privacy preserving on mobile health data in cloud
TRANSCRIPT
-
8/19/2019 Privacy preserving on mobile health data in cloud
1/46
Privacy preserving on mobile health data in cloud
ABSTRACT:
In the concept of MPI chatting and file transmission the decryption part will bedone automatically. Here we use three types of keys; they are pubic, private and secret key. Keys
are displayed to the destination only if they accept the reuest or else displaying of key is not
possible in the destination side and also it won!t give or establish the "onnection. In largelyspread clusters, computing nodes are naturally deployed in a variety of computing sites. #he
Information processed in a spread cluster is communal among a group of distributed processes or
client by high$uality of messages passing protocols %e.g. message passing interface $ MPI&running on the Internet. 'ecause of the open available nature of the Internet, data encryption for
these large$scale distributed clusters becomes a non$trivial and challenging problem. (e
improved the security of the MPI (Message Passing Interace! protocol by encrypting anddecrypting messages sent and received among computing nodes. (e are listening carefully onMPI rather than more protocols because MPI is one of the most accepted communication
protocols for cluster computing environments. )rom among a multiple of MPI implementations,
we selected MPI"H* developed by the +rgonne ational -aboratory. esign goal of MPI"H* $a commonly use MPI implementation $ is to /oin portability with high presentation. we gives a
security enhanced MPI$library with the standard MPI interface, data communications of a
conservative MPI program can be secured without converting the program into thecorresponding secure report. (e included encryption algorithms into the MPI"H* library so that
data in secret of MPI applications could be readily preserved without reuire modifying the
source codes of the MPI applications. "e used Sandia Micro Benchmar# and Intel MPI
Benchmar#s to evaluate and compared the perormance o original MPIC$% and&nhanced Security MPIC$%' +ccording to the performance estimation, 01$MPI"H* provides
protected Message Passing Interface by give up sensible system performance.
&ISTI)* S+ST&M:
The nontrivial and difcult complexity to oer secrecy service or large-
scale spread clusters, because there is an open easy to get to nature o
the open networks. To identiy this question, we improved the security
o the !" protocol by encrypting and decrypting messages sent and
expected among compute nodes. 2ising number of product clusters are
connected to other by public networks, it!s become a possible threat to safety sensitive
similar application running on the cluster. #o address this safety problems we residential
-
8/19/2019 Privacy preserving on mobile health data in cloud
2/46
a Message Passing Interface %MPI& implement!s to protect privacy of messages
communicate amongst nodes of clusters in an unprotect network.
,ISA,-A)TA*&S:
1. The programmers may rely on external libraries to implement secure
applications2. !"-interace-level solution enables programmers to write secure !"
applications with minimum changes to the interace
PR.P.S&, S+ST&M:
#he 01$MPI"H* methods allow application programmers to simply write safe
MPI applications without e3tra code for data$secrecy security. (e apply a standard MPI
method called 01$MPI"H* to present data confidentiality for safe network
communications in message passing environment. 4ur planned security method
incorporated in the MPI"H* library!s can be very helpful for pro/ect!s data transmitted in
open network like Internet. "hannel$level e3planation in which encryption and
decryption functions are built$in into the MPI"H* library.01$MPI"H* maintain a
standard MPI interface to replace messages while preserve data!s confidentiality.
A,-A)TA*&S5
#he implemented 01$MPI"H* framework provides a secured design file that
enables application programmers to selectively choose any cryptographic
algorithm and symmetric$key in 01$MPI"H*. #his feature makes it possible for programmers to easily and fully control the
security services incorporated in the MPI"HI* library. #o demonstrate this
feature, we implemented the +01 and 601 algorithms in 01MPI"H*.
-
8/19/2019 Privacy preserving on mobile health data in cloud
3/46
S+ST&M R&/0IR&M&)T SP&CI1ICATI.)
$AR,"AR& R&/0IR&M&)TS
Processor 5 Pentium I7
2+M 5 89* M'
Hard isk 5 :
-
8/19/2019 Privacy preserving on mobile health data in cloud
4/46
"$AT IS 5A-A6
=ava ha two things5 a programming language and a platform. =ava is a high$
level programming language that is all of the following
1imple +rchitecture$neutral4b/ect$oriented Portable
istributed High$performanceInterpreted multithreaded
2obust ynamic
1ecure
=ava is also unusual in that each =ava program is both compiled and
interpreted. (ith a compile you translate a =ava program into an intermediate
language called =ava bytecodes the platform$independent code instruction is
passed and run on the computer.
"ompilation happens /ust once; interpretation occurs each time the program is
e3ecuted. #he figure illustrates how this works.
Cou can think of =ava byte codes as the machine code instructions for the =ava
7irtual Machine %=ava 7M&. 0very =ava interpreter, whether it!s a =ava
development tool or a (eb browser that can run =ava applets, is an
implementation of the =ava 7M. #he =ava 7M can also be implemented in
hardware.
=ava byte codes help make Dwrite once, run anywhereE possible. Cou can
compile your =ava program into byte codes on my platform that has a =ava
Java
Program
Compilers
Interpreter
My Program
-
8/19/2019 Privacy preserving on mobile health data in cloud
5/46
compiler. #he byte codes can then be run any implementation of the =ava 7M. )or
e3ample, the same =ava program can run (indows #, 1olaris, and Macintosh.
5A-A P7AT1.RM
+ platform is the hardware of software environment inwhich a program runs. #he =ava platform differs from most other
platforms in that it!s a software only platform that runs on the top of
other, hardware$based platform. Most other platforms are described as
a combination of hardware and operating system.
#he =ava platform has two components5
#he =ava 7irtual Machine %=ava 7M&
#he =ava +pplication Programming Interface %=ava +PI&
Cou!ve already been introduced to the =ava 7M. It!s the base for the
=ava platform and is ported onto various hardware$based platforms.
#he =ava +PI is a large collection of ready$made software
components that provide many useful capabilities, such as graphical user interface
%
-
8/19/2019 Privacy preserving on mobile health data in cloud
6/46
they are runtime e3tensions of the application. Instead of working in browsers,
though, servlets run with in =ava (eb 1ervers, configuring of tailoring the server.How does the =ava +PI support all of these kinds of programsG (ith
packages of software components that provide a wide range of functionality. #he
+PI is the +PI included in every full implementation of the platform.
#he core +PI gives you the following features5
#he 0ssentials5 4b/ects, 1trings, threads, numbers, input and output, datastructures,
system properties, date and time, and so on.
)&T".R4I)*5 F2-!s #"P and FP sockets and IP addresses.
I)T&R)ATI.)A7I8ATI.): Help for writing programs that can be localied for
users.
(orldwide programs can automatically adapt to specific locates and
be displayed in the appropriate language.
=+7+ P24
-
8/19/2019 Privacy preserving on mobile health data in cloud
7/46
=ust$in$time$byte$code compilers can bring =ava!s performance close to the native
code without threatening portability.
"$AT CA) 5A-A ,.6
However, =ava is not /ust for writing cut, entertaining
applets for the (orld (ide (eb %(((&. =ava is a general purpose, high$level
programming language and a powerful software platform. Fsing the fineries
=ava +PI,you can write many types of programs.
#he most common types of program are probably applets and
application, where a =ava application is a standalone program that runs directly on
the =ava platform.
S&C0RIT+:'oth low$level and high$level, including electronic signatures,
publicBprivate key management, accesses control, and certificate.
M.,07&S:
• Key +greement
• +01
• 6 01
• 0""
• "hatting
• )ile 1haring
M.,07&S ,&SCRIPTI.):
-
8/19/2019 Privacy preserving on mobile health data in cloud
8/46
4ey Agreement:
In this Pro/ect for Key +greement we are using iffieHellman key e3change
algorithm that establishes a shared secret that can be used for secret communications bye3changing data over a public network. #he following diagram illustrates the general idea of the
key e3change by using colors instead of a very large number. #he key part of the process is that+lice and 'ob e3change their secret colors in a mi3 only. )inally this generates an identical keythat is mathematically difficult %impossible for modern supercomputers to do in a reasonable
amount of time& to reverse for another party that might have been listening in on them. +lice and
'ob now use this common secret to encrypt and decrypt their sent and received data. ote thatthe yellow paint is already agreed by +lice and 'ob5
A&S:
+01 is based on a design principle known as a substitution$permutation network, andis fast in both software and hardware. Fnlike its predecessor 01, +01 does not use a )eistelnetwork. +01 is a variant of 2i/ndael which has a fi3ed block sie of 9*: bits, and a key sie of
9*:, 9J*, or *8 bits. 'y contrast, the 2i/ndael specification per se is specified with block and
key sies that may be any multiple of 6* bits, both with a minimum of 9*: and a ma3imum of*8 bits.
