health care system for patients using multi-level privacy and authentication process

E.Abishek Daniel,K.GnanaJeyam,K.Deepika

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 30 March,2016         Pages:600-608

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Patients can authorize physicians by setting an access tree supporting flexible threshold predicates. A patient attribute-based designated verifier signature a patient self-controllable multi-level privacy-preserving cooperative authentication security and privacy requirement in distributed m-healthcare cloud computing system. The directly authorized physicians the indirectly authorized physicians and the unauthorized persons in medical consultation can respectively decipher the personal health information patients identities by satisfying the access tree with their own attribute sets. A security and privacy of the patient’s personal health information from various attacks physicians. The patients personal health information namely it is only the authorized physicians or institutions that can recover the patients personal health information during the data sharing in the distributed m-healthcare cloud computing system. The patients are concerned about the confidentiality of their personal health information. Patient’s personal health information in the honest-but-curious cloud server model since the frequent communication between a patient and a professional physician can lead the adversary to conclude that the patient is suffering from a specific disease with a high probability. Privacy in the distributed m-healthcare cloud computing consider simultaneously achieving data confidentiality and identity privacy with high efficiency. Patient authorized accessible privacy model and a patient self-controllable multi-level privacy preserving cooperative authentication scheme realizing three different levels of security and privacy requirement in the distributed m-healthcare cloud computing system.

Kewords

Healthcare System, Multi-Level Privacy, DotNet, MS SQL Server.

Reference

[1] L. Gatzoulis and I. Iakovidis, “Wearable and portable E-health systems,” IEEE Eng. Med. Biol. Mag., vol. 26, no. 5, pp. 51–56, Sep.-Oct. 2007. [2] I. Iakovidis, “Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare records in europe,” Int. J. Med. Inf., vol. 52, no. 1, pp. 105–115, 1998. [3] E. Villalba, M. T. Arredondo, S. Guillen, and E. Hoyo-Barbolla, “A new solution for a heart failure monitoring system based on wearable and information technologies in,” in Proc. Int. Workshop Wearable Implantable Body Sens. Netw., Apr. 2006, pp. 150–153. [4] R. Lu and Z. Cao, “Efficient remote user authentication scheme using smart card,” Comput. Netw., vol. 49, no. 4, pp. 535–540, 2005. [5] M. D. N. Huda, N. Sonehara, and S. Yamada, “A privacy management architecture for patient-controlled personal health record system,” J. Eng. Sci. Technol., vol. 4, no. 2, pp. 154–170, 2009.