privacy preserving on mobile health data in cloud

Upload: vinoth-chitra

Post on 07-Jul-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    1/46

    Privacy preserving on mobile health data in cloud

    ABSTRACT:

    In the concept of MPI chatting and file transmission the decryption part will bedone automatically. Here we use three types of keys; they are pubic, private and secret key. Keys

    are displayed to the destination only if they accept the reuest or else displaying of key is not

     possible in the destination side and also it won!t give or establish the "onnection. In largelyspread clusters, computing nodes are naturally deployed in a variety of computing sites. #he

    Information processed in a spread cluster is communal among a group of distributed processes or 

    client by high$uality of messages passing protocols %e.g. message passing interface $ MPI&running on the Internet. 'ecause of the open available nature of the Internet, data encryption for

    these large$scale distributed clusters becomes a non$trivial and challenging problem. (e

    improved the security of the MPI (Message Passing Interace! protocol by encrypting anddecrypting messages sent and received among computing nodes. (e are listening carefully onMPI rather than more protocols because MPI is one of the most accepted communication

     protocols for cluster computing environments. )rom among a multiple of MPI implementations,

    we selected MPI"H* developed by the +rgonne ational -aboratory. esign goal of MPI"H* $a commonly use MPI implementation $ is to /oin portability with high presentation. we gives a

    security enhanced MPI$library with the standard MPI interface, data communications of a

    conservative MPI program can be secured without converting the program into thecorresponding secure report. (e included encryption algorithms into the MPI"H* library so that

    data in secret of MPI applications could be readily preserved without reuire modifying the

    source codes of the MPI applications. "e used Sandia Micro Benchmar# and Intel MPI

    Benchmar#s to evaluate and compared the perormance o original MPIC$% and&nhanced Security MPIC$%' +ccording to the performance estimation, 01$MPI"H* provides

     protected Message Passing Interface by give up sensible system performance.

    &ISTI)* S+ST&M:

     The nontrivial and difcult complexity to oer secrecy service or large-

    scale spread clusters, because there is an open easy to get to nature o 

    the open networks. To identiy this question, we improved the security

    o the !" protocol by encrypting and decrypting messages sent and

    expected among compute nodes.  2ising number of product clusters are

    connected to other by public networks, it!s become a possible threat to safety sensitive

    similar application running on the cluster. #o address this safety problems we residential

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    2/46

    a Message Passing Interface %MPI& implement!s to protect privacy of messages

    communicate amongst nodes of clusters in an unprotect network.

    ,ISA,-A)TA*&S:

    1.  The programmers may rely on external libraries to implement secure

    applications2.  !"-interace-level solution enables programmers to write secure !"

    applications with minimum changes to the interace

    PR.P.S&, S+ST&M:

    #he 01$MPI"H* methods allow application programmers to simply write safe

    MPI applications without e3tra code for data$secrecy security. (e apply a standard MPI

    method called 01$MPI"H* to present data confidentiality for safe network 

    communications in message passing environment. 4ur planned security method

    incorporated in the MPI"H* library!s can be very helpful for pro/ect!s data transmitted in

    open network like Internet. "hannel$level e3planation in which encryption and

    decryption functions are built$in into the MPI"H* library.01$MPI"H* maintain a

    standard MPI interface to replace messages while preserve data!s confidentiality.

    A,-A)TA*&S5

    #he implemented 01$MPI"H* framework provides a secured design file that

    enables application programmers to selectively choose any cryptographic

    algorithm and symmetric$key in 01$MPI"H*. #his feature makes it possible for programmers to easily and fully control the

    security services incorporated in the MPI"HI* library. #o demonstrate this

    feature, we implemented the +01 and 601 algorithms in 01MPI"H*.

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    3/46

    S+ST&M R&/0IR&M&)T SP&CI1ICATI.)

    $AR,"AR& R&/0IR&M&)TS

    Processor 5 Pentium I7

    2+M 5 89* M'

    Hard isk 5 :

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    4/46

    "$AT IS 5A-A6

      =ava ha two things5 a programming language and a platform. =ava is a high$

    level programming language that is all of the following

    1imple +rchitecture$neutral4b/ect$oriented Portable

    istributed High$performanceInterpreted multithreaded

    2obust ynamic

    1ecure

    =ava is also unusual in that each =ava program is both compiled and

    interpreted. (ith a compile you translate a =ava program into an intermediate

    language called =ava bytecodes the platform$independent code instruction is

     passed and run on the computer.

    "ompilation happens /ust once; interpretation occurs each time the program is

    e3ecuted. #he figure illustrates how this works.

    Cou can think of =ava byte codes as the machine code instructions for the =ava

    7irtual Machine %=ava 7M&. 0very =ava interpreter, whether it!s a =ava

    development tool or a (eb browser that can run =ava applets, is an

    implementation of the =ava 7M. #he =ava 7M can also be implemented in

    hardware.

    =ava byte codes help make Dwrite once, run anywhereE possible. Cou can

    compile your =ava program into byte codes on my platform that has a =ava

     Java

    Program

    Compilers

    Interpreter

    My Program

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    5/46

    compiler. #he byte codes can then be run any implementation of the =ava 7M. )or 

    e3ample, the same =ava program can run (indows #, 1olaris, and Macintosh.

    5A-A P7AT1.RM

      + platform is the hardware of software environment inwhich a program runs. #he =ava platform differs from most other 

     platforms in that it!s a software only platform that runs on the top of 

    other, hardware$based platform. Most other platforms are described as

    a combination of hardware and operating system.

    #he =ava platform has two components5

      #he =ava 7irtual Machine %=ava 7M&

      #he =ava +pplication Programming Interface %=ava +PI&

      Cou!ve already been introduced to the =ava 7M. It!s the base for the

    =ava platform and is ported onto various hardware$based platforms.

    #he =ava +PI is a large collection of ready$made software

    components that provide many useful capabilities, such as graphical user interface

    %

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    6/46

    they are runtime e3tensions of the application. Instead of working in browsers,

    though, servlets run with in =ava (eb 1ervers, configuring of tailoring the server.How does the =ava +PI support all of these kinds of programsG (ith

     packages of software components that provide a wide range of functionality. #he

    +PI is the +PI included in every full implementation of the platform.

    #he core +PI gives you the following features5

    #he 0ssentials5 4b/ects, 1trings, threads, numbers, input and output, datastructures,

    system properties, date and time, and so on.

    )&T".R4I)*5 F2-!s #"P and FP sockets and IP addresses.

     I)T&R)ATI.)A7I8ATI.): Help for writing programs that can be localied for 

    users.

      (orldwide programs can automatically adapt to specific locates and

     be displayed in the appropriate language.

    =+7+ P24

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    7/46

    =ust$in$time$byte$code compilers can bring =ava!s performance close to the native

    code without threatening portability.

    "$AT CA) 5A-A ,.6

      However, =ava is not /ust for writing cut, entertaining

    applets for the (orld (ide (eb %(((&. =ava is a general purpose, high$level

     programming language and a powerful  software  platform. Fsing the fineries

    =ava +PI,you can write many types of programs.

    #he most common types of program are probably applets and

    application, where a =ava application is a standalone program that runs directly on

    the =ava platform.

    S&C0RIT+:'oth low$level and high$level, including electronic signatures,

     publicBprivate key management, accesses control, and certificate.

    M.,07&S:

    • Key +greement

    • +01

    • 6 01

    • 0""

    • "hatting

    • )ile 1haring

    M.,07&S ,&SCRIPTI.):

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    8/46

    4ey Agreement:

      In this Pro/ect for Key +greement we are using iffieHellman key e3change

    algorithm that establishes a shared secret that can be used for secret communications bye3changing data over a public network. #he following diagram illustrates the general idea of the

    key e3change by using colors instead of a very large number. #he key part of the process is that+lice and 'ob e3change their secret colors in a mi3 only. )inally this generates an identical keythat is mathematically difficult %impossible for modern supercomputers to do in a reasonable

    amount of time& to reverse for another party that might have been listening in on them. +lice and

