Research Paper II Anna Kate

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072

IMPLEMENTATION OF CLOUDLET-BASED MEDICAL DATA SHARING USING


NTRU CRYPTOSYSTEM METHOD
Mr. Sourabh Kate1, Mr. Akshay Waghmare2, Mr. Mayur Dange3, Prof. Sachin Pandhare4
1Student,SMSMPITR, Akluj, Maharashtra - 413118
2Student, SMSMPITR, Akluj, Maharashtra – 413118
3 Student, SMSMPITR, Akluj, Maharashtra - 413118
4Professor, Dept. of Computer Science & Engineering, SMSMPITR Akluj, Maharashtra - 413118

---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – This paper proposes an implementation of a Addressing the challenging issue of privacy-preserving
cloudlet-based system for securely sharing medical data, multi-keyword ranked search over encrypted cloud data
employing the NTRU cryptosystem method. Key features (MRSE), the proposed solution establishes strict privacy
include leveraging cloudlets for data transmission, requirements and utilizes the "coordinate matching"
employing NTRU encryption for secure transfer from mobile similarity measure for relevance assessment. Two improved
devices to cloudlets, and implementing a trust model for MRSE schemes are presented to meet various privacy
selective information sharing. The framework facilitates requirements in different threat models, ensuring both
secure and personalized data sharing among trusted privacy and efficiency.
partners while ensuring robust privacy protection for A practical solution for privacy-preserving medical record
remotely stored patient data. sharing for cloud computing is developed based on attribute
classification. It includes vertical data partitioning, data
Key Words: Privacy Protection, Data Sharing, Healthcare, combining, integrity checking, and hybrid search across
Collaborative Intrusion Detection System (IDS). plaintext and ciphertext. The system implements statistical
analysis and cryptography to balance medical data
1. INTRODUCTION utilization and privacy protection, enabling access to large-
scale medical data while ensuring privacy.
Distributed computing revolutionizes venture IT delivery,
offering cost-effective solutions and democratizing web
processing. Healthcare, a vital industry, faces challenges in 2. Flow chart for System
data security and privacy. Cloud platforms provide storage
services, but encryption is crucial to safeguard data
confidentiality and integrity. Economical searchable
encryption techniques facilitate efficient data retrieval.
Advanced distributed computing allows information to be
stored across various clouds, enabling information sharing
and intensive computations. However, ensuring the
security of user data during transmission and storage in
cloudlets and remote clouds remains a critical concern. This
paper proposes a cloudlet-based healthcare framework to
address these challenges and enhance the security of
healthcare data in distributed cloud environments.
1.1 Literature Survey

The functions of the cloudlet encompass privacy


protection, data sharing, and intrusion detection. In the data
collection stage, user body data from wearable devices is
encrypted using the NTRU method and sent to nearby
cloudlets efficiently. A new trust model is introduced to
enable users to select trustworthy partners for data sharing
and communication. Medical data stored in remote cloud is
divided into three parts for proper protection. Additionally,
a collaborative intrusion detection system based on cloudlet
mesh is designed to protect the healthcare system from Fig. System Flow Chart
malicious attacks.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072

2.1 Related Work

Fig. Medical Staff Login Page


Fig. Login Page
The login page facilitates the key authority request
The data provider login page serves as the gateway for process for medical staff, enabling them to securely receive
new data providers to upload and encrypt data securely. cryptographic keys from the KDC for decrypting and
Through this portal, authorized users gain access to accessing patient data. This ensures that sensitive medical
upload their data, which is subsequently encrypted to information is accessed and handled only by authorized
prevent unauthorized access without the specific personnel, maintaining patient confidentiality and data
encryption key. security.

Fig. KDC Page


Fig. User Registration Form
The Key Distribution Center generates unique public-
private key pairs for specific email IDs of authorized The registration page allows data owners or
doctors and securely distributes these keys to enable doctors to register themselves in the system by providing
secure access to patient data without intrusion. This necessary information. Upon successful registration, a
process ensures confidentiality, integrity, and authenticity confirmation message is displayed, and the user is ready to
in the healthcare data exchange environment. access the system using their credentials.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072

Fig. Browse File Fig. Decrypt File

The data upload window allows data owners to securely Medical staff can select the provider and file to be
upload their data onto the cloudlet system, ensuring decrypted, initiating the decryption and download
confidentiality, integrity, and access control over the processes securely through the system interface. This
uploaded data. ensures efficient access to patient data while maintaining
confidentiality and compliance with security protocols.

Fig. Download File

After receiving the keys from the KDC, authorized users can Fig. Attack Found
securely download and decrypt files using their private
keys, ensuring confidentiality and integrity of the data If an unauthorized user attempts to access the data, the
throughout the process. system detects the unauthorized access attempt and
displays an "attack found" message to alert system
administrators or security personnel. This prompts
immediate investigation and response to mitigate the
attack and prevent further unauthorized access.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072

[8]. J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for
3. CONCLUSION AND FUTURE SCOPE privacy preserving medical data sharing in the cloud
environment,” Future Generation Computer Systems, vol.
This proposed system is a secure cloudlet-based 43, pp. 74–86, 2015.
information sharing framework that operates on an
encrypted data format. The Key Distribution Center (KDC) [9]. K. Hung, Y. Zhang, and B. Tai, “Wearable medical
facilitates encryption by providing encryption algorithms devices for telehome healthcare,” in Engineering in
to customers or data owners. When sharing data, if an Medicine and Biology Society, 2004.IEMBS’04. 26th
attack occurs, the cloudlet system employs a collaborative Annual International Conference of the IEEE, vol. 2. IEEE,
intrusion detection system (IDS) technique to prevent it. 2004, pp. 5384–5387.
The system's implementation demonstrates its enhanced
security and reliability, while also saving time and memory [10]. M. S. Hossain, “Cloud-supported cyber–physical
resources. localization framework for patients monitoring,” 2015.

REFERENCES
BIOGRAPHIES
[1]. M. Quwaider and Y. Jararweh, “Cloudlet-based efficient
data collection in wireless body area networks,”
Simulation Modelling Practice andTheory, vol. 50,pp. Mr. Sourabh Sanjay Kate.
57–71, 2015./ Student, Dept. of Computer
Science & Engineering,
[2] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. SMSMPITR, Akluj, Maharashtra -
Kołodziej,A. Streit, and D. Georgakopoulos, “A security 413118
framework in g-hadoopfor big data computing across
distributed cloud data centres,” Journal of Computer and
System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.M. S. Ms. Akshay Sunil Waghmare.
Hossain and G. Muhammad, “Cloud-assisted industrial Student, Dept. of Computer
internet of things (iiot)–enabled framework for health Science & Engineering,
monitoring,” Computer Networks, vol. 101, pp. 192–202, SMSMPITR, Akluj, Maharashtra -
2016. 413118

[3]. R. Zhang and L. Liu, “Security models and


requirements for healthcare application clouds,” in Cloud Prof. Sachin Dadaso Pandhare.
HOD, Dept. of Computer Science
Computing (CLOUD), 2010 IEEE 3rd International
& Engineering, SMSMPITR Akluj,
Conference on. IEEE, 2010, pp. 268–275.
Maharashtra - 413118
[4]. K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang,
“Deypos:Deduplicatable dynamic proof of storage for
multi-user environments,”2016.

[5]. N. Cao,"Privacy-preserving multi-keyword ranked


search over encrypted cloud data",INFOCOM, 2011
Proceedings IEEE,IEEE, (2011).

[6]. Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang,


Shiwen Mao, Long Hu, “Privacy Protection and Intrusion
Avoidance for Cloudlet-based Medical Data Sharing”, IEEE
Transactions on Cloud Computing, 2016.

[7]. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-


preserving multi-keyword ranked search over encrypted
cloud data,” Parallel and Distributed Systems, IEEE
Transactions on, vol. 25, no. 1, pp. 222–233, 2014.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy