Professional Documents
Culture Documents
AIM
The main aim of this paper is a novel authorized accessible privacy model
(AAPM) is based on devised by a new technique of attribute-based designated
verifier signature, a patient self controllable multi-level privacy-preserving
cooperative authentication scheme (PSMPA) realizing three levels of security and
privacy requirement in distributed m-healthcare cloud computing system is
proposed.
SCOPE
The scope of this paper is the formal security proof and simulation results illustrate
our scheme can resist various kinds of attacks and far outperforms the previous
ones in terms of computational, communication and storage overhead.
Introduction:
In m-healthcare social networks, the personal health information is always
shared among the patients located in respective social communities suffering from
the same disease for mutual support, and across distributed healthcare providers
(HPs) equipped with their own cloud servers for medical consultant. However, it
also brings about a series of challenges, especially how to ensure the security and
privacy of the patients personal health information from various attacks in the
wireless communication channel such as eavesdropping and tampering and As to
the security facet, one of the main issues is access control of patients personal
health information, namely it is only the authorized physicians or institutions that
can recover the patients personal health information during the data sharing in the
distributed m-healthcare cloud computing system.
Disadvantages:
Data confidentiality is low.
Data redundancy is high.
There is a violation in data security.
Proposed System:
Proposed system for a privacy-preserving authentication scheme in
anonymous P2P systems based on Zero-Knowledge Proof. However, the heavy
computational overhead of Zero-Knowledge Proof makes it impractical when
directly applied to the distributed m-healthcare cloud computing systems where the
computational resource for patients is constrained. Suggested patients have to
consent to treatment and be alerted every time when associated physicians access
their records and also our proposed system is a patient-centric and fine-grained
data access control in multi-owner settings is constructed for securing personal
health records in cloud computing.
Advantages:
M-healthcare system is fully controlled and secured with encryption
standards.
There is no data loss and data redundancy.
System provides full protection for patients data and their attributes.
Literature Survey
1) Cross-Domain Data Sharing in Distributed Electronic Health Record
Systems
unless their health data are guaranteed proper use and disclosure, which cannot be
easily achieved without cross-domain authentication and fine-grained access
control. In addition, revocation of the delegated rights should be possible at any
time during the cooperation. In this paper, we propose a secure EHR system, based
on cryptographic constructions, to enable secure sharing of sensitive patient data
during cooperation and preserve patient data privacy. Our EHR system further
incorporates advanced mechanisms for fine-grained access control, and on-demand
revocation, as enhancements to the basic access control offered by the delegation
mechanism, and the basic revocation mechanism, respectively. The proposed EHR
system is demonstrated to fulfill objectives specific to the cross-domain delegation
scenario of interest.
Disadvantage
Data confidentiality is low.
Online personal health record (PHR) enables patients to manage their own
medical records in a centralized way, which greatly facilitates the storage, access
and sharing of personal health data. With the emergence of cloud computing, it is
attractive for the PHR service providers to shift their PHR applications and storage
into the cloud, in order to enjoy the elastic resources and reduce the operational
cost. However, by storing PHRs in the cloud, the patients lose physical control
to their personal health data, which makes it necessary for each patient to encrypt
her PHR data before uploading to the cloud servers. Under encryption, it is
challenging to achieve fine-grained access control to PHR data in a scalable and
efficient way. For each patient, the PHR data should be encrypted so that it is
scalable with the number of users having access. Also, since there are multiple
owners (patients) in a PHR system and every owner would encrypt her PHR files
using a different set of cryptographic keys, it is important to reduce the key
distribution complexity in such multi-owner settings. Existing cryptographic
enforced access control schemes are mostly designed for the single-owner
scenarios. In this paper, we propose a novel framework for access control to
PHRs within cloud computing environment. To enable fine-grained and scalable
access control for PHRs, we leverage attribute based encryption (ABE) techniques
to encrypt each patients PHR data. To reduce the key distribution complexity, we
divide the system into multiple security domains, where each domain manages
only a subset of the users. In this way, each patient has full control over her own
privacy, and the key management complexity is reduced dramatically. Our
proposed scheme is also flexible, in that it supports efficient and on-demand
revocation
Disadvantage
The challenge of keeping both the data confidentiality and patients identity privacy
simultaneously
Modules:
E-healthcare System Framework:
E-healthcare System consists of three components: body area networks
(BANs), wireless transmission networks and the healthcare providers equipped
with their own cloud servers. The patients personal health information is securely
transmitted to the healthcare provider for the authorized physicians to access and
perform medical treatment. Illustrate the unique characteristics of distributed mhealthcare cloud computing systems where all the personal health information can
be shared among patients suffering from the same disease for mutual support or
among the authorized physicians in distributed healthcare providers and medical
research institutions for medical consultation.
Authorized accessible privacy model:
Multi-level privacy-preserving cooperative authentication is established to
allow the patients to authorize corresponding privileges to different kinds of
physicians located in distributed healthcare providers by setting an access tree
supporting flexible threshold predicates. Propose a novel authorized accessible
privacy model for distributed m-healthcare cloud computing systems which
consists of the following two components: an attribute based designated verifier
signature scheme (ADVS) and the corresponding adversary model.
Security Verification:
OVERVIEW OF MICROSOFT.NET
.NET represents Microsoft's vision of the future of applications in the Internet
age. .NET provides enhanced interoperability features based upon open Internet
standards. Microsoft .NET represents a great improvement.
The .NET Framework consists of the CLR, the .NET Framework Class Library, the
Common Language Specification (CLS), a number of .NET languages, and Visual
Studio .NET.
The runtime environment provided by .NET, the CLR, manages the execution of
code and provides useful services. The services of the CLR are exposed through
programming languages. The syntax for these services varies from language to
language, but the underlying execution engine providing the services is the same.
Not all languages expose all the features of the CLR. The language with the best
mapping 45 to the CLR is the new language C#. VB.NET, however, does an
admirable job of exposing the functionality.
The .NET Framework class library is huge, comprising more than 2,500 classes.
All this functionality is available to all the .NET languages. The library consists of
four main parts:
1.
Base class library (which includes networking, security, diagnostics, I/O, and
other
Types of operating system services)
2. Data and XML classes
3. Windows UI
4. Web services and Web UI
The CLS is an agreement among language designers and class library designers
about those features and usage conventions that can be relied upon. CLS rules
apply to public features that are visible outside the assembly where they are
defined.
Languages in .NET
security
management,
network
communications;
thread
The ADO.NET classes enable developers to interact with data accessed in the form
of XML through the OLE DB, ODBC, Oracle, and SQL Server interfaces. The
ASP.NET classes
Support the development of Web-based applications and Web services. The
Windows Forms classes support the development of desktop-based smart client
applications.
ASP.NET
Enhanced Performance
just-in-time compilation, native optimization, and caching services right out of the
box. This amounts to dramatically better performance before you ever write a line
of code
Because ASP.NET is based on the common language runtime, the power and
flexibility of that entire platform is available to Web application developers. The
.NET Framework class library, Messaging, and Data Access solutions are all
seamlessly accessible from the Web. ASP.NET is also language-independent, so
you can choose the language that best applies to your application or partition your
application across many languages.
Simplicity
ASP.NET makes it easy to perform common tasks, from simple form submission
and client authentication to deployment and site configuration. For example, the
ASP.NET page framework allows you to build user interfaces that cleanly separate
application logic from presentation code and to handle events in a simple, Visual
Basic - like forms processing model. Additionally, the common language runtime
simplifies development, with managed code services such as automatic reference
counting and garbage collection
Manageability
philosophy
extends
to
deploying
ASP.NET
Framework
ASP.NET has been designed with scalability in mind, with features specifically
tailored to improve performance in clustered and multiprocessor environments.
Further, processes are closely monitored and managed by the ASP.NET runtime, so
that if one misbehaves (leaks, deadlocks), a new process can be created in its place,
which helps keep your applications constantly available to handle requests
Security
Language Support
The Microsoft .NET Platform currently offers built-in support for three languages:
C#, Visual Basic, and Scripts.