+01 operates on a LL column$ma/or order matri3 of bytes, termed the state, although some
versions of 2i/ndael have a larger block sie and have additional columns in the state. Most +01
calculations are done in a special finite field.
#he key sie used for an +01 cipher specifies the number of repetitions of transformation roundsthat convert the input, called the plainte3t, into the final output, called the cipher te3t. #he
numbers of cycles of repetition are as follows5
• 9 cycles of repetition for 9*: bit keys.
• 9* cycles of repetition for 9J* bit keys.
• 9L cycles of repetition for *8 bit keys.
0ach round consists of several processing steps, including one that depends on the encryption
key itself. + set of reverse rounds are applied to transform cipher te3t back into the original
plainte3t using the same encryption key.
3 ,&S:
#he original 01 cipherAs key sie of 8 bits was generally sufficient when that
algorithm was designed, but the availability of increasing computational power made brute$force
http://en.wikipedia.org/wiki/Key_sizehttp://en.wikipedia.org/wiki/Column-major_orderhttp://en.wikipedia.org/wiki/Finite_field_arithmetichttp://en.wikipedia.org/wiki/Column-major_orderhttp://en.wikipedia.org/wiki/Finite_field_arithmetichttp://en.wikipedia.org/wiki/Key_size
-
8/19/2019 Privacy preserving on mobile health data in cloud
9/46
attacks feasible. #riple 01 provides a relatively simple method of increasing the key sie of
01 to protect against such attacks, without the need to design a completely new block cipher
algorithm.
#riple 01 uses a Nkey bundleN which comprises three 01 keys, K 9, K * and K 6, each of
8 bits %e3cluding parity bits&. #he encryption algorithm is5
"ipher te3t O 0K6%K*%0K9%plainte3t&&&
I.e., 01 encrypts with K 9, 01 decrypt with K *, then 01 encrypt with K 6.
ecryption is the reverse5
Plainte3t O K9%0K*%K6%cipher te3t&&&
I.e., decrypt with K 6, encrypt with K *, and then decrypt with K 9.
&CC:
0lliptic curve cryptography %0""& is an approach to public$key cryptography based
on the algebraic structure of elliptic curves over finite fields. Popular asymmetric cryptosystemslike 21+ are known to be very costly concerning calculation time and memory needs for larger
key sies. #o solve this problem, elliptic curve cryptosystems based can be used. +n elliptic
curve cryptosystem is an asymmetric cryptosystem relying on the hardness of the discretelogarithm problem in elliptic curve groups. (ith 0"I01 encryption, it is possible to encrypt data
with a 9$bit key as secure as with 21+ using a 9*L$bit key. 1o 0"I01 encryption is the better
choice compared to 21+ when calculation time and available memory are restricted, e.g. whenusing cryptosystems on smartcards. #he 0lliptic "urve Integrated 0ncryption 1cheme %0"I01&,also known as 0lliptic "urve +ugmented 0ncryption 1cheme or simply the 0lliptic "urve
0ncryption 1cheme.
Chatting:
In "hatting, after )inished the key agreement the sender will send the message
and receiver will receive the msg using the socket connection. (hile sending 1ender must haveto choose +ny one of the three algorithm for encrypt the whole msg. #he sender can send
message using IP +ddress only.
1ile Sharing:
In )ile 1haring, +fter )inished the key agreement the sender will send the file and
receiver will receive the file without any loss of information using the socket connection. whilesending 1ender must have to choose +ny one of the three algorithm for encrypt the whole data.
#he sender can send file using IP +ddress only.
-
8/19/2019 Privacy preserving on mobile health data in cloud
10/46
M.,07&S "IS& ,IA*RAMS:
4ey Agreement
-
8/19/2019 Privacy preserving on mobile health data in cloud
11/46
http://en.wikipedia.org/wiki/File:Diffie-Hellman_Key_Exchange.svg
-
8/19/2019 Privacy preserving on mobile health data in cloud
12/46
A&S
-
8/19/2019 Privacy preserving on mobile health data in cloud
13/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
14/46
3 ,&S
-
8/19/2019 Privacy preserving on mobile health data in cloud
15/46
C$ATTI)*:
-
8/19/2019 Privacy preserving on mobile health data in cloud
16/46
1I7& S$ARI)*
9' 0M7 ,IA*RAMS:
i. F10 "+10 I+
-
8/19/2019 Privacy preserving on mobile health data in cloud
17/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
18/46
10>F0"0 I+
-
8/19/2019 Privacy preserving on mobile health data in cloud
19/46
$I&RARC$ICA7 ,IA*RAM:
#ey $greement%hoose&eceiver &eceiver &eceiver&eceiver &egistration
'ender
%hatting (ile 'haring'end
-
8/19/2019 Privacy preserving on mobile health data in cloud
20/46
S+ST&M ARC$IT&CT0R&:
Sender )etor# Receiver
-
8/19/2019 Privacy preserving on mobile health data in cloud
21/46
,ATA 17." ,IA*RAM:
1ender
&R ,IA*RAM:
. 'end to
destination
$lgorithm
%hosen
$uto
encry
pt
%hoose )le ormessage
$uto
decrypt
#ey
assi
*riginal
message or )le
+e can save
&egistration %hatting
(ile 'haring
#ey
'end
'end (ile
%hoose
-
8/19/2019 Privacy preserving on mobile health data in cloud
22/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
23/46
TAB7& ,&SI*):
algorithm
-
8/19/2019 Privacy preserving on mobile health data in cloud
24/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
25/46
0serdetiles
4ey agreement
-
8/19/2019 Privacy preserving on mobile health data in cloud
26/46
Registration
-
8/19/2019 Privacy preserving on mobile health data in cloud
27/46
C.)C70SI.):
#o address the issue of providing confidentiality services for large$scale clusters
connected by an open unsecured network, we aim at improving the security of the message
passing interface protocol by encrypting and decrypting messages communicated among
computing nodes. In this study, we implemented the 01$MPI"H* framework, which is based onMPI"H*. 01$MPI"H* is a secure, compatible and portable implementation of the message
passing interface standard. "ompared with the original version of MPI"H*, 01$MPI"H*
preserves message confidentiality in MPI applications by integrating encryption techniues like+01 and 601 into the MPI"H* library. In light of 01$MPI"H*, programmers can easily write
secure MPI applications without an additional source code for data$confidentiality protection inopen public networks. #he security feature of 01$MPI"H* is entirely transparent to MPI programmers because encryption and decryption functions are implemented at the channel$level
in the MPI"H* library. MPI$application programmers can fully configure any confidentiality
services in MPI"HI*, because a secured configuration file in 01$MPI"H* offers the programmers fle3ibility in choosing any cryptographic schemes and keys seamlessly
incorporated in 01$MPI"H*. 'esides the implementation of +01 and 601 in 01MPI"H*,
other cryptographic algorithms can be readily integrated in the 01$MPI"H* framework. (e used
-
8/19/2019 Privacy preserving on mobile health data in cloud
28/46
the 1andia Micro 'enchmarks and the Intel MPI benchmarks to evaluate and analye the
performance of MPI"H*. "onfidentiality services in 01$MPI"H* do introduce additional
overhead because of security operations. In the case of small messages, the overhead incurred bythe security services is marginal. #he security overhead caused by +01 and 601 becomes more
pronounced in 01$MPI"H* with larger messages %e.g., the message sie is larger than *8 K'&.
4ur e3perimental results show that the security overhead in 01$MPI"H* can be significantlyreduced by high$performance clusters. )or e3ample, the overhead added by +01 in 01$MPI"H*
is reduced by more than half when the $node cluster of Intel "eleron is used instead of the 9$
node cluster of Intel Pentium II. In addition to high$end clusters, the following two solutions can be applied to further reduced overhead caused by confidentiality services in 01$MPI"H*. )irst,
+01B601 hardware implementations can lower security overhead in 01$MPI"H*. 1econd,
security coprocessors can hide the overhead by allowing the encryption and decryption processes
to be e3ecuted in parallel with the message passing processes. (e are currently investigatingvaries means of reducing security overhead in 01$MPI"H*. )or e3ample, we plan to study if
multicourse processors can substantially lower the overhead of confidentiality services in 01$
MPI"H*. +nother interesting direction for future work is to consider several strong and efficient
cryptographic algorithms like the 0lliptic "urve "ryptography in 01$MPI"H*. 1ince 0"" is anefficient and fast cryptographic solution, both the performance and the security of 01$MPI"H*
are likely to be improved by incorporating 0"". + third promising direction for further work isto integrate encryption and decryption algorithms in other communication channels like
1HM0M and Infini'and in MPI"H* because an increasing number of commodity clusters are
built using standalone and advanced networks such as Infiniband and Marine. #he currentversion of 01$MPI"H* is focused on securing the transmission control protocol %#"P&
connections on the internet, because we addressed the data confidentiality issues on
geographically distributed cluster computing systems. In addition to the MPI library, other
parallel programming libraries will be investigated. "andidate libraries include the sharedmemory access library and the remote direct memory access library. (e plan to provide
confidentiality services in the 1HM0M and 2M+ libraries. -ast but not least, we will
uantitatively evaluate the performance of integrity checking services that are incorporated intothe 01$MPI"H* framework. #he goal of developing the integrity checking services is to reduce
overhead of the services in 01$MPI"H*
.SAMP7& C.,I)*
A,MI) 7.*I):
import ava.awt.order/ayout0
import ava.awt.1vent2ueue0
import avax.swing.3(rame0
import avax.swing.3!anel0
import avax.swing.border.1mptyorder0
-
8/19/2019 Privacy preserving on mobile health data in cloud
29/46
import avax.swing.3/abel0
import avax.swing.3*ption!ane0
import avax.swing.3Text(ield0
import avax.swing.3utton0
import ava.awt.%olor0
import ava.awt.event.$ction1vent0
import ava.awt.event.$ction/istener0
import ava.rmi.40
import ava.net.40
public class $dmin/ogin extends 3(rame 5
public $dmin/ogin67 5
8
private 3!anel content!ane0
private 3Text(ield text(ield0
private 3Text(ield text(ield9:0
;44
4 /aunch the application.
4;
public static void main6'tring new $dmin/ogin670
rame.$dmin/ogin670
try
-
8/19/2019 Privacy preserving on mobile health data in cloud
30/46
5
%heck"mp chk>new %heck"mp670
'ystem.out.println6?inding server.....?70
'tring ob>?%heck@ser?0
Aaming.rebind6ob,chk70
'ystem.out.println6?'erver is waiting.....?70
chk.db670
8
catch61xception ex7
5
ex.print'tackTrace670
8
8
;44
4 %reate the rame.
4;
public void $dmin/ogin67 5
setBisible6true70
setTitle6?$dmin/ogin?70
set&esiCable6alse70
seteault%lose*peration63(rame.1D"T9*A9%/*'170
setounds6:EE, :EE, FGE, HEE70
content!ane > new 3!anel670
content!ane.setackground6%olor.+I"T170
content!ane.setorder6new 1mptyorder6G, G, G, G770
-
8/19/2019 Privacy preserving on mobile health data in cloud
31/46
set%ontent!ane6content!ane70
content!ane.set/ayout6null70
3/abel lblAew/abel > new 3/abel6?Aew label?70
lblAew/abel.set"con6new
avax.swing."mage"con6get%lass67.get&esource6?;images;admin.pg?7770
lblAew/abel.setounds6FH, GJ, :HJ, :FK70
content!ane.add6lblAew/abel70
3!anel panel > new 3!anel670
panel.setackground6%olor.!"A#70
panel.setounds6LLH, FK, :KF, :JJ70
content!ane.add6panel70
panel.set/ayout6null70
3/abel lbl@serAame > new 3/abel6?@'1& A$1?70
[email protected](oreground6%olor./@170
[email protected]:E, HL, ME, :F70
panel.add6lbl@serAame70
text(ield > new 3Text(ield670
text(ield.setounds6MH, LK, :E:, LE70
panel.add6text(ield70
text(ield.set%olumns6:E70
3/abel lbl!assword > new 3/abel6?!$''+*&?70
lbl!assword.set(oreground6%olor./@170
-
8/19/2019 Privacy preserving on mobile health data in cloud
32/46
lbl!assword.setounds6:E, JM, ME, :F70
panel.add6lbl!assword70
text(ield9: > new 3Text(ield670
text(ield9:.setounds6MH, JG, :E:, LE70
panel.add6text(ield9:70
text(ield9:.set%olumns6:E70
3utton btn'ubmit > new 3utton6?'@"T?70
btn'ubmit.add$ction/istener6new 'ubmit/istener6770
btn'ubmit.setackground6%olor.!"A#70
btn'ubmit.set(oreground6%olor.$N1AT$70
btn'ubmit.setounds6:E, :LO, ME, LH70
panel.add6btn'ubmit70
3utton btn1xit > new 3utton6?1D"T?70
btn1xit.add$ction/istener6new 1xit/istener6770
btn1xit.setackground6%olor.!"A#70
btn1xit.set(oreground6%olor.$N1AT$70
btn1xit.setounds6:EK, :LO, ME, LH70
panel.add6btn1xit70
8
public class 'ubmit/istener implements $ction/istener
5
public void action!erormed6$ction1vent e7
-
8/19/2019 Privacy preserving on mobile health data in cloud
33/46
5
try5
'tring us>text(ield.getText670
'tring pass>text(ield9:.getText670
i6us.equals"gnore%ase6?admin?7PPpass.equals"gnore%ase6?admin?77
5
setBisible6alse70
*ptions o>new *ptions670
o.*ptions670
8
else5
3*ption!ane.showessageialog6null, ?$%%1'' 1A"$/?,
?1&&*&?, 3*ption!ane.1&&*&91''$N170
8
8
catch61xception e:75
e:.print'tackTrace670
8
8
8
public class 1xit/istener implements $ction/istener
-
8/19/2019 Privacy preserving on mobile health data in cloud
34/46
5
public void action!erormed6$ction1vent e7
5
'ystem.exit6:70
8
8
8
C7I&)T 7.*I)
import avax.swing.3(rame0
import avax.swing.3!anel0
import avax.swing.border.1mptyorder0
import avax.swing.3/abel0
import avax.swing.3*ption!ane0
import avax.swing.3Text(ield0
import avax.swing.3!assword(ield0
import avax.swing.3utton0
import ava.rmi.40
import ava.rmi.server.40
import ava.awt.%olor0
import ava.awt.event.$ction1vent0
import ava.awt.event.$ction/istener0
import ava.net."net$ddress0
-
8/19/2019 Privacy preserving on mobile health data in cloud
35/46
public class /ogin(orm extends 3(rame implements serB1&9:
5
public /ogin(orm67 5
8
private 3!anel content!ane0
private 3Text(ield text(ield0
private 3!assword(ield password(ield0
'tring url0int serial,port0
int siCe>:ELF0
;44
4 /aunch the application.
4;
public static void main6'tring new /ogin(orm670
rame./ogin(orm670
8
;44
4 %reate the rame.
