Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BRINTHA.K

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

IMPROVING THE EFFICIENCY OF

E-HEALTHCARE SYSTEM BASED


ON CLOUD

PRESENTED BY GUIDED BY
K.BRINTHA PROF.A.Sharfudeen,AP/MCA
813521622008
ABSTRACT

• Personal health record (PHR) is an emerging patient-centric model of


health information exchange, which is often outsourced to be stored at
a third party, such as cloud providers.
• Extensive analytical and experimental results are presented which
show the security, scalability and efficiency of our proposed scheme.
INTRODUCTION

• The advent of cloud computing, data owners are motivated to outsource


their complex data management systems from local sites to commercial
public cloud for great flexibility and economic savings.
• Cloud computing is a computing style in which scalable and flexible
information technologies functionalities are delivered as a service to
external customers using internet technologies.
EXISTING SYSTEM

• The first scheme, which adopts the Message Authentication Code (MAC)
to verify the search results, works fine with static cloud data .
• If the cloud server returns a result including a pair of non-updated file and
MAC, it can pass the verification.
DISADVANTAGES

• It does not have searching process.


• It does not have multiple sharing technique.
• It takes more time to share the files.

• unsolved problem to realize efficient verification for dynamic SSE


schemes.
PROPOSED SYSTEM

• In order to support the efficient verification of dynamic data, we design a


novel symmetric-key based Accumulative Authentication Tag (AAT) to
generate an authentication tag for each keyword.
• Based on the above technique and structure, design the first keyword
search scheme over dynamic encrypted cloud data with symmetric-key
based verification.
ADVANTAGES

• It allow searches over encrypted files.


• Decryption key should be send via a secure channel like Gmail.
• Data files are encrypted on the cloud server.
ALGORITHM

• HMAC (Hash-based Message Authentication Code) is a type of a message


authentication code (MAC) that is acquired by executing a cryptographic
hash function on the data (that is) to be authenticated and a secret shared
key.
SYSTEM ARCHITECTURE
Data Flow Diagram

Level 0
Level 1
Level 2
Use Case Diagram
MODULES

1. PHR

2. Service provider

3. Java
Modules 1 - PHR

• Personal Health Record (PHR) service is an emerging model for health


information exchange. It allows patients to create, update and manage
personal and medical information. Also they can control and share their
medical information with other users as well as health care providers.
Modules 2 – Service provider

• A cloud service provider, or CSP, is an IT company that provides on-


demand, scalable computing resources like computing power, data storage,
or applications over the internet. Typically, cloud-based service models are
defined as IaaS (infrastructure as a service), PaaS (platform as a service),
or SaaS (software as a service).
Modules 3 - Java

• Java technology is both a programming language and a platform. The Java


Programming Language. . The Java programming language is unusual in
that a program is both compiled and interpreted. With the compiler, first
you translate a program into an intermediate language called Java byte
codes —the platform-independent codes interpreted by the interpreter on
the Java platform.
SYSTEM SPECIFICATION

HARDWARE REQUIREMENTS:
 Operating system : Windows 10
 Coding Language : JAVA
 Tool : APACHE TOMCAT
 Database : SQLSERVER

SOFTWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 4GB
Screenshots
FUTURE ENHANCEMENT

• To design a dynamic searchable encryption scheme whose updating


operation can be completed by cloud server only, meanwhile reserving
the ability to support multi-keyword ranked search. In addition, as the
most of works about searchable encryption, our scheme mainly
considers the challenge from the cloud server. Actually, there are many
secure challenges in a multi-user scheme. Firstly, all the users usually
keep the same secure key for Multi-keyword Ranked Search over
Encrypted in a symmetric scheme. In this case, the revocation of the
user is big challenge. If it is needed to revoke a user in this scheme.
CONCLUSION

• The proposed work ensures the secure multi-keyword search and CP-ABE
data retrieval over encrypted cloud data. Multikeyword Ranked Search
over Encrypted in a symmetric scheme.
• Secondly, symmetric CP-ABE schemes usually assume that all the data
users are trustworthy.
THANK YOU

You might also like