0% found this document useful (0 votes)
52 views18 pages

DSAS A Secure Data Sharing and Authorized

Uploaded by

cloudcrypt1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views18 pages

DSAS A Secure Data Sharing and Authorized

Uploaded by

cloudcrypt1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

SYNOPSIS

OBJECTIVE

1) Individuals health data gathered from gadgets are secured before being uploaded
to the online server, ensuring the security and privacy of PHRs; (2) Just permitted
medical professionals or research facilities have access to the PHRs; and (3) Alice
(doctor-in-charge) can delegate medical research and utilization to Bob (doctor-in-
agent) or a specific research organization via the cloud server, thus minimizing
data reaching the cloud server. We define the security concept and demonstrate the
security of our approach. Finally, the assessment of performance shows how
effective of our approach.

ABSTRACT

In e-healthcare system, an increasing number of patients enjoy high-quality


medical servicesby sharing encrypted personal healthcare records (PHRs) with
doctors or medical research institutions.However, one of the important issues is
that the encrypted PHRs prevent effective search of information,resulting in the
decrease of data usage. Another issue is that medical treatment process requires the
doctorto be online all the time, which may be unaffordable for all doctors (e.g., to
be absent under certaincircumstances). In this paper, we design a new secure and
practical proxy searchable re-encryption scheme,allowing medical service
providers to achieve remote PHRs monitoring and research safely and
efficiently.Through our scheme DSAS, (1) patients' healthcare records collected by
the devices are encrypted beforeuploading to the cloud server ensuring privacy and
confidentiality of PHRs; (2) only authorized doctorsor research institutions have
access to the PHRs; (3) Alice (doctor-in-charge) is able to delegate
medicalresearch and utilization to Bob (doctor-in-agent) or certain research
institution through the cloud server,supporting minimizing information exposure to
the cloud server. We formalize the security definition andprove the security of our
scheme. Finally, performance evaluation shows the efficiency of our scheme.

MODULES

 Patient
 Doctor
 Cloud Server
 Data collection and encryption phase
 Data retrieval phase
 Conditional authorization

SYSTEM SPECIFICATION

HARDWARE REQUIREMENTS:

 System : Pentium i3 Processor


 Hard Disk : 500 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 4 GB

SOFTWARE REQUIREMENTS:

 Operating system : Windows 10.


 Coding Language : JAVA.
 Tool : Apache NetbeansIDE 16
 Database : MYSQL
CONCLUSION

In this investigation, we describe a client-invisible condition-hiding proxy


reconfiguration technique with phrase search capabilities that may be used to
secure data exchange and delegate in digital healthcare systems. With our new
approach, a doctor, Alice (delegator), can create a conditional permission for
another doctor, Bob (delegatee), by providing an a second encryption key. The
cloud server can utilize the a second encryption key to execute ciphertext
alteration, allowing Bob to access the PHRs that were originally encoded using
Alice's private key, allowing safe delegations. The cloud server may conduct
searches across encrypted PHRs on behalf of the doctor without learning anything
about a word or underpinning ailment. Specifically, we accomplished proxy-
invisibility in the system.
CHAPTER 1
INTRODUCTION
1.1 PROJECT OVERVIEW
Nowadays, with the rapid development of artificial intelligence and the
advancement of wearable devices and sensors, e-healthcare sensor network has
reached a stage of maturity for adoption and deployment at a commercial scale.
Ehealthcare sensor network serving as a mobile platform profoundly benefit
patients to obtain medical treatment of high quality and efficiency. As shown in
Fig.1, patients’ devices collect a large amount of personal healthcare records
through sensor devices, which enable doctors to more effectively diagnose and
attend to the need of the patients through utilizing these data. Such information
also enables medical researchers and analysts to perform analytics to gain better
insights on illnesses and devise better treatments. Nevertheless, these data may be
stored on cloud storage provided by third-party service providers [10], [16], [34],
which introduce potential security issues such as data leakage. This is because
neither the patients nor the doctors have control of the information once the data is
outsourced. This means the privacy and confidentiality of these outsourced data
should be protected in such an environment. For instance, some medical
institutions collect and store a large amount of PHRs on cloud servers and
authorize the usage of these data to the Center for Disease Control and Prevention
(CDC). To facilitate disease prevention and control, doctors in CDC are allowed to
study these data with data mining technology. However, in the process of
collecting case information from medical institutions and the implementation of
traditional data mining technology, the CDC may inevitably expose sensitive data
of patients. How to store manage and retrieve the PHRs securely and efficiently is
a great challenge.
1.2 PROBLEM DESCRIPTION
The current system requires clinicians to be accessible at all times. If the doctor is
unavailable, healthcare is not feasible.

sadly most present CPRE systems cannot ensure the condition's privacy, which
includes some sensitive information.On the other hand, if a malicious user can tell
the difference between are-encrypted ciphertext and an original ciphertext, the
security risk increases, since the hostile user would know Alice is not available
right now.

The current system approaches for retrieving information from encrypted PHRs
remain a challenge, particularly when dealing with large amounts of data at a finer
level.
Unfortunately, no existing systems provide encrypted keyword search and
condition-hiding at the same time, limiting the commercial uses of proxy re-
encryption in the e-healthcare system.
1.3 OBJECTIVES

1.Input Design is the process of converting a user-oriented description of the input


into a computer-based system. This design is important to avoid errors in the data
input process and show the correct direction to the management for getting correct
information from the computerized system.

2.It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.

3.When the data is entered it will check for its validity. Data can be entered with
the help of screens. Appropriate messages are provided as when needed so that the
user will not be in maize of instant. Thus the objective of input design is to create
an input layout that is easy to follow.
CHAPTER 2

LITERATURE SURVEY

2.1 EXISTING SYSTEM:

 Yasnoff proposed a e-healthcare storageframework to eliminate the potential


for loss of an entirecentralized dataset from a single intrusion while
maintaining reasonable search performance.
 A reliable, searchableand privacy-preserving e-healthcare system was
proposed byYang et al. based on searchable encryption to protect sensitive
healthcare files on cloudstorage and enable cloud server to search on the
encrypteddata under the control of patients.
 Boneh et al., gave the first PEKS constructionfor e-healthcare system in the
public key environment. Later,Abdalla et al. revisited the concept of PEKS
and proposed the consistency notion.
 Baek et al. extended PEKSwhich removes secure channels between a user
and the cloudserver, which make the patients communicate with doctorswith
a secure way.

DISADVANTAGES OF EXISTING SYSTEM:

 Although encryption ensuresdata confidentiality and can be used to address


concerns ofdata privacy and avoids the attacks from malicious usersand
cloud servers, it also brings inconvenience of usage. Forinstance,
conventional encryption techniques render it difficult to query these
encrypted data because of the uselessinformation retrieval methods based on
plaintext.
 Themassive sensitive data leads to a great security and efficiency challenge
to the current e-healthcare system due tolack of efficient information retrieve
mechanism and poor fine-grained access control.
 Existing system also implies the doctors need to be available allthe time. If
the doctor is offline, then medical treatmentwould not be possible.
 Unfortunately, mostexisting CPRE schemes cannot guarantee the privacy of
thecondition, which also contains some sensitive information.On the other
hand, if a malicious user can distinguish are-encrypted ciphertext from an
original ciphertext, it willincrease the security risk such as that the malicious
userknows Alice is not available right now.
 The existing system methodsinformation retrieve over the encrypted PHRs
is still a challengingissue, especially when dealing with massive data at a
fine-grainedlevel.
 Unfortunately, all the existing systems do not simultaneouslysupport both
encrypted keyword search and condition-hidingin practice, which limits the
commercial applications ofproxy re-encryption in the e-healthcare system.

