Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Cloud-Assisted Mobile-Access of Health Data with 
Privacy and Audit ability 
Abstract:- 
Motivated by the privacy issues, curbing the adoption of 
electronic healthcare systems and the wild success of cloud service models, 
we propose to build privacy into mobile healthcare systems with the help of 
the private cloud. Our system offers salient features including efficient key 
management, privacy-preserving data storage, and retrieval, especially for 
retrieval at emergencies, and audit ability for misusing health data. 
Specifically, we pro-pose to integrate key management from pseudorandom 
number generator for unlink ability, a secure indexing method for privacy-preserving 
keyword search which hides both search and access pat-terns 
based on redundancy, and integrate the concept of attribute-based encryption 
with threshold signing for providing role-based access control with audit 
ability to prevent potential misbehavior, in both normal and emergency 
cases. Anywhere-anytime-accessible electronic healthcare systems play a 
vital role in our daily life. Services supported by mobile devices, such as 
home care and remote monitoring, enable patients to retain their living style
and cause minimal interruption to their daily activities. In addition, it 
significantly reduces the hospital occupancy, allowing patients with higher 
need of in-hospital treatment to be admitted. 
Existing System:- 
 Existing system a PHR system model, there are multiple owners who may 
encrypt according to their own ways, possibly using different sets of 
cryptographic keys. 
 Each user obtains keys from every owner whose PHR she wants to read 
would limit the accessibility since patients are not always online. 
 An alternative is to employ a central authority CA to do the key management 
on behalf of all PHR owners, but this requires too much trust on a single 
authority. 
 Key escrow also known as a “fair” cryptosystem is an arrangement in which 
the keys needed to decrypt encrypted data are held in escrow so that, under 
certain circumstances, an authorized third party may gain access to those 
keys. 
 We provide a thorough analysis of the complexity and scalability of our 
Existing secure PHR sharing solution, in terms of multiple metrics in 
computation, communication, storage and key management 
 This requirement is the most challenging and none of the existing efficient 
SSE can satisfy it. 
Disadvantages:-
 Difficult for Long Term Medication. Several Kinds of Medicine Diagnosing, 
Frustration of missing Doses. 
 Manual Insurance Climbing Patients could actually control the sharing of their 
sensitive PHI, especially when they are stored on a third-party server which 
people may not fully trust. 
 Because a third-party server inside hackers can able to leak the patient’s 
information and security records to other peoples so this scheme is not fully 
trust. 
 The ABE important issues such as key management scalability, dynamic policy 
updates, and efficient on-demand revocation are non-trivial to solve, and remain 
largely open up-to-date. 
Proposed System:- 
 The proposed cloud-assisted mobile health networking is inspired by the power, 
flexibility, convenience, and cost efficiency of the Cloud-based 
data/computation outsourcing paradigm. 
 We introduce the private cloud which can be considered as a service offered to 
mobile users. 
 The result indicates that the proposed scheme is efficient as well as scalable. 
 Mobile users outsource data processing tasks to the private cloud which stores 
the processed results on the public cloud. 
 The cloud-assisted service model supports the implementation of practical 
privacy mechanisms since intensive computation and storage can be shifted to 
the cloud, leaving mobile users with lightweight tasks. 
 Our proposed pattern hiding scheme just slightly increases the computation and 
storage costs at the public cloud compared to the most efficient construction.
Advantages: 
 We provide a thorough analysis of the complexity and scalability of our 
proposed secure PHR sharing solution, in terms of multiple metrics in 
computation, communication, storage and key management. 
 Data Confidentiality and On-Demand Revocation. Write Access Control and 
Scalability and Usability. 
 We proposed to build privacy into mobile health systems with the help of the 
private cloud. 
 We provided a solution for privacy-preserving data storage by integrating a 
PRF based key management for unlink ability 
Hardware Requirements:- 
 SYSTEM : Pentium IV 2.4 GHz 
 HARD DISK : 40 GB 
 RAM : 256 MB 
System Configuration:- 
H/W System Configuration:-
Processor - Pentium –III 
Speed - 1.1 Ghz 
RAM - 256 MB (min) 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 
 Database Connectivity : JDBC.

More Related Content

IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of health data with privacy and audit ability

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Cloud-Assisted Mobile-Access of Health Data with Privacy and Audit ability Abstract:- Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and audit ability for misusing health data. Specifically, we pro-pose to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy-preserving keyword search which hides both search and access pat-terns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with audit ability to prevent potential misbehavior, in both normal and emergency cases. Anywhere-anytime-accessible electronic healthcare systems play a vital role in our daily life. Services supported by mobile devices, such as home care and remote monitoring, enable patients to retain their living style
  • 2. and cause minimal interruption to their daily activities. In addition, it significantly reduces the hospital occupancy, allowing patients with higher need of in-hospital treatment to be admitted. Existing System:-  Existing system a PHR system model, there are multiple owners who may encrypt according to their own ways, possibly using different sets of cryptographic keys.  Each user obtains keys from every owner whose PHR she wants to read would limit the accessibility since patients are not always online.  An alternative is to employ a central authority CA to do the key management on behalf of all PHR owners, but this requires too much trust on a single authority.  Key escrow also known as a “fair” cryptosystem is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.  We provide a thorough analysis of the complexity and scalability of our Existing secure PHR sharing solution, in terms of multiple metrics in computation, communication, storage and key management  This requirement is the most challenging and none of the existing efficient SSE can satisfy it. Disadvantages:-
  • 3.  Difficult for Long Term Medication. Several Kinds of Medicine Diagnosing, Frustration of missing Doses.  Manual Insurance Climbing Patients could actually control the sharing of their sensitive PHI, especially when they are stored on a third-party server which people may not fully trust.  Because a third-party server inside hackers can able to leak the patient’s information and security records to other peoples so this scheme is not fully trust.  The ABE important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date. Proposed System:-  The proposed cloud-assisted mobile health networking is inspired by the power, flexibility, convenience, and cost efficiency of the Cloud-based data/computation outsourcing paradigm.  We introduce the private cloud which can be considered as a service offered to mobile users.  The result indicates that the proposed scheme is efficient as well as scalable.  Mobile users outsource data processing tasks to the private cloud which stores the processed results on the public cloud.  The cloud-assisted service model supports the implementation of practical privacy mechanisms since intensive computation and storage can be shifted to the cloud, leaving mobile users with lightweight tasks.  Our proposed pattern hiding scheme just slightly increases the computation and storage costs at the public cloud compared to the most efficient construction.
  • 4. Advantages:  We provide a thorough analysis of the complexity and scalability of our proposed secure PHR sharing solution, in terms of multiple metrics in computation, communication, storage and key management.  Data Confidentiality and On-Demand Revocation. Write Access Control and Scalability and Usability.  We proposed to build privacy into mobile health systems with the help of the private cloud.  We provided a solution for privacy-preserving data storage by integrating a PRF based key management for unlink ability Hardware Requirements:-  SYSTEM : Pentium IV 2.4 GHz  HARD DISK : 40 GB  RAM : 256 MB System Configuration:- H/W System Configuration:-
  • 5. Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC.