SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3598
SECRECY PRESERVING AND INTRUSION AVOIDANCE IN MEDICAL DATA
SHARING OVER CLOUD
Haritha H1, Monish N2, Saranya K3, Soundarya S4
1,2,3,4 Student, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology,
Coimbatore, India.
-----------------------------------------------------------------------------------***----------------------------------------------------------------------------------
Abstract - In modern era of globalization, cloud
technology has changed the world in a vast manner. In this
day and age, people are storing their data in the cloud
because the data is getting wider and to be offered from
many devices. Common healthcare system leads to leakage
of sensitive data, which also causes communication energy
consumption. So, it is a tedious process to share the medical
data over cloud. To overcome these sorts of issues, we have
developed a distinctive healthcare system by utilizing the
adaptability of cloud. Normally, functions of cloud include
privacy preserving, data sharing and intrusion detection.
Initially, we make use of Number Theory Research Unit
(NTRU) algorithm to encrypt user’s body data which we
were collected and those data will be transmitted to nearby
cloud in an energy capable mode. At the same time, we
introduce a new trust model to help users for choosing the
believable partners, whom they want to share the stored
data in the cloud. It also helps similar patients to
communicate with each other about their diseases. Further,
we divide user’s medical data stored in remote cloud of
hospital into three parts, and give them proper shield.
Finally, to safeguard the healthcare system from malicious
attacks, we develop a unique deliberative intrusion detection
system (IDS), which can effectually prevent the remote
healthcare data cloud from malicious attacks.
Key Words: secrecy preserving, NTRU, malicious attacks,
deliberative intrusion system (IDS).
1. INTRODUCTION
With encroachment of healthcare big data technology, the
cloud computing, communication technologies and cloud-
assisted healthcare big data computing has become nit-
picking to meet user’s demands on health session.
However, provocation issue to personalize specific
healthcare data for various users in a convenient manner.
Existing work suggested the consolidation of social
networks and healthcare services to facilitate the finding
of the disease treatment process for the retrieval of
current disease details. However, sharing medical data on
the social network is favourable to both patients and
doctors, the sensitive data might be leaked or stolen, which
causes privacy and security problems without efficient
protection for the shared data.
Though, data sharing over cloud brings about the following
elemental problems:
• How to protect the security of user’s body data during
its delivery to a cloud?
• How to make sure the data sharing in cloudlet will not
cause privacy problem?
• How to effectually safeguard the whole system from
malicious attacks?
In provisions to the above problems, this paper proposes a
cloud based healthcare system. The data which is collected
are transmitted to the nearby cloud. Those data are further
handed over to the remote cloud where doctors can
approach for disease diagnosis. According to data delivery
chain, we separate the secrecy into three stages. At
foremost stage, user’s essential signs gathered by the
cloud. Throughout this stage, data privacy is the main
mission. In the second stage, user’s data will be further
delivered toward remote cloud through clouds Thus, both
secrecy and data sharing are considered in this stage.
Then, we introduce a new trust model to help users to
select convincing partners who want to share stored data
in the cloud. The user’s medical data are stored in remote
cloud are classified into different varieties and take the
corresponding security policy. Extraneous to above three
stages, we also acknowledged deliberative IDS based on
cloud to protect the cloud ecosystem.
In short, the main improvement of this paper comprises
of
• The cloud based medical healthcare system is
conferred; where the secrecy of user’s medical data and
the efficiency of data communication is our main
mission. We use NTRU for data protection during data
transmissions to the cloud.
• To share data in the cloud, we use user’s comparability
and acceptability to develop trust model. Based on the
amplitude of user’s trust level, the system determines
whether data shared or not.
• Then we split the required data in remote cloud into
different varieties and use encryption mechanism to
protect them appropriately.
• Finally, we propose deliberatively IDS based on cloud
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3599
mesh to safeguard the whole medical healthcare
system against malicious attacks.
2. RELATED WORK
Our work is closely related to secrecy and intrusion
avoidance system and we will give a brief review of the
works in these aspects.
K. Hung, Y.T.Zhang and B. Tai [1] demonstrated the
overview of state-of-art wearable technologies for remote
patient-monitoring is presented, pursued by case studies
on a cuff less blood pressure meter, ring-type heart rate
monitor, and Bluetooth/spl trade/-based ECG monitor.
Objective of this project is to build a tele-home healthcare
system that uses wearable devices, wireless transmission
technologies, and multisensory data integration
techniques. The essential part of this project is a cuff less
BP meter has been refined and tested on 30 subjects in a
total of 71 trials over a period of five months. Elemental
results show a mean error (ME) of 1.82 mmHg and
standard deviation of error (SDE) of 7.62 mmHg in systolic
pressure; while ME and SDE in diastolic pressure are 0.45
mmHg and 5.27 mmHg, respectively.
M.S. Hossain [5] represents a rapidly evolving approach to
patient monitoring, and have many exciting possibilities
with regard to communication (localization) and
computation. The layout and development of such systems
requires route to substantial sensor and user contextual
data that are stored in cyberspace. Providing reliable and
real-time route to such data is sometimes hindered by the
high latencies of wide-area networks underlying the CCPLS
infrastructure. For understanding these characteristics of
localization systems, the workload should be measured by
deploying the proposed localization approach over public
cloud services such as Amazon’s EC2 platform. Some of the
workloads are measured. In future work, we will conduct
more workload measurements to record the resource
utilization of CPU, memory, storage, and network
bandwidth.
J. Zhao, L. Wang [6] implemented a security framework
for running map reduce tasks across different clusters in a
distributed environment. This framework provides users
with a single-sign-on process to submit jobs to G-Hadoop.
Furthermore, it applies various security mechanisms to
protect the G-Hadoop system from attacks as well as
abusing or misusing. These security mechanisms are based
on some current security solutions, for example SSL and
cryptographic algorithm, or the concepts of other security
solutions such as GSI. Some concepts, for example, proxy
credentials, user session, and user instance, are applied in
this security framework as well to provide the
functionalities of the framework. With these security
mechanisms the designed security framework has the
ability to prevent the most common attacks, such as MITM
attack, replay attack, and delay attack, and ensures a
secure communication of G-Hadoop over public networks.
In addition, it adopts different mechanisms to protect the
resources of G-Hadoop from abusing or misusing. On the
whole, it provides a trustful and complete solution of the
single-sign-on process for the user to access G-Hadoop. For
further improvement, job execution in Phase V as well as
the encryption algorithms and keys will be designed as
changeable to increase the difficulty of cryptographic
analysis by an attacker.
G. Muhammad [7] represent the healthcare monitoring
system, and provides a quality patient care through
continuous monitoring from anywhere at any time,
through a multitude of devices. Along HealthIIoT,
healthcare professionals may be able to access patient
information, store it, and analyse it in a real-time manner
to monitor and track the patient. Though, interconnected
wearable patient devices and healthcare data (such as ECG
signals) are subject to security breaches. Finally, this paper
describes a cloud-integrated HealthIIoT monitoring
framework, where healthcare data are watermarked
before being sent to the cloud for secure, safe, and high-
quality health monitoring. Further work will involve
testing the proposed HealthIIoT monitoring framework for
data security and notification functions, as well as
implementing a test trial with real-world patients and
health professionals.
R. Zhang and L. Liu[8] implemented the medical approach
to fact-finding security models and security requirements
for healthcare application clouds. Meantime, we have
considered important concepts related to EHR sharing and
integration in healthcare clouds and analysed the arising
security and privacy issues in access and management of
EHRs. Security reference model for controlling security
problems in healthcare clouds, that focus three major
segments in securing an EHR cloud. Lastly, we
demonstrate the development of the proposed EHR
security reference model through a use-case scenario and
describe the corresponding security. Electronic Health
Record safety reference model for handling safety issues in
healthcare clouds, which highlights three important core
components in safeguarding an Electronic Health Record
cloud.
3. IMPLEMENTATION
3.1 Methodology
The framework of the proposed medical data sharing over
cloud is shown in Fig -1. The client’s physiological data are
collected by cloud. Then, those data are delivered to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3600
nearby cloud in an energy efficient manner. The following
are two important issues for healthcare data security is
taken into account. The foremost issue is data secrecy
protection and sharing of data. Next issue is to develop
effectual countermeasures to prevent the medical
database from being intruded.
Fig – 1: Architecture of proposed method
We address the first issue on medical healthcare data
encryption and sharing abides,
 Client data encryption
We use NTRU algorithm to protect the client’s
physiological data from being leaked or abused. This
scheme is to protect the user’s privacy when transmitting
the data from the cloud to the nearby cloud.
 Data sharing over cloud
Generally, users geographically close to each other connect
to the same cloud. It’s feasible for them to share common
visible feature, for instance, patients suffer from allied kind
of disease exchange information of treatment and share
related data. Due to this purpose, we use users’
comparability and acceptability as input data. Thereafter,
we obtain users’ trust levels, a certain threshold is set for
the comparison. On reaching or exceeding the threshold, it
is considered that the trust between the users is enough
for data sharing. Or else, the data will not share with low
trust level.
 Remote cloud data privacy protection
In comparison to user’s daily data in cloud, the data stored
in remote contains large scale medical data, e.g., EMR,
which will be stored for a remote future. Further EMR is
divided into explicit identifier (EI-D), quasi-identifier
(QID) and medical information (MI). Later segregating,
proper protection is given for the data containing user’s
sensitive information.
 Deliberative IDS based on cloud mesh
The huge volume of medical data stored in the remote
cloud, hence it is nit-picking to apply security mechanism
to safeguard the database from malicious intrusions. In
this paper, we implement specific counter step to establish
a defence system for the large medical database in the
remote cloud storage. Pointedly, deliberative IDS based on
the cloud mesh structure is used to screen any visit to the
database as a protection border. If the detection shows a
malicious intrusion in advance, the collaborative IDS will
fire an alarm and block the visit, and vice-versa. The
deliberative IDS, as a guard of the cloud database, will
protect a huge number of medical data and make sure of
the security of the database. Here we apply a decision tree
to choose the optimal number of IDS’s to be deployed on
the mesh. The goal is to achieve a prescribed detection
accuracy against the false alarm rate under the premise of
minimizing the system cost.
3.2 MODULES
Cloud Service Provider Configuration
In this cloud service provider module cloud will register
and login with valid user name and password. If
authentication is successful cloud can add doctors and
send user name and password to doctors registered mail
id. Cloud can view all doctor’s details. Cloud can view
information of registered patients along with data
uploaded by patients in encrypted format. Cloud can view
patient’s appointments and choose doctors based on user
selection.
Patient Management
In this module patient will register with application and
login with user name and password. Patient can view his
profile and encrypt personal data which can be viewed by
cloud provider. Patient will request for appointment to
doctor and verify status of appointment.
Doctor Management
In doctor module doctor can check his registered mail id
for username and password and login with those details.
Doctor can view patient’s queries and response to patient.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3601
Intruder Management
Intruder is a module designed to check malicious activities
by un authorized user who don’t have access to data but
what to view data. In this case when intruder views data
message is sent to actual user who owns data.
4. SIMULATION STUDY
In simulation study, we have compared AES with DES and
Blowfish algorithm. Below table Table-2. shows the
comparison,
AES DES BLOWFISH
Advanced
Encryption
Standard (AES) is
the beneficiary of
DES as standard
symmetric
encryption
algorithm for US
federal
organizations.
AES agree to take
keys of 128, 192 or
256 bits, uses 128-
bit blocks, and is
efficient in both
software and
hardware.
DES is the timeworn
"data encryption
standard" from the
seventies. Its key size
is too short for
proper security. Also,
DES uses 64-bit
blocks, which raises
some potential issues
when encrypting
several gigabytes of
data with the same
key.
3DES is not a real to
reuse DES
implementations, by
cascading three
instances of DES
3DES is believed to
be secure up to at
least "2112" security.
But it is slow,
especially in
software.
Blowfish is a block
cipher suggested by
Bruce Schneier, and
deployed in some
software’s.
It can use enormous
keys and is
supposed to be
secure, except with
regards to its block
size, which is 64
bits, just like DES
and 3DES.
It is effectual in
software, at least on
some software
platforms.
Table – 2: Comparison of AES, DES and Blowfish
Chart – 3: Performance of AES
In Chart-3., we measure the performance of AES with other
encryption techniques.
There are three main measures of IDS performance and
chart-4 will represent the error detection in IDS using the
following measures.
 The False Positive Rate (FPR) is the occurrence in
which the IDS information malicious activities with
errors. These errors are the bane of a security
administrator's existence. The true risk of a high false
positive rate lies in the fact that it may cause
administrators to ignore the system's output when
legitimate alerts are raised. You may also see false
positives stated as "Type I errors," a phrase hired from
the field of medical research. In general, increasing the
sensitivity of intrusion avoidance system fallouts in a
higher false positive rate, while decreasing the
sensitivity lowers the false positive rate.
 The False Negative Rate (FNR) is the occurrence in
which the IDS flop to raise an alert when malicious
activity actually happens. These are the most
dangerous types of errors, as they represent
undetected attacks on a system. The corresponding
term from medical research is a "Type II error." False
negative rates change in an inverse proportion to false
positive rates. As the false positive rate increases, the
false negative rate decreases and vice-versa.
Chart – 4: Error Detection in IDS
 The Crossover Error Rate (CER) is used to afford a
standard measure for comparison of intrusion-
detection systems. As per the sensitivity of systems
may cause the false positive or negative degrees to
vary, it's critical to have some common measure that
may be applied across the board. We can evaluate
numerous different IDSs by running successively on the
same network and evaluating the CER for each. If we
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3602
want to attain a balance between false positives and
false negatives, we can select the system with the
lowest CER. Next, if we want to sense every single
attack with ultimate priority, we can select the system
with the lowest false negative rate recognizing that this
selection may increase the administrative overhead
associated with false positive reports.
5.CONCLUSION
Cloud computing is an emerging technology that will
receive more attention in the future from industry and
academia. The cost of this technology is more attractive
when it is compared to building the infrastructure.
Though, there are many security issues coming with this
technology as happens when every technology matures. In
this paper, we have identified the problem of secrecy and
sharing large amount medical data in cloud and the remote
cloud. At first, we can utilize ubiquitous devices to collect
user’s data, and in order to protect user’s privacy, we use
NTRU mechanism to make sure the transmission of users’
data to cloudlet in security. Next, for the purpose of
sharing data in the cloudlet, we use trust model to measure
users’ trust level to judge whether to share data or not.
Then, for privacy-preserving of remote cloud data, we
partition the data stored in the remote cloud and encrypt
the data in different ways, so as to not just ensure data
protection but also accelerate the efficacy of transmission.
Lastly, we propose collaborative IDS based on cloudlet
mesh to protect the whole system. These solutions will
lead to more secure cloud storage, which will also lead to
more acceptance from the people and the trust on the
cloud will increase.
6.REFERENCES
[1] K. Hung, Y. Zhang, and B. Tai, “Wearable medical
devices for tele-home healthcare,” in Engineering in
Medicine and Biology Society, 2004. IEMBS’04. 26th
Annual International Conference of the IEEE, vol. 2. IEEE,
2004, pp. 5384–5387.
[2] Parthasarathi.P, Shankar. S (March 2017), “A Survival
Study of Security Attacks, Mechanisms and Challenges in
Network Security” Journal of Advanced in Natural and
Applied Sciences (ANAS) ISSN NO: 1995 0772. (Anna
University Annexure – II).
[3] Parthasarathi.P, Shankar. S (March 2017), “Detect the
path to Delivery of the Packet in Mobile ADHOC Network”
Journal of Advanced in Natural and Applied Sciences
(ANAS) ISSN NO: 1995 0772. (Anna University Annexure–
II).
[4] Parthasarathi.P, Rajeshwari.K (November 2015),
“Multi-Authority Attribute Based Encryption In Cloud
Computing For Agriculture” Proceedings of International
Journal of Science & Engineering Research (IJ0SER), Vol 3,
Issue 11.
[5] M. S. Hossain, “Cloud-supported cyber–physical
localization framework for patients monitoring,” 2015.
[6] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J.
Kołodziej, A. Streit, and D. Georga kopoulos, “A security
framework in g-hadoop for big data computing across
distributed cloud data centres,” Journal of Computer and
System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
[7] M. S. Hossain and G. Muhammad, “Cloud-assisted
industrial internet of things (iiot)–enabled framework for
health monitoring,” Computer Networks, vol. 101, pp. 192–
202, 2016.
[8] R. Zhang and L. Liu, “Security models and requirements
for healthcare application clouds,” in Cloud Computing
(CLOUD), 2010 IEEE 3rd International Conference on. IEEE,
2010, pp. 268–275.
[9] K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang,
“Deypos: Deduplicatable dynamic proof of storage for
multi-user environments,” 2016.
[10] L. Griffin and E. De Leastar, “Social networking
healthcare,” in Wearable Micro and Nano Technologies for
Personalized Health (pHealth), 2009 6th International
Workshop on. IEEE, 2009, pp. 75–78.