2.2 PROPOSED SYSTEM:

 We propose aproxy-invisible condition-hiding proxy re-encryption


schemewith keyword search to address the issues of inefficiency
andcondition privacy in the e-healthcare system.Encrypting is considered to
be a simple and efficient solution to guarantee data confidentiality, but it
also makes search over encrypted dataextremely difficult. Searchable
encryption technologyrealizes the search operation of encrypted data without
decryption, and solves the problem that userscannot control remotely
because of data encryption.Hence, searchable is necessary in the e-
healthcaresystem.In this proposed system, we aim to designan efficient,
searchable and privacy-preserving e-healthcaresystem.
 In the proposed system we design asecure data sharing and authorized
searchable scheme for e-healthcare system where patients continuously
collectsPHRs with sensors from physical environments andsends these
encrypted PHRs to his doctor-in-charge for seeking for medical treatment. In
some case, doctor A wants to sharesome but not all these PHRs to doctor B.
To achieveaccess authorization, A generates a re-encryption keybased on his
private key and the public key of B. In order to prevent privacy disclosure,
we generatea conditional re-encryption by embedding a trapdoorin the re-
encryption key so that thecloud server can only convert ciphertext under
thedesignated condition. Moreover, the cloud server isresponsible for storing
the encrypted data and providing keyword search services and also acts as a
proxy toperform re-encryption for data users. When a keywordsearch
request with a trapdoor is received from B, thecloud server performs
information retrieval over theencrypted PHRs. Finally, B can decrypt
ciphertext byusing only his private key to obtain specific
medicalinformation.
2.3 APPLICATIONS

Secure Medical Records Management:

Implement your scheme in healthcare institutions to securely manage and share


patients' medical records among authorized personnel, ensuring privacy and
confidentiality.

Remote Patient Monitoring:

Develop a system that allows doctors to remotely monitor patients' health data
securely using your proxy re-encryption scheme. This can be especially useful for
telemedicine and remote healthcare services.

Medical Research Collaboration:

Enable secure collaboration and data sharing among medical researchers and
institutions while protecting sensitive healthcare information. Your scheme can
facilitate efficient and secure research collaborations.

Healthcare Data Analytics:

Use your scheme to securely analyze and process large volumes of encrypted
healthcare data for insights and decision-making in healthcare analytics and
personalized medicine.

Patient-Centric Health Apps:

Integrate your scheme into mobile health applications to ensure that patient-
generated health data (PGHD) is securely stored, shared, and accessed by
healthcare providers based on patient consent.

Compliance and Regulatory Tools:


Develop tools and systems that help healthcare organizations comply with data
privacy regulations such as HIPAA (Health Insurance Portability and
Accountability Act) by implementing robust security measures for handling
sensitive health information.

Health Information Exchange (HIE) Platforms:

Enhance existing HIE platforms with your scheme to facilitate secure and efficient
exchange of electronic health information among healthcare providers, patients,
and authorized entities. Telehealth Platforms: Incorporate your scheme into
telehealth platforms to ensure the secure transmission and storage of patient data
during virtual consultations and remote healthcare services.
CHAPTER 3

METHODOLOGY

Cloud Server

The cloud server module acts as an intermediary between the patient and doctor
modules. It stores the encrypted PHRs and handles requests for data retrieval.We
have used DriveHQ cloud service provider for the storage of files in the cloud part.
In this module cloud server is built with the responsible to approving or rejecting
both the patients and doctors also to make the system secure. The Cloud server is
responsible for assigning a patient to the doctor. Also if any doctor requests for a
particular patient, then the cloud server verifies and approves it accordingly.

Data collection and encryption phase

This module is responsible for collecting patients' PHRs from various patients and
encrypting them before uploading them to the cloud server. It also ensures the
confidentiality, integrity, and availability of the PHRs by implementing security
protocols.

Data retrieval phase


The data retrieval module is responsible for handling authorized doctors' requests
for medical records. It retrieves the relevant data from the cloud server, decrypts it,
and returns it to the doctor module. Only if the particular decryption key is
available they can able to access the data orelse the data cannot be accessed. The
key will not be same for all the entity for the same file. So even if one entity leaks
the key the file is still secure and cannot be accessed.

Conditional authorization

This module is the core of the DSAS project, which provides a secure and practical
proxy searchable re-encryption scheme for efficient and safe remote PHRs
monitoring and research. It allows Alice (doctor-in-charge) to delegate medical
research and utilization to Bob (doctor-in-agent) through the cloud server,
supporting minimizing information exposure to the cloud server.
3.2 ARCHITECTURE
3.3 DEVELOPMENT