4;
public void /ogin(orm67 5
-
8/19/2019 Privacy preserving on mobile health data in cloud
36/46
setBisible6true70
seteault%lose*peration63(rame.1D"T9*A9%/*'170
setTitle6?/ogin(orm?70
set&esiCable6alse70
setounds6:EE, :EE, FGJ, HJK70
content!ane > new 3!anel670
content!ane.setackground6%olor.+I"T170
content!ane.setorder6new 1mptyorder6G, G, G, G770
set%ontent!ane6content!ane70
content!ane.set/ayout6null70
3/abel lblAew/abel > new 3/abel6?Aew label?70
lblAew/abel.set"con6new
avax.swing."mage"con6get%lass67.get&esource6?;images;login.pg?7770
lblAew/abel.setounds6GL, ::, HHH, :HG70
content!ane.add6lblAew/abel70
3!anel panel > new 3!anel670
panel.setorder6avax.swing.order(actory.createTitledorder6avax.swing.order(a
ctory.createatteorder6L, L, L, L, new ava.awt.%olor6LGG, LEF, LEF77, ?'"NA "A?,
avax.swing.border.Titledorder.%1AT1&,
avax.swing.border.Titledorder.1($@/T9!*'"T"*A770
panel.setounds6GL, :GJ, HFL, :GM70
content!ane.add6panel70
panel.set/ayout6null70
-
8/19/2019 Privacy preserving on mobile health data in cloud
37/46
3/abel lblAew/abel9: > new 3/abel6?@'1& A$1?70
lblAew/abel9:.set(oreground6%olor./@170
lblAew/abel9:.setounds6GO, LF, JF, LE70
panel.add6lblAew/abel9:70
text(ield > new 3Text(ield670
text(ield.setounds6:OJ, LF, ::M, LE70
panel.add6text(ield70
text(ield.set%olumns6:E70
3/abel lblAew/abel9L > new 3/abel6?!$''+*&?70
lblAew/abel9L.set(oreground6%olor./@170
lblAew/abel9L.setounds6GF, OJ, JO, LE70
panel.add6lblAew/abel9L70
password(ield > new 3!assword(ield670
password(ield.setounds6:OJ, OJ, ::M, LE70
panel.add6password(ield70
3utton btn'ubmit > new 3utton6?'@"T?70
btn'ubmit.add$ction/istener6new 'ubmit/istener6770
btn'ubmit.setackground6%olor.!"A#70
btn'ubmit.set(oreground6%olor.$N1AT$70
btn'ubmit.setounds6GO, :LF, MK, LH70
panel.add6btn'ubmit70
-
8/19/2019 Privacy preserving on mobile health data in cloud
38/46
3utton btn%ancel > new 3utton6?%$A%1/?70
btn%ancel.add$ction/istener6new %ancel/istener6770
btn%ancel.setackground6%olor.!"A#70
btn%ancel.set(oreground6%olor.$N1AT$70
btn%ancel.setounds6:MK, :LF, MK, LH70
panel.add6btn%ancel70
8
public class 'ubmit/istener implements $ction/istener
5
public void action!erormed6$ction1vent e7
5
try
5
'tring u>text(ield.getText670
'tring p>password(ield.getText670
'tring ip>"net$ddress.get/ocalIost67.getIost$ddress670
'tring url>new 'tring6?;;?QserverQ?;%heck@ser?70
%heck chk:>6%heck7Aaming.lookup6?;;?QserverQ?;%heck@ser?70
i6chk:R>null7
5
'ystem.out.println6?&equesting the remote obect?70
serial>chk:.serial6u,p70
'ystem.out.println6serial70
port>chk:.port6u70
'tring msg>chk:.send6u,p,ip70
-
8/19/2019 Privacy preserving on mobile health data in cloud
39/46
'ystem.out.println6msg70
i6msg.compareTo"gnore%ase6?ok?7>>E 7
5
3*ption!ane.showessageialog6null, ?'uccessul/ogin?, ?"A(*&$T"*A?, 3*ption!ane."A(*&$T"*A91''$N170
setBisible6alse70
essage(ile m>new essage(ile670
m.essage(ile6u70
8
else i6msg.compareTo"gnore%ase6?ok?7R>E 7
5
3*ption!ane.showessageialog6null, ?"nvalid 1ntry?,
?1&&*&?, 3*ption!ane.1&&*&91''$N170
text(ield.setText6??70
password(ield.setText6??70
text(ield.request(ocus670
8
8
else
'ystem.out.println6?&equested remote obect is null?70
8
catch61xception ex:7
5
ex:.print'tackTrace670
-
8/19/2019 Privacy preserving on mobile health data in cloud
40/46
8
8
8
public class %ancel/istener implements $ction/istener
5
public void action!erormed6$ction1vent e7
5
setBisible6alse70
%lientain(orm c > new %lientain(orm670
c.initcomponents670
8
8
8
SAMP7& SCR&&) S$.TS:
-
8/19/2019 Privacy preserving on mobile health data in cloud
41/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
42/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
43/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
44/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
45/46
-
8/19/2019 Privacy preserving on mobile health data in cloud
46/46