[11] W. Xiang, G. Wang, M. Pickering, and Y. Zhang, “Big
video data for light-field-based 3d telemedicine,” IEEE
Network, vol. 30, no. 3, pp. 30– 38, 2016.
[12] C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and
security for online social networks: challenges and
opportunities,” Network, IEEE, vol. 24, no. 4, pp. 13–18,
2010.
[13] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-
preserving multi-keyword ranked search over encrypted
cloud data,” Parallel and Distributed Systems, IEEE
Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[14] K. T. Pickard and M. Swan, “Big desire to share big
health data: A shift in consumer attitudes toward personal
health information,” in 2014 AAAI Spring Symposium
Series, 2014.

Contenu connexe

Tendances

Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET Journal
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcarekhalidhassan105
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2CitiusTech
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET Journal
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET Journal
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET Journal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemeSAT Publishing House
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
 

Tendances (19)

Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring system
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 

Similaire à IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing Over Cloud

IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
 
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCARE
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCAREUSING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCARE
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCAREIJCI JOURNAL
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
 

Similaire à IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing Over Cloud (20)

IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCARE
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCAREUSING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCARE
USING BLOCKCHAIN TO ACHIEVE DECENTRALIZED PRIVACY IN IOT HEALTHCARE
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
N018138696
N018138696N018138696
N018138696
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Dernier (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing Over Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3598 SECRECY PRESERVING AND INTRUSION AVOIDANCE IN MEDICAL DATA SHARING OVER CLOUD Haritha H1, Monish N2, Saranya K3, Soundarya S4 1,2,3,4 Student, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, India. -----------------------------------------------------------------------------------***---------------------------------------------------------------------------------- Abstract - In modern era of globalization, cloud technology has changed the world in a vast manner. In this day and age, people are storing their data in the cloud because the data is getting wider and to be offered from many devices. Common healthcare system leads to leakage of sensitive data, which also causes communication energy consumption. So, it is a tedious process to share the medical data over cloud. To overcome these sorts of issues, we have developed a distinctive healthcare system by utilizing the adaptability of cloud. Normally, functions of cloud include privacy preserving, data sharing and intrusion detection. Initially, we make use of Number Theory Research Unit (NTRU) algorithm to encrypt user’s body data which we were collected and those data will be transmitted to nearby cloud in an energy capable mode. At the same time, we introduce a new trust model to help users for choosing the believable partners, whom they want to share the stored data in the cloud. It also helps similar patients to communicate with each other about their diseases. Further, we divide user’s medical data stored in remote cloud of hospital into three parts, and give them proper shield. Finally, to safeguard the healthcare system from malicious attacks, we develop a unique deliberative intrusion detection system (IDS), which can effectually prevent the remote healthcare data cloud from malicious attacks. Key Words: secrecy preserving, NTRU, malicious attacks, deliberative intrusion system (IDS). 1. INTRODUCTION With encroachment of healthcare big data technology, the cloud computing, communication technologies and cloud- assisted healthcare big data computing has become nit- picking to meet user’s demands on health session. However, provocation issue to personalize specific healthcare data for various users in a convenient manner. Existing work suggested the consolidation of social networks and healthcare services to facilitate the finding of the disease treatment process for the retrieval of current disease details. However, sharing medical data on the social network is favourable to both patients and doctors, the sensitive data might be leaked or stolen, which causes privacy and security problems without efficient protection for the shared data. Though, data sharing over cloud brings about the following elemental problems: • How to protect the security of user’s body data during its delivery to a cloud? • How to make sure the data sharing in cloudlet will not cause privacy problem? • How to effectually safeguard the whole system from malicious attacks? In provisions to the above problems, this paper proposes a cloud based healthcare system. The data which is collected are transmitted to the nearby cloud. Those data are further handed over to the remote cloud where doctors can approach for disease diagnosis. According to data delivery chain, we separate the secrecy into three