 Data privacy: patients' data collected are encrypted before they are uploaded
to thecloud storage server. This ensures privacy and confidentiality of data
since the cloud server will not be able tolearn any information from the
encrypted PHRs.
 Conditional authorization: In the event where the doctor-in-charge (Alice) is
unavailable, our scheme enables thedelegation of the task to another doctor
(Bob) through acloud server, without the need to decrypt the PHRs
thusminimizing information exposure to the cloud server.
 Condition-hiding: Our scheme not only guaranteespatients's PHRs privacy
through encrypted data but alsopreserves the privacy of the condition
embedded in there-encryption key.
 Proxy invisibility: In our scheme, the authorized doctor (Bob) or a malicious
user cannot distinguish whichciphertext is sent to delegatee and which
ciphertext isre-encrypted by the cloud delegated by Alice.
 Collusion resistance: In our scheme, even a dishonestproxy colludes with
Bob, Alice's private key can still besecure.
CHAPTER 4

CONCLUSION

In this paper, we presented a proxy-invisible condition-hidingproxy re-encryption


scheme which supports keyword searchthat can be applied to securing data sharing
and delegationin e-healthcare systems. With our new system, a doctor,Alice
(delegator), may construct a conditional authorizationfor a doctor, Bob (delegatee),
by specifying a re-encryptionkey. With the re-encryption key, the cloud server can
perform ciphertext transformation so that Bob is able to accessthe PHRs original
encrypted under Alice's public key, thusenabling secure delegation. The cloud
server can operatesearch over encrypted PHRs on behalf of the doctor without
learning information about the keyword or the underlying condition. Specifically,
we achieved the property ofproxy-invisible in the system. We have also obtained
theproperty of collusion-resistance in the system, where a delegator's (Alice)
private key is still secure even a dishonestcloud server colludes with the delegatee
(Bob). We havedemonstrated security through a rigorous proof, and the
performance analysis confirms that our proposed scheme DSASis efficient and
practical.
BIBILOGRAPHY

[1] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange,J. Malone-


Lee, G. Neven, P. Paillier, and H. Shi, ``Searchable encryptionrevisited:
Consistency properties, relation to anonymous IBE, and extensions,'' in Proc.
Annu. Int. Cryptol. Conf. Berlin, Germany: Springer, 2005,pp. 205222.

[2] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, ``Improved proxy re-


encryption schemes with applications to secure distributed storage,'' ACMTrans.
Inf. Syst. Secur., vol. 9, no. 1, pp. 130, 2006.

[3] J. Baek, R. Safavi-Naini, and W. Susilo, ``Public key encryption withkeyword


search revisited,'' in Proc. Int. Conf. Comput. Sci. Appl. (ICCSA),2008, pp.
12491259.

[4] T. Bhatia, A. K. Verma, and G. Sharma, ``Towards a secure incrementalproxy


re-encryption for e-healthcare data sharing in mobile cloud computing,''
Concurrency Comput., Pract. Exper., vol. 32, no. 5, p. e5520,Mar. 2020.

[5] T. Bhatia, A. K.Verma, and G. Sharma, ``Secure sharing of mobile


personalhealthcare records using certicateless proxy re-encryption in cloud,''Trans.
Emerg.Telecommun.Technol., vol. 29, no. 6, p. e3309, Jun. 2018.

[6] I. F. Blake, G. Seroussi, and N. Smart, ``Advances in Elliptic


CurveCryptography (London Mathematical Society Lecture Note Series (317)),vol.
19. Cambridge, U.K.: Cambridge Univ. Press, no. 20, 2005, p. 666.
[7] M. Blaze, G. Bleumer, and M. Strauss, ``Divertible protocols and atomicproxy
cryptography,'' in Advances in Cryptology-EUROCRYPT. Berlin,Germany:
Springer, 1998, pp. 127144.

[8] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, ``Publickey


encryption with keyword search,'' in Proc. Int. Conf. Theory Appl.Cryptograph.
Techn. Berlin, Germany: Springer, 2004, pp. 506522.

[9] D. Boneh and B. Waters, ``Conjunctive, subset, and range queries onencrypted
data,'' in Proc. Theory Cryptogr. Conf. Berlin, Germany:Springer, 2007, pp.
535554.

[10] H. Fang, X. Wang, and L. Hanzo, ``Learning-aided physical layer


authentication as an intelligent process,'' IEEE Trans. Commun., vol. 67, no. 3,pp.
22602273, Mar. 2019.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy