SlideShare a Scribd company logo
1 of 16
Privacy preserving secure dataPrivacy preserving secure data
exchange in mobile P2Pexchange in mobile P2P
cloud healthcare environmentcloud healthcare environment
Sk. Md. Mizanur Rahman · Md. Mehedi Masud
M. Anwar Hossain · Abdulhameed Alelaiwi ·
Mohammad Mehedi Hassan · Atif Alamri
Received: 2 October 2014 / Accepted: 6 February 2015
© Springer Science+Business Media New York 2015
Dhaka University of Engineering and Technology, Gazipur
Presented by
Md. Mostafijur Rahman
Masters Student ID #: 132431(p)
Department of Computer Science and Engineering
Outline of the talkOutline of the talk
• P2P cloud
o Technology context: multi-core, virtualization, 64-bit processors, parallel
computing models, big-data storages…
• Describes the related work
• Elaborates on the privacy and security threats, which can occur
when cloud peers exchange data over an unsecured channel
and highlights our contribution.
• Secure data exchange : we describe how the data exchange
policy/mapping is established between two cloud peers for our
proposed protocol
• Pairing-based cryptography , we discuss issues of cryptographic
implementation and prevention of different attacks in the
proposed anonymous secure data exchange protocol.
• Anonymous authentication
Dhaka University of Engineering and Technology, Gazipur
ABSTRACTABSTRACT
• Cloud computing technology offers the possibility of inter
organizational medical data sharing at a larger scale. The
different organizations can maintain their own cloud
environment while exchanging healthcare data among
them in a peer-to-peer(P2P) fashion according to some
defined polices.
• Our proposed solution allows cloud peers to dynamically
generate temporary identities that are used to produce a
session key for each session of data exchange.
• Protocol is robust against different attacks, such as target-
oriented, man-in-the middle, masquerade, and message
manipulation attacks.
Dhaka University of Engineering and Technology, Gazipur
Operation WorkOperation Work
In this paper we propose an anonymous on-the-fly secure data
exchange protocol for such environment based on pairing-based
cryptography. The proposed solution does not require a centralized
control for the peers and it can avoid the expensive Public Key
Infrastructure (PKI) based approach.
The proposed scheme allows cloud peers to dynamically generate
temporary identities that are used to produce a session key for each
session of data exchange. It is robust against different security
attacks, such as target-oriented, man-in-the middle, masquerade,
and message manipulation attacks.
Hospital, clinics, medical laboratories, pharmacists, and other
stakeholders) are willing to share and exchange data about
patients’ treatments, medications, and test results
over an insecure network such as the Internet.
Dhaka University of Engineering and Technology, Gazipur
OperationOperation
Fig. 1 An example model of a collaborative healthcare scenario using P2P-Cloud-DB architecture
Dhaka University of Engineering and Technology, Gazipur
Operation healthcare scenario of a P2POperation healthcare scenario of a P2P
Dhaka University of Engineering and Technology, Gazipur
In this scenario, family doctors (FDDB), hospitals (HDB), medical laboratories
(LABDB), pharmacies (PHDB), and other stakeholders (e.g. medical research cells
(RDB)) are willing to exchange or coordinate information about patients’
treatments, medications, test results, and diseases.
In the system, an organization (a cloud peer) may need to be exchange data with
other related organizations (cloud peers) according to some established policies
between them. For example, family doctors may want to keep track of patients’
medications for some specific diseases. Therefore, FDDB should have a link with
the PHDB.
Any patient in PHDB diagnosed with a disease that is of interest to family doctors
may have data that needs to be exchanged with FDDB. Moreover, family doctors
may be interested in collecting test results of their patients from LABDB and the
medications that their patients take while staying at hospitals and hence a link
between FDDB and HDB is required. The links between cloud peers in the figure
are formally a set of mappings or mapping constraints.
Anonymous DynamicAnonymous Dynamic
Pseudo-ID generation techniquePseudo-ID generation technique
in P2P-Cloud-DBin P2P-Cloud-DB
Dhaka University of Engineering and Technology, Gazipur
Figure Above : In this paper, we propose an anonymous secured data
exchange protocol between cloud peers where cloud peers generate
dynamic IDs and the corresponding session keys on-the-fly for data
exchange based on the requested query. In our protocol, when two cloud
peers want to exchange data, each of them generates its dynamic ID and
the corresponding secret session key using the shared attributes between
them by computing a pairing function over an elliptic curve. Then the
cloud peers authenticate each other in a challenge and response fashion.
Key agreement & anonymous secure data exchange in P2PKey agreement & anonymous secure data exchange in P2P
Dhaka University of Engineering and Technology, Gazipur
