Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

PROJECT PRESENTATION

Class & Team No:

Review No:

Title:

Date:

Time:

5 February 2022 KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India 1
ENHANCING SECURITY OF HEALTH INFORMATION
USING MODULAR ENCRYPTION STANDARD IN MOBILE
CLOUD COMPUTING

Members:
Name 1
Name 2
Name 3 Guided by:

5 February 2022 KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India 2
ABSTRACT
• Despite the numerous and noticeable inherited gains of Mobile Cloud Computing (MCC) in healthcare, its
growth is being hindered by privacy and security challenges.

• Such issues require the utmost urgent attention to realize its full scale and efficient usage. There is a need to
secure Health Information worldwide, regionally, and locally.

• To fully avail of the health services, it is crucial to put in place the demanded security practices for the
prevention of security breaches and vulnerabilities

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 3
Tamil Nadu, India
OBJECTIVE
• Deliberated on to provide requirement-oriented health information security using the Modular
Encryption Standard (MES) based on the layered modeling of the security measures.

• The performance analysis shows that the proposed work excels, compared to other commonly
used algorithms against the health information security at the MCC environment in terms of better
performance and auxiliary qualitative security ensuring measures.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 4
Tamil Nadu, India
INTRODUCTION

• (MCC) is the combination of cloud computing and mobile computing to bring rich computational resources to mobile
users, network operators, as well as cloud computing providers.

• The ultimate goal of MCC is to enable execution of rich mobile applications on a plethora of mobile devices, with a rich
user experience.

• MCC provides business opportunities for mobile network operators as well as cloud providers. More comprehensively,
MCC can be defined as "a rich mobile computing technology that leverages unified elastic resources of varied clouds and
network technologies toward unrestricted functionality, storage, and mobility to serve a multitude of mobile devices
anywhere, anytime through the channel of Ethernet or Internet regardless of heterogeneous environments and platforms
based on the pay-as-you-use principle.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 5
Tamil Nadu, India
LITERATURE SURVEY
AUTHOR TITLE AND YEAR METHODOLOGY ADVANTAGES DISADVANTAGES

Y. Al-Issa, M. A. Ottom EHEALTH CLOUD the stateof-the art solutions Strong multicloud Evaluation and the diagnosis
SECURITY CHALLENGES: address only a subset of those cryptography is possible along with the attack information
A SURVEY concerns. -us, there is an challenge is not efficient
immediate need for a holistic
solution that balances all the
contradicting requirements.

H. Jin, Y. Luo A REVIEW OF SECURE the cyber infrastructure Many types of attacks is Existing work with the
AND PRIVACY- boundaries of healthcare possible performance is low
PRESERVING MEDICAL organizations and privacy Poor data block
DATA SHARING leakage threats place obstacles
on the sharing of medical
records. Blockchain, as a
public ledger characterized by
its transparency, tamper-
evidence, trustlessness, and
decentralization, can help
build a secure medical data
exchange network.

5 February 2022 KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India 6
EXISTING SYSTEM
• The section presents the literature survey of the HI security threats and approaches against ensuring its
confidentiality in the cloud.

• Potent security and privacy risks and threats of MCC have appeared as considerable issues. MCC’s users and
enterprises are greatly dependent on their provided services.

• Numerous research attempts and solutions have been proposed to attend privacy and security challenges.

• Tele-monitoring has been utilized to remotely screen the patient’s health (that are present in far off places),
like clinical centres and emergency clinics.

• These days, it is a potent E-health service.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 7
Tamil Nadu, India
PROPOSED SYSTEM
• Modular Encryption Standard (MES) ia used as the proposed system .

• The requirement for securing HI is directed by IDN and CLF characterization (as per the level of confidentiality of HI).

• Here, the identification (to distinguish the criticality and sensitivity of HI) would be performed.

• The IDN of Health records depends on the MCC client’s highlighted prerequisites.

• It usually comprises two general classifications, with subsequent sub-classifications.

• Confidential HI (with high-level security), and open/public HI. This section presents an overview of the proposed work.

• The steps that need to be performed while using MES against ensuring the HI confidentiality at MCC.

• Among these six steps, some of them are performed at the MCC user side; rest of the confidentiality ensuring measures at the intermediary
cloud and finally, the data is stored using multi-cloud. In the proposed mes the CP ABE is used as the implemented algorithm.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 8
Tamil Nadu, India
ADVANTAGES
• Multiple key generation

• High security

• Strong multicloud cryptography is possible

• Many types of attacks is possible

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 9
Tamil Nadu, India
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS:
• Processor Type ` : Pentium i3
• Speed : 3.40GHZ
• RAM : 4GB DD2 RAM
• Hard disk : 500 GB
• Keyboard : 101/102 Standard Keys
• Mouse : Optical Mouse

SOFTWARE REQUIREMENTS:
• Operating System : Windows 10
• Front end : Netbeans 8.1 IDE / jdk1.8
• Coding Language : Java

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 10
Tamil Nadu, India
IMPLEMENTATION DETAIL

• MEMORY UTILIZATION

• GROUP MEMBER REGISTRATION AND LOGIN

• BATCH LEVEL SIGN BASED KEY GENERATION

• KEY VARIANCES BASED ANALYSIS

• KEY-DATA COLLIGATION-RATE FOR SINGLE ROUND

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 11
Tamil Nadu, India
RESULTS

• This section presents the MES analysis from different perspectives in the MCC environment.

• MES at cloud was executed utilizing the following mentioned specifications.

• This section shows the outcomes we obtained from the performance analysis of our proposed work.

• We examined the performance analysis factors of MES solely and in a comparative view with other common
enciphering block ciphers

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 12
Tamil Nadu, India
CONCLUSION

• Despite the prospective solutions offered by MCC in Health record monitoring, numerous impediments restrain the key
potentials of MCC.

• Among these obstacles, security and privacy are the key hindrances in the utilization of MCC in healthcare.

• This is one of the considerable research gaps. Accordingly, this research utilizes a layered, modular, data nature-centric
cryptography approach, for example, MES, that utilizes secure HI sharing, and storage mechanisms.

• The Comparative results show that this scheme outperforms other commonly used techniques (from different
performance factors) in the MCC environment.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 13
Tamil Nadu, India
REFERENCES
• Y. Al-Issa, M. A. Ottom, and A. Tamrawi, ‘‘eHealth cloud security challenges: A survey,’’ J. Healthcare Eng., vol. 2019, Sep. 2019, Art. no.
7516035.

• H. Jin, Y. Luo, P. Li, and J. Mathew, ‘‘A review of secure and privacy preserving medical data sharing,’’ IEEE Access, vol. 7, pp. 61656–
61669, 2019

• D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, ‘‘A survey on secure data analytics in edge computing,’’ IEEE Internet Things J., vol. 6, no. 3,
pp. 4946–4967, Jun. 2019.

• S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, ‘‘Security and privacy-preserving challenges of E-health solutions in cloud computing,’’
IEEE Access, vol. 7, pp. 74361–74382, 2019.

• Algarni, ‘‘A survey and classification of security and privacy research in smart healthcare systems,’’ IEEE Access, vol. 7, pp. 101879–
101894, 2019.

5 February 2022
KPR Institute of Engineering and Technology, Coimbatore, 14
Tamil Nadu, India
Thank you.

5 February 2022 KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India 15

You might also like