scalable and secure sharing of public health record using attribute based encryption

29
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE BASED ENCRYPTION By Shreyank M. Byadagi Email:[email protected]

Upload: shreyank-byadagi

Post on 15-Jul-2015

232 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Scalable and secure sharing of public health record using attribute based Encryption

SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING

ATTRIBUTE BASED ENCRYPTION

ByShreyank M. ByadagiEmail:[email protected]

Page 2: Scalable and secure sharing of public health record using attribute based Encryption

AGENDA:

1. Objectives of project.

2. Problem definition.

3. Literature survey.

4. Methodology.

5. Applications.

6. Implementation carried out.

7. References.

Page 3: Scalable and secure sharing of public health record using attribute based Encryption

OBJECTIVES:

• The main aim of this system is to provide secure patient-centric PHR access and efficient key management at the same time.

• The key idea is to divide the system into multiple security domains according to the different users’ data access requirements.

Page 4: Scalable and secure sharing of public health record using attribute based Encryption

PROBLEM DEFINITION:

Personal health record(PHR) is meant for health information exchange , this data is outsourced for maintenance like cloud providers.

CHALLENGES :

• PHR data is prone to unauthorized access.

• Access needs to be secure.

OUR SOLUTION:

• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.

• A high degree of patient privacy guaranteed.

Page 5: Scalable and secure sharing of public health record using attribute based Encryption

LITERATURE SURVEY:

• J. Benaloh, proposed a scheme “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in which a file can be uploaded without key distribution and it is highly efficient.

• J. Hur and D. K. Noh proposed a scheme “Attribute-Based Revocation in Data Outsourcing Systems” with immediate capability, instead of periodical revocation.

Page 6: Scalable and secure sharing of public health record using attribute based Encryption

SYSTEM FLOW DIAGRAM:

Page 7: Scalable and secure sharing of public health record using attribute based Encryption

ARCHITECTURE:

Page 8: Scalable and secure sharing of public health record using attribute based Encryption

ER-Diagram:

Page 9: Scalable and secure sharing of public health record using attribute based Encryption

EXISTING SYSTEM:

• Due to the high cost of building and maintaining specialized data centers, many PHR services are outsourced .

• The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third-party server which people may not fully trust.

Page 10: Scalable and secure sharing of public health record using attribute based Encryption

EXISTING SYSTEM(Contd…):Hey, I got it !!Lets modify &

send!!!

Page 11: Scalable and secure sharing of public health record using attribute based Encryption

PROPOSED SYSTEM:

• It is the promising method to encrypt the PHRs before outsourcing.

• Risks of privacy exposure , scalability in key management , flexible access are important challenges towards data access control.

• Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.

Page 12: Scalable and secure sharing of public health record using attribute based Encryption

PROPOSED SYSTEM (Contd…):????????????

?

Encryption using ABE

Page 13: Scalable and secure sharing of public health record using attribute based Encryption

ALGORITHMS:

• Advanced Encryption Standard(AES)

• Message Digest5(MD5)

Page 14: Scalable and secure sharing of public health record using attribute based Encryption

ADVANCED ENCRYPTION STANDARD:

• Step1:Substitute bytes.

• Step2. Shift rows.

• Step3. Mix Columns.

• Step4. Add Round Key

Page 15: Scalable and secure sharing of public health record using attribute based Encryption

Step1: SUBSTITUTE BYTES:

Page 16: Scalable and secure sharing of public health record using attribute based Encryption

Contd….

Page 17: Scalable and secure sharing of public health record using attribute based Encryption

Step2:SHIFT ROW TRANSFORMATION:

Page 18: Scalable and secure sharing of public health record using attribute based Encryption

Step3:MIX COLUMN TRANSFORMATION:

Page 19: Scalable and secure sharing of public health record using attribute based Encryption

STEP4:ADD ROUND KEY:

Page 20: Scalable and secure sharing of public health record using attribute based Encryption

MESSAGE DIGEST5(MD5):

• Step1: Append padding bits: Message is pad so its length is 448 mod 512

• Step2: Append Length Append a 64-bit length value to message Generate a message with 512 bits in length

• Step3: Initialize MD buffer Initialize a 4-word (128-bit) MD buffer (A, B, C, D)

Word A: 01 23 45 67 Word B: 89 AB CD EF Word C: FE DC BA 98Word D: 76 54 32 10

• Step4: Process Message in 16-word block Process message in 16-word (512-bit) blocks

• Step5: Output

Page 21: Scalable and secure sharing of public health record using attribute based Encryption

Difference B/W:

Existing System:

1. Expensive to maintain many PHR services.

2. Patient rejects to share his PHI as it is stored in third party server.

Proposed System:

1. Inexpensive to create and maintain PHR services.

2. Patient shares his PHI as it is encrypted using ABE technique before it is stored in third party server.

Page 22: Scalable and secure sharing of public health record using attribute based Encryption

ATTRIBUTE BASED ENCRYPTION(ABE):

Page 23: Scalable and secure sharing of public health record using attribute based Encryption

APPLICATIONS:

• Hospital Management.

• Health Care Website.

Page 24: Scalable and secure sharing of public health record using attribute based Encryption

MODULES:

• PHR Owner module

• Cloud Server Module

• Attribute based Access Policy Module

• Data confidentiality Module

Front end of our project is prepared with the help of JSP.

Page 25: Scalable and secure sharing of public health record using attribute based Encryption

REQUIREMENTS:

HARDWARE REQUIREMENTS:-

• Processor - Pentium –III

• Speed - 1.1 Ghz

• RAM - 256 MB(min)

• Hard Disk - 20 GB

• Floppy Drive - 1.44 MB

• Key Board - Standard Windows Keyboard

• Mouse - Two or Three Button Mouse

• Monitor - SVGA

Page 26: Scalable and secure sharing of public health record using attribute based Encryption

REQUIREMENTS(CONTD..)

SOFTWARE REQUIREMENTS:-

• Operating System : Windows95/98/2000/XP

• TOOL USED : ECLIPSE

• Front End : JAVA

Page 27: Scalable and secure sharing of public health record using attribute based Encryption

REFERENCES:

• M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”.

• H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud”.

• “The health insurance portability and accountability act”.

Page 28: Scalable and secure sharing of public health record using attribute based Encryption

ANY SUGGESTIONS??

Page 29: Scalable and secure sharing of public health record using attribute based Encryption

THANK YOU!!!!