0% found this document useful (0 votes)
14 views3 pages

Implementation of Cloudlet-Based Medical Data Sharing Using Ntru Cryptosystem Method

The document proposes a cloudlet-based healthcare framework to securely share medical data. It uses NTRU cryptography to encrypt data transmission to cloudlets. A trust model and intrusion detection system enhance security, while cloudlets improve performance by reducing latency during data sharing.

Uploaded by

katesourabh1822
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

Implementation of Cloudlet-Based Medical Data Sharing Using Ntru Cryptosystem Method

The document proposes a cloudlet-based healthcare framework to securely share medical data. It uses NTRU cryptography to encrypt data transmission to cloudlets. A trust model and intrusion detection system enhance security, while cloudlets improve performance by reducing latency during data sharing.

Uploaded by

katesourabh1822
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT Volume-,Issue-

IN TECHNOLOGY ISSN (O) :- 2349-3585

IMPLEMENTATION OF CLOUDLET-BASED MEDICAL


DATA SHARING USING NTRU CRYPTOSYSTEM
METHOD
1 2 3
Mr. Sourabh S. Kate ,Mr. Akshay S. Waghmare ,Mr. Mayur B. Dange ,
Prof. Sachin D. Pandhare 4
1,2,3 4
Student, AssistantProfessor,1,2,3,4 Department of Computer Science and Engineering,
SMSMPITR,Akluj,Maharashtra,India

However, security and privacy pose significant challenges in


Abstract - This healthcare framework proposes a novel
cloud computing, leading to the imperative need for data
solution for securely transmitting sensitive patient
information to the cloud using cloudlet adaptability. The key encryption to ensure confidentiality and integrity. In advanced

features of the cloudlet system encompass security measures, distributed computing, where information is stored across

efficient data transfer, and breakpoint detection. In the data diverse clouds, including cloudlets and remote clouds, to

collection phase, the Numerical Theory Research Unit facilitate information sharing and intensive computations,

(NTRU) method encrypts user body information from mobile critical challenges arise. Specifically, concerns center around

devices, ensuring secure transmission to nearby cloudlets with ensuring the security of users' sensitive health information during
transit to a cloudlet and preventing privacy issues in cloudlet data
minimal energy consumption. A trust model is introduced,
distribution. With the increasing prevalence of electronic
enabling users to selectively share information with trusted
medical records (EMR) and cloudassisted applications, there is a
partners in the cloudlet, fostering a secure and personalized
data-sharing environment. This trust model facilitates patient growing need to address security considerations associated with
remote clouds housing extensive healthcare big data. This paper
interaction for discussing and sharing insights into their
proposes a solution through a cloudlet-based healthcare
medical conditions. Additionally, a three tiered approach is
framework, aiming to secure healthcare data in remote clouds
implemented to safeguard patient medical data stored
remotely, ensuring robust privacy protection. and fortify the overall system against malicious attacks.

Introduction LITERATURE REVIEW

Distributed computing revolutionizes venture IT, providing a The first study focuses on cloudlet functions in healthcare,

cost-effective and democratized approach to web processing. emphasizing privacy, data sharing, and intrusion detection. It

This transformative shift not only alters business models but employs the NTRU method for encrypting wearable-collected

reshapes the entire lifecycle of IT infrastructure and application body data, introduces a trust model for selecting partners and

delivery. Simultaneously, healthcare, a vital sector in a nation's aiding patient communication, and protects users' medical data

economy, involves intricate processes of diagnosis, treatment, in remote clouds. Additionally, it proposes a collaborative

and prevention, driven by patients' consumption of products and intrusion detection system using cloudlet mesh to prevent

services from healthcare institutions. In the realm of computing, malicious attacks on healthcare big data clouds[1]. The second

cloud technology stands out, sharing resources among users and study addresses privacy in multi-keyword ranked search over

offering benefits from end users to organizations. Cloud encrypted cloud data (MRSE). It establishes strict privacy

storage, exemplified by platforms like Google Drive, SkyDrive, requirements and adopts "coordinate matching" and "inner

Amazon S3, Dropbox, and Microsoft Azure, eliminates the product similarity" measures. Two improved MRSE schemes are

need for significant financial investments in data warehousing. proposed, addressing various privacy requirements in different

1
IMPLEMENTATION OF CLOUDLET-BASED MEDICAL DATA SHARING USING NTRU CRYPTOSYSTEM
METHOD
threat models, with a comprehensive examination of privacy
and efficiency guarantees[2]. The third study offers a practical Proposed System
solution for privacy-preserving medical record sharing in cloud
The proposed system involves implementing a cloudlet-based
computing. Utilizing attribute classification and vertical data
architecture for efficient medical data sharing. This is achieved
partitioning, it consists of four components: data partition for
through the utilization of the NTRU cryptosystem method for
publishing, data combining for access, integrity checking, and
secure data transmission. NTRU, known for its robust encryption
hybrid search. Statistical analysis and cryptography are
capabilities, ensures the confidentiality and integrity of medical
combined to balance medical data utilization and privacy
data during sharing processes. The cloudlet infrastructure
protection in a prototype system for large-scale medical data
enhances performance by bringing computation closer to the data
access and distribution.
source, reducing latency, and improving overall system
METHODOLOGY responsiveness. This integration of cloudlet technology with
In this system, the data owner takes a medical dataset as input NTRU cryptography establishes a secure and efficient
and encrypts it using the NTRU key encryption algorithm to framework for medical data sharing in a cloud environment.
safeguard user's medical data during transmission to the Objective
cloudlet. The Key Distribution Center (KDC) provides
The project objectives are as follows:
encryption keys to the data owner. The encrypted data is stored
in a cloudlet system where users with similar medical  Develop a novel healthcare framework utilizing the
conditions can exchange treatment information. To protect adaptability of cloudlet technology.
against attacks, a collaborative intrusion detection system (IDS)  Propose a secure Cloudlet-based Medical Data Sharing system.
based on cloudlet mesh is developed, preventing malicious
 Ensure quick and efficient retrieval of information within the
activities on remote healthcare big data. Access to data by
framework. Scope
doctors is controlled; they request a key from the data owner,
and upon authentication, the data owner provides the key for  The proposed system emphasizes a high level of accuracy in
decrypting and accessing the data stored in the cloud server. its operations.
This ensures secure and controlled access to sensitive  It ensures that all tasks are performed correctly within the
healthcare information. system.
Existing System  The system's primary objective is to provide superior security
The existing system involves implementing cloudlet-based for medical data.
medical data sharing using the NTRU cryptosystem method.
 It prioritizes accuracy and reliability in handling sensitive
This method likely employs cloudlets, which are small-scale
information.
cloud computing resources located at the network edge, to
Conclusion
facilitate secure and efficient sharing of medical data. The
NTRU cryptosystem is likely used for encryption and In this study, This proposed system introduces a secure cloudlet-
decryption purposes to ensure the confidentiality and integrity based information sharing framework, ensuring data is shared in
of the shared medical information. This approach aims to an encoded format. The Key Distribution Center (KDC)
enhance data accessibility and collaboration among healthcare facilitates encryption by providing the pathway to users or data
professionals while maintaining the security of sensitive owners. In case of a potential attack during data sharing, the
medical data. cloudlet employs a collaborative intrusion detection system
(IDS) to prevent unauthorized access. The system's

2|Page ISSN:-2349-3585 |www.ijrdt.org


IMPLEMENTATION OF CLOUDLET-BASED MEDICAL DATA SHARING USING NTRU CRYPTOSYSTEM
METHOD
implementation demonstrates enhanced security and
trustworthiness, along with notable efficiency gains in terms of
time and memory usage.

References

[1].Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen


Mao, Long Hu, “Privacy Protection and Intrusion Avoidance
for Cloudlet-based Medical Data Sharing”, IEEE Transactions
on Cloud Computing, 2016.

[2]. Cao, C. Wang, M. Li, K. Ren, and W. Lou,


“Privacypreserving multi-keyword ranked search over
encrypted cloud data,” Parallel and Distributed Systems, IEEE
Transactions on, vol. 25, no. 1, pp. 222–233, 2014.

[3]. J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for
privacy preserving medical data sharing in the cloud
environment,” Future Generation Computer Systems, vol. 43,
pp. 74– 86, 2015.

[4].K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices


for telehome healthcare,” in Engineering in Medicine and
Biology Society, 2004.IEMBS’04. 26th Annual International
Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.

[5]. R. Zhang and L. Liu, “Security models and requirements


for healthcare application clouds,” in Cloud Computing
(CLOUD), 2010 IEEE 3 rd International Conference on. IEEE,
2010, pp. 268–275.

[6].K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang,


“Deypos:Deduplicatable dynamic proof of storage for multi-
user environments,”2016.

[7].N. Cao,"Privacy-preserving multi-keyword ranked search


over encrypted cloud data",INFOCOM, 2011 Proceedings
IEEE,IEEE, (2011).

[8]. M. Quwaider and Y. Jararweh, “Cloudlet-based efficient


data collection in wireless body area networks,” Simulation
Modelling Practice andTheory, vol. 50, pp. 57–71, 2015.

3|Page ISSN:-2349-3585 |www.ijrdt.org

You might also like