stages. At foremost stage, user’s essential signs gathered by the cloud. Throughout this stage, data privacy is the main mission. In the second stage, user’s data will be further delivered toward remote cloud through clouds Thus, both secrecy and data sharing are considered in this stage. Then, we introduce a new trust model to help users to select convincing partners who want to share stored data in the cloud. The user’s medical data are stored in remote cloud are classified into different varieties and take the corresponding security policy. Extraneous to above three stages, we also acknowledged deliberative IDS based on cloud to protect the cloud ecosystem. In short, the main improvement of this paper comprises of • The cloud based medical healthcare system is conferred; where the secrecy of user’s medical data and the efficiency of data communication is our main mission. We use NTRU for data protection during data transmissions to the cloud. • To share data in the cloud, we use user’s comparability and acceptability to develop trust model. Based on the amplitude of user’s trust level, the system determines whether data shared or not. • Then we split the required data in remote cloud into different varieties and use encryption mechanism to protect them appropriately. • Finally, we propose deliberatively IDS based on cloud
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3599 mesh to safeguard the whole medical healthcare system against malicious attacks. 2. RELATED WORK Our work is closely related to secrecy and intrusion avoidance system and we will give a brief review of the works in these aspects. K. Hung, Y.T.Zhang and B. Tai [1] demonstrated the overview of state-of-art wearable technologies for remote patient-monitoring is presented, pursued by case studies on a cuff less blood pressure meter, ring-type heart rate monitor, and Bluetooth/spl trade/-based ECG monitor. Objective of this project is to build a tele-home healthcare system that uses wearable devices, wireless transmission technologies, and multisensory data integration techniques. The essential part of this project is a cuff less BP meter has been refined and tested on 30 subjects in a total of 71 trials over a period of five months. Elemental results show a mean error (ME) of 1.82 mmHg and standard deviation of error (SDE) of 7.62 mmHg in systolic pressure; while ME and SDE in diastolic pressure are 0.45 mmHg and 5.27 mmHg, respectively. M.S. Hossain [5] represents a rapidly evolving approach to patient monitoring, and have many exciting possibilities with regard to communication (localization) and computation. The layout and development of such systems requires route to substantial sensor and user contextual data that are stored in cyberspace. Providing reliable and real-time route to such data is sometimes hindered by the high latencies of wide-area networks underlying the CCPLS infrastructure. For understanding these characteristics of localization systems, the workload should be measured by deploying the proposed localization approach over public cloud services such as Amazon’s EC2 platform. Some of the workloads are measured. In future work, we will conduct more workload measurements to record the resource utilization of CPU, memory, storage, and network bandwidth. J. Zhao, L. Wang [6] implemented a security framework for running map reduce tasks across different clusters in a distributed environment. This framework provides users with a single-sign-on process to submit jobs to G-Hadoop. Furthermore, it applies various security mechanisms to protect the G-Hadoop system from attacks as well as abusing or misusing. These security mechanisms are based on some current security solutions, for example SSL and cryptographic algorithm, or the concepts of other security solutions such as GSI. Some concepts, for example, proxy credentials, user session, and user instance, are applied in this security framework as well to provide the functionalities of the framework. With these security mechanisms the designed security framework has the ability to prevent the most common attacks, such as MITM attack, replay attack, and delay attack, and ensures a secure communication of G-Hadoop over public networks. In addition, it adopts different mechanisms to protect the resources of G-Hadoop from abusing or misusing. On the whole, it provides a trustful and complete solution of the single-sign-on process for the user to access G-Hadoop. For further improvement, job execution in Phase V as well as the encryption algorithms and keys will be designed as changeable to increase the difficulty of cryptographic analysis by an attacker. G. Muhammad [7] represent the healthcare monitoring system, and provides a quality patient care through continuous monitoring from anywhere at any time, through a multitude of devices. Along HealthIIoT, healthcare professionals may be able to access patient information, store it, and analyse it in a real-time manner to monitor and track the patient. Though, interconnected wearable patient devices and healthcare data (such as ECG signals) are subject to security breaches. Finally, this paper describes a cloud-integrated HealthIIoT monitoring framework, where healthcare data are watermarked before being sent to the cloud for secure, safe, and high- quality health monitoring. Further work will involve testing the proposed HealthIIoT monitoring framework for data security and notification functions, as well as implementing a test trial with real-world patients and health professionals. R. Zhang and L. Liu[8] implemented the medical approach to fact-finding security models and security requirements for healthcare application clouds. Meantime, we have considered important concepts related to EHR sharing and integration in healthcare clouds and analysed the arising security and privacy issues in access and management of EHRs. Security reference model for controlling security problems in healthcare clouds, that focus three major segments in securing an EHR cloud. Lastly, we demonstrate the development of the proposed EHR security reference model through a use-case scenario and describe the corresponding security. Electronic Health Record safety reference model for handling safety issues in healthcare clouds, which highlights three important core components in safeguarding an Electronic Health Record cloud. 3. IMPLEMENTATION 3.1 Methodology The framework of the proposed medical data sharing over cloud is shown in Fig -1. The client’s physiological data are collected by cloud. Then, those data are delivered to
