SlideShare a Scribd company logo
Blockchain for Secure EHRs Sharing of
Mobile Cloud based E-health Systems
DOMAIN OVERVIEW – CLOUD
 Cloud computing is the delivery of computing and storage space as a service to a distributed community of
end users.
 The schema/model of Cloud computing is, all the servers, networks, applications and other elements related
to data centers are made available to end users.
 Cloud computing is growing now-a-days in the interest of technical and business organizations but this can
also be beneficial for solving social issues
 Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers
online data storage, infrastructure and application
INTRODUCTION
 Cloud computing has emerged as a promising and powerful paradigm for managing and
delivering computation, applications and services over the Internet.
 In this project we are going to use the Blockchain technology to protect healthcare data
hosted within the cloud.
ABSTRACT
 The main objective of this project is securely store and maintain the patient records in the healthcare.
 Healthcare is a data-intensive domain where a large amount of data is created, disseminated, stored, and accessed
daily.
 The blockchain technology is used to protect the healthcare data hosted within the cloud. The block that contain
the medical data and the timestamp.
 Cloud computing will connect different healthcare providers.
 It allows healthcare provider to access the patient details more securely from anywhere.
 It preserve data from attackers. The data is encrypted prior to outsourcing to the cloud. The healthcare provider
have to decrypt the data prior to download.
Continue…
 Finally our model ensure the data security for accessing the patient record over the
cloud.
OBJECTIVE
 The main objective is to ensure the data security.
 To achieve forward and backward security of the data with revocation scheme.
 To enable access control that is cryptographically enhanced.
 To ensure the protection of cloud database.
 To perform secure and efficient query processing.
EXISTING SYSTEM
 Existing system doesn’t maintain and process the data securely. It doesn’t provides the
more accurate search result.
 Incorrect and misleading of data will produce the wrong analysis result. Low search
Efficiency.
 The search delay of the scheme is proportional to the size of the database. It is not
suitable for the large scale databases.
DISADVANTAGES
 Theoretical Limits.
 Data are not secured.
 Not reliable.
 Low search Efficiency.
 Search Delay.
PROPOSED SYSTEM
 To overcome the security problems that are occurred in the existing system and
effectively store the data over the cloud we introduce this system.
 The data user outsources the encrypted documents to the cloud.
 The Data user get the each result, the proof and the public verification key, they itself or
others can verify the freshness, authenticity, and completeness of the search result even
without decrypting them.
ADVANTAGES
 Increase the accuracy of the result.
 The data’s are highly secured.
 Easily retrieve an information from cloud storage.
SYSTEM REQUIREMENTS
Software Requirements
O/S : Windows 7
Language : Java
IDE : Net Beans 8.2
Data Base : MySql
 Server : WampServer
SYSTEM REQUIREMENTS
Hardware Requirements
 System : Pentium IV 2.4 GHz
 Hard Disk : 160 GB
 Monitor : 15 VGA color
 Mouse : Logitech.
 Keyboard : 110 keys enhanced
 Ram : 2GB
FLOW DIAGRAM
Healthcare
Providers
Login Register
Load Patient Records Download Patient Records
Encrypt Records
Send an upload request
Block Creation Upload
Search Records
Cloud Server
Login
View Upload Requests
Check
Validity
Grand Permission
Key Generation of Each
Record
Build a Block Chain
Monitor Patient
reports
View Download Requests
Send Download
Request to cloud
Check
Validity
Send a Key
Receive Key
Decrypt Records Download
Secret Key Verification
MODULES
• Registration
• Healthcare Provider
• Load patient Records
• Key Generation
• Encrypt patient Records
• Block Creation
• Upload and Download Patient Records
• Cloud Service Provider
• View Patient Records
• Grant or Revoke Permission
REFERENCES
[1] Yunru Zhang, Debiao He, and Kim-Kwang Raymond Choo, "BaDS: Blockchain-Based Architecture for Data Sharing with ABS
and CP-ABE in IoT," Wireless Commu. and Mobile Comput., 2018.
[2] Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang "Blockchain for Secure and
Efficient Data Sharing in Vehicular Edge Computing and Networks," IEEE Internet of Things J., 2018.
[3] Oscar Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT," IEEE Internet of Things J., vol. 5,
pp. 1184-1195, 2018.
[4] Kuo TT, Kim HE, and Ohno-Machado L, "Blockchain distributed ledger technologies for biomedical and health care applications,"
Ame. Medi. Infor. Assoc. J., vol. 6, pp. 1211-1220, 2017.
[5] Nabil Rifi, Elie Rachkidi, Nazim Agoulmine, and Nada Chendeb Taher, "Towards Using Blockchain Technology for eHealth Data
Access Management,"in Proc. IEEE on Advances in Bio. Engi., Oct. 2017.
0th PPT - BLOCKCHAIN-CBE (1).ppt

More Related Content

PDF
Cloud Based Privacy Preserving Data Encryption
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
PDF
Centralized Data Verification Scheme for Encrypted Cloud Data Services
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
An interactive Study on secure data sharing in the IOT through Blockchain
PDF
50120140507005
PDF
50120140507005 2
Cloud Based Privacy Preserving Data Encryption
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Security Check in Cloud Computing through Third Party Auditor
An interactive Study on secure data sharing in the IOT through Blockchain
50120140507005
50120140507005 2

Similar to 0th PPT - BLOCKCHAIN-CBE (1).ppt (20)