Language Compatibility
The differences between the VBScript used in ASP and the Visual Basic .NET
language used in
ASP.NET
ASP.NET
"true" Visual Basic, but the Visual Basic language itself has undergone significant
changes in this release.
Visual Basic.Net is designed to be a fast and easy way to create .NET applications,
including Web services and
ASP.NET
Visual Basic are built on the services of the common language runtime and take
full advantage of the .NET Framework.
Visual Basic .NET (VB.NET) is an object-oriented computer language that can be viewed as
an evolution of Microsoft's Visual Basic (VB) implemented on the Microsoft .NET framework.
Its introduction has been controversial, as significant changes were made that
broke
backward compatibility
community.
It is fully integrated with the .NET Framework and the common language
runtime,1 which together provide language interoperability, garbage collection,
enhanced security, and improved versioning support.
These tools through rich data analysis and data mining capabilities that integrate
with familiar applications such as Microsoft Office, SQL Server 2005 enable you
to provide all of your employees with critical, timely business information tailored
to their specific information needs. Every copy of SQL Server 2005 ships with a
suite of BI services.
Unlike its competitors, SQL Server 2005 provides a powerful and comprehensive
data management platform. Every software license includes extensive management
and development tools, a powerful extraction, transformation, and loading (ETL)
tool, business intelligence and analysis services, and new capabilities such as
Notification Services. The result is the best overall business value available.
Enterprise Edition includes the complete set of SQL Server data management and
analysis features and is uniquely characterized by several features that make it the
most scalable and available edition of SQL Server 2005. It scales to the
performance levels required to support the largest Web sites, Enterprise Online
Transaction Processing (OLTP) systems and Data Warehousing systems. Its
support for failover clustering also makes it ideal for any mission critical line-ofbusiness application.
4. Data encryption
SQL Server 2000 had no documented or publicly supported functions to encrypt
data in a table natively. Organizations had to rely on third-party products to address
this need. SQL Server 2005 has native capabilities to support encryption of data
stored in user-defined databases.
5. SMTP mail
Sending mail directly from SQL Server 2000 is possible, but challenging. With
SQL Server 2005, Microsoft incorporates SMTP mail to improve the native mail
capabilities. Say "see-ya" to Outlook on SQL Server!
6. HTTP endpoints
You can easily create HTTP endpoints via a simple T-SQL statement exposing an
object that can be accessed over the Internet. This allows a simple object to be
called across the Internet for the needed data.
7. Multiple Active Result Sets (MARS)
MARS allow a persistent database connection from a single client to have more
than one active request per connection. This should be a major performance
improvement, allowing developers to give users new capabilities when working
with SQL Server. For example, it allows multiple searches, or a search and data
entry. The bottom line is that one client connection can have multiple active
processes simultaneously.
8. Dedicated administrator connection
If all else fails, stop the SQL Server service or push the power button. That
mentality is finished with the dedicated administrator connection. This
functionality will allow a DBA to make a single diagnostic connection to SQL
Server even if the server is having an issue.
9. SQL Server Integration Services (SSIS)
SSIS has replaced DTS (Data Transformation Services) as the primary ETL
(Extraction, Transformation and Loading) tool and ships with SQL Server free of
charge. This tool, completely rewritten since SQL Server 2000, now has a great
deal of flexibility to address complex data movement.
10. Database mirroring
It's not expected to be released with SQL Server 2005 at the RTM in November,
but I think this feature has great potential. Database mirroring is an extension of
the native high-availability capabilities. So, stay tuned for more details.
Internet was originally established to meet the research needs of the U.S Defence
Industry. But it has grown into a huge global network serving universities,
academic researches, commercial interest and Government agencies, both in the
U.S and Overseas. The Internet uses TCP/IP protocols and many of the Internet
hosts run the Unix Operating System.
HTML
HTML (Hyper Text Markup Language) is the language that is used to prepare
documents for online publications. HTML documents are also called Web
documents, and each HTML document is known as Web page.
A page is what is seen in the browser at any time. Each Web site, whether on the
Internet or Intranet, is composed of multiple pages. And it is possible to switch
among them by following hyperlinks. The collection of HTML pages makes up the
World Wide Web.
A web pages is basically a text file that contains the text to be displayed and
references of elements such as images, sounds and of course hyperlinks to other
documents. HTML pages can be created using simple text editor such as Notepad
or a WYSIWYG application such as Microsoft FrontPage.
In either case the result is a plain text file that computers can easily exchange. The
browser displays this text file on the client computer.
"Hypertext" is the jumping frog portion. A hyperlink can jump to any place within
your own page(s) or literally to anyplace in the world with a 'net address (URL, or
Uniform Resource Locator.) It's a small part of the html language.
Tools and functionality, IIS also has built-in capabilities to help administer secure
websites, and to develop server-intensive web application.
FEATURES OF IIS:
IIS provides integrated security and access to a wide range of content, work
seamlessly with COM components, and has a graphical interface-the Microsoft
Management Console (MMC) that you can use to create and manage your ASP
application.
You can control many parts of IIS using COM>IIS exposes many of the servers
configuration settings via the IIS Admin objects. These objects are accessible from
ASP and other languages. That means you can adjust server configuration and
create virtual directories and webs programmatically. IIS 4 and higher store
settings and web information in a spoil database called the Metaphase. You can use
the IIS Admin objects to create new sites and virtual directories be alter the
properties of existing sites and virtual directories.
IIS ARCHITECTURES OVERVIEW:
IIS is a core product, which means that it is designed to work closely with many
other products, including all products in the Windows NT Server 4.0 Option pack.
The following figure shows the relationship between IIS and other products
installed as part of the Windows NT Server 4.0 Option pack.
SECURITY FOR IIS APPLICATION
IIS provides three authentication schemes to control access to ITS resources:
Anonymous, Basic and Windows NT challenge/Response. Each of these schemes
had different effect on the security context of an application launched by ITS. This
includes ISAPI extension agents, COT applications, IDC scripts and future
scripting capabilities.
ACCESS PRIVIEGES
IIS provides several new access levels. The following values can set the type of
access allowed to specific directories:
Read
Write
Script
Execute
Log Access
Directory Browsing.
Administering websites can be time consuming and costly, especially for people
who manage large internet Service Provider (ISP) Installations. To save time and
money Sips support only large company web siesta the expense of personal
websites. But is there a cost-effective way to support both? The answer is yes; if
you can automate administrative tasks and let users administer their own sites from
remote computers. This solution reduces the amount of time and money it takes to
manually administer a large installation, without reducing the number of web sites
supported.
2) Requirement Specification:
Here, the focus is on specifying what has been found giving analysis such as
representation, specification languages and tools, and checking the specifications
are addressed during this activity.
The Requirement phase terminates with the production of the validate SRS
document. Producing the SRS document is the basic goal of this phase.
Role of SRS:
The purpose of the Software Requirement Specification is to reduce the
communication gap between the clients and the developers. Software Requirement
Specification is the medium though which the client and user needs are accurately
specified. It forms the basis of software development. A good SRS should satisfy
all the parties involved in the system.
PSMPA
patient registration
Patient details
Generate ID
Data base
Level 1
Patient
Data
storage
Level 2
USER
Data base
Level 3
Provide treatment
Hospit
Generate ID
Verify physician
Class Diagram
Generate key ()
Verify physician ()
Activity diagram
Verify physician
PSMPA
SYSTEM TESTING
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid
outputs. All decision branches and internal code flow should be validated. It is the
testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing, that
relies on knowledge of its construction and is invasive. Unit tests perform basic
tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined
inputs and expected results.
Integration testing
Functional test
Invalid Input
Functions
Output
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit
testing to be conducted as two distinct phases.
Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Conclusion:
A novel authorized accessible privacy model and a patient self-controllable
multi-level privacy preserving cooperative authentication scheme realizing three
different levels of security and privacy requirement in the distributed m-healthcare
cloud computing system are proposed, followed by the formal security proof and
efficiency evaluations which illustrate our PSMPA can resist various kinds of
malicious attacks and far outperforms previous schemes in terms of storage,
computational and communication overhead.
Future Enhancement
Our future work will focus on investigating the relation between patient
mobility and privacy under the distributed Environment.
References:
I.
II.
III.
IV.
V.