You are on page 1of 7

Synopsis

1. GROUP ID: 08
1. Ajay B. Kavhale 25
2. Akash D. Tamhane 18
3. Rishabh U. Pande 23
4. Supriya V. Sunkarwar 24

2. Project Title

A Methodology for Secure Sharing of Personal Health Records in the Cloud


3. Project Option

Internal Project: Cloud Computing


4. Internal Guide

Prof. Rina Jugale


5. Sponsorship and External Guide

No Sponsorship
6. Technical Keywords

• Access control

• Cloud computing

• Personal Health Records

• Privacy.

• RSA

7. Problem Statement

Now a days, PHR record is always available to PHR user when PHR user
Sends once. but that record is very Important and changes continues to PHR
user health. our aim is to send that PHR user record once for given time limit

1
that the PHR user changes their record and send as per their requirement.

8. Abstract
In the healthcare sector has resulted in cost effective and convenient exchange
of Personal Health Records (PHRs) among several participating entities of
the e-Health systems. Nevertheless, storing the confidential health informa-
tion to cloud servers is susceptible to revelation or theft and calls for the
development of methodologies that ensure the privacy of the PHRs. There-
fore, we propose a methodology called SeSPHR for secure sharing of the
PHRs in the cloud. The SeSPHR scheme ensures patient-centric control on
the PHRs and preserves the confidentiality of the PHRs. The patients store
the encrypted PHRs on the un-trusted cloud servers and selectively grant
access to different types of users on different portions of the PHRs. A semi-
trusted proxy called Setup and Re-encryption Server (SRS) is introduced to
set up the public/private key pairs and to produce the re-encryption keys.
Moreover, the methodology is secure against insider threats and also enforces
a forward and backward access control. Furthermore, we formally analyze
and verify the working of SeSPHR methodology through the High Level Petri
Nets (HLPN). Performance evaluation regarding time consumption indicates
that the SeSPHR methodology has potential to be employed for securely
sharing the PHRs in the cloud.
Also we Implement as a contribution in this paper time Server, Secure Audit-
ing Storage, in Time Server PHR Owner add the starting time and Ending
time attach to uploaded Encrypted files, and also implement the TPA Mod-
ule for verify the PHR Record its hack or corrupted for any other hacker and
Attacker if data hack from hacker side detect all system details of attacker
like MAC Address and IP Address its our contribution in our project.
LOUD computing has emerged as an important computing paradigm to offer
pervasive and ondemand availability of various resources in the form of hard-
ware, software, infrastructure, and storage [1, 2]. Consequently, the cloud
computing paradigm facilitates organizations by relieving them from the pro-
tracted job of infrastructure development and has encouraged them to trust
on the third-party Information Technology (IT) services. Additionally, the
cloud computing model has demonstrated significant potential to increase co-
ordination among several healthcare stakeholders and also to ensure continu-
ous availability of health information, and scalability. Furthermore, the cloud
computing also integrates various important entities of healthcare domains,
such as patients, hospital staff including the doctors, nursing staff, pharma-
cies, and clinical laboratory personnel, insurance providers, and the service
providers. Therefore, the integration of aforementioned entities results in the

2
evolution of a cost effective and collaborative health ecosystem where the pa-
tients can easily create and manage their Personal Health Records (PHRs).
Generally, the PHRs contain information, such as: (a) demographic infor-
mation, (b) patients medical history including the diagnosis, allergies, past
surgeries, and treatments, (c) laboratory reports, (d) data about health in-
surance claims, and (e) private notes of the patients about certain important
observed health conditions. More formally, the PHRs are managed through
the Internet based tools to permit patients to create and manage their health
information as lifelong records that can be made available to those who need
the access. Consequently, the PHRs enable the patients to effectively com-
municate with the doctors and other care providers to inform about the
symptoms, seek advice, and keep the health records updated for accurate
diagnosis and treatment.
Despite the advantages of scalable, agile, cost effective, and ubiquitous ser-
vices offered by the cloud, various concerns correlated to the privacy of health
data also arise. A major reason for patients apprehensions regarding the con-
fidentiality of PHRs is the nature of the cloud to share and store the PHRs.
Storing the private health information to cloud servers managed by thirdpar-
ties is susceptible to unauthorized access. In particular, privacy of the PHRs
stored in public clouds that are managed by commercial service providers is
extremely at risk. The privacy of the PHRs can be at risk in several ways,
for example theft, loss, and leakage. The PHRs either in cloud storage or in
transit from the patient to the cloud or from cloud to any other user may
be susceptible to unauthorized access because of the malicious behavior of
external entities. Moreover, there are also some threats by valid insiders to
the data. For instance, the PHRs either in cloud storage or in transit from
the patient to the cloud or from cloud to any other user may be susceptible
to unauthorized access because of the malicious behavior of external entities.
9. Goals and objective