PDF
Privacy preserving public auditing for secure cloud storage
PDF
Iaetsd storage privacy protection against data
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
Secure Data Sharing In an Untrusted Cloud
PPTX
Data security in cloud computing
PDF
Anonymous Key Based Secure File Encryption in Cloud
PPTX
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
Cloud Security
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Survey On: Auditing Public Clouds
PDF
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
FOGCOMPUTING
PDF
Enhanced security framework to ensure data security
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Enhanced security framework to ensure data security in cloud using security b...
Privacy preserving public auditing for secure cloud storage
Iaetsd storage privacy protection against data
Insuring Security for Outsourced Data Stored in Cloud Environment
Secure Data Sharing In an Untrusted Cloud
Data security in cloud computing
Anonymous Key Based Secure File Encryption in Cloud
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Cloud Security
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Survey On: Auditing Public Clouds
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
Enabling Integrity for the Compressed Files in Cloud Server
Third Party Public Auditing Scheme for Security in Cloud Storage
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
FOGCOMPUTING
Enhanced security framework to ensure data security
Cloud Auditing With Zero Knowledge Privacy
Enhanced security framework to ensure data security in cloud using security b...
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Machine Learning_overview_presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Machine Learning_overview_presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Ad

0th PPT - BLOCKCHAIN-CBE (1).ppt

  • 1. Blockchain for Secure EHRs Sharing of Mobile Cloud based E-health Systems
  • 2. DOMAIN OVERVIEW – CLOUD  Cloud computing is the delivery of computing and storage space as a service to a distributed community of end users.  The schema/model of Cloud computing is, all the servers, networks, applications and other elements related to data centers are made available to end users.  Cloud computing is growing now-a-days in the interest of technical and business organizations but this can also be beneficial for solving social issues  Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application
  • 3. INTRODUCTION  Cloud computing has emerged as a promising and powerful paradigm for managing and delivering computation, applications and services over the Internet.  In this project we are going to use the Blockchain technology to protect healthcare data hosted within the cloud.
  • 4. ABSTRACT  The main objective of this project is securely store and maintain the patient records in the healthcare.  Healthcare is a data-intensive domain where a large amount of data is created, disseminated, stored, and accessed daily.  The blockchain technology is used to protect the healthcare data hosted within the cloud. The block that contain the medical data and the timestamp.  Cloud computing will connect different healthcare providers.  It allows healthcare provider to access the patient details more securely from anywhere.  It preserve data from attackers. The data is encrypted prior to outsourcing to the cloud. The healthcare provider have to decrypt the data prior to download.
  • 5. Continue…  Finally our model ensure the data security for accessing the patient record over the cloud.
  • 6. OBJECTIVE  The main objective is to ensure the data security.  To achieve forward and backward security of the data with revocation scheme.  To enable access control that is cryptographically enhanced.  To ensure the protection of cloud database.  To perform secure and efficient query processing.
  • 7. EXISTING SYSTEM  Existing system doesn’t maintain and process the data securely. It doesn’t provides the more accurate search result.  Incorrect and misleading of data will produce the wrong analysis result. Low search Efficiency.  The search delay of the scheme is proportional to the size of the database. It is not suitable for the large scale databases.
  • 8. DISADVANTAGES  Theoretical Limits.  Data are not secured.  Not reliable.  Low search Efficiency.  Search Delay.
  • 9. PROPOSED SYSTEM  To overcome the security problems that are occurred in the existing system and effectively store the data over the cloud we introduce this system.  The data user outsources the encrypted documents to the cloud.  The Data user get the each result, the proof and the public verification key, they itself or others can verify the freshness, authenticity, and completeness of the search result even without decrypting them.
  • 10. ADVANTAGES  Increase the accuracy of the result.  The data’s are highly secured.  Easily retrieve an information from cloud storage.
  • 11. SYSTEM REQUIREMENTS Software Requirements O/S : Windows 7 Language : Java IDE : Net Beans 8.2 Data Base : MySql  Server : WampServer
  • 12. SYSTEM REQUIREMENTS Hardware Requirements  System : Pentium IV 2.4 GHz  Hard Disk : 160 GB  Monitor : 15 VGA color  Mouse : Logitech.  Keyboard : 110 keys enhanced  Ram : 2GB
  • 14. Healthcare Providers Login Register Load Patient Records Download Patient Records Encrypt Records Send an upload request Block Creation Upload Search Records Cloud Server Login View Upload Requests Check Validity Grand Permission Key Generation of Each Record Build a Block Chain Monitor Patient reports View Download Requests Send Download Request to cloud Check Validity Send a Key Receive Key Decrypt Records Download Secret Key Verification
  • 15. MODULES • Registration • Healthcare Provider • Load patient Records • Key Generation • Encrypt patient Records • Block Creation • Upload and Download Patient Records • Cloud Service Provider • View Patient Records • Grant or Revoke Permission
  • 16. REFERENCES [1] Yunru Zhang, Debiao He, and Kim-Kwang Raymond Choo, "BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT," Wireless Commu. and Mobile Comput., 2018. [2] Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang "Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks," IEEE Internet of Things J., 2018. [3] Oscar Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT," IEEE Internet of Things J., vol. 5, pp. 1184-1195, 2018. [4] Kuo TT, Kim HE, and Ohno-Machado L, "Blockchain distributed ledger technologies for biomedical and health care applications," Ame. Medi. Infor. Assoc. J., vol. 6, pp. 1211-1220, 2017. [5] Nabil Rifi, Elie Rachkidi, Nazim Agoulmine, and Nada Chendeb Taher, "Towards Using Blockchain Technology for eHealth Data Access Management,"in Proc. IEEE on Advances in Bio. Engi., Oct. 2017.