OperationOperation
Dhaka University of Engineering and Technology, Gazipur
Step-by-step procedure of the Proposed Protocol
STEP 1: A query Qt is generated at the target Pj .
STEP 2: Target Pj determines group G1, hash functions
H1 and H2 and performs the following steps:
2.a: Generates a dynamic temporary ID
TIDP , a dynamic authentication code
MACCA∧∨NCAj→i and a random number Rj .
2.b: Pj sends < G1,H1,H2,Rj, TIDP MACCA∧∨NCAj→i > to the source Pi .
STEP 3: Source Pi generates MACCA NCAi,∧∨ θ
; 1 ≤ θ ≤ n and compares with MACCA NCAj→i .∧∨
If any one of MACCA NCAi,∧∨ θ matches with
MACCA NCAj→i then∧∨
OperationOperation
Dhaka University of Engineering and Technology, Gazipur
3.c: Generates a secret session key KSi, and an authentication code Aut0.
3.d: Sends < G2, ˜ e,H3, TIDPi , RPii−SESSION , Aut0 > to the target Pj .
STEP 4: Target Pj generates secret session key KSj , and verification code V er0.
4.a: Generates a random number RPjj−SESSION .
4.b: Compares V er0 with Aut0 if V er0 =
Aut0 then generates Aut1.
4.c: Sends < RPjj−SESSION,Aut1 > to the source Pi .
STEP 5: Source Pi generates verification code V er1.
5.a: Compares V er1 with Aut1 if V er1 = Aut1 then generates message authentication
code MACMESSAGE.
5.b: Encrypts query result QRt, with session key KSi denoted as CIPHERQRt
.5.c: Sends < TIDPi ,CIPHERQRt , MACMESSAGE, TIDPj > to the target Pj .
STEP 6: Target decrypts CIPHERQRt with session key KSj ; generates verification message
authentication code VERMESSAGE; compares VERMESSAGE with MACMESSAGE. if
VERMESSAGE = MACMESSAGE then data is accepted.
Anonymous secure data exchange inAnonymous secure data exchange in
P2P-Cloud-DB DurationP2P-Cloud-DB Duration
Dhaka University of Engineering and Technology, Gazipur
RISKS ASOCIATED WITHRISKS ASOCIATED WITH
CLOUDCLOUD
• Privacy threat : Procedures are being developed to improve
security and performance in the cloud.
• Masquerade attack : Malicious peer may pretend to be a valid
target of a source by stealing the identity of the real target.
• Man-in-the-middle attack : Shim proposed an improved identity-
based authenticated key agreement protocol by including certified
public keys. The author claims that the protocol provides attractive
security properties, such as, known-key security, forward secrecy, key
compromise impersonation resilience, and unknown key-share
resilience.
• Message manipulation attack : For this attack, an attacker needs to
take part in the message communication. To this end, it is necessary
to be a valid node in the network. In our protocol, an attacker
cannot forge the data exchange session and data packet as was
already discussed.
Dhaka University of Engineering and Technology, Gazipur
RESEARCH ISSUESRESEARCH ISSUES
•Define the characteristics of an application under test and the
types of testing done on the application. providing all this in a
cost-effective manner?
•Evaluate whether certain testing infrastructure in the cloud really
helps to meet a specific performance attribute.
•Validate the quality of cloud tested applications at all levels. .
•Management of test data
Dhaka University of Engineering and Technology, Gazipur
SummarySummary
•In this paper, we have presented a novel privacy preserving :
•Secure data exchange protocol for a P2P cloud environment in a health care
domain. Using this protocol a peer in a P2P-Cloud-DB generates a dynamic
temporary ID .
•Fly and corresponding session key by exchanging some system and session
parameters with other peers. The protocol is based on pairing-based cryptographic
model where the generated system and session parameters are derived from the
confidential and non-confidential attributes that are present in the data schema of
the P2P-Cloud-DB.
•An important feature of the proposed protocol is that peers always generate a new
dynamic temporary ID and a corresponding session key based on the query
initiated by a target peer and authenticate themselves anonymously without
disclosing their IDs. Thus, every session is completely independent with respect to the
ID and session key generation.
• Hence the proposed protocol successfully prevents different attacks such as man-
in-the-middle attack, masquerade attack, message manipulation attack, and the
more sophisticated target oriented attack. This approach has the potential to bring
confidence into P2P cloud database system in case of anonymous secure data
exchange in the health care domain.
Dhaka University of Engineering and Technology, Gazipur
References & useful linksReferences & useful links
• 1. Fuxman A, Kolaitis PG, Miller RJ, Tan WC (2005) Peer data
exchange. In ACM Trans Database Syst 31(4):1454–1498
• 2. Beeri C, Vardi MY (1984) A proof procedure for data
dependencies. In JACM 31(4):718–741
• 3. Halevy AY, Ives ZG, Suciu D, Tatarinov I (2003) Schema
mediation in peer data management system. In: Proceedings
of the international conference on data engineering, pp 505–
516
Dhaka University of Engineering and Technology, Gazipur
Section Questions and AnswersSection Questions and Answers
ThanksThanks
Dhaka University of Engineering and Technology, Gazipur

