system requirments specification

advertisement
SYSTEM REQUIRMENTS SPECIFICATION
A. Aim of the Project:
This aim of the System is to address the problem of data privacy and design a cloud-assisted
privacy preserving mobile health monitoring system to protect the privacy of the involved parties
and their data. Moreover, the outsourcing decryption technique and a newly-proposed key private
proxy re-encryption are adapted to shift the computational complexity of the involved parties to the
cloud without compromising clients’ privacy and service providers ‘intellectual property. Finally,
our security and performance analysis demonstrates the effectiveness of our developed System.
A CAM system will collect authorized medical data about people and store it securely on the
cloud server to help deliver quick and efficient care of Patients.
Problem Statement:
This system will address the important problem of data security and design a cloud-assisted
privacy preserving mobile health monitoring system to protect the privacy of the involved parties
and their data. The intended system will consist of implementation in a mobile based environment.
Integration of cloud server and users’ device to provide efficient storage and accessibility. Providing
complete security of user data in accompany with mobile environment.
Existing System:
In Existing System CAM model is present as a web based project. A website that allows user
login, Trusted Authority login and the company i. e. service provider. Our aim is to provide the
service in an easier and in a mobile way. Users will have this service as a mobile app so the
convenience or the usage is increased. Existing system misses the mobile part which our system
will be implementing.
Disadvantage:
In Existing System privacy protection mechanisms apply by simply re-moving clients’ personal
identity information (such as names or SSN) or by using anonymization technique fails to servers
an effective way in dealing with privacy of health systems due to the increasing amount and
diversity of personal identifiable information . It is worth noting that the collected information from
a mHealth monitoring system could contain clients’ personal physical data such as their heights,
weights, and blood types, or even their ultimate personal identifiableinformation such as their
fingerprints and DNA profiles. Because there may be chances of data misuse from Admin, Trusted
Authority.
B. Proposed System
The proposed models will be a User module, a Trusted Authority module and a Service Provider
module. User module consists of an android app which will allow users to use the application in
mobile environment. It will present before the user a login and through which access to app
showing their requests, also user will be able to query the app for their schedule of medication.
Trusted Authority module will act as an interface between user and service provider. It will
hold the information provided by the users and provide the users with keys. The information is
held by the trusted authority is in encrypted format so no way of information leak.
The System stores its encrypted monitoring data or program in the cloud server. Individual
clients collect their medical data and store them in their mobile devices, which then transform the
data into attribute vectors. The attribute vectors are delivered as inputs to the monitoring program
in the cloud server through a mobile (or smart) device. A semi-trusted authority is responsible for
distributing private keys to the individual clients and collecting the service fee from the clients
according to a certain business model such as pay-as-you-go business model.
C. Description of Project In Short:
We first elaborate our cloud-assisted mHealth monitoring system (CAM). CAM consists of four
parties: the cloud server (simply the cloud), the company who provides the mHealth monitoring
service (i.e. the healthcare service provider), and the individual clients (simply clients), and a semitrusted authority (TA).
The company stores its encrypted monitoring data or program in the cloud server. Individual
clients collect their medical data and store them in their mobile devices, which then transform the
data into attribute vectors. The attribute vectors are delivered as inputs to the monitoring program
in the cloud server through a mobile (or smart) device. A semi-trusted authority is responsible for
Distributing private keys to the individual clients and collecting the service fee from the clients
according to a certain business model such as pay-as-you-go business model. The TA can be
considered as a collaborator or a management agent for a company (or several companies) and
thus shares certain level of mutual interest with the company. However, the company and TA could
collude to obtain private health data from client input vectors. We assume a neutral cloud server,
which means it neither colludes with the company nor a client to attack the other side.
D. Process Summary:
mHelath Service Provider Processes
1. Service Provider will store the data monitoring details in cloud in encrypted form.
2. Service provider can view user details.
3. Service Provider can add medical data details & also view & add comments &
descriptions.
Cloud Server Processes
4. Act’s as a offline storage.
5. All data are stored in encrypted form securely even password of user also.
Cloud Server Processes
6. Client Registration.
7. Trusted Authority activates the user account.
8. Client Login by providing correct Username & Password.
9. Client can raise the query when a query is raise request is automatically send to the
Trusted Authority.
10. Client can view their details.
11. Client can raise query & view query results using the token
Cloud Server Processes
12. STA will generate token for user (Client). STA also not able to view the token even if
token is generated & send by STA.
E. Algorithms:
1. Private Key encryption Algorithm:
This algorithm is performed by TA to generate private key for each user.
2. Token Generation Algorithm:
This algorithm is performed by TA to generate unique & encrypted token
for each client.
3. Decryption Algorithm:
Decryption Algorithm performed at Client side to decrypt the data returned by cloud
server.
F. Experimental Setup:
We require cloud server (Amazon Service Provider) to store large amount of user details
securely in encrypted format.
Hardware Requirements:

Pentium processor at 900 MHz or higher

1 GB RAM or higher

25 GB or more hard disk
Software Requirements:

Operating System

Developing language : - Java (JDK 1.7)

Database
: - MySQL 5.5

Tools
: - Eclipse Helios
: - Windows 7.

Server
: - Apache Tomcat 7.0.
Design and Implementation Constraints
We will deploy this system on Cloud Server so we need to purchase Private Cloud. We need an
android enabled phone with internet facility.
Assumptions and Dependencies
User is using Android Application to give their daily schedule information to obtain
response from Healthcare Provider.
Modules Information
Module1:
1.1. GUI of the Project
GUI of the Project in android accessing cloud & for displaying final result to the user.
1.2. Branching Program:
We formally describe the branching programs, which include binary classification or decision trees
as a special case. We only consider the binary branching program for the ease of exposition since a
private query protocol based on a general decision tree can be easily derived from our scheme.
Module 2: Token Generation
To generate the private key for the attribute vector a client first computes the identity
representation set of each element and delivers all the identity representation sets to TA. Then TA
runs the Anon Extraction each identity in the identity set and delivers all the respective private
keys to the client.
Module 3:
3.1 Query Generation
A client delivers the private key sets obtained from the TokenGenerationalgorithm to the
cloud, which runs the Anon Decryption algorithm on the cipher text generated in the Store
algorithm. Starting the decryption result determines which cipher text should be decrypted next.
Then the decryption result indicates the next node index. The cloud will then use
AnonDecryptionalgorithm to decrypt the subsequent cipher text Continue this process iteratively
until it reaches a leaf node and decrypt the respective attached information.
3.2 Semi Trusted Authority:
A semi-trusted authority is responsible for distributing private keys to the individual clients
and collecting the service fee from the clients according to a certain business model such as pay-asyou-go business model. The TA can be considered as a collaborator or a management agent for a
company (or several companies) and thus shares certain level of mutual interest with the company.
However, the company and TA could collude to obtain private health data from client input vectors.
Module 4: Contribution Work
4.1 Fully Secure Anonymous HIBE
A Hierarchical Identity Based Encryption scheme (henceforth abbreviated in HIBE) over an
alphabet ∑ is a tuple of five efficient and probabilistic algorithms: (Setup, Encrypt, KeyGen,
Decrypt, and Delegate).
An HIBE system is an IBE that allows delegation of the keys in a hierarchical structure. To the
top of the structure there is the central authority that holds the master secret key, then several
sub-authorities (or individual users) that hold delegated keys which can be used to decrypt only
the messages addressed to the organization which the sub-authority belongs.
We will be comparing our existing system with this algorithm.
Project Plan
Modules
Code Delivery date
Code
delivered
(Percentage) %
Module 1
25%
Module 2
50%
Module 3
75%
Module 4
100%
in
Download