• Data Store on Re-Encryption Format

• Secure Data Sharing

10. Relevant mathematics associated with the Project

Let S be the system object


It consist of following

3
S=U,F,CSP
U= no of users
U=u1,u2,u3,..un
F= no of phr in files
F=f1,f2,f3,..fn
f1=phr1,phr2,....,phrn
phr=Personal Health Record
Process1: PHR convert in Encryption Format
Process2: PHR Stored on Cloud in Re-Encrypted Format
Process3: PHR Users Access Re-Encrypted PHR
Process4: PHR user Request for Re-Encryption Key
Process5: PHR user Download in Decryption Format

11. Names of Conferences / Journals where papers can


be published

• IJCA

• IJARCCE

• IJREST

• IIAERD

12. Review of Conference/Journal Papers supporting


Project idea
12.1 Literature Survey

4
Sr. Title Author/Year Description
N0
1. SeSPHR: A Method- Mazhar The widespread accep-
ology for Secure Shar- Ali, Assad tance of cloud based
ing of Personal Health Abbas, services in the health-
Records in the Cloud Muhammad care sector has resulted
Usman in cost effective and
Shahid convenient exchange of
Khan Personal Health Records
(PHRs) among several
participating entities of
the e-Health systems.
2. Bounded Model G. Aude- In This paper sym-
Checking for Timed mard, A. bolic verification tech-
Systems. Cimatti, A. nique that extends the
Kornilow- Bounded Model Check-
icz.2013 ing (BMC) approach for
the verification of timed
systems
3. Incremental proxy re- A. N. Khan, In this Paper proposed
encryption scheme for ML M. an incremental version
mobile cloud comput- Kiah, S. A. of proxy re-encryption
ing environment Madani, M. scheme for improving the
Ali.2015 file modification opera-
tion and compared with
the original version of
the proxy re-encryption
scheme on the basis of
turnaround time.
4. Bounded Model Armin In this Paper a technique
Checking . Biere, called Bounded Model
Alessandro Checking (BMC), which
Cimatti2 uses a propositional SAT
Edmund M. solver rather than BDD
Clarke.2014 manipulation techniques.

12.2 References

1. Mazhar Ali, Assad Abbas, Muhammad Usman Shahid Khan” SeSPHR:

5
A Methodology for Secure Sharing of Personal Health Records in the
Cloud” 2168-7161 2018 IEEE

2. K. Gai, M. Qiu, Z. Xiong, and M. Liu, Privacy-preserving multi-channel


communication in Edge-of-Things, Future Generation Computer Sys-
tems, 85, 2018, pp. 190-200.

3. K. Gai, M. Qiu, and X. Sun, A survey on FinTech, Journal of Network


and Computer Applications, 2017, pp. 1-12.

4. A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, A cloud based health


insurance plan recommendation system: A user centered approach, Fu-
ture Generation Computer Systems, vols. 43- 44, pp. 99-109, 2015.

5. A. N. Khan, ML M. Kiah, S. A. Madani, M. Ali, and S. Shamshirband,


Incremental proxy re-encryption scheme for mobile cloud computing
environment, The Journal of Supercomputing, Vol. 68, No. 2, 2014,
pp. 624-651.

6. J. Li, Electronic personal health records and the question of privacy,


Computers, 2013, DOI: 10.1109/MC.2013.225

13 Plan of Project Execution

6
N0 TASK DURATION START END DATE
DATE
1. Group Formation 4 15.6.2018 18.6.2018
2. Decide Area of Inter- 4 19.6.2018 22.6.2018
est
3. Search Topic 5 23.6.2018 27.6.2018
4. Topic Selection 5 28.6.2018 2.7.2018
5. Topic Selection 5 3.7.2018 7.7.2018
6. Search Related Infor- 12 8.7.2018 19.7.2018
mation
7. Understanding con- 7 20.7.2018 26.7.2018
cept
8. Search Essential 4 27.7.2018 1.8.2018n
Document(IEEE and
White paper,Software
)
9. Problem De 2 2.8.2018 3.8.2018
nition
10. Literature Survey 5 4.8.2018 8.8.2018
11. SRS 14 9.8.2017 22.8.2018
12. Project Planning 2 23.8.2018 24.8.2018
13. Modeling and design 10 25.8.2018 3.9.2018
14. Technical Specifica- 2 4.9.2018 5.9.2018
tion
15. PPT 6 6.9.2018 11.9.2018
16. Model Refinement 7 15.01.2018 22.01.2018
17. Coding Implementa- 15 23.01.2019 06.02.2019
tion
18. Validation /testing 8 07.02.2019 15.02.2019
19. Report writing 10 16.02.2019 26.02.2019
20. Publication Activity 10 26.02.2019 08.03.2019
21. submission of project 10 09.03.2019 19.03.2019
22. PPT 6 20.03.2019 26.03.2019

You might also like