More Related Content

What's hot

Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...IRJET Journal
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...ijtsrd
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computingijsptm
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query ServiceIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for SnagsIRJET Journal
 
Architecture authorization-constrained
Architecture authorization-constrainedArchitecture authorization-constrained
Architecture authorization-constrainedAhmed Sabeeh
 

What's hot (19)

Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query Service
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
H1803035056
H1803035056H1803035056
H1803035056
 
H0362052056
H0362052056H0362052056
H0362052056
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Architecture authorization-constrained
Architecture authorization-constrainedArchitecture authorization-constrained
Architecture authorization-constrained
 

Viewers also liked

Campaign Snapshot
Campaign SnapshotCampaign Snapshot
Campaign SnapshotGia Manieri
 
Unit 4 fourier series by Abdrehman Ahmed
Unit 4 fourier series by Abdrehman AhmedUnit 4 fourier series by Abdrehman Ahmed
Unit 4 fourier series by Abdrehman AhmedAbdrehman Ahmed
 
Economics project 2014-2015
Economics project 2014-2015Economics project 2014-2015
Economics project 2014-2015Kersty-Jo Zammit
 
Sistema Solar - Leivis Brayer T
Sistema Solar - Leivis Brayer TSistema Solar - Leivis Brayer T
Sistema Solar - Leivis Brayer Tleivisbt
 
Communicating effectively with your audience
Communicating effectively with your audienceCommunicating effectively with your audience
Communicating effectively with your audienceEmmaprince
 
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1itecloei1
 
EVALUACION DEL TERCER PARCIAL
EVALUACION DEL TERCER PARCIALEVALUACION DEL TERCER PARCIAL
EVALUACION DEL TERCER PARCIALpaul123patricia
 
Overview of fozmula 2015 jp
Overview of fozmula 2015 jpOverview of fozmula 2015 jp
Overview of fozmula 2015 jpJohn Petersen
 
Peer feedback in Higher Education
Peer feedback in Higher EducationPeer feedback in Higher Education
Peer feedback in Higher EducationWeldon Green
 

Viewers also liked (20)

Pitching night Mures Startups
Pitching night Mures StartupsPitching night Mures Startups
Pitching night Mures Startups
 
Campaign Snapshot
Campaign SnapshotCampaign Snapshot
Campaign Snapshot
 
BBC Make It Digital
BBC Make It Digital BBC Make It Digital
BBC Make It Digital
 
Kiewit Portfolio
Kiewit PortfolioKiewit Portfolio
Kiewit Portfolio
 
Unit 4 fourier series by Abdrehman Ahmed
Unit 4 fourier series by Abdrehman AhmedUnit 4 fourier series by Abdrehman Ahmed
Unit 4 fourier series by Abdrehman Ahmed
 
Evaluacion word
Evaluacion wordEvaluacion word
Evaluacion word
 
Economics project 2014-2015
Economics project 2014-2015Economics project 2014-2015
Economics project 2014-2015
 
LindseyGarrison_CE
LindseyGarrison_CELindseyGarrison_CE
LindseyGarrison_CE
 
Market research
Market researchMarket research
Market research
 
Sistema Solar - Leivis Brayer T
Sistema Solar - Leivis Brayer TSistema Solar - Leivis Brayer T
Sistema Solar - Leivis Brayer T
 
WE ARE HIRING !
WE ARE HIRING ! WE ARE HIRING !
WE ARE HIRING !
 
