You are on page 1of 14

A METHODOLOGY FOR SECURE SHARING

OF PERSONAL HEALTH RECORDS IN THE


CLOUD
ABSTRACT
• The across the board acknowledgment of cloud based administrations in the
medicinal services part has brought about savvy and advantageous trade of
Personal Health Records (PHRs) among a few partaking substances of the e-
Health frameworks. In any case, putting away the private wellbeing data to
cloud servers is defenseless to disclosure or burglary and requires the
advancement of philosophies that guarantee the security of the PHRs. Thusly,
we propose a strategy called SeSPHR for secure sharing of the PHRs in the
cloud. The SeSPHR conspire guarantees quiet driven control on the PHRs and
jelly the privacy of the PHRs.
• The patients store the encoded PHRs on the un-confided in cloud servers and
specifically award get to various sorts of clients on various segments of the
PHRs. A semi-believed intermediary called Setup and Re-encryption Server
(SRS) is acquainted with set up people in general/private key sets and to create
the re-encryption keys. In addition, the approach is secure against insider
dangers and furthermore upholds an advance and in reverse access control.
Besides, we officially examine and confirm the working of SeSPHR technique
through the High Level Petri Nets (HLPN). Execution assessment with respect
to time utilization demonstrates that the SeSPHR approach can possibly be
utilized for safely sharing the PHRs in the cloud.
INTRODUCTION
 Cloud storage has drawn research attention in the last few years with the
development of cloud computing. There are some IT systems providing
storage services such as Dropbox, iCloud and SkyDrive, and more and
more users are getting used to storing and accessing their data by smart
phones in cloud storage. For the protection of privacy and confidentiality
of sensitive data, secure encryption is an effective way to defence against
attackers.

• Some have inspected the security of the proposed arrangements also,


where imperfections were discovered, arrangements were proposed. In this
paper, we present an expression seeks plot which accomplishes an a lot
quicker reaction time than existing arrangements.
EXISTING SYSTEM
• As organizations and individuals adopt cloud technologies, many have
become aware of the serious concerns regarding security and privacy of
accessing personal and confidential information over the Internet. In
particular, the recent and continuing data breaches highlight the need for
more secure cloud storage systems. While it is generally agreed that
encryption is necessary, cloud providers often perform the encryption and
maintain the private keys instead of the data owners. That is, the cloud can
read any data it desired, providing no privacy to its users.

• The storage of private keys and encrypted data by the cloud provider is
also problematic in case of data breach. Hence, researchers have actively
been exploring solutions for secure storage on private and public clouds
where private keys remain in the hands of data owners.
DISADVANTAGES OF EXISTING SYSTEM
• The ranking of search results and searching with keywords that might
contain errors
• Potential statistical attacks on the indexes are indentified.
PROPOSED SYSTEM
• In this paper, we present a phrase search scheme and it is scalable, where
documents can easily be removed and added to the corpus. We also
describe modifications to the scheme to lower storage cost at a small cost
in response time and to defend against cloud providers with statistical
knowledge on stored data.

• Our framework differs from some of the earlier works, where keywords
generally consist of meta-data rather than content of the files and where a
trusted key escrow authority is used due to the use of Identity based
encryption.
ADVANTAGES OF PROPOSED SYSTEM
• The proposed system achieves a much faster response time than existing
solutions.

• The proposed algorithms can easily be adapted to the scenario of an


organization wishing to setup a cloud server for its employees by
implementing a proxy server in place of the data owner and having the
employees/users authenticate to the proxy server.
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : Windows XP.
• Coding Language: J2EE
• Data Base : MYSQL.
MODULES
• Data Owner Module
• Cloud Server Module
MODULES DESCRIPTION
• DATA OWNER MODULE

The data owner generates the required encryption keys for hashing and
encryption operations. Then, all documents in the database are parsed for
keywords. Bloom filters tied to hashed keywords and n-grams are attached.
The documents are then symmetrically encrypted and uploaded to the cloud
server. To add files to the database, the data owner parses the files as in setup
and uploads them with Bloom filters attached to the cloud server. To remove a
file from the data, the data owner simply sends the request to the cloud server,
who removes the file along with the attached Bloom filters. To perform a
search, the data owner computes and sends a trapdoor encryption of the
queried keywords to the cloud to initiate a protocol to search for the requested
keywords in the corpus.
MODULES DESCRIPTION
• CLOUD SERVER MODULE
The cloud server can receive the uploaded and encrypted files from the
data owner and also it receives the file trapdoors. Finally, the cloud responds
to the data owner with the identifiers to the requested documents.
CONCLUSION
• We proposed a strategy to safely store and transmission of the PHRs to the
approved substances in the cloud. The philosophy saves the privacy of the PHRs
and upholds a patient-driven access control to various bits of the PHRs dependent
on the entrance gave by the patients. We executed a fine-grained get to control
technique so that even the legitimate framework clients can't get to those
segments of the PHR for which they are not approved. The PHR proprietors store
the encoded information on the cloud and just the approved clients having
legitimate re-encryption keys gave by a semi-trusted intermediary can decode the
PHRs.
• The job of the semi-believed intermediary is to create and store the general
population/private key sets for the clients in the framework. Notwithstanding
safeguarding the classification and guaranteeing persistent driven access
command over the PHRs, the system additionally regulates the advance and in
reverse access control for withdrawing and the recently joining clients, separately.
Also, we officially investigated and confirmed the working of SeSPHR procedure
through the HLPN, SMT-Lib, and the Z3 solver. The exhibition assessment was
done on the based on time expended to produce keys, encryption and decoding
activities, and turnaround time. The exploratory outcomes display the
reasonability of the SeSPHR philosophy to safely share the PHRs in the cloud
REFERENCE
• K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel
communication in Edge-of-Things,” Future Generation Computer Systems,
85, 2018, pp. 190-200.

• K. Gai, M. Qiu, and X. Sun, “A survey on FinTech,” Journal of Network and


Computer Applications, 2017, pp. 1-12.

• A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health


insurance plan recommendation system: A user centered approach, “Future
Generation Computer Systems, vols. 43- 44, pp. 99-109, 2015.

• A. N. Khan, ML M. Kiah, S. A. Madani, M. Ali, and S. Shamshirband,


“Incremental proxy re-encryption scheme for mobile cloud computing
environment,” The Journal of Supercomputing, Vol. 68, No. 2, 2014, pp. 624-
651.

You might also like