SlideShare ist ein Scribd-Unternehmen logo
1 von 20
A SECURITY MODEL FOR
PRESERVING THE PRIVACY OF
MEDICAL BIG DATA IN A
HEALTHCARE CLOUD USING A FOG
COMPUTING FACILITY WITH
PAIRING-BASED CRYPTOGRAPHY
INTRODUCTION
• Big data in healthcare refers to sets of electronic medical health data
that are large and complex.
• In the telemedicine service, EMRs including MBD, images, and
multimedia medical data are transmitted on the fly over insecure
internet connections as they are required by the remote doctors.
• The healthcare cloud infrastructure would make it much easier to
pull all different healthcare information together for a patient while
the patient moves from one hospital to another
HIGH LEVEL
ILLUSTRATION OF
HEALTHCARE CLOUD
INTRODUCTION
Similar to cloud computing, healthcare cloud computing has different
issues related to its security, the most important of which are:
• Legal and policy issues
• Data protection, privacy protection
• Lack of transparency
• Cybersecurity issues
• Absence of security standards
• Software licensing
INTRODUCTION
Cyber security challenges are related to four factors which are:
1. Information input
2. Information and commands output
3. Shared tenancy
4. Physical infrastructure.
CLOUD COMPUTING
Cloud computing has different service models, which are divided
into three categories:
• IAAS
• PAAS
• SAAS
Several features are available in cloud computing, for example: on-
demand broad network access, self-service, measured service, resource
pooling, and rapid elasticity.
FOG COMPUTING
• Fog computing is an emerging paradigm that provides storage,
processing, and communication services closer to the end user.
• Fog computing can be considered as an alternative name for the
decoy document distributor (d3), which is a tool for generating
and monitoring decoys.
• The decoy should have certain features: it should be believable,
the decoy should be enticing enough to attract the attention of the
attacker, it should be conspicuous
FOG COMPUTING
ARCHITECTURE
PROPOSED SYSTEM
ARCHITECTURE: Based on our
Proposed system, we will
Encrypt the photos using
The blow sh algorithm while
The key authentication and
Exchange will be done using ECDH
UPLOAD PHOTO
PROCESS
ALGORITHMS
•
• A. DMBD ALGORITHM:DMBD is used as a trap gallery that makes it
not of direct relevance to the legitimate user but it is used to secure
his/her ombd by distracting the attacker.
• B. USER PROFILING ALGORITHM:User profiling can help to determine
whether a user is legitimate or not based on certain parameters, such
as the user-search behavior, amount of downloaded data, nature of
operations, division of tasks, and IP address.
ALGORITHMS
C.KEY EXCHANGE ALGORITHM: During the bootstrap of the
communications, the privatekey generator (PKG) server generates
following parameters:
• Determines two groups G1 and G2 , of the same prime order q,
where G1 as an additive group and G2 as a multiplicative group.
• Determines a generator p of g1 and a bilinear map e :g1 × g1
→ g2
• Determines two collision resistant cryptographic hash functions
H1 and H2 , whereh1 : {0, 1}∗ → G1 , (mapping from
arbitrary-length strings to points in G1 )
and H2 : {0, 1}∗ → {0, 1}G1 × G1 → G2
COLLECTION OF
SECRET KEYS FROM
PKG
ALGORITHMS
D. MUTUAL AUTHENTICATION PROTOCOL:
Now, each party needs to authenticate
the other party in order to exchange
messages between each other secretly
ALGORITHMS
E.PHOTO ENCRYPTION ALGORITHM:
Photo encryption is a technique used
to secure a photo by changing it to
an understandable one. Different
photo encryption algorithms with
different properties and different
levels of security are available.
ALGORITHMS
F. PHOTO DECRYPTION ALGORITHM:The only difference between
decryption and encryption is that supplying the sub-keys (p-array)
with photo decryption is in reverse order.
G. ORIGINAL MBD ALGORITHM:The OMBD contains the real legitimate
user's photos, for which the whole system was built to secure them.
This gallery is located in the cloud. Each time the user needs to
access it, he/she needs to pass the security challenge rst.
ELLIPTIC CURVE CRYPTOGRAPHY
• Key exchange algorithm is used to ensure that the connection
between the parties is secured and to let the party ensure that it is
connected to the intended party
• ECC has the best performance in terms of using a smaller key size
for the same level of security compared with RSA.
• That means the rsa private key operation is slower than the ecc.
On the other hand, the public key operation is generally faster for
RSA compared with ECC.
• Ecc achieves the same security level as rsa but with lower memory
used
BLOWFISH ALGORITHM
• Block size
• Number of rounds
• Key length
• Encryption/decryption time
• Power consumption
• Memory usage
• Con dentiality
CONCLUSION
• Instead of retrieving the DMBD only when any unauthorized access
is discovered, the user, by default, accesses the DMBD.
• The OMBD is only accessible by a user after verifying the
authenticity of the user. Thus, the original multimedia data become
more secure by setting the default value of the DMBD, while the
OMBD is kept in a hidden gallery.
• To facilitate the above process, an efficient tri-party authenticated
key agreement protocol has been pro-posed among the user, the
dpg, and the opg based on paring cryptography.
REFERENCES
• M. CHEN, J. YANG, Y. HAO, S. MAO, AND K. HWANG, ``A 5G COGNITIVE SYSTEM
FOR HEALTHCARE,''
• S. M. M. RAHMAN AND K. EL-KHATIB, ``PRIVATE KEY AGREEMENT AND SECURE
COMMUNICATION FOR HETEROGENEOUS SENSOR NETWORKS,''
• HADEAL ABDULAZIZ AL HAMID AND SK MD MIZANUR RAHMAN, “A SECURITY
MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE
CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED
CRYPTOGRAPHY”