islamic book amharic 02
islamic book amharic 02islamic book amharic 02
islamic book amharic 02
 
Communicating effectively with your audience
Communicating effectively with your audienceCommunicating effectively with your audience
Communicating effectively with your audience
 
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1
ประกาศรับย้าย/รับโอน/บุคลากรทางการศึกษาอื่่นตามมาตรา 38 ค(2) สพป.ลย1
 
EVALUACION DEL TERCER PARCIAL
EVALUACION DEL TERCER PARCIALEVALUACION DEL TERCER PARCIAL
EVALUACION DEL TERCER PARCIAL
 
Overview of fozmula 2015 jp
Overview of fozmula 2015 jpOverview of fozmula 2015 jp
Overview of fozmula 2015 jp
 
REDES SOCIALES
REDES SOCIALESREDES SOCIALES
REDES SOCIALES
 
Peer feedback in Higher Education
Peer feedback in Higher EducationPeer feedback in Higher Education
Peer feedback in Higher Education
 
islamic book amharic 04
islamic book amharic 04islamic book amharic 04
islamic book amharic 04
 
Prelim p2
Prelim p2Prelim p2
Prelim p2
 

Similar to Privacy preserving secure data exchange in mobile P2P

Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual KeysA New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keysijtsrd
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
Selecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsSelecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsKashif Dayo
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).pptVarioTechnology
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploadingIJAEMSJORNAL
 

Similar to Privacy preserving secure data exchange in mobile P2P (20)

Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual KeysA New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
Selecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsSelecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to Systems
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
 

More from www.pixelsolutionbd.com

Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingwww.pixelsolutionbd.com
 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerancewww.pixelsolutionbd.com
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveywww.pixelsolutionbd.com
 
Adaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingAdaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingwww.pixelsolutionbd.com
 
Protecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentsProtecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentswww.pixelsolutionbd.com
 
Protecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentsProtecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentswww.pixelsolutionbd.com
 
Real time service oriented cloud computing
Real time service oriented cloud computingReal time service oriented cloud computing
Real time service oriented cloud computingwww.pixelsolutionbd.com
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
 
Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...www.pixelsolutionbd.com
 
A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...www.pixelsolutionbd.com
 
Software Testing in Cloud Platform A Survey_final
Software Testing in Cloud Platform A Survey_finalSoftware Testing in Cloud Platform A Survey_final
Software Testing in Cloud Platform A Survey_finalwww.pixelsolutionbd.com
 

More from www.pixelsolutionbd.com (20)

Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computing
 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerance
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
 
Adaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computingAdaptive fault tolerance in real time cloud_computing
Adaptive fault tolerance in real time cloud_computing
 
Protecting from transient failures in cloud deployments
Protecting from transient failures in cloud deploymentsProtecting from transient failures in cloud deployments
Protecting from transient failures in cloud deployments
 
Protecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deploymentsProtecting from transient failures in cloud microsoft azure deployments
Protecting from transient failures in cloud microsoft azure deployments
 
Speaking
SpeakingSpeaking
Speaking
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Real time service oriented cloud computing
Real time service oriented cloud computingReal time service oriented cloud computing
Real time service oriented cloud computing
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...
 
Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...Comprehensive analysis of performance, fault tolerance and scalability in gri...
Comprehensive analysis of performance, fault tolerance and scalability in gri...
 
A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...A task based fault-tolerance mechanism to hierarchical master worker with div...
A task based fault-tolerance mechanism to hierarchical master worker with div...
 
Software Testing in Cloud Platform A Survey_final
Software Testing in Cloud Platform A Survey_finalSoftware Testing in Cloud Platform A Survey_final
Software Testing in Cloud Platform A Survey_final
 

Privacy preserving secure data exchange in mobile P2P

  • 1. Privacy preserving secure dataPrivacy preserving secure data exchange in mobile P2Pexchange in mobile P2P cloud healthcare environmentcloud healthcare environment Sk. Md. Mizanur Rahman · Md. Mehedi Masud M. Anwar Hossain · Abdulhameed Alelaiwi · Mohammad Mehedi Hassan · Atif Alamri Received: 2 October 2014 / Accepted: 6 February 2015 © Springer Science+Business Media New York 2015 Dhaka University of Engineering and Technology, Gazipur Presented by Md. Mostafijur Rahman Masters Student ID #: 132431(p) Department of Computer Science and Engineering
  • 2. Outline of the talkOutline of the talk • P2P cloud o Technology context: multi-core, virtualization, 64-bit processors, parallel computing models, big-data storages… • Describes the related work • Elaborates on the privacy and security threats, which can occur when cloud peers exchange data over an unsecured channel and highlights our contribution. • Secure data exchange : we describe how the data exchange policy/mapping is established between two cloud peers for our proposed protocol • Pairing-based cryptography , we discuss issues of cryptographic implementation and prevention of different attacks in the proposed anonymous secure data exchange protocol. • Anonymous authentication Dhaka University of Engineering and Technology, Gazipur
  • 3. ABSTRACTABSTRACT • Cloud computing technology offers the possibility of inter organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a peer-to-peer(P2P) fashion according to some defined polices. • Our proposed solution allows cloud peers to dynamically generate temporary identities that are used to produce a session key for each session of data exchange. • Protocol is robust against different attacks, such as target- oriented, man-in-the middle, masquerade, and message manipulation attacks. Dhaka University of Engineering and Technology, Gazipur
  • 4. Operation WorkOperation Work In this paper we propose an anonymous on-the-fly secure data exchange protocol for such environment based on pairing-based cryptography. The proposed solution does not require a centralized control for the peers and it can avoid the expensive Public Key Infrastructure (PKI) based approach. The proposed scheme allows cloud peers to dynamically generate temporary identities that are used to produce a session key for each session of data exchange. It is robust against different security attacks, such as target-oriented, man-in-the middle, masquerade, and message manipulation attacks. Hospital, clinics, medical laboratories, pharmacists, and other stakeholders) are willing to share and exchange data about patients’ treatments, medications, and test results over an insecure network such as the Internet. Dhaka University of Engineering and Technology, Gazipur
  • 5. OperationOperation Fig. 1 An example model of a collaborative healthcare scenario using P2P-Cloud-DB architecture Dhaka University of Engineering and Technology, Gazipur
  • 6. Operation healthcare scenario of a P2POperation healthcare scenario of a P2P Dhaka University of Engineering and Technology, Gazipur In this scenario, family doctors (FDDB), hospitals (HDB), medical laboratories (LABDB), pharmacies (PHDB), and other stakeholders (e.g. medical research cells (RDB)) are willing to exchange or coordinate information about patients’ treatments, medications, test results, and diseases. In the system, an organization (a cloud peer) may need to be exchange data with other related organizations (cloud peers) according to some established policies between them. For example, family doctors may want to keep track of patients’ medications for some specific diseases. Therefore, FDDB should have a link with the PHDB. Any patient in PHDB diagnosed with a disease that is of interest to family doctors may have data that needs to be exchanged with FDDB. Moreover, family doctors may be interested in collecting test results of their patients from LABDB and the medications that their patients take while staying at hospitals and hence a link between FDDB and HDB is required. The links between cloud peers in the figure are formally a set of mappings or mapping constraints.
  • 7. Anonymous DynamicAnonymous Dynamic Pseudo-ID generation techniquePseudo-ID generation technique in P2P-Cloud-DBin P2P-Cloud-DB Dhaka University of Engineering and Technology, Gazipur Figure Above : In this paper, we propose an anonymous secured data exchange protocol between cloud peers where cloud peers generate dynamic IDs and the corresponding session keys on-the-fly for data exchange based on the requested query. In our protocol, when two cloud peers want to exchange data, each of them generates its dynamic ID and the corresponding secret session key using the shared attributes between them by computing a pairing function over an elliptic curve. Then the cloud peers authenticate each other in a challenge and response fashion.
  • 8. Key agreement & anonymous secure data exchange in P2PKey agreement & anonymous secure data exchange in P2P Dhaka University of Engineering and Technology, Gazipur
