Research Paper II Anna Kate
Research Paper II Anna Kate
Research Paper II Anna Kate
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – This paper proposes an implementation of a Addressing the challenging issue of privacy-preserving
cloudlet-based system for securely sharing medical data, multi-keyword ranked search over encrypted cloud data
employing the NTRU cryptosystem method. Key features (MRSE), the proposed solution establishes strict privacy
include leveraging cloudlets for data transmission, requirements and utilizes the "coordinate matching"
employing NTRU encryption for secure transfer from mobile similarity measure for relevance assessment. Two improved
devices to cloudlets, and implementing a trust model for MRSE schemes are presented to meet various privacy
selective information sharing. The framework facilitates requirements in different threat models, ensuring both
secure and personalized data sharing among trusted privacy and efficiency.
partners while ensuring robust privacy protection for A practical solution for privacy-preserving medical record
remotely stored patient data. sharing for cloud computing is developed based on attribute
classification. It includes vertical data partitioning, data
Key Words: Privacy Protection, Data Sharing, Healthcare, combining, integrity checking, and hybrid search across
Collaborative Intrusion Detection System (IDS). plaintext and ciphertext. The system implements statistical
analysis and cryptography to balance medical data
1. INTRODUCTION utilization and privacy protection, enabling access to large-
scale medical data while ensuring privacy.
Distributed computing revolutionizes venture IT delivery,
offering cost-effective solutions and democratizing web
processing. Healthcare, a vital industry, faces challenges in 2. Flow chart for System
data security and privacy. Cloud platforms provide storage
services, but encryption is crucial to safeguard data
confidentiality and integrity. Economical searchable
encryption techniques facilitate efficient data retrieval.
Advanced distributed computing allows information to be
stored across various clouds, enabling information sharing
and intensive computations. However, ensuring the
security of user data during transmission and storage in
cloudlets and remote clouds remains a critical concern. This
paper proposes a cloudlet-based healthcare framework to
address these challenges and enhance the security of
healthcare data in distributed cloud environments.
1.1 Literature Survey
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
The data upload window allows data owners to securely Medical staff can select the provider and file to be
upload their data onto the cloudlet system, ensuring decrypted, initiating the decryption and download
confidentiality, integrity, and access control over the processes securely through the system interface. This
uploaded data. ensures efficient access to patient data while maintaining
confidentiality and compliance with security protocols.
After receiving the keys from the KDC, authorized users can Fig. Attack Found
securely download and decrypt files using their private
keys, ensuring confidentiality and integrity of the data If an unauthorized user attempts to access the data, the
throughout the process. system detects the unauthorized access attempt and
displays an "attack found" message to alert system
administrators or security personnel. This prompts
immediate investigation and response to mitigate the
attack and prevent further unauthorized access.
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
[8]. J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for
3. CONCLUSION AND FUTURE SCOPE privacy preserving medical data sharing in the cloud
environment,” Future Generation Computer Systems, vol.
This proposed system is a secure cloudlet-based 43, pp. 74–86, 2015.
information sharing framework that operates on an
encrypted data format. The Key Distribution Center (KDC) [9]. K. Hung, Y. Zhang, and B. Tai, “Wearable medical
facilitates encryption by providing encryption algorithms devices for telehome healthcare,” in Engineering in
to customers or data owners. When sharing data, if an Medicine and Biology Society, 2004.IEMBS’04. 26th
attack occurs, the cloudlet system employs a collaborative Annual International Conference of the IEEE, vol. 2. IEEE,
intrusion detection system (IDS) technique to prevent it. 2004, pp. 5384–5387.
The system's implementation demonstrates its enhanced
security and reliability, while also saving time and memory [10]. M. S. Hossain, “Cloud-supported cyber–physical
resources. localization framework for patients monitoring,” 2015.
REFERENCES
BIOGRAPHIES
[1]. M. Quwaider and Y. Jararweh, “Cloudlet-based efficient
data collection in wireless body area networks,”
Simulation Modelling Practice andTheory, vol. 50,pp. Mr. Sourabh Sanjay Kate.
57–71, 2015./ Student, Dept. of Computer
Science & Engineering,
[2] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. SMSMPITR, Akluj, Maharashtra -
Kołodziej,A. Streit, and D. Georgakopoulos, “A security 413118
framework in g-hadoopfor big data computing across
distributed cloud data centres,” Journal of Computer and
System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.M. S. Ms. Akshay Sunil Waghmare.
Hossain and G. Muhammad, “Cloud-assisted industrial Student, Dept. of Computer
internet of things (iiot)–enabled framework for health Science & Engineering,
monitoring,” Computer Networks, vol. 101, pp. 192–202, SMSMPITR, Akluj, Maharashtra -
2016. 413118
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 4