SlideShare a Scribd company logo
OUTLINE 
• What is Cloud Computing? 
• What is the use of it? 
• What is attribute-based encryption? 
• Introduction. 
• Existing system and its disadvantages. 
• Proposed system and its advantages. 
• Hardware requirements. 
• Software requirements. 
• Use case diagrams. 
• Conclusion.
• There are a number of reasons why cloud 
computing is so widely used among 
businesses today some are: 
 Reduction of cost. 
 Universal access. 
 Flexibility.
• It is a type of public - key encryption in 
which the secret key of a user and the 
cipher text are dependent upon attributes 
(e.g. the country he lives, the subscriber 
he uses). 
• In such a system , the decryption of a 
cipher text is possible only if the set of 
attributes of the user key matches the 
attributes of the cipher text.
This webpage is to secure the personal 
and medical information of the patient 
using encryption. 
• Here we have an option of visibility... 
that means we can access the permission 
for particular member to visit or to see 
the status of the person(patient), that is 
nothing but
• The existing system stores the 
information in files. 
• That is personal and medical information. 
• The entire details about the user or 
patient are stored, in written type or any 
printed papers. 
• By this we may face many.
• By storing the information in files it can be 
exposed to the third party or unauthorized 
parties. 
• By secretly any one can access it this is the 
main disadvantage of the existing system. 
• It occupies more space. 
• High cost as it requires more space to store 
the files.
• Here we use system memory to store the 
personal and medical information of the 
person. 
• Here we use one technique to avoid risk like 
accessing the information of the particular 
person via network analysis and that is 
ATTRIBUTE –BASED ENCRYPTION.
• No can access the information of a person 
as it is encrypted by a secret key. 
• To see any report about the person … him 
self should login into the webpage and 
access the information. 
• Every user as unique user name and 
password that is known only to him. 
•User as an option to access the information 
for whom ever he needed.
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Floppy Drive - 1.44 MB 
 Processor - Pentium-III 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA
Operating System :Windows95 
/98/2000/XP 
Application Server : Tomcat5.0 
Front End : Java, JSP 
Database : MYSQL
registration 
login 
view old treatments 
patients 
enter disease details
login 
view patient details 
Doctors 
enter treatment details
admin doctor patient users treatments 
add doctors 
view doctors 
view patient details 
view user details 
enter treatments 
search and view treatments 
search and view treatments
 All patient data should be gathered and 
accessible through one system. 
 A PHR applies health information 
technology to your personal life to improve 
safety, reduces medical errors, reduces gaps 
in communication and reduce delays in 
receiving proper care.
Scalable and secure sharing of personal health records

More Related Content

Viewers also liked

Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
RRR784
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
Dr. Satya Mishra.
 
Personal Health Records - An Overview
Personal Health Records - An OverviewPersonal Health Records - An Overview
Personal Health Records - An Overview
rcostantini
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
Ayush Narula
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 
Personal Health Record and web 2.0
Personal Health Record and web 2.0Personal Health Record and web 2.0
Personal Health Record and web 2.0
Eugenio Santoro
 
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Liliana Laranjo
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
Pratik Poddar
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Asha a true story
Asha  a true storyAsha  a true story
Asha a true story
The Radiation Doctor
 
intensified pulse polio immunization 2016
intensified pulse polio immunization 2016intensified pulse polio immunization 2016
intensified pulse polio immunization 2016
dpmo123
 
Pulse polio immunization campaign
Pulse polio immunization campaignPulse polio immunization campaign
Pulse polio immunization campaign
Shanmukha Akinapelli
 
Pulse polio immunization campaign
Pulse polio immunization campaignPulse polio immunization campaign
Pulse polio immunization campaign
Shanmukha Guptha
 
ASHA - Revolutionary women
ASHA - Revolutionary womenASHA - Revolutionary women
ASHA - Revolutionary women
Dr. Pawan Kumar B
 
Intensive pulse polio immunisation
Intensive pulse polio immunisationIntensive pulse polio immunisation
Intensive pulse polio immunisation
Abino David
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoft
Custom Soft
 
Health and family welfare (eleventh five year plan)
Health and family welfare (eleventh five year plan)Health and family welfare (eleventh five year plan)
Health and family welfare (eleventh five year plan)
Sa Rah
 

Viewers also liked (20)

Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
 
Personal Health Records - An Overview
Personal Health Records - An OverviewPersonal Health Records - An Overview
Personal Health Records - An Overview
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
 
