Data leakage detection using cyber security

      

ABSTARCT :

The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an encrypted form, but it affects usability and flexibility in terms of effective search. Attribute-based searchable encryption (ABSE) has proven its worth by providing fine-grained searching capabilities in the shared cloud storage. However, it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations. In a healthcare cloud-based cyber-physical system (CCPS), the data is often collected by resource-constraint devices; therefore, here also, we cannot directly apply ABSE schemes..

EXISTING SYSTEM :

The existing systems are poor in processing large volumes of multi-structured healthcare data with less security using AES Algorithum and not providing accurate health recommendation data

DISADVANTAGE :

Problem transformation method ?rst transforms one multilabel dataset into multiple single-label datasets, and then exploits existing single-label learning algorithm to process each single-label dataset.

PROPOSED SYSTEM :

The main aim of this research is to provide secure management in accessing the medical records using block chain technology by unique identification of the data security. Using Block Chain Crypto System Algorithm the laboratory test data and basic information of patients are Encrypted. The clinical dataset is an information system that offers knowledge and personalized information to users in enhancing health and healthcare outcomes .

ADVANTAGE :

Instead, it is managed by theconsensus nodes,andthat to is done only when the consensus nodes receive asearch token generation request from the end-users.  For remaining algorithms, storage and computational cost isdependent upon the number of attributes. However, the proposed scheme is genuinely decentralized and more securedue to the application of blockchain technology.  Furtherthesearch token needs not be stored by the user; it can becomputed on-demand with consensus nodes. Consensusnodesgenerate a partial search token, upon which the user will perform some exponent and multiplication operations(minimal cost operations) to compute the complete searchtoken.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp