SlideShare a Scribd company logo
Scalable and secure sharing of personal health records
Scalable and secure sharing of personal health records
OUTLINE 
• What is Cloud Computing? 
• What is the use of it? 
• What is attribute-based encryption? 
• Introduction. 
• Existing system and its disadvantages. 
• Proposed system and its advantages. 
• Hardware requirements. 
• Software requirements. 
• Use case diagrams. 
• Conclusion.
Scalable and secure sharing of personal health records
• There are a number of reasons why cloud 
computing is so widely used among 
businesses today some are: 
 Reduction of cost. 
 Universal access. 
 Flexibility.
Scalable and secure sharing of personal health records
• It is a type of public - key encryption in 
which the secret key of a user and the 
cipher text are dependent upon attributes 
(e.g. the country he lives, the subscriber 
he uses). 
• In such a system , the decryption of a 
cipher text is possible only if the set of 
attributes of the user key matches the 
attributes of the cipher text.
This webpage is to secure the personal 
and medical information of the patient 
using encryption. 
• Here we have an option of visibility... 
that means we can access the permission 
for particular member to visit or to see 
the status of the person(patient), that is 
nothing but
Scalable and secure sharing of personal health records
• The existing system stores the 
information in files. 
• That is personal and medical information. 
• The entire details about the user or 
patient are stored, in written type or any 
printed papers. 
• By this we may face many.
• By storing the information in files it can be 
exposed to the third party or unauthorized 
parties. 
• By secretly any one can access it this is the 
main disadvantage of the existing system. 
• It occupies more space. 
• High cost as it requires more space to store 
the files.
• Here we use system memory to store the 
personal and medical information of the 
person. 
• Here we use one technique to avoid risk like 
accessing the information of the particular 
person via network analysis and that is 
ATTRIBUTE –BASED ENCRYPTION.
• No can access the information of a person 
as it is encrypted by a secret key. 
• To see any report about the person … him 
self should login into the webpage and 
access the information. 
• Every user as unique user name and 
password that is known only to him. 
•User as an option to access the information 
for whom ever he needed.
Scalable and secure sharing of personal health records
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Floppy Drive - 1.44 MB 
 Processor - Pentium-III 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA
Operating System :Windows95 
/98/2000/XP 
Application Server : Tomcat5.0 
Front End : Java, JSP 
Database : MYSQL
Scalable and secure sharing of personal health records
registration 
login 
view old treatments 
patients 
enter disease details
login 
view patient details 
Doctors 
enter treatment details
admin doctor patient users treatments 
add doctors 
view doctors 
view patient details 
view user details 
enter treatments 
search and view treatments 
search and view treatments
Scalable and secure sharing of personal health records
 All patient data should be gathered and 
accessible through one system. 
 A PHR applies health information 
technology to your personal life to improve 
safety, reduces medical errors, reduces gaps 
in communication and reduce delays in 
receiving proper care.
Scalable and secure sharing of personal health records

More Related Content

PPTX
Scalable and secure sharing of public health record using attribute based Enc...
PDF
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
PPTX
Efficient sharing of personal health records using encryption in cloud computing
PPTX
PPTX
secured storage of Personal health record in cloude
PDF
Scalable and secure sharing of personal health records in cloud computing us...
PPTX
kpit ppt
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of public health record using attribute based Enc...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Efficient sharing of personal health records using encryption in cloud computing
secured storage of Personal health record in cloude
Scalable and secure sharing of personal health records in cloud computing us...
kpit ppt
Scalable and secure sharing of personal health records in cloud computing usi...

Viewers also liked (20)

PPTX
Personal Health Records
PPTX
Attribute-Based Encryption for Cloud Security
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
PDF
Personal Health Records
PPT
Personal Health Records - An Overview
PPTX
Personal Health Records
DOCX
Attribute Based Encryption
PDF
Personal Health Record and web 2.0
PPTX
Development of a Personal Health Record with a Diabetes Self-management Tool ...
PDF
Identity Based Encryption
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
PPTX
Attributes based encryption with verifiable outsourced decryption
PPTX
Asha a true story
PDF
intensified pulse polio immunization 2016
PPTX
Pulse polio immunization campaign
PPTX
Pulse polio immunization campaign
PPTX
ASHA - Revolutionary women
PPTX
Intensive pulse polio immunisation
PPTX
Smart health prediction using data mining by customsoft
PPTX
Health and family welfare (eleventh five year plan)
Personal Health Records
Attribute-Based Encryption for Cloud Security
Attribute Based Encryption with Privacy Preserving In Clouds
Personal Health Records
Personal Health Records - An Overview
Personal Health Records
Attribute Based Encryption
Personal Health Record and web 2.0
Development of a Personal Health Record with a Diabetes Self-management Tool ...
Identity Based Encryption
Final_attribute based encryption in cloud with significant reduction of compu...
Attributes based encryption with verifiable outsourced decryption
Asha a true story
intensified pulse polio immunization 2016
Pulse polio immunization campaign
Pulse polio immunization campaign
ASHA - Revolutionary women
Intensive pulse polio immunisation
Smart health prediction using data mining by customsoft
Health and family welfare (eleventh five year plan)
Ad

Similar to Scalable and secure sharing of personal health records (20)

PPTX
2nd rvw
PDF
Secure Personal Health Records Using Encryption
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Iaetsd scalable and secure sharing of personal health
PDF
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
PDF
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
PDF
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
PDF
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
PPTX
amit.pj2.pptx
PPTX
Hospital AES.pptx
PPTX
Hospital AES computer science networks.pptx
PDF
Full paper
2nd rvw
Secure Personal Health Records Using Encryption
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
Cloud assisted mobile-access of health data with privacy and auditability
Iaetsd scalable and secure sharing of personal health
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
amit.pj2.pptx
Hospital AES.pptx
Hospital AES computer science networks.pptx
Full paper
Ad

Recently uploaded (20)

PDF
composite construction of structures.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Current and future trends in Computer Vision.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
573137875-Attendance-Management-System-original
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Digital Logic Computer Design lecture notes
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
composite construction of structures.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Current and future trends in Computer Vision.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Safety Seminar civil to be ensured for safe working.
UNIT 4 Total Quality Management .pptx
573137875-Attendance-Management-System-original
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Digital Logic Computer Design lecture notes
bas. eng. economics group 4 presentation 1.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Scalable and secure sharing of personal health records

  • 3. OUTLINE • What is Cloud Computing? • What is the use of it? • What is attribute-based encryption? • Introduction. • Existing system and its disadvantages. • Proposed system and its advantages. • Hardware requirements. • Software requirements. • Use case diagrams. • Conclusion.
  • 5. • There are a number of reasons why cloud computing is so widely used among businesses today some are:  Reduction of cost.  Universal access.  Flexibility.
  • 7. • It is a type of public - key encryption in which the secret key of a user and the cipher text are dependent upon attributes (e.g. the country he lives, the subscriber he uses). • In such a system , the decryption of a cipher text is possible only if the set of attributes of the user key matches the attributes of the cipher text.
  • 8. This webpage is to secure the personal and medical information of the patient using encryption. • Here we have an option of visibility... that means we can access the permission for particular member to visit or to see the status of the person(patient), that is nothing but
  • 10. • The existing system stores the information in files. • That is personal and medical information. • The entire details about the user or patient are stored, in written type or any printed papers. • By this we may face many.
  • 11. • By storing the information in files it can be exposed to the third party or unauthorized parties. • By secretly any one can access it this is the main disadvantage of the existing system. • It occupies more space. • High cost as it requires more space to store the files.
  • 12. • Here we use system memory to store the personal and medical information of the person. • Here we use one technique to avoid risk like accessing the information of the particular person via network analysis and that is ATTRIBUTE –BASED ENCRYPTION.
  • 13. • No can access the information of a person as it is encrypted by a secret key. • To see any report about the person … him self should login into the webpage and access the information. • Every user as unique user name and password that is known only to him. •User as an option to access the information for whom ever he needed.
  • 15.  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Processor - Pentium-III  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 16. Operating System :Windows95 /98/2000/XP Application Server : Tomcat5.0 Front End : Java, JSP Database : MYSQL
  • 18. registration login view old treatments patients enter disease details
  • 19. login view patient details Doctors enter treatment details
  • 20. admin doctor patient users treatments add doctors view doctors view patient details view user details enter treatments search and view treatments search and view treatments
  • 22.  All patient data should be gathered and accessible through one system.  A PHR applies health information technology to your personal life to improve safety, reduces medical errors, reduces gaps in communication and reduce delays in receiving proper care.