Weitere ähnliche Inhalte

Was ist angesagt?

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityNeel Chakraborty
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption SystemsChristopher Frenz
 

Was ist angesagt? (20)

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Final ppt
Final pptFinal ppt
Final ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Privacy and Neutrality v0.1.0
Privacy and Neutrality v0.1.0Privacy and Neutrality v0.1.0
Privacy and Neutrality v0.1.0
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 

Ähnlich wie A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED CRYPTOGRAPHY

Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themMuhammedYaseen39
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptxSasal6
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 

Ähnlich wie A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED CRYPTOGRAPHY (20)

Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
262 265
262 265262 265
262 265
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing them
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 

Kürzlich hochgeladen

Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 

Kürzlich hochgeladen (20)

Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 

A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED CRYPTOGRAPHY

  • 1. A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED CRYPTOGRAPHY
  • 2. INTRODUCTION • Big data in healthcare refers to sets of electronic medical health data that are large and complex. • In the telemedicine service, EMRs including MBD, images, and multimedia medical data are transmitted on the fly over insecure internet connections as they are required by the remote doctors. • The healthcare cloud infrastructure would make it much easier to pull all different healthcare information together for a patient while the patient moves from one hospital to another
  • 4. INTRODUCTION Similar to cloud computing, healthcare cloud computing has different issues related to its security, the most important of which are: • Legal and policy issues • Data protection, privacy protection • Lack of transparency • Cybersecurity issues • Absence of security standards • Software licensing
  • 5. INTRODUCTION Cyber security challenges are related to four factors which are: 1. Information input 2. Information and commands output 3. Shared tenancy 4. Physical infrastructure.
  • 6. CLOUD COMPUTING Cloud computing has different service models, which are divided into three categories: • IAAS • PAAS • SAAS Several features are available in cloud computing, for example: on- demand broad network access, self-service, measured service, resource pooling, and rapid elasticity.
  • 7. FOG COMPUTING • Fog computing is an emerging paradigm that provides storage, processing, and communication services closer to the end user. • Fog computing can be considered as an alternative name for the decoy document distributor (d3), which is a tool for generating and monitoring decoys. • The decoy should have certain features: it should be believable, the decoy should be enticing enough to attract the attention of the attacker, it should be conspicuous
  • 9. PROPOSED SYSTEM ARCHITECTURE: Based on our Proposed system, we will Encrypt the photos using The blow sh algorithm while The key authentication and Exchange will be done using ECDH