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3600 nearby cloud in an energy efficient manner. The following are two important issues for healthcare data security is taken into account. The foremost issue is data secrecy protection and sharing of data. Next issue is to develop effectual countermeasures to prevent the medical database from being intruded. Fig – 1: Architecture of proposed method We address the first issue on medical healthcare data encryption and sharing abides,  Client data encryption We use NTRU algorithm to protect the client’s physiological data from being leaked or abused. This scheme is to protect the user’s privacy when transmitting the data from the cloud to the nearby cloud.  Data sharing over cloud Generally, users geographically close to each other connect to the same cloud. It’s feasible for them to share common visible feature, for instance, patients suffer from allied kind of disease exchange information of treatment and share related data. Due to this purpose, we use users’ comparability and acceptability as input data. Thereafter, we obtain users’ trust levels, a certain threshold is set for the comparison. On reaching or exceeding the threshold, it is considered that the trust between the users is enough for data sharing. Or else, the data will not share with low trust level.  Remote cloud data privacy protection In comparison to user’s daily data in cloud, the data stored in remote contains large scale medical data, e.g., EMR, which will be stored for a remote future. Further EMR is divided into explicit identifier (EI-D), quasi-identifier (QID) and medical information (MI). Later segregating, proper protection is given for the data containing user’s sensitive information.  Deliberative IDS based on cloud mesh The huge volume of medical data stored in the remote cloud, hence it is nit-picking to apply security mechanism to safeguard the database from malicious intrusions. In this paper, we implement specific counter step to establish a defence system for the large medical database in the remote cloud storage. Pointedly, deliberative IDS based on the cloud mesh structure is used to screen any visit to the database as a protection border. If the detection shows a malicious intrusion in advance, the collaborative IDS will fire an alarm and block the visit, and vice-versa. The deliberative IDS, as a guard of the cloud database, will protect a huge number of medical data and make sure of the security of the database. Here we apply a decision tree to choose the optimal number of IDS’s to be deployed on the mesh. The goal is to achieve a prescribed detection accuracy against the false alarm rate under the premise of minimizing the system cost. 3.2 MODULES Cloud Service Provider Configuration In this cloud service provider module cloud will register and login with valid user name and password. If authentication is successful cloud can add doctors and send user name and password to doctors registered mail id. Cloud can view all doctor’s details. Cloud can view information of registered patients along with data uploaded by patients in encrypted format. Cloud can view patient’s appointments and choose doctors based on user selection. Patient Management In this module patient will register with application and login with user name and password. Patient can view his profile and encrypt personal data which can be viewed by cloud provider. Patient will request for appointment to doctor and verify status of appointment. Doctor Management In doctor module doctor can check his registered mail id for username and password and login with those details. Doctor can view patient’s queries and response to patient.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3601 Intruder Management Intruder is a module designed to check malicious activities by un authorized user who don’t have access to data but what to view data. In this case when intruder views data message is sent to actual user who owns data. 4. SIMULATION STUDY In simulation study, we have compared AES with DES and Blowfish algorithm. Below table Table-2. shows the comparison, AES DES BLOWFISH Advanced Encryption Standard (AES) is the beneficiary of DES as standard symmetric encryption algorithm for US federal organizations. AES agree to take keys of 128, 192 or 256 bits, uses 128- bit blocks, and is efficient in both software and hardware. DES is the timeworn "data encryption standard" from the seventies. Its key size is too short for proper security. Also, DES uses 64-bit blocks, which raises some potential issues when encrypting several gigabytes of data with the same key. 3DES is not a real to reuse DES implementations, by cascading three instances of DES 3DES is believed to be secure up to at least "2112" security. But it is slow, especially in software. Blowfish is a block cipher suggested by Bruce Schneier, and deployed in some software’s. It can use enormous keys and is supposed to be secure, except with regards to its block size, which is 64 bits, just like DES and 3DES. It is effectual in software, at least on some software platforms. Table – 2: Comparison of AES, DES and Blowfish Chart – 3: Performance of AES In Chart-3., we measure the performance of AES with other encryption techniques. There are three main measures of IDS performance and chart-4 will represent the error detection in IDS using the following measures.  The False Positive Rate (FPR) is the occurrence in which the IDS information malicious activities with errors. These errors are the bane of a security administrator's existence. The true risk of a high false positive rate lies in the fact that it may cause administrators to ignore the system's output when legitimate alerts are raised. You may also see false positives stated as "Type I errors," a phrase hired from the field of medical research. In general, increasing the sensitivity of intrusion avoidance system fallouts in a higher false positive rate, while decreasing the sensitivity lowers the false positive rate.  The False Negative Rate (FNR) is the occurrence in which the IDS flop to raise an alert when malicious activity actually happens. These are the most dangerous types of errors, as they represent undetected attacks on a system. The corresponding term from medical research is a "Type II error." False negative rates change in an inverse proportion to false positive rates. As the false positive rate increases, the false negative rate decreases and vice-versa. Chart – 4: Error Detection in IDS  The Crossover Error Rate (CER) is used to afford a standard measure for comparison of intrusion- detection systems. As per the sensitivity of systems may cause the false positive or negative degrees to vary, it's critical to have some common measure that may be applied across the board. We can evaluate numerous different IDSs by running successively on the same network and evaluating the CER for each. If we
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3602 want to attain a balance between false positives and false negatives, we can select the system with the lowest CER. Next, if we want to sense every single attack with ultimate priority, we can select the system with the lowest false negative rate recognizing that this selection may increase the administrative overhead associated with false positive reports. 5.CONCLUSION Cloud computing is an emerging technology that will receive more attention in the future from industry and academia. The cost of this technology is more attractive when it is compared to building the infrastructure. Though, there are many security issues coming with this technology as happens when every technology matures. In this paper, we have identified the problem of secrecy and sharing large amount medical data in cloud and the remote cloud. At first, we can utilize ubiquitous devices to collect user’s data, and in order to protect user’s privacy, we use NTRU mechanism to make sure the transmission of users’ data to cloudlet in security. Next, for the purpose of sharing data in the cloudlet, we use trust model to measure users’ trust level to judge whether to share data or not. Then, for privacy-preserving of remote cloud data, we partition the data stored in the remote cloud and encrypt the data in different ways, so as to not just ensure data protection but also accelerate the efficacy of transmission. Lastly, we propose collaborative IDS based on cloudlet mesh to protect the whole system. These solutions will lead to more secure cloud storage, which will also lead to more acceptance from the people and the trust on the cloud will increase. 6.REFERENCES [1] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for tele-home healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387. [2] Parthasarathi.P, Shankar. S (March 2017), “A Survival Study of Security Attacks, Mechanisms and Challenges in Network Security” Journal of Advanced in Natural and Applied Sciences (ANAS) ISSN NO: 1995 0772. (Anna University Annexure – II). [3] Parthasarathi.P, Shankar. S (March 2017), “Detect the path to Delivery of the Packet in Mobile ADHOC Network” Journal of Advanced in Natural and Applied Sciences (ANAS) ISSN NO: 1995 0772. (Anna University Annexure– II). [4] Parthasarathi.P, Rajeshwari.K (November 2015), “Multi-Authority Attribute Based Encryption In Cloud Computing For Agriculture” Proceedings of International Journal of Science & Engineering Research (IJ0SER), Vol 3, Issue 11. [5] M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015. [6] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georga kopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014. [7] M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring,” Computer Networks, vol. 101, pp. 192– 202, 2016. [8] R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 268–275. [9] K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, “Deypos: Deduplicatable dynamic proof of storage for multi-user environments,” 2016. [10] L. Griffin and E. De Leastar, “Social networking healthcare,” in Wearable Micro and Nano Technologies for Personalized Health (pHealth), 2009 6th International Workshop on. IEEE, 2009, pp. 75–78. [11] W. Xiang, G. Wang, M. Pickering, and Y. Zhang, “Big video data for light-field-based 3d telemedicine,” IEEE Network, vol. 30, no. 3, pp. 30– 38, 2016. [12] C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challenges and opportunities,” Network, IEEE, vol. 24, no. 4, pp. 13–18, 2010. [13] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014. [14] K. T. Pickard and M. Swan, “Big desire to share big health data: A shift in consumer attitudes toward personal health information,” in 2014 AAAI Spring Symposium Series, 2014.