SlideShare une entreprise Scribd logo
1  sur  15
BY
A.DINESH,
M.TECH (CNIS)
 Introduction
 System Model
 Security Model
 Design Goal
 Proposed SPOC framework
 Security Analysis
 Conclusion
 References
 M-Healthcare an application to improve
health care quality and save lives
 BSN’s and Smartphone's utilized to provide
m-health care in chronic medical conditions
like heart attacks, diabetes
Medical users are no longer needed to be
monitored within home or hospitals with
m-healthcare
 Opportunistic computing is to resolve
reliability issue in Personal Health
Information[PHI] process
 Once the raw PHI data is processed in OC, the
privacy of PHI would be disclosed
 3-contributions
i) balances high reliability of PHI &
minimizing PHI privacy disclosure
ii) to achieve user-centric privacy access
control
iii) to validate proposed SPOC framework
 As PHI very sensitive, it can handle with
minimal privacy disclosure
 It has:
i) Phase-1 access control
ii)Phase-2 access control
 These two access control to achieve high
reliable PHI process & transmission in m-
healthcare emergency
 It is to develop specifically:
i) apply opportunistic computing in
m-healthcare emergency to achieve high
reliability of PHI process and transmission
ii) develop user centric privacy access control
to minimize the PHI privacy disclosure
 It has 3-parts
1)System Initialization
2)User centric privacy access control for m-
healthcare emergency
-phase-I access control
-phase-II access control
3)Analysis of opportunistic computing in m-
healthcare emergency
 The proposed SPOC framework can achieve
phase –I access control and also phase –II
access control by providing security
 It can achieve the user-centric privacy access
control of opportunistic computing in
m-healthcare emergency
 The proposed SPOC framework which mainly
exploits how to use OC to achieve high
reliability of PHI process & transmission in
emergency while minimizing the privacy
disclosure is achieved.
 It has achieved the balance the high intensive
PHI process
 Future work may exploit issues of PPSPC.
QUERIES??
THANK YOU!!

Contenu connexe

En vedette

Light Peak Technology February 2011
Light Peak Technology February 2011Light Peak Technology February 2011
Light Peak Technology February 2011
patrick g
 
Light peak presentation
Light peak presentationLight peak presentation
Light peak presentation
Simer Sahni
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATION
Akhil Kumar
 

En vedette (20)

Light peak
Light peakLight peak
Light peak
 
Full report on light peak technology
Full report on light peak technologyFull report on light peak technology
Full report on light peak technology
 
Rural Kiosk
Rural KioskRural Kiosk
Rural Kiosk
 
Taming Big Data with NoSQL
Taming Big Data with NoSQLTaming Big Data with NoSQL
Taming Big Data with NoSQL
 
Light peak technology, Peak Light technology, Optical Technology, Sumalatha
Light peak technology, Peak Light technology, Optical Technology, Sumalatha Light peak technology, Peak Light technology, Optical Technology, Sumalatha
Light peak technology, Peak Light technology, Optical Technology, Sumalatha
 
Light Peak Technology February 2011
Light Peak Technology February 2011Light Peak Technology February 2011
Light Peak Technology February 2011
 
iTwin
iTwiniTwin
iTwin
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Light peak presentation
Light peak presentationLight peak presentation
Light peak presentation
 
AIRBORNE
AIRBORNEAIRBORNE
AIRBORNE
 
Freenet
FreenetFreenet
Freenet
 
Moneypad
MoneypadMoneypad
Moneypad
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
I twin technology
I twin technologyI twin technology
I twin technology
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATION
 
Flying Cars
Flying CarsFlying Cars
Flying Cars
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
VLAN
VLANVLAN
VLAN
 

Similaire à Spoc (1)

Opportunistic Computing Framework for Mobile-Healthcare Emergency
Opportunistic Computing Framework for Mobile-Healthcare EmergencyOpportunistic Computing Framework for Mobile-Healthcare Emergency
Opportunistic Computing Framework for Mobile-Healthcare Emergency
AM Publications
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
ProductNation/iSPIRT
 
HL7 January 2013
HL7 January 2013HL7 January 2013
HL7 January 2013
Barry Smith
 

Similaire à Spoc (1) (20)

Opportunistic Computing Framework for Mobile-Healthcare Emergency
Opportunistic Computing Framework for Mobile-Healthcare EmergencyOpportunistic Computing Framework for Mobile-Healthcare Emergency
Opportunistic Computing Framework for Mobile-Healthcare Emergency
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
 
Introduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdfIntroduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdf
 
Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
HL7 January 2013
HL7 January 2013HL7 January 2013
HL7 January 2013
 
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
 
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Spoc (1)

  • 2.  Introduction  System Model  Security Model  Design Goal  Proposed SPOC framework  Security Analysis  Conclusion  References
  • 3.  M-Healthcare an application to improve health care quality and save lives  BSN’s and Smartphone's utilized to provide m-health care in chronic medical conditions like heart attacks, diabetes Medical users are no longer needed to be monitored within home or hospitals with m-healthcare
  • 4.
  • 5.  Opportunistic computing is to resolve reliability issue in Personal Health Information[PHI] process  Once the raw PHI data is processed in OC, the privacy of PHI would be disclosed  3-contributions i) balances high reliability of PHI & minimizing PHI privacy disclosure ii) to achieve user-centric privacy access control iii) to validate proposed SPOC framework
  • 6.
  • 7.  As PHI very sensitive, it can handle with minimal privacy disclosure  It has: i) Phase-1 access control ii)Phase-2 access control  These two access control to achieve high reliable PHI process & transmission in m- healthcare emergency
  • 8.
  • 9.  It is to develop specifically: i) apply opportunistic computing in m-healthcare emergency to achieve high reliability of PHI process and transmission ii) develop user centric privacy access control to minimize the PHI privacy disclosure
  • 10.  It has 3-parts 1)System Initialization 2)User centric privacy access control for m- healthcare emergency -phase-I access control -phase-II access control 3)Analysis of opportunistic computing in m- healthcare emergency
  • 11.  The proposed SPOC framework can achieve phase –I access control and also phase –II access control by providing security  It can achieve the user-centric privacy access control of opportunistic computing in m-healthcare emergency
  • 12.  The proposed SPOC framework which mainly exploits how to use OC to achieve high reliability of PHI process & transmission in emergency while minimizing the privacy disclosure is achieved.  It has achieved the balance the high intensive PHI process  Future work may exploit issues of PPSPC.
  • 13.