Personal Health Record and web 2.0
Personal Health Record and web 2.0Personal Health Record and web 2.0
Personal Health Record and web 2.0
 
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...Development of a Personal Health Record with a Diabetes Self-management Tool ...
Development of a Personal Health Record with a Diabetes Self-management Tool ...
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
Asha a true story
Asha  a true storyAsha  a true story
Asha a true story
 
intensified pulse polio immunization 2016
intensified pulse polio immunization 2016intensified pulse polio immunization 2016
intensified pulse polio immunization 2016
 
Pulse polio immunization campaign
Pulse polio immunization campaignPulse polio immunization campaign
Pulse polio immunization campaign
 
Pulse polio immunization campaign
Pulse polio immunization campaignPulse polio immunization campaign
Pulse polio immunization campaign
 
ASHA - Revolutionary women
ASHA - Revolutionary womenASHA - Revolutionary women
ASHA - Revolutionary women
 
Intensive pulse polio immunisation
Intensive pulse polio immunisationIntensive pulse polio immunisation
Intensive pulse polio immunisation
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoft
 
Health and family welfare (eleventh five year plan)
Health and family welfare (eleventh five year plan)Health and family welfare (eleventh five year plan)
Health and family welfare (eleventh five year plan)
 

Similar to Scalable and secure sharing of personal health records

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
JebasheelaSJ
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
Benjamin Biwer
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
miki304759
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Papitha Velumani
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
Jose L. Quiñones-Borrero
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
3 02
3 023 02
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
chnrketan
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
Great Bay Software
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
Feisal Nanji
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
selvapriyabiher
 
Hospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptxHospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptx
CopyContentCC
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 

Similar to Scalable and secure sharing of personal health records (20)

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
3 02
3 023 02
3 02
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Hospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptxHospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptx
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 

Recently uploaded

4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
mahaffeycheryld
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 

Recently uploaded (20)

4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 

Scalable and secure sharing of personal health records

  • 1.
  • 2.
  • 3. OUTLINE • What is Cloud Computing? • What is the use of it? • What is attribute-based encryption? • Introduction. • Existing system and its disadvantages. • Proposed system and its advantages. • Hardware requirements. • Software requirements. • Use case diagrams. • Conclusion.
  • 4.
  • 5. • There are a number of reasons why cloud computing is so widely used among businesses today some are:  Reduction of cost.  Universal access.  Flexibility.
  • 6.
  • 7. • It is a type of public - key encryption in which the secret key of a user and the cipher text are dependent upon attributes (e.g. the country he lives, the subscriber he uses). • In such a system , the decryption of a cipher text is possible only if the set of attributes of the user key matches the attributes of the cipher text.
  • 8. This webpage is to secure the personal and medical information of the patient using encryption. • Here we have an option of visibility... that means we can access the permission for particular member to visit or to see the status of the person(patient), that is nothing but
  • 9.
  • 10. • The existing system stores the information in files. • That is personal and medical information. • The entire details about the user or patient are stored, in written type or any printed papers. • By this we may face many.
  • 11. • By storing the information in files it can be exposed to the third party or unauthorized parties. • By secretly any one can access it this is the main disadvantage of the existing system. • It occupies more space. • High cost as it requires more space to store the files.
  • 12. • Here we use system memory to store the personal and medical information of the person. • Here we use one technique to avoid risk like accessing the information of the particular person via network analysis and that is ATTRIBUTE –BASED ENCRYPTION.
  • 13. • No can access the information of a person as it is encrypted by a secret key. • To see any report about the person … him self should login into the webpage and access the information. • Every user as unique user name and password that is known only to him. •User as an option to access the information for whom ever he needed.
  • 14.
  • 15.  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Processor - Pentium-III  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 16. Operating System :Windows95 /98/2000/XP Application Server : Tomcat5.0 Front End : Java, JSP Database : MYSQL
  • 17.
  • 18. registration login view old treatments patients enter disease details
  • 19. login view patient details Doctors enter treatment details
  • 20. admin doctor patient users treatments add doctors view doctors view patient details view user details enter treatments search and view treatments search and view treatments
  • 21.
  • 22.  All patient data should be gathered and accessible through one system.  A PHR applies health information technology to your personal life to improve safety, reduces medical errors, reduces gaps in communication and reduce delays in receiving proper care.