    'ob now use this common secret to encrypt and decrypt their sent and received data. ote thatthe yellow paint is already agreed by +lice and 'ob5

    A&S:

      +01 is based on a design principle known as a substitution$permutation network, andis fast in both software and hardware. Fnlike its predecessor 01, +01 does not use a )eistelnetwork. +01 is a variant of 2i/ndael which has a fi3ed block sie of 9*: bits, and a key sie of

    9*:, 9J*, or *8 bits. 'y contrast, the 2i/ndael specification per se is specified with block and

    key sies that may be any multiple of 6* bits, both with a minimum of 9*: and a ma3imum of*8 bits.

    +01 operates on a LL column$ma/or order  matri3 of bytes, termed the state, although some

    versions of 2i/ndael have a larger block sie and have additional columns in the state. Most +01

    calculations are done in a special finite field.

    #he key sie used for an +01 cipher specifies the number of repetitions of transformation roundsthat convert the input, called the plainte3t, into the final output, called the cipher te3t. #he

    numbers of cycles of repetition are as follows5

    • 9 cycles of repetition for 9*: bit keys.

    • 9* cycles of repetition for 9J* bit keys.

    • 9L cycles of repetition for *8 bit keys.

    0ach round consists of several processing steps, including one that depends on the encryption

    key itself. + set of reverse rounds are applied to transform cipher te3t back into the original

     plainte3t using the same encryption key.

    3 ,&S:

      #he original 01 cipherAs key sie of 8 bits was generally sufficient when that

    algorithm was designed, but the availability of increasing computational power made brute$force

    http://en.wikipedia.org/wiki/Key_sizehttp://en.wikipedia.org/wiki/Column-major_orderhttp://en.wikipedia.org/wiki/Finite_field_arithmetichttp://en.wikipedia.org/wiki/Column-major_orderhttp://en.wikipedia.org/wiki/Finite_field_arithmetichttp://en.wikipedia.org/wiki/Key_size

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    9/46

    attacks feasible. #riple 01 provides a relatively simple method of increasing the key sie of

    01 to protect against such attacks, without the need to design a completely new block cipher

    algorithm. 

    #riple 01 uses a Nkey bundleN which comprises three 01 keys, K 9, K * and K 6, each of

    8 bits %e3cluding parity bits&. #he encryption algorithm is5

    "ipher te3t O 0K6%K*%0K9%plainte3t&&&

    I.e., 01 encrypts with K 9, 01 decrypt  with K *, then 01 encrypt with K 6.

    ecryption is the reverse5

    Plainte3t O K9%0K*%K6%cipher te3t&&&

    I.e., decrypt with K 6, encrypt  with K *, and then decrypt with K 9.

    &CC:

      0lliptic curve cryptography %0""& is an approach to public$key cryptography based

    on the algebraic structure of elliptic curves over finite fields. Popular asymmetric cryptosystemslike 21+ are known to be very costly concerning calculation time and memory needs for larger

    key sies. #o solve this problem, elliptic curve cryptosystems based can be used. +n elliptic

    curve cryptosystem is an asymmetric cryptosystem relying on the hardness of the discretelogarithm problem in elliptic curve groups. (ith 0"I01 encryption, it is possible to encrypt data

    with a 9$bit key as secure as with 21+ using a 9*L$bit key. 1o 0"I01 encryption is the better 

    choice compared to 21+ when calculation time and available memory are restricted, e.g. whenusing cryptosystems on smartcards. #he 0lliptic "urve Integrated 0ncryption 1cheme %0"I01&,also known as 0lliptic "urve +ugmented 0ncryption 1cheme or simply the 0lliptic "urve

    0ncryption 1cheme.

    Chatting:

      In "hatting, after )inished the key agreement the sender will send the message

    and receiver will receive the msg using the socket connection. (hile sending 1ender must haveto choose +ny one of the three algorithm for encrypt the whole msg. #he sender can send

    message using IP +ddress only.

    1ile Sharing:

      In )ile 1haring, +fter )inished the key agreement the sender will send the file and

    receiver will receive the file without any loss of information using the socket connection. whilesending 1ender must have to choose +ny one of the three algorithm for encrypt the whole data.

