Anzeige

0th PPT - BLOCKCHAIN-CBE (1).ppt

6. Sep 2022
Anzeige

Más contenido relacionado

Similar a 0th PPT - BLOCKCHAIN-CBE (1).ppt(20)

Anzeige

0th PPT - BLOCKCHAIN-CBE (1).ppt

  1. Blockchain for Secure EHRs Sharing of Mobile Cloud based E-health Systems
  2. DOMAIN OVERVIEW – CLOUD  Cloud computing is the delivery of computing and storage space as a service to a distributed community of end users.  The schema/model of Cloud computing is, all the servers, networks, applications and other elements related to data centers are made available to end users.  Cloud computing is growing now-a-days in the interest of technical and business organizations but this can also be beneficial for solving social issues  Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application
  3. INTRODUCTION  Cloud computing has emerged as a promising and powerful paradigm for managing and delivering computation, applications and services over the Internet.  In this project we are going to use the Blockchain technology to protect healthcare data hosted within the cloud.
  4. ABSTRACT  The main objective of this project is securely store and maintain the patient records in the healthcare.  Healthcare is a data-intensive domain where a large amount of data is created, disseminated, stored, and accessed daily.  The blockchain technology is used to protect the healthcare data hosted within the cloud. The block that contain the medical data and the timestamp.  Cloud computing will connect different healthcare providers.  It allows healthcare provider to access the patient details more securely from anywhere.  It preserve data from attackers. The data is encrypted prior to outsourcing to the cloud. The healthcare provider have to decrypt the data prior to download.
  5. Continue…  Finally our model ensure the data security for accessing the patient record over the cloud.
  6. OBJECTIVE  The main objective is to ensure the data security.  To achieve forward and backward security of the data with revocation scheme.  To enable access control that is cryptographically enhanced.  To ensure the protection of cloud database.  To perform secure and efficient query processing.
  7. EXISTING SYSTEM  Existing system doesn’t maintain and process the data securely. It doesn’t provides the more accurate search result.  Incorrect and misleading of data will produce the wrong analysis result. Low search Efficiency.  The search delay of the scheme is proportional to the size of the database. It is not suitable for the large scale databases.
  8. DISADVANTAGES  Theoretical Limits.  Data are not secured.  Not reliable.  Low search Efficiency.  Search Delay.
  9. PROPOSED SYSTEM  To overcome the security problems that are occurred in the existing system and effectively store the data over the cloud we introduce this system.  The data user outsources the encrypted documents to the cloud.  The Data user get the each result, the proof and the public verification key, they itself or others can verify the freshness, authenticity, and completeness of the search result even without decrypting them.
  10. ADVANTAGES  Increase the accuracy of the result.  The data’s are highly secured.  Easily retrieve an information from cloud storage.
  11. SYSTEM REQUIREMENTS Software Requirements O/S : Windows 7 Language : Java IDE : Net Beans 8.2 Data Base : MySql  Server : WampServer
  12. SYSTEM REQUIREMENTS Hardware Requirements  System : Pentium IV 2.4 GHz  Hard Disk : 160 GB  Monitor : 15 VGA color  Mouse : Logitech.  Keyboard : 110 keys enhanced  Ram : 2GB
  13. FLOW DIAGRAM
  14. Healthcare Providers Login Register Load Patient Records Download Patient Records Encrypt Records Send an upload request Block Creation Upload Search Records Cloud Server Login View Upload Requests Check Validity Grand Permission Key Generation of Each Record Build a Block Chain Monitor Patient reports View Download Requests Send Download Request to cloud Check Validity Send a Key Receive Key Decrypt Records Download Secret Key Verification
  15. MODULES • Registration • Healthcare Provider • Load patient Records • Key Generation • Encrypt patient Records • Block Creation • Upload and Download Patient Records • Cloud Service Provider • View Patient Records • Grant or Revoke Permission
  16. REFERENCES [1] Yunru Zhang, Debiao He, and Kim-Kwang Raymond Choo, "BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT," Wireless Commu. and Mobile Comput., 2018. [2] Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang "Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks," IEEE Internet of Things J., 2018. [3] Oscar Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT," IEEE Internet of Things J., vol. 5, pp. 1184-1195, 2018. [4] Kuo TT, Kim HE, and Ohno-Machado L, "Blockchain distributed ledger technologies for biomedical and health care applications," Ame. Medi. Infor. Assoc. J., vol. 6, pp. 1211-1220, 2017. [5] Nabil Rifi, Elie Rachkidi, Nazim Agoulmine, and Nada Chendeb Taher, "Towards Using Blockchain Technology for eHealth Data Access Management,"in Proc. IEEE on Advances in Bio. Engi., Oct. 2017.
Anzeige