SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Cloud-Assisted Mobile-Access of Health Data with 
Privacy and Audit ability 
Abstract:- 
Motivated by the privacy issues, curbing the adoption of 
electronic healthcare systems and the wild success of cloud service models, 
we propose to build privacy into mobile healthcare systems with the help of 
the private cloud. Our system offers salient features including efficient key 
management, privacy-preserving data storage, and retrieval, especially for 
retrieval at emergencies, and audit ability for misusing health data. 
Specifically, we pro-pose to integrate key management from pseudorandom 
number generator for unlink ability, a secure indexing method for privacy-preserving 
keyword search which hides both search and access pat-terns 
based on redundancy, and integrate the concept of attribute-based encryption 
with threshold signing for providing role-based access control with audit 
ability to prevent potential misbehavior, in both normal and emergency 
cases. Anywhere-anytime-accessible electronic healthcare systems play a 
vital role in our daily life. Services supported by mobile devices, such as 
home care and remote monitoring, enable patients to retain their living style
and cause minimal interruption to their daily activities. In addition, it 
significantly reduces the hospital occupancy, allowing patients with higher 
need of in-hospital treatment to be admitted. 
Existing System:- 
 Existing system a PHR system model, there are multiple owners who may 
encrypt according to their own ways, possibly using different sets of 
cryptographic keys. 
 Each user obtains keys from every owner whose PHR she wants to read 
would limit the accessibility since patients are not always online. 
 An alternative is to employ a central authority CA to do the key management 
on behalf of all PHR owners, but this requires too much trust on a single 
authority. 
 Key escrow also known as a “fair” cryptosystem is an arrangement in which 
the keys needed to decrypt encrypted data are held in escrow so that, under 
certain circumstances, an authorized third party may gain access to those 
keys. 
 We provide a thorough analysis of the complexity and scalability of our 
Existing secure PHR sharing solution, in terms of multiple metrics in 
computation, communication, storage and key management 
 This requirement is the most challenging and none of the existing efficient 
SSE can satisfy it. 
Disadvantages:-
 Difficult for Long Term Medication. Several Kinds of Medicine Diagnosing, 
Frustration of missing Doses. 
 Manual Insurance Climbing Patients could actually control the sharing of their 
sensitive PHI, especially when they are stored on a third-party server which 
people may not fully trust. 
 Because a third-party server inside hackers can able to leak the patient’s 
information and security records to other peoples so this scheme is not fully 
trust. 
 The ABE important issues such as key management scalability, dynamic policy 
updates, and efficient on-demand revocation are non-trivial to solve, and remain 
largely open up-to-date. 
Proposed System:- 
 The proposed cloud-assisted mobile health networking is inspired by the power, 
flexibility, convenience, and cost efficiency of the Cloud-based 
data/computation outsourcing paradigm. 
 We introduce the private cloud which can be considered as a service offered to 
mobile users. 
 The result indicates that the proposed scheme is efficient as well as scalable. 
 Mobile users outsource data processing tasks to the private cloud which stores 
the processed results on the public cloud. 
 The cloud-assisted service model supports the implementation of practical 
privacy mechanisms since intensive computation and storage can be shifted to 
the cloud, leaving mobile users with lightweight tasks. 
 Our proposed pattern hiding scheme just slightly increases the computation and 
storage costs at the public cloud compared to the most efficient construction.
Advantages: 
 We provide a thorough analysis of the complexity and scalability of our 
proposed secure PHR sharing solution, in terms of multiple metrics in 
computation, communication, storage and key management. 
 Data Confidentiality and On-Demand Revocation. Write Access Control and 
Scalability and Usability. 
 We proposed to build privacy into mobile health systems with the help of the 
private cloud. 
 We provided a solution for privacy-preserving data storage by integrating a 
PRF based key management for unlink ability 
Hardware Requirements:- 
 SYSTEM : Pentium IV 2.4 GHz 
 HARD DISK : 40 GB 
 RAM : 256 MB 
System Configuration:- 
H/W System Configuration:-
Processor - Pentium –III 
Speed - 1.1 Ghz 
RAM - 256 MB (min) 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 
 Database Connectivity : JDBC.

More Related Content

PPTX
PPT
It pp hybrid attribute- and re-encryption-based key management for secure and...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
DOCX
accuracy-constrained privacy preserving access control mechanism for relation...
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
It pp hybrid attribute- and re-encryption-based key management for secure and...
Scalable and secure sharing of personal health records in cloud computing usi...
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
accuracy-constrained privacy preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Scalable and secure sharing of personal health records in cloud computing usi...

What's hot (8)

DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
PPTX
Scalable and secure sharing of personal health records
PDF
Scalable and secure sharing of personal health records in cloud computing us...
PPTX
Scalable and secure sharing of public health record using attribute based Enc...
PPTX
kpit ppt
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
Accuracy constrained privacy-preserving access control mechanism for relation...
Scalable and secure sharing of personal health records
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of public health record using attribute based Enc...
kpit ppt
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ad

Similar to IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of health data with privacy and audit ability (20)

DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
PDF
1784 1788
PDF
1784 1788
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
PDF
Cloud Based Privacy Preserving Data Encryption
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Scalable and secure sharing of personal health records in cloud computing usi...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
1784 1788
1784 1788
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Dotnet scalable and secure sharing of personal health records in cloud compu...
Android scalable and secure sharing of personal health records in cloud comp...
Scalable and secure sharing of personal health records in cloud computing usi...
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Cloud Based Privacy Preserving Data Encryption
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Ad

More from IEEEGLOBALSOFTSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PPT on Performance Review to get promotions
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Artificial Intelligence
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
web development for engineering and engineering
PPTX
Geodesy 1.pptx...............................................
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
bas. eng. economics group 4 presentation 1.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT on Performance Review to get promotions
CH1 Production IntroductoryConcepts.pptx
additive manufacturing of ss316l using mig welding
III.4.1.2_The_Space_Environment.p pdffdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Artificial Intelligence
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
web development for engineering and engineering
Geodesy 1.pptx...............................................
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mechanical Engineering MATERIALS Selection
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of health data with privacy and audit ability

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Cloud-Assisted Mobile-Access of Health Data with Privacy and Audit ability Abstract:- Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and audit ability for misusing health data. Specifically, we pro-pose to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy-preserving keyword search which hides both search and access pat-terns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with audit ability to prevent potential misbehavior, in both normal and emergency cases. Anywhere-anytime-accessible electronic healthcare systems play a vital role in our daily life. Services supported by mobile devices, such as home care and remote monitoring, enable patients to retain their living style
  • 2. and cause minimal interruption to their daily activities. In addition, it significantly reduces the hospital occupancy, allowing patients with higher need of in-hospital treatment to be admitted. Existing System:-  Existing system a PHR system model, there are multiple owners who may encrypt according to their own ways, possibly using different sets of cryptographic keys.  Each user obtains keys from every owner whose PHR she wants to read would limit the accessibility since patients are not always online.  An alternative is to employ a central authority CA to do the key management on behalf of all PHR owners, but this requires too much trust on a single authority.  Key escrow also known as a “fair” cryptosystem is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.  We provide a thorough analysis of the complexity and scalability of our Existing secure PHR sharing solution, in terms of multiple metrics in computation, communication, storage and key management  This requirement is the most challenging and none of the existing efficient SSE can satisfy it. Disadvantages:-
  • 3.  Difficult for Long Term Medication. Several Kinds of Medicine Diagnosing, Frustration of missing Doses.  Manual Insurance Climbing Patients could actually control the sharing of their sensitive PHI, especially when they are stored on a third-party server which people may not fully trust.  Because a third-party server inside hackers can able to leak the patient’s information and security records to other peoples so this scheme is not fully trust.  The ABE important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date. Proposed System:-  The proposed cloud-assisted mobile health networking is inspired by the power, flexibility, convenience, and cost efficiency of the Cloud-based data/computation outsourcing paradigm.  We introduce the private cloud which can be considered as a service offered to mobile users.  The result indicates that the proposed scheme is efficient as well as scalable.  Mobile users outsource data processing tasks to the private cloud which stores the processed results on the public cloud.  The cloud-assisted service model supports the implementation of practical privacy mechanisms since intensive computation and storage can be shifted to the cloud, leaving mobile users with lightweight tasks.  Our proposed pattern hiding scheme just slightly increases the computation and storage costs at the public cloud compared to the most efficient construction.
  • 4. Advantages:  We provide a thorough analysis of the complexity and scalability of our proposed secure PHR sharing solution, in terms of multiple metrics in computation, communication, storage and key management.  Data Confidentiality and On-Demand Revocation. Write Access Control and Scalability and Usability.  We proposed to build privacy into mobile health systems with the help of the private cloud.  We provided a solution for privacy-preserving data storage by integrating a PRF based key management for unlink ability Hardware Requirements:-  SYSTEM : Pentium IV 2.4 GHz  HARD DISK : 40 GB  RAM : 256 MB System Configuration:- H/W System Configuration:-
  • 5. Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC.