SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 20
CLOUD ASSISTED PRIVACY PRESERVING AND DATA INTEGRITY
FOR MOBILE HEALTH MONITORING
K.M.Jadhav1
, S.R.Idate2
1
PG Student,Department Of Information Technology, Bharti Vidyapeeth Deemed University College Of Engineering,
Pune, India
2
Assoc.Prof., Department Of Information Technology, Bharti vidyapeeth Deemed University College Of Engineering,
Pune, India
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically
and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not
changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party
Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is
difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is
to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health
monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the
algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
-------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
Cloud storage is service ,where data is remotely maintained
and back up. The service is available to user over a network
,which usually the internet. It allows the user to store files
online ,so that the user can access them from any location
via the internet. The provider company makes them
available to the user online by keeping the uploaded files on
an external server. This gives companies using cloud storage
service ease and convenience, but can potentially be costly.
Users should also be aware that backing up their data is still
required when using cloud storage service ,because
recovering data from cloud storage is much slower than
local backup. Some of the cloud storage advantages are
decrease expenditure, afford more flexibility. In spite of
these advantages ,"cloud" require in some of the issues like
information honesty ,information loss, illegal right of entry,
isolation etc.
fortunately, even though cloud-assisted mHealth monitoring
could offer a huge chance to get better the excellence of
healthcare services and potentially reduce healthcare costs
.There is uncertain chunk in creation this technology a
truth.[2] exclusive of correctly addressing the information
organization in an mHealth system ,customers isolation may
be harshly breach during the collection ,storage ,diagnosis,
communications and computing .A current learning shows
that 75% Americans judge the isolation of their health
information important or very important[3].
2. RELATED WORK
1 .Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak,
U.Systems, Man, and Cybernetics (SMC), 2012 IEEE
International Conference on2012
In this paper, we show that both requirements can be
satisfied fully when adopting a novel cloud-based PHR
system architecture. [4]
2. Smith, R.; Jie Xu; Hima, S.; Johnson, We present a
prototype which takes health records from a commercial
data provider, anonymises them in an innovative way and
makes them available within a secure cloud-based Virtual
Research Environment (VRE)[5]
T.; Fabian, B.Business Informatics (CBI),. we present a
novel secure architecture for sharing electronic health
records in a cloud environment.[6]
Lingfeng Chen; Hoang, D.B.This paper addresses security
and privacy challenges in healthcare cloud by deploying a
novel framework with CPRBAC (Cloud-based Privacy-
aware Role Based Access Control) model for controllability,
traceability of data and authorized access to system
resources[7]
3. EXISISTING SYSTEM
They have proposed mobile health monitoring system which
provides a good opportunity for adversaries to obtain a large
set of medical information. In that clients input there related
health data such as a systolic blood pressure(BP),whether
they missed daily medications or have an abnormal diet and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 21
the energy consumption of physical activity to the decision
support system, which will then return a recommendation on
how the clients can improve their condition[2]
3.1 Limitations of Existing System
 Exisisting system does not store medical data on
cloud side[2].
 Exisisting system does not focus on Data integrity
issue.
4. PROPOSED SYSTEM
In proposed health monitoring system, If the patient wants to
consult about his BP problem or Diabetes problem such as
increase or decrease in the sugar level. For the medical
advice regarding above problem ,He can log in To The
mobile health monitoring Application, To use this
Application his mobile must have android base and he has to
install This particular mobile health monitoring application.
There is another application ,in which the provider can store
the general information regarding the health related problem
such as BP, Diabetes and Hypertension. In this Mobile
Health Monitoring System, provider have suggested, how to
take care when above described problems are arised. All
data of these application are stored on cloud. some times
what happens if there is no strong security system used then
data can be altered, changed or hacked by the hackers. Thus
there is no fear to provider or user regarding data security
,because In this applications data is secured strongly by
using following algorithms.Namely:1)Tate pairing 2)Token
Generation 3)AES (Advanced Encryption standards)
4.1 System Architecture
Fig 1 System Architecture
We now highlight our design of the proposed cloud assisted
privacy preserving and data integrity for Mobile Health
Monitoring System. Above fig 1.consist of 3 parties i.e
1)Android Mobile User 2)Cloud Health Provider and Semi
Trust Authority. Semi Trust Authority generate public and
private key for each and every user who does the registration
to Mobile Health Application. when any android mobile
user first do the registration to Mobile Health Application
and After that he will send Request for token to the Semi
Trust Authority .when Semi Trust Authority receives request
he will first check whether it is valid user or not and if it is
valid then he will send token to requested user. when user
receives token ,he will encrypt data by using that token and
send query for ex. systolic Bp:100 e.t.c.to cloud Health
Provider. When Cloud Health Provider Receives query from
user, cloud health provider requires the users private key to
decrypt users data .so ,he will send request to the semi
Trust Authority for users private key After receiving request
,Semi Trust Authority sends users private key to cloud
Health Provider and then Cloud Health Provider decrypts
data by using AES algorithm send Query Result to requested
user.
In our proposed cloud assisted privacy preserving and data
integrity for Mobile Health Monitoring System, actually
consist four modules which are as follows:
a) Cloud server
b) M-Health Provider
c)Trusted Authority
d) Client
a) Cloud Server:
1) Acts as offline storage
2) All data are saved in encrypted format
3) Even passwords of users too
b) MHealth Provider
1) Stores Data on cloud in encrypted format
2) can view user detail
3) Add medical data detail (BP,Systolic,e.t.c)
4) View or add comments or Description
c) Trusted Authority
1) Activates user account
2 )Generate token for user
3)Trusted Authority can't view token as it is generated and
to client .
Token = jz6v|ERHZiowFuiPL8SiB9==
d) Client
1) Registers with mHealth
2) Trusted authority must activate the user
3) can view their details
4) Raise Query
5) view Query results
6) Using token he can view query results
7) Query automatically send to Trusted authority.
8) Query = "blood pressure 50,missed medication:3"
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 22
4.2 Mathematical Function Definition for the
System
M = Message
Min1 = Minimum value.
Max1 = Maximum value.
M = { , , ......... }
Where,
M = Message as per the High BP range and Low BP range.
for example,
Min1 -> specifies the low value
Range of Min1 = 60 -70 means it represents the low BP.
Min2-> Specifies the another Low value,
Range of Min2-> - 80-90 it represents normal BP.
Max1->Specifies the High value.
Range of Max1 ->100-120 it represents the normal BP.
Max2->130-160 it represents the high Bp.
Fig 2 Mathematical Function Definition For The System
4.3 Algorithmic Strategy
1) AES Algorithm
a) Encryption
Input: String to be encrypted
Output: Encrypted value
Begin
Get the instance of Cipher class i.e java.crypto.cipher.
Step 1: Generate the dynamic Key
Step 2:Using Base 64 encoder encode the bytes of given
String and get the encrypted value.
Return encrypted value.
End
b) Decryption
Input: String to be decrypted
Output: decrypt value
Begin
Get the instance of Cipher class i.e java.crypto.cipher.
Step 1: Generate the dynamic Key
Step 2:Using Base 64 decoder to decode the bytes of given
String and get the decrypted value.
Return decrypted value.
End
2) Tate Pairing
Input: Generate the public key and private key
Output: public key value and private key value
Begin
Point Key = new point(x,y)
pairing e = new Tate pairing curve,grouporder,coFactor);
point p = new point(x2,y2);
point Ppub = new point(x3,y3);
BFMasterPublicKeyparam = new
BFMasterPublicKey(e,p,Ppub);
private key = new BFUserPrivateKey(key param);
Return Public key and Private key
End
4.4 Experimental Results
1) Health Provider
STEPS:
TO START TOMCAT
 Go to command line- Type cd
C:CloudHealthapache-tomcat-7.0.54bin
 write : startup.bat
 3 Go to Firefox :
http://localhost:8080/cloudhealthprovider
 4 click on signup and create new account
 5 sign in to application with user name and
password.
 6 After sign in following window will be displayed
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 23
 In Above window There are three buttons
a) Home
b) Provider
c) Action
 After clicking provider button following window will be displayed:
 In above window, After clicking provider option ,The three sub options of provider will open these are:
a) Add medication details
b) View medication details
c) user search
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 24
a) In add medication detail provider can add medication details of diseases which are displayed in following window:
b) In view medication details, provider can view the details of medications which he had added.
c) when user click on Action option then will get three sub options which are:
1)Update Profile
2)Change Password
3)Logout
1) If provider wants to update his profile then he has to click on update profile button.
2) If provider wants to change password then he has to click on change password button.
3) If provider wants to Logout from application then he has to click on logout button.
2) For Android User
STEPS:
 C:CloudHealthadt-bundle-windows-x86_64-20140702eclipse . start eclipse.
 After starting the eclipse following window will open
.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 25
 After dragging the android mobile lock displaced in above window then following window will open. This window is
consisting of different options. as well as different applications. from these applications one has to select mobile health
application i.e m_Health.
 After clicking mobile health application the next window will open. In that window there are two options one is sign in and
another is register. if the user is already having his account then he has to sign in only, otherwise he has to open new
account by clicking on register option. and has to submit it, then he will get his username and password.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 26
 After signing in to the android mobile health application following window will open.
In This window There are two options of two types of diseases These are:
i) Hypertension
ii)Diabetes
According to the need of user he has to select any one application from above mention window and to click the same.
For example, If the user is blood pressure patient, and if he knows that his BP is at high level, then he has to enter his information
about BP reading in the Hypertension form. after submitting it ,he will get immediately the required message displaced on the
mobile screen and then according to the suggestions of that message he has to act to control his BP level to normal side.
4.5 To View Databse
 STEPS:
1. Start toad
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 27
In Above Database Healthcare provider, user and disease data is stored. The data stored in database is in encrypted format. This
data is encrypted by using Tate pairing algorithm and AES Algorithm. so there is no need to fear about the data is stolen or
hacked by anybody. following screen is displaying the user and provider data in encrypted format. This all Healthcare provider
and user data will be finally stored in cloud side with encrypted format. As per the requirement of user or provider same data
stored on cloud side will be decrypted as an when required by the user or provider.
 USER DATA
 PROVIDER DATA
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 28
5. CONCLUSION
We have come to the conclusion that, the above designed
application will help to the healthcare provider and to the
patient to solve there problems of medication.Thus this
paper has addressed this important problem related to the
data integrity and design a cloud assisted privacy preserving
mobile-health monitoring system to protect the privacy of
the involved parties and their data. for that purpose we have
used the algorithm:1)Tate pairing 2)Token generation
3)AES(Advanced Encryption Standards)-SHA1 and MD5
algorithms
REFERENCES
[1]. Saranya eswaran and Dr,sunitha Abburu,"Identifying
Data Integrity in the Cloud storage" in IJCSI,Vol.9,Issue
2,No 1,March 2012.
[2]. CAM:Cloud-Assisted Privacy Preserving Mobile Health
Monitoring Huang Lin,Jun Shao,Chi Zhang,and Yuguang
Fang,Fellow,IEEE.VOL. 8,NO.6,JUNE 2013.
[3]. L.Ponemon Institute,Americans' Opinions on Healthcare
Privaacy,2010[Online].Available:http://tinyurl.com/4atsdlj.
[4]. Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak,
U.Systems, Man, and Cybernetics (SMC), 2012 IEEE
International Conference on2012
[5]. Smith, R.; Jie Xu; Hima, S.; Johnson, O.Service
Oriented System Engineering (SOSE), 2013 IEEE 7th
International Symposium on2013
[6]. Ermakova, T.; Fabian, B.Business Informatics (CBI),
2013 IEEE 15th Conference on2013
[7]. High Performance Computing and Communications
(HPCC), 2011 IEEE 13th International Conference on2011.

More Related Content

What's hot

The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
IRJET Journal
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET Journal
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET Journal
 
Ibrahem
IbrahemIbrahem
Ibrahem
BarojReal
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
IJET - International Journal of Engineering and Techniques
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
Health Data Share Service System using REST
Health Data Share Service System using RESTHealth Data Share Service System using REST
Health Data Share Service System using REST
theijes
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
K017547981
K017547981K017547981
K017547981
IOSR Journals
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Editor IJARCET
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
IJECEIAES
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
IRJET Journal
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
 

What's hot (20)

The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Health Data Share Service System using REST
Health Data Share Service System using RESTHealth Data Share Service System using REST
Health Data Share Service System using REST
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
K017547981
K017547981K017547981
K017547981
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
M dgx mde0mdi=
M dgx mde0mdi=M dgx mde0mdi=
M dgx mde0mdi=
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 

Similar to Cloud assisted privacy preserving and data integrity for mobile health monitoring

IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
IRJET Journal
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
IRJET Journal
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
VishalSoni95234
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Akshay Mittal
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud Computing
IOSR Journals
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET Journal
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET Journal
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
IJERA Editor
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET Journal
 

Similar to Cloud assisted privacy preserving and data integrity for mobile health monitoring (20)

IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud Computing
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Cloud assisted privacy preserving and data integrity for mobile health monitoring

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 20 CLOUD ASSISTED PRIVACY PRESERVING AND DATA INTEGRITY FOR MOBILE HEALTH MONITORING K.M.Jadhav1 , S.R.Idate2 1 PG Student,Department Of Information Technology, Bharti Vidyapeeth Deemed University College Of Engineering, Pune, India 2 Assoc.Prof., Department Of Information Technology, Bharti vidyapeeth Deemed University College Of Engineering, Pune, India Abstract In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5. Keywords— Data integrity,TPA,Tate pairing, Cryptography -------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Cloud storage is service ,where data is remotely maintained and back up. The service is available to user over a network ,which usually the internet. It allows the user to store files online ,so that the user can access them from any location via the internet. The provider company makes them available to the user online by keeping the uploaded files on an external server. This gives companies using cloud storage service ease and convenience, but can potentially be costly. Users should also be aware that backing up their data is still required when using cloud storage service ,because recovering data from cloud storage is much slower than local backup. Some of the cloud storage advantages are decrease expenditure, afford more flexibility. In spite of these advantages ,"cloud" require in some of the issues like information honesty ,information loss, illegal right of entry, isolation etc. fortunately, even though cloud-assisted mHealth monitoring could offer a huge chance to get better the excellence of healthcare services and potentially reduce healthcare costs .There is uncertain chunk in creation this technology a truth.[2] exclusive of correctly addressing the information organization in an mHealth system ,customers isolation may be harshly breach during the collection ,storage ,diagnosis, communications and computing .A current learning shows that 75% Americans judge the isolation of their health information important or very important[3]. 2. RELATED WORK 1 .Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak, U.Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on2012 In this paper, we show that both requirements can be satisfied fully when adopting a novel cloud-based PHR system architecture. [4] 2. Smith, R.; Jie Xu; Hima, S.; Johnson, We present a prototype which takes health records from a commercial data provider, anonymises them in an innovative way and makes them available within a secure cloud-based Virtual Research Environment (VRE)[5] T.; Fabian, B.Business Informatics (CBI),. we present a novel secure architecture for sharing electronic health records in a cloud environment.[6] Lingfeng Chen; Hoang, D.B.This paper addresses security and privacy challenges in healthcare cloud by deploying a novel framework with CPRBAC (Cloud-based Privacy- aware Role Based Access Control) model for controllability, traceability of data and authorized access to system resources[7] 3. EXISISTING SYSTEM They have proposed mobile health monitoring system which provides a good opportunity for adversaries to obtain a large set of medical information. In that clients input there related health data such as a systolic blood pressure(BP),whether they missed daily medications or have an abnormal diet and
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 21 the energy consumption of physical activity to the decision support system, which will then return a recommendation on how the clients can improve their condition[2] 3.1 Limitations of Existing System  Exisisting system does not store medical data on cloud side[2].  Exisisting system does not focus on Data integrity issue. 4. PROPOSED SYSTEM In proposed health monitoring system, If the patient wants to consult about his BP problem or Diabetes problem such as increase or decrease in the sugar level. For the medical advice regarding above problem ,He can log in To The mobile health monitoring Application, To use this Application his mobile must have android base and he has to install This particular mobile health monitoring application. There is another application ,in which the provider can store the general information regarding the health related problem such as BP, Diabetes and Hypertension. In this Mobile Health Monitoring System, provider have suggested, how to take care when above described problems are arised. All data of these application are stored on cloud. some times what happens if there is no strong security system used then data can be altered, changed or hacked by the hackers. Thus there is no fear to provider or user regarding data security ,because In this applications data is secured strongly by using following algorithms.Namely:1)Tate pairing 2)Token Generation 3)AES (Advanced Encryption standards) 4.1 System Architecture Fig 1 System Architecture We now highlight our design of the proposed cloud assisted privacy preserving and data integrity for Mobile Health Monitoring System. Above fig 1.consist of 3 parties i.e 1)Android Mobile User 2)Cloud Health Provider and Semi Trust Authority. Semi Trust Authority generate public and private key for each and every user who does the registration to Mobile Health Application. when any android mobile user first do the registration to Mobile Health Application and After that he will send Request for token to the Semi Trust Authority .when Semi Trust Authority receives request he will first check whether it is valid user or not and if it is valid then he will send token to requested user. when user receives token ,he will encrypt data by using that token and send query for ex. systolic Bp:100 e.t.c.to cloud Health Provider. When Cloud Health Provider Receives query from user, cloud health provider requires the users private key to decrypt users data .so ,he will send request to the semi Trust Authority for users private key After receiving request ,Semi Trust Authority sends users private key to cloud Health Provider and then Cloud Health Provider decrypts data by using AES algorithm send Query Result to requested user. In our proposed cloud assisted privacy preserving and data integrity for Mobile Health Monitoring System, actually consist four modules which are as follows: a) Cloud server b) M-Health Provider c)Trusted Authority d) Client a) Cloud Server: 1) Acts as offline storage 2) All data are saved in encrypted format 3) Even passwords of users too b) MHealth Provider 1) Stores Data on cloud in encrypted format 2) can view user detail 3) Add medical data detail (BP,Systolic,e.t.c) 4) View or add comments or Description c) Trusted Authority 1) Activates user account 2 )Generate token for user 3)Trusted Authority can't view token as it is generated and to client . Token = jz6v|ERHZiowFuiPL8SiB9== d) Client 1) Registers with mHealth 2) Trusted authority must activate the user 3) can view their details 4) Raise Query 5) view Query results 6) Using token he can view query results 7) Query automatically send to Trusted authority. 8) Query = "blood pressure 50,missed medication:3"
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 22 4.2 Mathematical Function Definition for the System M = Message Min1 = Minimum value. Max1 = Maximum value. M = { , , ......... } Where, M = Message as per the High BP range and Low BP range. for example, Min1 -> specifies the low value Range of Min1 = 60 -70 means it represents the low BP. Min2-> Specifies the another Low value, Range of Min2-> - 80-90 it represents normal BP. Max1->Specifies the High value. Range of Max1 ->100-120 it represents the normal BP. Max2->130-160 it represents the high Bp. Fig 2 Mathematical Function Definition For The System 4.3 Algorithmic Strategy 1) AES Algorithm a) Encryption Input: String to be encrypted Output: Encrypted value Begin Get the instance of Cipher class i.e java.crypto.cipher. Step 1: Generate the dynamic Key Step 2:Using Base 64 encoder encode the bytes of given String and get the encrypted value. Return encrypted value. End b) Decryption Input: String to be decrypted Output: decrypt value Begin Get the instance of Cipher class i.e java.crypto.cipher. Step 1: Generate the dynamic Key Step 2:Using Base 64 decoder to decode the bytes of given String and get the decrypted value. Return decrypted value. End 2) Tate Pairing Input: Generate the public key and private key Output: public key value and private key value Begin Point Key = new point(x,y) pairing e = new Tate pairing curve,grouporder,coFactor); point p = new point(x2,y2); point Ppub = new point(x3,y3); BFMasterPublicKeyparam = new BFMasterPublicKey(e,p,Ppub); private key = new BFUserPrivateKey(key param); Return Public key and Private key End 4.4 Experimental Results 1) Health Provider STEPS: TO START TOMCAT  Go to command line- Type cd C:CloudHealthapache-tomcat-7.0.54bin  write : startup.bat  3 Go to Firefox : http://localhost:8080/cloudhealthprovider  4 click on signup and create new account  5 sign in to application with user name and password.  6 After sign in following window will be displayed
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 23  In Above window There are three buttons a) Home b) Provider c) Action  After clicking provider button following window will be displayed:  In above window, After clicking provider option ,The three sub options of provider will open these are: a) Add medication details b) View medication details c) user search
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 24 a) In add medication detail provider can add medication details of diseases which are displayed in following window: b) In view medication details, provider can view the details of medications which he had added. c) when user click on Action option then will get three sub options which are: 1)Update Profile 2)Change Password 3)Logout 1) If provider wants to update his profile then he has to click on update profile button. 2) If provider wants to change password then he has to click on change password button. 3) If provider wants to Logout from application then he has to click on logout button. 2) For Android User STEPS:  C:CloudHealthadt-bundle-windows-x86_64-20140702eclipse . start eclipse.  After starting the eclipse following window will open .
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 25  After dragging the android mobile lock displaced in above window then following window will open. This window is consisting of different options. as well as different applications. from these applications one has to select mobile health application i.e m_Health.  After clicking mobile health application the next window will open. In that window there are two options one is sign in and another is register. if the user is already having his account then he has to sign in only, otherwise he has to open new account by clicking on register option. and has to submit it, then he will get his username and password.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 26  After signing in to the android mobile health application following window will open. In This window There are two options of two types of diseases These are: i) Hypertension ii)Diabetes According to the need of user he has to select any one application from above mention window and to click the same. For example, If the user is blood pressure patient, and if he knows that his BP is at high level, then he has to enter his information about BP reading in the Hypertension form. after submitting it ,he will get immediately the required message displaced on the mobile screen and then according to the suggestions of that message he has to act to control his BP level to normal side. 4.5 To View Databse  STEPS: 1. Start toad
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 27 In Above Database Healthcare provider, user and disease data is stored. The data stored in database is in encrypted format. This data is encrypted by using Tate pairing algorithm and AES Algorithm. so there is no need to fear about the data is stolen or hacked by anybody. following screen is displaying the user and provider data in encrypted format. This all Healthcare provider and user data will be finally stored in cloud side with encrypted format. As per the requirement of user or provider same data stored on cloud side will be decrypted as an when required by the user or provider.  USER DATA  PROVIDER DATA
  • 9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 28 5. CONCLUSION We have come to the conclusion that, the above designed application will help to the healthcare provider and to the patient to solve there problems of medication.Thus this paper has addressed this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithm:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5 algorithms REFERENCES [1]. Saranya eswaran and Dr,sunitha Abburu,"Identifying Data Integrity in the Cloud storage" in IJCSI,Vol.9,Issue 2,No 1,March 2012. [2]. CAM:Cloud-Assisted Privacy Preserving Mobile Health Monitoring Huang Lin,Jun Shao,Chi Zhang,and Yuguang Fang,Fellow,IEEE.VOL. 8,NO.6,JUNE 2013. [3]. L.Ponemon Institute,Americans' Opinions on Healthcare Privaacy,2010[Online].Available:http://tinyurl.com/4atsdlj. [4]. Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak, U.Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on2012 [5]. Smith, R.; Jie Xu; Hima, S.; Johnson, O.Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on2013 [6]. Ermakova, T.; Fabian, B.Business Informatics (CBI), 2013 IEEE 15th Conference on2013 [7]. High Performance Computing and Communications (HPCC), 2011 IEEE 13th International Conference on2011.