  • 9. OperationOperation Dhaka University of Engineering and Technology, Gazipur Step-by-step procedure of the Proposed Protocol STEP 1: A query Qt is generated at the target Pj . STEP 2: Target Pj determines group G1, hash functions H1 and H2 and performs the following steps: 2.a: Generates a dynamic temporary ID TIDP , a dynamic authentication code MACCA∧∨NCAj→i and a random number Rj . 2.b: Pj sends < G1,H1,H2,Rj, TIDP MACCA∧∨NCAj→i > to the source Pi . STEP 3: Source Pi generates MACCA NCAi,∧∨ θ ; 1 ≤ θ ≤ n and compares with MACCA NCAj→i .∧∨ If any one of MACCA NCAi,∧∨ θ matches with MACCA NCAj→i then∧∨
  • 10. OperationOperation Dhaka University of Engineering and Technology, Gazipur 3.c: Generates a secret session key KSi, and an authentication code Aut0. 3.d: Sends < G2, ˜ e,H3, TIDPi , RPii−SESSION , Aut0 > to the target Pj . STEP 4: Target Pj generates secret session key KSj , and verification code V er0. 4.a: Generates a random number RPjj−SESSION . 4.b: Compares V er0 with Aut0 if V er0 = Aut0 then generates Aut1. 4.c: Sends < RPjj−SESSION,Aut1 > to the source Pi . STEP 5: Source Pi generates verification code V er1. 5.a: Compares V er1 with Aut1 if V er1 = Aut1 then generates message authentication code MACMESSAGE. 5.b: Encrypts query result QRt, with session key KSi denoted as CIPHERQRt .5.c: Sends < TIDPi ,CIPHERQRt , MACMESSAGE, TIDPj > to the target Pj . STEP 6: Target decrypts CIPHERQRt with session key KSj ; generates verification message authentication code VERMESSAGE; compares VERMESSAGE with MACMESSAGE. if VERMESSAGE = MACMESSAGE then data is accepted.
  • 11. Anonymous secure data exchange inAnonymous secure data exchange in P2P-Cloud-DB DurationP2P-Cloud-DB Duration Dhaka University of Engineering and Technology, Gazipur
  • 12. RISKS ASOCIATED WITHRISKS ASOCIATED WITH CLOUDCLOUD • Privacy threat : Procedures are being developed to improve security and performance in the cloud. • Masquerade attack : Malicious peer may pretend to be a valid target of a source by stealing the identity of the real target. • Man-in-the-middle attack : Shim proposed an improved identity- based authenticated key agreement protocol by including certified public keys. The author claims that the protocol provides attractive security properties, such as, known-key security, forward secrecy, key compromise impersonation resilience, and unknown key-share resilience. • Message manipulation attack : For this attack, an attacker needs to take part in the message communication. To this end, it is necessary to be a valid node in the network. In our protocol, an attacker cannot forge the data exchange session and data packet as was already discussed. Dhaka University of Engineering and Technology, Gazipur
  • 13. RESEARCH ISSUESRESEARCH ISSUES •Define the characteristics of an application under test and the types of testing done on the application. providing all this in a cost-effective manner? •Evaluate whether certain testing infrastructure in the cloud really helps to meet a specific performance attribute. •Validate the quality of cloud tested applications at all levels. . •Management of test data Dhaka University of Engineering and Technology, Gazipur
  • 14. SummarySummary •In this paper, we have presented a novel privacy preserving : •Secure data exchange protocol for a P2P cloud environment in a health care domain. Using this protocol a peer in a P2P-Cloud-DB generates a dynamic temporary ID . •Fly and corresponding session key by exchanging some system and session parameters with other peers. The protocol is based on pairing-based cryptographic model where the generated system and session parameters are derived from the confidential and non-confidential attributes that are present in the data schema of the P2P-Cloud-DB. •An important feature of the proposed protocol is that peers always generate a new dynamic temporary ID and a corresponding session key based on the query initiated by a target peer and authenticate themselves anonymously without disclosing their IDs. Thus, every session is completely independent with respect to the ID and session key generation. • Hence the proposed protocol successfully prevents different attacks such as man- in-the-middle attack, masquerade attack, message manipulation attack, and the more sophisticated target oriented attack. This approach has the potential to bring confidence into P2P cloud database system in case of anonymous secure data exchange in the health care domain. Dhaka University of Engineering and Technology, Gazipur
  • 15. References & useful linksReferences & useful links • 1. Fuxman A, Kolaitis PG, Miller RJ, Tan WC (2005) Peer data exchange. In ACM Trans Database Syst 31(4):1454–1498 • 2. Beeri C, Vardi MY (1984) A proof procedure for data dependencies. In JACM 31(4):718–741 • 3. Halevy AY, Ives ZG, Suciu D, Tatarinov I (2003) Schema mediation in peer data management system. In: Proceedings of the international conference on data engineering, pp 505– 516 Dhaka University of Engineering and Technology, Gazipur
  • 16. Section Questions and AnswersSection Questions and Answers ThanksThanks Dhaka University of Engineering and Technology, Gazipur