    #he sender can send file using IP +ddress only.

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    10/46

    M.,07&S "IS& ,IA*RAMS:

    4ey Agreement

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    11/46

    http://en.wikipedia.org/wiki/File:Diffie-Hellman_Key_Exchange.svg

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    12/46

    A&S

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    13/46

     

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    14/46

    3 ,&S

     

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    15/46

    C$ATTI)*:

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    16/46

    1I7& S$ARI)* 

    9' 0M7 ,IA*RAMS:

    i. F10 "+10 I+

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    17/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    18/46

    10>F0"0 I+

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    19/46

    $I&RARC$ICA7 ,IA*RAM:

    #ey $greement%hoose&eceiver &eceiver &eceiver&eceiver &egistration

    'ender

    %hatting (ile 'haring'end

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    20/46

    S+ST&M ARC$IT&CT0R&:

    Sender )etor# Receiver

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    21/46

    ,ATA 17." ,IA*RAM:

    1ender 

    &R ,IA*RAM:

     . 'end to

    destination

    $lgorithm

    %hosen

    $uto

    encry

    pt

    %hoose )le ormessage

    $uto

    decrypt

    #ey

    assi

    *riginal

    message or )le

    +e can save

    &egistration  %hatting

      (ile 'haring

    #ey

    'end

    'end (ile

     

    %hoose

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    22/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    23/46

    TAB7& ,&SI*):

    algorithm

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    24/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    25/46

    0serdetiles

    4ey agreement

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    26/46

    Registration

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    27/46

    C.)C70SI.):

    #o address the issue of providing confidentiality services for large$scale clusters

    connected by an open unsecured network, we aim at improving the security of the message

     passing interface protocol by encrypting and decrypting messages communicated among

    computing nodes. In this study, we implemented the 01$MPI"H* framework, which is based onMPI"H*. 01$MPI"H* is a secure, compatible and portable implementation of the message

     passing interface standard. "ompared with the original version of MPI"H*, 01$MPI"H*

     preserves message confidentiality in MPI applications by integrating encryption techniues like+01 and 601 into the MPI"H* library. In light of 01$MPI"H*, programmers can easily write

    secure MPI applications without an additional source code for data$confidentiality protection inopen public networks. #he security feature of 01$MPI"H* is entirely transparent to MPI programmers because encryption and decryption functions are implemented at the channel$level

    in the MPI"H* library. MPI$application programmers can fully configure any confidentiality

    services in MPI"HI*, because a secured configuration file in 01$MPI"H* offers the programmers fle3ibility in choosing any cryptographic schemes and keys seamlessly

    incorporated in 01$MPI"H*. 'esides the implementation of +01 and 601 in 01MPI"H*,

    other cryptographic algorithms can be readily integrated in the 01$MPI"H* framework. (e used

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    28/46

    the 1andia Micro 'enchmarks and the Intel MPI benchmarks to evaluate and analye the

     performance of MPI"H*. "onfidentiality services in 01$MPI"H* do introduce additional

    overhead because of security operations. In the case of small messages, the overhead incurred bythe security services is marginal. #he security overhead caused by +01 and 601 becomes more

     pronounced in 01$MPI"H* with larger messages %e.g., the message sie is larger than *8 K'&.

    4ur e3perimental results show that the security overhead in 01$MPI"H* can be significantlyreduced by high$performance clusters. )or e3ample, the overhead added by +01 in 01$MPI"H*

    is reduced by more than half when the $node cluster of Intel "eleron is used instead of the 9$

    node cluster of Intel Pentium II. In addition to high$end clusters, the following two solutions can be applied to further reduced overhead caused by confidentiality services in 01$MPI"H*. )irst,

    +01B601 hardware implementations can lower security overhead in 01$MPI"H*. 1econd,

    security coprocessors can hide the overhead by allowing the encryption and decryption processes

    to be e3ecuted in parallel with the message passing processes. (e are currently investigatingvaries means of reducing security overhead in 01$MPI"H*. )or e3ample, we plan to study if 

    multicourse processors can substantially lower the overhead of confidentiality services in 01$

