DSAS A Secure Data Sharing and Authorized
DSAS A Secure Data Sharing and Authorized
OBJECTIVE
1) Individuals health data gathered from gadgets are secured before being uploaded
to the online server, ensuring the security and privacy of PHRs; (2) Just permitted
medical professionals or research facilities have access to the PHRs; and (3) Alice
(doctor-in-charge) can delegate medical research and utilization to Bob (doctor-in-
agent) or a specific research organization via the cloud server, thus minimizing
data reaching the cloud server. We define the security concept and demonstrate the
security of our approach. Finally, the assessment of performance shows how
effective of our approach.
ABSTRACT
MODULES
Patient
Doctor
Cloud Server
Data collection and encryption phase
Data retrieval phase
Conditional authorization
SYSTEM SPECIFICATION
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
sadly most present CPRE systems cannot ensure the condition's privacy, which
includes some sensitive information.On the other hand, if a malicious user can tell
the difference between are-encrypted ciphertext and an original ciphertext, the
security risk increases, since the hostile user would know Alice is not available
right now.
The current system approaches for retrieving information from encrypted PHRs
remain a challenge, particularly when dealing with large amounts of data at a finer
level.
Unfortunately, no existing systems provide encrypted keyword search and
condition-hiding at the same time, limiting the commercial uses of proxy re-
encryption in the e-healthcare system.
1.3 OBJECTIVES
2.It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.
3.When the data is entered it will check for its validity. Data can be entered with
the help of screens. Appropriate messages are provided as when needed so that the
user will not be in maize of instant. Thus the objective of input design is to create
an input layout that is easy to follow.
CHAPTER 2
LITERATURE SURVEY
Develop a system that allows doctors to remotely monitor patients' health data
securely using your proxy re-encryption scheme. This can be especially useful for
telemedicine and remote healthcare services.
Enable secure collaboration and data sharing among medical researchers and
institutions while protecting sensitive healthcare information. Your scheme can
facilitate efficient and secure research collaborations.
Use your scheme to securely analyze and process large volumes of encrypted
healthcare data for insights and decision-making in healthcare analytics and
personalized medicine.
Integrate your scheme into mobile health applications to ensure that patient-
generated health data (PGHD) is securely stored, shared, and accessed by
healthcare providers based on patient consent.
Enhance existing HIE platforms with your scheme to facilitate secure and efficient
exchange of electronic health information among healthcare providers, patients,
and authorized entities. Telehealth Platforms: Incorporate your scheme into
telehealth platforms to ensure the secure transmission and storage of patient data
during virtual consultations and remote healthcare services.
CHAPTER 3
METHODOLOGY
Cloud Server
The cloud server module acts as an intermediary between the patient and doctor
modules. It stores the encrypted PHRs and handles requests for data retrieval.We
have used DriveHQ cloud service provider for the storage of files in the cloud part.
In this module cloud server is built with the responsible to approving or rejecting
both the patients and doctors also to make the system secure. The Cloud server is
responsible for assigning a patient to the doctor. Also if any doctor requests for a
particular patient, then the cloud server verifies and approves it accordingly.
This module is responsible for collecting patients' PHRs from various patients and
encrypting them before uploading them to the cloud server. It also ensures the
confidentiality, integrity, and availability of the PHRs by implementing security
protocols.
Conditional authorization
This module is the core of the DSAS project, which provides a secure and practical
proxy searchable re-encryption scheme for efficient and safe remote PHRs
monitoring and research. It allows Alice (doctor-in-charge) to delegate medical
research and utilization to Bob (doctor-in-agent) through the cloud server,
supporting minimizing information exposure to the cloud server.
3.2 ARCHITECTURE
3.3 DEVELOPMENT
Data privacy: patients' data collected are encrypted before they are uploaded
to thecloud storage server. This ensures privacy and confidentiality of data
since the cloud server will not be able tolearn any information from the
encrypted PHRs.
Conditional authorization: In the event where the doctor-in-charge (Alice) is
unavailable, our scheme enables thedelegation of the task to another doctor
(Bob) through acloud server, without the need to decrypt the PHRs
thusminimizing information exposure to the cloud server.
Condition-hiding: Our scheme not only guaranteespatients's PHRs privacy
through encrypted data but alsopreserves the privacy of the condition
embedded in there-encryption key.
Proxy invisibility: In our scheme, the authorized doctor (Bob) or a malicious
user cannot distinguish whichciphertext is sent to delegatee and which
ciphertext isre-encrypted by the cloud delegated by Alice.
Collusion resistance: In our scheme, even a dishonestproxy colludes with
Bob, Alice's private key can still besecure.
CHAPTER 4
CONCLUSION
[9] D. Boneh and B. Waters, ``Conjunctive, subset, and range queries onencrypted
data,'' in Proc. Theory Cryptogr. Conf. Berlin, Germany:Springer, 2007, pp.
535554.