  • 11. ALGORITHMS • • A. DMBD ALGORITHM:DMBD is used as a trap gallery that makes it not of direct relevance to the legitimate user but it is used to secure his/her ombd by distracting the attacker. • B. USER PROFILING ALGORITHM:User profiling can help to determine whether a user is legitimate or not based on certain parameters, such as the user-search behavior, amount of downloaded data, nature of operations, division of tasks, and IP address.
  • 12. ALGORITHMS C.KEY EXCHANGE ALGORITHM: During the bootstrap of the communications, the privatekey generator (PKG) server generates following parameters: • Determines two groups G1 and G2 , of the same prime order q, where G1 as an additive group and G2 as a multiplicative group. • Determines a generator p of g1 and a bilinear map e :g1 × g1 → g2 • Determines two collision resistant cryptographic hash functions H1 and H2 , whereh1 : {0, 1}∗ → G1 , (mapping from arbitrary-length strings to points in G1 ) and H2 : {0, 1}∗ → {0, 1}G1 × G1 → G2
  • 14. ALGORITHMS D. MUTUAL AUTHENTICATION PROTOCOL: Now, each party needs to authenticate the other party in order to exchange messages between each other secretly
  • 15. ALGORITHMS E.PHOTO ENCRYPTION ALGORITHM: Photo encryption is a technique used to secure a photo by changing it to an understandable one. Different photo encryption algorithms with different properties and different levels of security are available.
  • 16. ALGORITHMS F. PHOTO DECRYPTION ALGORITHM:The only difference between decryption and encryption is that supplying the sub-keys (p-array) with photo decryption is in reverse order. G. ORIGINAL MBD ALGORITHM:The OMBD contains the real legitimate user's photos, for which the whole system was built to secure them. This gallery is located in the cloud. Each time the user needs to access it, he/she needs to pass the security challenge rst.
  • 17. ELLIPTIC CURVE CRYPTOGRAPHY • Key exchange algorithm is used to ensure that the connection between the parties is secured and to let the party ensure that it is connected to the intended party • ECC has the best performance in terms of using a smaller key size for the same level of security compared with RSA. • That means the rsa private key operation is slower than the ecc. On the other hand, the public key operation is generally faster for RSA compared with ECC. • Ecc achieves the same security level as rsa but with lower memory used
  • 18. BLOWFISH ALGORITHM • Block size • Number of rounds • Key length • Encryption/decryption time • Power consumption • Memory usage • Con dentiality
  • 19. CONCLUSION • Instead of retrieving the DMBD only when any unauthorized access is discovered, the user, by default, accesses the DMBD. • The OMBD is only accessible by a user after verifying the authenticity of the user. Thus, the original multimedia data become more secure by setting the default value of the DMBD, while the OMBD is kept in a hidden gallery. • To facilitate the above process, an efficient tri-party authenticated key agreement protocol has been pro-posed among the user, the dpg, and the opg based on paring cryptography.
  • 20. REFERENCES • M. CHEN, J. YANG, Y. HAO, S. MAO, AND K. HWANG, ``A 5G COGNITIVE SYSTEM FOR HEALTHCARE,'' • S. M. M. RAHMAN AND K. EL-KHATIB, ``PRIVATE KEY AGREEMENT AND SECURE COMMUNICATION FOR HETEROGENEOUS SENSOR NETWORKS,'' • HADEAL ABDULAZIZ AL HAMID AND SK MD MIZANUR RAHMAN, “A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCARE CLOUD USING A FOG COMPUTING FACILITY WITH PAIRING-BASED CRYPTOGRAPHY”