    MPI"H*. +nother interesting direction for future work is to consider several strong and efficient

    cryptographic algorithms like the 0lliptic "urve "ryptography in 01$MPI"H*. 1ince 0"" is anefficient and fast cryptographic solution, both the performance and the security of 01$MPI"H*

    are likely to be improved by incorporating 0"". + third promising direction for further work isto integrate encryption and decryption algorithms in other communication channels like

    1HM0M and Infini'and in MPI"H* because an increasing number of commodity clusters are

     built using standalone and advanced networks such as Infiniband and Marine. #he currentversion of 01$MPI"H* is focused on securing the transmission control protocol %#"P&

    connections on the internet, because we addressed the data confidentiality issues on

    geographically distributed cluster computing systems. In addition to the MPI library, other 

     parallel programming libraries will be investigated. "andidate libraries include the sharedmemory access library and the remote direct memory access library. (e plan to provide

    confidentiality services in the 1HM0M and 2M+ libraries. -ast but not least, we will

    uantitatively evaluate the performance of integrity checking services that are incorporated intothe 01$MPI"H* framework. #he goal of developing the integrity checking services is to reduce

    overhead of the services in 01$MPI"H*

    .SAMP7& C.,I)*

    A,MI) 7.*I):

    import ava.awt.order/ayout0

    import ava.awt.1vent2ueue0

    import avax.swing.3(rame0

    import avax.swing.3!anel0

    import avax.swing.border.1mptyorder0

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    29/46

    import avax.swing.3/abel0

    import avax.swing.3*ption!ane0

    import avax.swing.3Text(ield0

    import avax.swing.3utton0

    import ava.awt.%olor0

    import ava.awt.event.$ction1vent0

    import ava.awt.event.$ction/istener0

    import ava.rmi.40

    import ava.net.40

    public class $dmin/ogin extends 3(rame 5

    public $dmin/ogin67 5

    8

    private 3!anel content!ane0

    private 3Text(ield text(ield0

    private 3Text(ield text(ield9:0

    ;44

     4 /aunch the application.

     4;

    public static void main6'tring new $dmin/ogin670

    rame.$dmin/ogin670

    try

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    30/46

      5

      %heck"mp chk>new %heck"mp670

      'ystem.out.println6?inding server.....?70

      'tring ob>?%heck@ser?0

      Aaming.rebind6ob,chk70

      'ystem.out.println6?'erver is waiting.....?70

      chk.db670

      8

      catch61xception ex7

      5

      ex.print'tackTrace670

      8

    8

    ;44

     4 %reate the rame.

     4;

    public void $dmin/ogin67 5

    setBisible6true70

    setTitle6?$dmin/ogin?70

      set&esiCable6alse70

    seteault%lose*peration63(rame.1D"T9*A9%/*'170

    setounds6:EE, :EE, FGE, HEE70

    content!ane > new 3!anel670

    content!ane.setackground6%olor.+I"T170

    content!ane.setorder6new 1mptyorder6G, G, G, G770

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    31/46

    set%ontent!ane6content!ane70

    content!ane.set/ayout6null70

     3/abel lblAew/abel > new 3/abel6?Aew label?70

    lblAew/abel.set"con6new

     avax.swing."mage"con6get%lass67.get&esource6?;images;admin.pg?7770

    lblAew/abel.setounds6FH, GJ, :HJ, :FK70

    content!ane.add6lblAew/abel70

     3!anel panel > new 3!anel670

    panel.setackground6%olor.!"A#70

    panel.setounds6LLH, FK, :KF, :JJ70

    content!ane.add6panel70

    panel.set/ayout6null70

     3/abel lbl@serAame > new 3/abel6?@'1& A$1?70

    [email protected](oreground6%olor./@170

    [email protected]:E, HL, ME, :F70

    panel.add6lbl@serAame70

    text(ield > new 3Text(ield670

    text(ield.setounds6MH, LK, :E:, LE70

    panel.add6text(ield70

    text(ield.set%olumns6:E70

     3/abel lbl!assword > new 3/abel6?!$''+*&?70

    lbl!assword.set(oreground6%olor./@170

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    32/46

    lbl!assword.setounds6:E, JM, ME, :F70

    panel.add6lbl!assword70

    text(ield9: > new 3Text(ield670

    text(ield9:.setounds6MH, JG, :E:, LE70

    panel.add6text(ield9:70

    text(ield9:.set%olumns6:E70

      3utton btn'ubmit > new 3utton6?'@"T?70

      btn'ubmit.add$ction/istener6new 'ubmit/istener6770

    btn'ubmit.setackground6%olor.!"A#70

    btn'ubmit.set(oreground6%olor.$N1AT$70

    btn'ubmit.setounds6:E, :LO, ME, LH70

    panel.add6btn'ubmit70

     3utton btn1xit > new 3utton6?1D"T?70

    btn1xit.add$ction/istener6new 1xit/istener6770

    btn1xit.setackground6%olor.!"A#70

    btn1xit.set(oreground6%olor.$N1AT$70

    btn1xit.setounds6:EK, :LO, ME, LH70

    panel.add6btn1xit70

    8

    public class 'ubmit/istener implements $ction/istener

      5

      public void action!erormed6$ction1vent e7

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    33/46

      5

      try5

      'tring us>text(ield.getText670

      'tring pass>text(ield9:.getText670

     

    i6us.equals"gnore%ase6?admin?7PPpass.equals"gnore%ase6?admin?77

      5

      setBisible6alse70

      *ptions o>new *ptions670

      o.*ptions670

      8

      else5

      3*ption!ane.showessageialog6null, ?$%%1'' 1A"$/?,

    ?1&&*&?, 3*ption!ane.1&&*&91''$N170

      8

      8

      catch61xception e:75

      e:.print'tackTrace670

     

    8

     

    8

      8

    public class 1xit/istener implements $ction/istener

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    34/46

      5

      public void action!erormed6$ction1vent e7

      5

      'ystem.exit6:70

      8

     

    8

    8

    C7I&)T 7.*I)

    import avax.swing.3(rame0

    import avax.swing.3!anel0

    import avax.swing.border.1mptyorder0

    import avax.swing.3/abel0

    import avax.swing.3*ption!ane0

    import avax.swing.3Text(ield0

    import avax.swing.3!assword(ield0

    import avax.swing.3utton0

    import ava.rmi.40

    import ava.rmi.server.40

    import ava.awt.%olor0

    import ava.awt.event.$ction1vent0

    import ava.awt.event.$ction/istener0

    import ava.net."net$ddress0

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    35/46

    public class /ogin(orm extends 3(rame implements serB1&9:

    5

    public /ogin(orm67 5

    8

    private 3!anel content!ane0

    private 3Text(ield text(ield0

    private 3!assword(ield password(ield0

    'tring url0int serial,port0

      int siCe>:ELF0

    ;44

     4 /aunch the application.

     4;

    public static void main6'tring new /ogin(orm670

    rame./ogin(orm670

    8

    ;44

     4 %reate the rame.

     4;

     public void /ogin(orm67 5

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    36/46

     

    setBisible6true70

    seteault%lose*peration63(rame.1D"T9*A9%/*'170

    setTitle6?/ogin(orm?70

      set&esiCable6alse70

    setounds6:EE, :EE, FGJ, HJK70

    content!ane > new 3!anel670

    content!ane.setackground6%olor.+I"T170

    content!ane.setorder6new 1mptyorder6G, G, G, G770

    set%ontent!ane6content!ane70

    content!ane.set/ayout6null70

     3/abel lblAew/abel > new 3/abel6?Aew label?70

    lblAew/abel.set"con6new

     avax.swing."mage"con6get%lass67.get&esource6?;images;login.pg?7770

    lblAew/abel.setounds6GL, ::, HHH, :HG70

    content!ane.add6lblAew/abel70

     3!anel panel > new 3!anel670

    panel.setorder6avax.swing.order(actory.createTitledorder6avax.swing.order(a

    ctory.createatteorder6L, L, L, L, new ava.awt.%olor6LGG, LEF, LEF77, ?'"NA "A?,

     avax.swing.border.Titledorder.%1AT1&,

     avax.swing.border.Titledorder.1($@/T9!*'"T"*A770

    panel.setounds6GL, :GJ, HFL, :GM70

    content!ane.add6panel70

    panel.set/ayout6null70

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    37/46

     3/abel lblAew/abel9: > new 3/abel6?@'1& A$1?70

    lblAew/abel9:.set(oreground6%olor./@170

    lblAew/abel9:.setounds6GO, LF, JF, LE70

    panel.add6lblAew/abel9:70

    text(ield > new 3Text(ield670

    text(ield.setounds6:OJ, LF, ::M, LE70

    panel.add6text(ield70

    text(ield.set%olumns6:E70

     3/abel lblAew/abel9L > new 3/abel6?!$''+*&?70

    lblAew/abel9L.set(oreground6%olor./@170

    lblAew/abel9L.setounds6GF, OJ, JO, LE70

    panel.add6lblAew/abel9L70

    password(ield > new 3!assword(ield670

    password(ield.setounds6:OJ, OJ, ::M, LE70

    panel.add6password(ield70

     3utton btn'ubmit > new 3utton6?'@"T?70

    btn'ubmit.add$ction/istener6new 'ubmit/istener6770

    btn'ubmit.setackground6%olor.!"A#70

    btn'ubmit.set(oreground6%olor.$N1AT$70

    btn'ubmit.setounds6GO, :LF, MK, LH70

    panel.add6btn'ubmit70

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    38/46

     3utton btn%ancel > new 3utton6?%$A%1/?70

    btn%ancel.add$ction/istener6new %ancel/istener6770

    btn%ancel.setackground6%olor.!"A#70

    btn%ancel.set(oreground6%olor.$N1AT$70

    btn%ancel.setounds6:MK, :LF, MK, LH70

    panel.add6btn%ancel70

    8

     

    public class 'ubmit/istener implements $ction/istener

     5

      public void action!erormed6$ction1vent e7

      5

      try

      5

      'tring u>text(ield.getText670

      'tring p>password(ield.getText670

      'tring ip>"net$ddress.get/ocalIost67.getIost$ddress670

      'tring url>new 'tring6?;;?QserverQ?;%heck@ser?70

      %heck chk:>6%heck7Aaming.lookup6?;;?QserverQ?;%heck@ser?70

      i6chk:R>null7

      5

      'ystem.out.println6?&equesting the remote obect?70

      serial>chk:.serial6u,p70

      'ystem.out.println6serial70

      port>chk:.port6u70

      'tring msg>chk:.send6u,p,ip70

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    39/46

      'ystem.out.println6msg70

      i6msg.compareTo"gnore%ase6?ok?7>>E 7

      5

      3*ption!ane.showessageialog6null, ?'uccessul/ogin?, ?"A(*&$T"*A?, 3*ption!ane."A(*&$T"*A91''$N170

     

    setBisible6alse70

      essage(ile m>new essage(ile670

      m.essage(ile6u70

      8

      else i6msg.compareTo"gnore%ase6?ok?7R>E 7

      5

      3*ption!ane.showessageialog6null, ?"nvalid 1ntry?,

    ?1&&*&?, 3*ption!ane.1&&*&91''$N170

      text(ield.setText6??70

      password(ield.setText6??70

      text(ield.request(ocus670

      8

      8

      else

      'ystem.out.println6?&equested remote obect is null?70

      8

      catch61xception ex:7

      5

      ex:.print'tackTrace670

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    40/46

      8

     

    8

     8

     

    public class %ancel/istener implements $ction/istener

     5

      public void action!erormed6$ction1vent e7

      5

      setBisible6alse70

      %lientain(orm c > new %lientain(orm670

      c.initcomponents670

     

    8

     8

    8

    SAMP7& SCR&&) S$.TS:

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    41/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    42/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    43/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    44/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    45/46

  • 8/19/2019 Privacy preserving on mobile health data in cloud

    46/46