Final

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

Privacy Protection and Intrusion

Avoidance for Cloudlet-based Medical Data


Sharing
Introduction to the Domain
Cloud computing is an information technology (IT) paradigm, a model
for enabling ubiquitous access to shared pools of configurable resources
(such as computer networks, servers, storage, applications and
services),which can be rapidly provisioned with minimal management
effort, often over the Internet. Cloud computing allows users and
enterprises with various computing capabilities to store and process data
either in a privately-owned cloud, or on a third-party server located in
a data center - thus making data-accessing mechanisms more efficient
and reliable. Cloud computing relies on sharing of resources to
achieve coherence and economy of scale, similar to a utility.
Problems identified in the domain

Many cloud providers can share information with third parties if necessary
for purposes of law and order even without a warrant. That is permitted in
their privacy policies which users have to agree to before they start using
cloud services.
There are life-threatening situations in which there is no time to wait for the
police to issue a warrant. Many cloud providers can share information
immediately to the police in such situations.
Motivation
We divide data in remote cloud into different kinds and utilize
encryption mechanism to protect them respectively. We propose
collaborative IDS based on cloudlet mesh to protect the whole
healthcare system against malicious attacks.
Project Scope
It shares information of any user based on cloudlet with the similarity.
 
A prevention system must identify and stop malicious attacks before
they do damage and have a chance to infect a system.
Objectives & Goals
The main objective of proposed system is to provide for a quick and
efficient retrieval of information.
 
The level of accuracy in the proposed system will be higher. All
operation would be done correctly and it ensures that whatever provides
better security to medical data.
Sr.No
Literature Survey
Project Name Author Name Proposed System Advantages and Disadvantages This proposed refer to:
[1] “Wearable medical K. Hung, Y. Advantages: Aim of our project is to
devices for Zhang, and B. 1. Use of mobile communication is no longer limited develop a tele-home
telehome Tai to telephony. healthcare system which
healthcare” 2. New interests and demands are wireless data and utilizes wearable
multimedia services, as 3G phones are available. devices, wireless
Disadvantages: communication
3. The world’s ageing population and prevalence of technologies, and multi-
chronic diseases have lead to high demand for tele- sensor
home healthcare, in which vital-signs monitoring is data fusion methods.
essential.

[2] “Cloud-supported M. S. Hossain Advantages: This paper proposes a


cyber–physical 1. The design and development of such systems cloud-supported cyber–
localization requires access to substantial sensor and user physical localization
framework contextual data that are stored in cyberspace. system for patient
for patients Disadvantages: monitoring using smart
monitoring” 2. This enables a range of emerging applications or phones to acquire voice
systems such as patient or health monitoring, which and electroencephalogram
require patient locations to be tracked. signals in a scalable.
[3] “A security J. Zhao, L. Advantages: The security model is
framework in g- Wang, J. Tao, J. 1. The goal of this research is to advance the Map based on several security
hadoop Chen, W. Sun, Reduce framework for large-scale distributed solutions such as public
for big data R. Ranjan, J. computing across multiple data key cryptography and the
computing across Kołodziej, Disadvantages: SSL protocol, and is
distributed cloud A. Streit, and D. 2. The MapReduce tasks are firstly scheduled among dedicatedly designed for
data centres” Georgakopoulos the clusters using Hadoop’s data-aware scheduling. distributed environments
Sr.No Project Name
Literature Survey
Author Proposed System Advantages and Disadvantages This proposed refer to:
Name
[4] “Security models R. Zhang Advantages: We describe an EHR
and requirements and L. Liu We have taken a methodical approach to investigating security reference model
for healthcare security models and security requirements for healthcare for managing security
application clouds application clouds. issues in healthcare
Disadvantages:
” clouds, which highlights
The widespread use of electronic health record (EHR),
building a secure EHR sharing environment has attracted a three important core
lot of attention in both healthcare industry and academic components in securing an
community. EHR cloud.
[5] “Privacy- N. Cao, C. Advantages: We explain and solve the
preserving Wang, M. 1. We describe and resolve the difficult of multi-keyword interesting problem of
multi-keyword Li, K. Ren, ranked search over encrypted cloud data, and create a privacy preserving multi
ranked search over and W. Lou variety of privacy requirements. keywords ranked search
2. We give two better MRSE outlines to realise many
encrypted cloud stringent privacy requirements in two dissimilar threat over encrypted cloud data,
data” models. and create a set of strict
Disadvantages: privacy necessities for
3. The innovation in cloud computing has encouraged the such a safe cloud data
data owners to outsource their data managing system application system.

6. “Cloudlet-based M. Advantages: The proposed work also


efficient data Quwaider 1. The goal was objective to minimize end-to-end packet attempts to minimize the
collection and Y. cost by dynamically choosing data collection to the end-to-end packet delay
in wireless body Jararweh cloud using cloudlet based system by choosing dynamically
area networks” Disadvantages: a neighbor cloudlet.
The huge amount of data collected by BAN nodes
demands scalable, on-demand, powerful, and secure
storage and processing infrastructure.
Sr.
Literature Survey
No Project Name Author Proposed System Advantages and Disadvantages This proposed refer to:
Name
7. “Data privacy A. Sajid Advantages: The system is privacy-
in cloud- and H. 1. We have proposed a privacy-aware cloud assisted healthcare assured where cloud sees
assisted Abbas monitoring system via compressive sensing. neither the original
2. The random mapping based protection ensures no sensitive
healthcare samples nor underlying
samples would leave the sensor in unprotected form.
systems: State data. It handles well
Disadvantages:
of the art and 3. Wireless sensors are being increasingly used to sparse and general data,
future monitor/collect information in healthcare medical systems. and data tampered with
challenges” noise.
8. “Behavior rule R. Advantages: We demonstrate that our
specification- Mitchell 1. For safety-critical MCPSs, being able to detect attackers intrusion detection
based intrusion and I.-R. while limiting the false alarm probability to protect the technique can effectively
detection for Chen welfare of patients is of utmost importance trade false positives off
safety critical Disadvantages: for a high detection
medical cyber 2. We propose and analyze a behavior-rule specification-based probability to cope with
physical technique for intrusion detection of medical devices more sophisticated and
systems” embedded in a medical cyber physical system (MCPS) in hidden attackers to
which the patient’s safety is of the utmost importance
support ultra safe.

9. “A H. Advantages: Objective is to develop


collaborative Mohamed 1. Security solutions are not yet adapted to this new concept. the functioning of our
intrusion , L. Adil, Indeed, in such an environment, the more customers and security system to be able
paths, the greater the intrusion is effective.
detection and T. Saida, to detect and block
prevention and M. Disadvantages: various types of attacks
2. They add that Cloud Computing deals with different
system in cloud Hicham fundamentals like virtualization management, fault tolerance and intrusions.
computing.” and load balancing.
Problems Identified in the Existing
work
With the advances in distributed computing, a lot of information can be
put away in different clouds, including cloudlets and remote cloud,
encouraging information sharing and escalated calculations. Be that as it
may, cloud-based information sharing entails the following crucial
issues: How to ensure the security of client's body information data its
conveyance to a cloudlet? How to ensure the information partaking in
cloudlet won't cause protection issue? As can be anticipated, with the
expansion of electronic medicinal records (EMR) and cloud-helped
applications, more and more considerations ought to be paid to the
security issues in regards to a remote cloud containing human services
huge information. How to secure the medicinal services huge
information put away in a remote cloud? How to adequately shield the
entire framework from malevolent assaults?
Problem Statement & Hypothesis
Problem statement:
Low security of user’s body data.
 
User interaction to the cloud so security issue occurs in all store data.
 
Low accuracy

Hypothesis:
1.At the time of forgot password system should be connect with Internet.
Proposed Work & System
Architecture
Wearable Device

User body information

User

Question and Answer

Cloudlet Cloudlet

EMR
Remote Cloud
Doctor
Proposed Work & System
Architecture
For the user body information fetch using the wearable device and then
provide transfer this information to the cloudlet. But we provide the privacy of
user information. This information is transfer to the cloudlet in encrypted
format. In cloudlet is share information on user symptoms. Doctor fetched
information from remote cloud and checks the user EMR Report. User asked
question to the doctor through online for small disease.
Project Plan
Activity I II III IV V VI VII VIII week IX

week week week week Week week week week

Aug 4 Aug 11 Aug 18 Aug 25 Sept 1 Sept 8 Sept 15 Sept 22 Sept 29

Initiate the project


Communication
Literature survey
Define scope
Develop SRS
Plan the project
Design mathematical model

Feasibility Analysis

Develop work breakdown


structure

Planning project schedule

Design UML and other diagrams

Design test plan


Design risk management plan
Project Modules & Features
Remote Cloud server Module:
Cloud represents the data store where all the encrypted report records are
stored and is responsible of processing the queries.
Wearable Device(Data Owner) :
Wearable device is store user information on device and send to cloudlets.
Thirsted Authority:
The medical obtain the public key in order to encrypt their report records and
upload them to cloudlet.
Cloudlet:
A cloudlet takes information from wearable device and store onto remote
cloud.
Doctor:
A doctor checks the information of user and give to plaintext.
User:-
User request to other user for sharing the data and check on google map for
any registered doctor hospital.
Work flow diagram
Start

User

Body Info

Wearable Device

Encryption transmit to
Cloudlet

Cloudlet based shared


Data

Use Reputation &


Similarity

Intrusion Avoidance
Stored to remote Cloud Using CIDS

EMR Report

Doctor
UML
Class Diagram
Activity Diagram
Activity Diagram
Sequence Diagram
Sequence Diagram
Algorithm strategy & Proposed
Algorithm
Algorithm 1: NTRU
Number Theory Research Unit (NTRU):-
Input:- F, G, Message .
Output:- encrypt and decrypt message.
Step 1: Two small polynomial f and g.
Step 2: The large modulo p and modulo q.
Step 3: The inverse of f modulo q and the inverse of f modulo p.
Step 4: f * fq = 1 (mod q) and f * fp = 1 (mod p)
Step 5: Generating fp = f-1 (mod p) and fq = f-1 (mod q).
Step 6: The private key pair and the public key h is calculated using p, fq and g.
Step 7: public key is h = pfq * g (mod q).
Step 8: Encryption uses m, r and the public key h to generate e, the encrypted
message that is as follows: e = r * h + m (mod q).
Step 9: First uses the private key f to calculate: a = f * e (mod q).
Step 10: c = fp * b (mod p)
If decryption has successfully completed, then the polynomial c will be equal to
the original message.
Mathematical Modeling
A] Mapping Diagram
 
 
 

Where,
U1,U2,…Un=Users
E=Encrypted User Body Information
C1,C2=Cloudlet
C1,C2---Cn= Cloudlet information
Mathematical Modeling
B] Set Theory
S={s, e, X, Y,Φ}
Where,
s = Start of the program.
1. Log in with webpage.
2. Load medical data on cloudlet.
e = End of the program.
Retrieve the user EMR report from remote cloud .
X = {U, Nc}
X = Input of the program.
U = User.
Nc = Select number of User.
Y = Output of the program.
Share the same user symptoms
X, Y € U
Let U be the Set of System.
U= {User, E, H}
Where User, E,H are the elements of the set.
User=Cloudlet
E=Encryption
Feasibility Analysis
Feasibility study:
The feasibility of the project is analyzed in this phase and business proposal is
put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are,
 
1. Economical feasibility:
Considering developing medical it require some software as well as hardware.
The cost is required for that. Here to develop project the steps are performed
requirement gathering, analysis, design, coding, testing for that need employee
to work on it. That needs to pay money.
Project Cost Analysis & System
Requirements
•Cost Matrix and COCOMO Model
1.COCOMO (Constructive Cost Estimation Model) was proposed by Boehm.
According to him, any software development project can be classified into one
of the following three categories based on the development complexity:
organic, semidetached, and embedded.

2.According to Boehm, software cost estimation should be done through three


stages: Basic COCOMO, Intermediate COCOMO, and Complete COCOMO.

3.The basic COCOMO model gives an approximate estimate of the project


parameters.
The basic COCOMO estimation model is given by the following expressions:
Effort = a * (KLOC)b PM
Tdev = 2.5 * (Effort) c Months
Risk Analysis & Mitigation
Assessment Risk Index Mitigation

5A ,5B ,5C ,4A ,4B ,3A Providing insurance ,replacing device if need

5D ,5E ,4C ,3B ,3C ,2A ,2B Security provided to system, fire management
system in office ,data backup, power backup

4E, 4D , 3D ,2C , 1A , 1B Insurance ,security, backup, using camera of high


mega pixel

3E ,2E ,2C ,1E ,1D ,1C Providing user manual and well answered FAQ’s
,rich vocabulary database
Quality Assurance Measures
Under the FURPS model, the following characteristics are identified:-
Functionality
The F in the FURPS+ acronym represents all the system-wide functional
requirements that we would expect to see described.
In privacy protection and intrusion avoidance based on medical data sharing is
share data based on user similarity.
Usability
This medical system is used as share information based on cloudlet but we
provide security of the user information
Reliability
Here it provide search only to authenticated user. It allows user to change his
password securely.
Performance
It works on personalized information so its performance is better than other
system.
Supportability
this is a general bucket of requirements that address supporting the software
Ex. Hospital uses
Testing Strategy Used
Case Test Element Valid Values Valid Invalid R1 R2
Numbers Response Response
1 Are system classes permissible Existence of classes in YES NO YES YES
libraries
2 Are system classes generalizations/ Determination of class, YES NO YES YES
specializations permissible super class and subclass

3 Are system class determine object part-of YES NO YES YES


aggregations/compositions links, determine
permissible necessity of part-of
links’ permissible
number of links
4 Is system activity flow correct system activities YES NO YES YES
→object
attributes/actions
5 Is event reception/state change determine event YES NO YES YES
correct reception/state change
6 Are state sequences correct event reception and YES NO YES YES
state change
7 Are message sequences/object sequences of messages YES NO YES YES
interactions correct among objects
8 Are system functions available system functionality YES NO YES YES
9 Are system functions available determine large-scale YES NO YES YES
functionality
Data sets considered
We use medical data set.
Dataset is included the user body information like bp, hb, pulse rate,
temperature etc.
Results & Discussion
Results & Discussion
Results & Discussion
Comparative Result Analysis
Comparative Result Analysis
Conclusion & Future Work
In this project, we investigated the problem of privacy protection and sharing
large medical data in cloudlets and the remote cloud. We developed a system
which does not allow users to transmit data to the remote cloud in
consideration of secure collection of data, as well as low communication cost.
However, it does allow users to transmit data to a cloudlet, which triggers the
data sharing problem in the cloudlet. Firstly, we can utilize wearable devices
to collect users’ data, and in order to protect users privacy, we use NTRU
mechanism to make sure the transmission of users’ data to cloudlet in security.
Secondly, for the purpose of sharing data in the cloudlet based on user
similarities. Thirdly, for privacy-preserving of remote cloud data, we partition
the data stored in the remote cloud and encrypt the data in different ways, so
as to not just ensure data protection but also accelerate the efficacy of
transmission. Finally, we propose collaborative IDS based on cloudlet mesh to
protect the whole system.
References
 [1] A. Sajid and H. Abbas, “Data privacy in cloud-assisted healthcare systems:
State of the art and future challenges,” Journal of Medical Systems, vol. 40, no. 6,
pp. 1–16, 2016.

[2] M. S. Hossain, “Cloud-supported cyber–physical localization framework for


patients monitoring,” 2015.
 
[3] M. Quwaider and Y. Jararweh, “Cloudlet-based efficient data collection in
wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50,
pp. 57–71, 2015.

[4] R. Mitchell and I.-R. Chen, “Behavior rule specification-based intrusion


detection for safety critical medical cyber physical systems,” Dependable and
Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, 2015.

[5] Y. Shi, S. Abhilash, and K. Hwang, “Cloudlet mesh for securing mobile clouds
from intrusions and network attacks,” in The Third IEEE International Conference
on Mobile Cloud Computing, Services, and Engineering,(Mobile Cloud 2015).
IEEE, 2015.
References
[6] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-
keyword ranked search over encrypted cloud data,” Parallel and Distributed
Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[7] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit,
and D. Georgakopoulos, “A security framework in g-hadoop for big data
computing across distributed cloud data centres,” Journal of Computer and System
Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
[8] H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion
detection and prevention system in cloud computing,” in AFRICON, 2013. IEEE,
2013, pp. 1–5.
[9]R. Zhang and L. Liu, “Security models and requirements for healthcare
application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rdInternational
Conference on. IEEE, 2010, pp. 268–275.
[10] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome
healthcare,” in Engineering in Medicine and Biology Society, 2004.
IEMBS’04.26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004,
pp. 5384–5387.
 
Base Paper

You might also like