SlideShare a Scribd company logo
SCALABLE AND SECURE SHARING OF PERSONAL
HEALTH RECORDS IN CLOUD COMPUTING USING
ATTRIBUTE BASED ENCRYPTION
By
Shreyank M. Byadagi
Email:shrunk7byadagi@gmail.com
AGENDA:
1. Objectives of project.
2. Problem definition.
3. Literature survey.
4. Methodology.
5. Applications.
6. Implementation carried out.
7. References.
OBJECTIVES:
• The main aim of this system is to provide secure patient-
centric PHR access and efficient key management at the same
time.
• The key idea is to divide the system into multiple security
domains according to the different users’ data access
requirements.
PROBLEM DEFINITION:
Personal health record(PHR) is meant for health information
exchange , this data is outsourced for maintenance like cloud
providers.
CHALLENGES :
• PHR data is prone to unauthorized access.
• Access needs to be secure.
OUR SOLUTION:
• Attribute Based Encryption(ABE) techniques are used to
encrypt patient’s PHR file.
• A high degree of patient privacy guaranteed.
LITERATURE SURVEY:
• J. Benaloh, proposed a scheme “Patient Controlled
Encryption: Ensuring Privacy of Electronic Medical Records,”
in which a file can be uploaded without key distribution and it
is highly efficient.
• J. Hur and D. K. Noh proposed a scheme “Attribute-Based
Revocation in Data Outsourcing Systems” with immediate
capability, instead of periodical revocation.
SYSTEM FLOW DIAGRAM:
ARCHITECTURE:
ER-Diagram:
EXISTING SYSTEM:
• Due to the high cost of building and maintaining specialized
data centers, many PHR services are outsourced .
• The main concern is about whether the patients could
actually control the sharing of their sensitive personal health
information (PHI), especially when they are stored on a third-
party server which people may not fully trust.
EXISTING SYSTEM(Contd…):
Hey, I got it !!
Lets modify &
send!!!
PROPOSED SYSTEM:
• It is the promising method to encrypt the PHRs before
outsourcing.
• Risks of privacy exposure , scalability in key management ,
flexible access are important challenges towards data access
control.
• Attribute Based Encryption(ABE) techniques are used to
encrypt patient’s PHR file.
PROPOSED SYSTEM (Contd…):
????????????
?
Encryption
using ABE
ALGORITHMS:
• Advanced Encryption Standard(AES)
• Message Digest5(MD5)
ADVANCED ENCRYPTION STANDARD:
• Step1:Substitute bytes.
• Step2. Shift rows.
• Step3. Mix Columns.
• Step4. Add Round Key
Step1: SUBSTITUTE BYTES:
Contd….
Step2:SHIFT ROW TRANSFORMATION:
Step3:MIX COLUMN TRANSFORMATION:
STEP4:ADD ROUND KEY:
MESSAGE DIGEST5(MD5):
• Step1: Append padding bits: Message is pad so its length is 448
mod 512
• Step2: Append Length Append a 64-bit length value to message
Generate a message with 512 bits in length
• Step3: Initialize MD buffer Initialize a 4-word (128-bit) MD buffer (A,
B, C, D)
Word A: 01 23 45 67
Word B: 89 AB CD EF
Word C: FE DC BA 98
Word D: 76 54 32 10
• Step4: Process Message in 16-word block Process message in 16-
word (512-bit) blocks
• Step5: Output
Difference B/W:
Existing System:
1. Expensive to maintain
many PHR services.
2. Patient rejects to share his
PHI as it is stored in third
party server.
Proposed System:
1. Inexpensive to create and
maintain PHR services.
2. Patient shares his PHI as it
is encrypted using ABE
technique before it is
stored in third party server.
ATTRIBUTE BASED ENCRYPTION(ABE):
APPLICATIONS:
• Hospital Management.
• Health Care Website.
MODULES:
• PHR Owner module
• Cloud Server Module
• Attribute based Access Policy Module
• Data confidentiality Module
Front end of our project is prepared with the help of JSP.
REQUIREMENTS:
HARDWARE REQUIREMENTS:-
• Processor - Pentium –III
• Speed - 1.1 Ghz
• RAM - 256 MB(min)
• Hard Disk - 20 GB
• Floppy Drive - 1.44 MB
• Key Board - Standard Windows Keyboard
• Mouse - Two or Three Button Mouse
• Monitor - SVGA
REQUIREMENTS(CONTD..)
SOFTWARE REQUIREMENTS:-
• Operating System : Windows95/98/2000/XP
• TOOL USED : ECLIPSE
• Front End : JAVA
REFERENCES:
• M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health
records in cloud computing: Patient-centric and fine-grained
data access control in multi-owner settings”.
• H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-
health cloud”.
• “The health insurance portability and accountability act”.
ANY SUGGESTIONS??
THANK YOU!!!!

More Related Content

Viewers also liked (19)

DOCX
Attribute Based Encryption
UT, San Antonio
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
PPTX
Attribute-Based Encryption for Cloud Security
Mphasis
 
PPTX
Personal Health Records
RRR784
 
PPTX
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
PDF
Personal Health Records
Dr. Satya Mishra.
 
DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
parry prabhu
 
PDF
Presentation
Saikrishna Badrinarayanan
 
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Nexgen Technology
 
PPTX
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
PDF
Identity Based Encryption
Pratik Poddar
 
PPTX
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
PPTX
Personal Health Records
Ayush Narula
 
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
DOC
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
PPTX
Encryption-Based Multilevel Model for DBMS
Amna Magzoub
 
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Attribute Based Encryption
UT, San Antonio
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Attribute-Based Encryption for Cloud Security
Mphasis
 
Personal Health Records
RRR784
 
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Personal Health Records
Dr. Satya Mishra.
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
parry prabhu
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Nexgen Technology
 
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
Identity Based Encryption
Pratik Poddar
 
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Personal Health Records
Ayush Narula
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
Encryption-Based Multilevel Model for DBMS
Amna Magzoub
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 

Similar to Scalable and secure sharing of public health record using attribute based Encryption (20)

DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Secure Personal Health Records Using Encryption
Editor IJCATR
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
PDF
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
PDF
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
DOCX
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
PDF
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
PDF
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
DOCX
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
DOCX
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
PDF
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure Personal Health Records Using Encryption
Editor IJCATR
 
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Ad

Recently uploaded (20)

PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PDF
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PDF
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
PDF
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENT
samueljackson3773
 
PPTX
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PDF
PRIZ Academy - Process functional modelling
PRIZ Guru
 
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
PDF
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
PDF
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENT
samueljackson3773
 
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PRIZ Academy - Process functional modelling
PRIZ Guru
 
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
Ad

Scalable and secure sharing of public health record using attribute based Encryption

  • 1. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE BASED ENCRYPTION By Shreyank M. Byadagi Email:[email protected]
  • 2. AGENDA: 1. Objectives of project. 2. Problem definition. 3. Literature survey. 4. Methodology. 5. Applications. 6. Implementation carried out. 7. References.
  • 3. OBJECTIVES: • The main aim of this system is to provide secure patient- centric PHR access and efficient key management at the same time. • The key idea is to divide the system into multiple security domains according to the different users’ data access requirements.
  • 4. PROBLEM DEFINITION: Personal health record(PHR) is meant for health information exchange , this data is outsourced for maintenance like cloud providers. CHALLENGES : • PHR data is prone to unauthorized access. • Access needs to be secure. OUR SOLUTION: • Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file. • A high degree of patient privacy guaranteed.
  • 5. LITERATURE SURVEY: • J. Benaloh, proposed a scheme “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in which a file can be uploaded without key distribution and it is highly efficient. • J. Hur and D. K. Noh proposed a scheme “Attribute-Based Revocation in Data Outsourcing Systems” with immediate capability, instead of periodical revocation.
  • 9. EXISTING SYSTEM: • Due to the high cost of building and maintaining specialized data centers, many PHR services are outsourced . • The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third- party server which people may not fully trust.
  • 10. EXISTING SYSTEM(Contd…): Hey, I got it !! Lets modify & send!!!
  • 11. PROPOSED SYSTEM: • It is the promising method to encrypt the PHRs before outsourcing. • Risks of privacy exposure , scalability in key management , flexible access are important challenges towards data access control. • Attribute Based Encryption(ABE) techniques are used to encrypt patient’s PHR file.
  • 13. ALGORITHMS: • Advanced Encryption Standard(AES) • Message Digest5(MD5)
  • 14. ADVANCED ENCRYPTION STANDARD: • Step1:Substitute bytes. • Step2. Shift rows. • Step3. Mix Columns. • Step4. Add Round Key
  • 20. MESSAGE DIGEST5(MD5): • Step1: Append padding bits: Message is pad so its length is 448 mod 512 • Step2: Append Length Append a 64-bit length value to message Generate a message with 512 bits in length • Step3: Initialize MD buffer Initialize a 4-word (128-bit) MD buffer (A, B, C, D) Word A: 01 23 45 67 Word B: 89 AB CD EF Word C: FE DC BA 98 Word D: 76 54 32 10 • Step4: Process Message in 16-word block Process message in 16- word (512-bit) blocks • Step5: Output
  • 21. Difference B/W: Existing System: 1. Expensive to maintain many PHR services. 2. Patient rejects to share his PHI as it is stored in third party server. Proposed System: 1. Inexpensive to create and maintain PHR services. 2. Patient shares his PHI as it is encrypted using ABE technique before it is stored in third party server.
  • 24. MODULES: • PHR Owner module • Cloud Server Module • Attribute based Access Policy Module • Data confidentiality Module Front end of our project is prepared with the help of JSP.
  • 25. REQUIREMENTS: HARDWARE REQUIREMENTS:- • Processor - Pentium –III • Speed - 1.1 Ghz • RAM - 256 MB(min) • Hard Disk - 20 GB • Floppy Drive - 1.44 MB • Key Board - Standard Windows Keyboard • Mouse - Two or Three Button Mouse • Monitor - SVGA
  • 26. REQUIREMENTS(CONTD..) SOFTWARE REQUIREMENTS:- • Operating System : Windows95/98/2000/XP • TOOL USED : ECLIPSE • Front End : JAVA
  • 27. REFERENCES: • M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”. • H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the e- health cloud”. • “The health insurance portability and accountability act”.