.NET Project On PSMPA Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative


The Distributed m-healthcare cloud computing system significantly facilitates secure and efficient patient treatment for medical consultation by sharing personal health data among the healthcare providers. This system ought to achieve the challenge of keeping both the information confidentiality and patients’ identity privacy simultaneously. Much existing access control and anonymous authentication plans can’t be straightforwardly exploited. To solve the issue proposed a novel Authorised accessible privacy model (AAPM) is built up. Patients can authorize doctors by setting an access tree supporting flexible threshold predicates. At that point, in view of it, by formulating another strategy of attribute-based assigned verifier signature, a patient self-controllable multi-level privacy preserving cooperative authentication scheme (PSMPA) acknowledging three levels of security and privacy requirement in the distributed m-healthcare cloud computing system is proposed. The directly authorized doctors, the indirectly unauthorized doctors and the unauthorized persons in medical consultation can respectively decipher the personal health information and/or verify patients’ identities by satisfying the access tree with their own attribute sets.


In a m-healthcare system information confidentiality is much important but in existing framework structure it isn’t sufficient for to just ensure the data confidentiality of the patient’s personal health data in the honest but curious cloud server demonstrate since the frequent communication between a patient and a professional doctor can lead the adversary to conclude that the patient is suffering from particular disease with a high probability. Unfortunately, the issue of how to ensure both the patients’ information confidentiality and identity privacy in the distributed m-healthcare cloud computing situation under the malicious model was left untouched.


 Data confidentiality is low.

 Data redundancy is high.

 There is a violation of information security.


The proposed system for a privacy-preserving validation scheme in anonymous P2P systems in based on Zero-Knowledge Proof. Nonetheless, the heavy computational overhead of Zero-Knowledge Proof makes it impractical when directly applied to the distributed m-healthcare cloud computing systems where the computational resource for patients is constrained. Recommended patients need to consent to treatment and be alerted every time when related doctors get to their records and furthermore, our proposed system is a patient-centric and fine-grained data access control in multi-proprietor settings is built for securing personal healthcare records in cloud computing.

Our proposed m-healthcare system mainly focuses on the central cloud computing system which is not sufficient for efficiently processing the increasing volume of personal health information in m-healthcare cloud computing system. in distributed m-healthcare cloud computing systems, all members can be arranged into three classifications: the specifically authorized doctors with green labels in in the local health care provider who are authorized by the patients and can both access the patient’s personal health information and verify the patient’s identity and the indirectly authorized physicians with yellow labels in the remote healthcare providers who are authorized by the directly authorized physicians for medical consultant or some research purposes. They can only access the personal health information, but not the patient’s identity. For the unauthorized persons with red labels, nothing could be obtained.

The security and anonymity level of our proposed development is altogether improved by associating it to the underlying Gap Bilinear Diffie-Hellman (GBDH) issue and the number of patients’ attributes to manage the privacy leakage in patient sparsely distributed scenarios. More significantly, without the knowledge of which physician in the healthcare provider is professional in treating his illness, the best way for the patient is to encrypt his own PHI under a specified access policy rather than assign each physician a secret key. As a result, the authorized physicians whose attribute set satisfy the access policy can recover the PHI and the access control management also becomes more efficient.


 M-healthcare system is completely controlled and secured with encryption standards.

 There is no information loss and information redundancy.

 The system gives full protection to patient’s information and their attributes.


Leave a Reply

Your email address will not be published. Required fields are marked *