Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
![](/pic/nikiforov.jpg)
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2024-24-3-456-463
Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption
Read the full article
![](/images/pdf.png)
Article in English
For citation:
Abstract
For citation:
Aravindakshan H.A., Rengasamy P. Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2024, vol. 24, no. 3, pp. 456–463. doi: 10.17586/2226-1494-2024-24-3-456-463
Abstract
The primary idea of this paper is the implementation of the Optimal Key-Tuned Rivest Shamir Adelman technique, a dual authentication approach for effective data sharing in the cloud within hospital data management. The system begins with user registration with the Trusted Center where user details are provided. An authentication scheme utilizing the Caesar cipher and the Secure Hashing Algorithm 512 ensures integrity. The encryption process employs the Optimal Key-Tuned Rivest Shamir Adelman scheme for secure file transmission. To enhance key creation procedures in the Rivest Shamir Adelman model, the Improved Butterfly Optimization Algorithm technique is utilized to maximize throughput. Finally, dual authentication is conducted on the receiver side for file access and downloads from the cloud server. This additional layer of authentication fortifies the system resilience against unauthorized access, ensuring that only legitimate users can interact with the healthcare data stored in the cloud. The results indicate that the system outperforms other state-of-the-art systems enabling secure sharing and downloading of health data in cloud environments.
Keywords: healthcare security, dual authentication, secure data transmission, encryption, decryption, trusted center
References
References
- Pai M.M.M., Ganiga R., Pai R.M., Sinha R.K. Standard electronic health record (EHR) framework for Indian healthcare system. Health Services and Outcomes Research Methodology, 2021, vol. 21, no. 3, pp. 339–362. https://doi.org/10.1007/s10742-020-00238-0
- Zhao J., Zeng P., Choo K.K.R. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access, 2021, vol. 9, pp. 13789–13799. https://doi.org/10.1109/access.2021.3052247
- Chauhan R., Kaur H., Chang V. An optimized integrated framework of big data analytics managing security and privacy in healthcare data. Wireless Personal Communications, 2021, vol. 117, no. 1, pp. 87–108. https://doi.org/10.1007/s11277-020-07040-8
- Maathavan K.S.K., Venkatraman S. A secure encrypted classified electronic healthcare data for public cloud environment. Intelligent Automation & Soft Computing, 2022, vol. 32, no. 2, pp. 765–779. https://doi.org/10.32604/iasc.2022.022276
- Rani M., Guleria K., Panda S.N. Blockchain technology novel prospective for cloud security. Proc. of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2022, pp. 1–6. https://doi.org/10.1109/ICRITO56286.2022.9964666
- Xi P., Zhang X., Wang L., Liu W., Peng S. A review of blockchain-based secure sharing of healthcare data. Applied Sciences, 2022, vol. 12, no. 15, pp. 7912. https://doi.org/10.3390/app12157912
- Wu Y., Zhang L., Berretti S., Wan S. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Transactions on Industrial Informatics, 2023, vol. 19, no. 2, pp. 2089–2098. https://doi.org/10.1109/tii.2022.3194590
- Mani V., Manickam P., Alotaibi Y., Alghamdi S., Khalaf O.I. Hyperledger healthchain: patient-centric IPFS-based storage of health records. Electronics, 2021, vol. 10, no. 23, pp. 3003. https://doi.org/10.3390/electronics10233003
- Sivan R., Zukarnain Z.A. Security and privacy in cloud-based e-health system. Symmetry, 2021, vol. 13, no. 5, pp. 742. https://doi.org/10.3390/sym13050742
- Recent Advances in Blockchain Technology: Real-World Applications / ed. by S.K. Panda, V. Mishra, S.P. Dash, A.K. Pani. Springer, 2023. XXIX, 317 p. https://doi.org/10.1007/978-3-031-22835-3
- Masud M., Gaba G.S., Choudhary K., Alroobaea R., Hossain M.S. A robust and lightweight secure access scheme for cloud based E-healthcare services. Peer-to-peer Networking and Applications, 2021, vol. 14, no. 5, pp. 3043–3057. https://doi.org/10.1007/s12083-021-01162-x
- Ramachandra M.N., Srinivasa Rao M., Lai W.C., Parameshachari B.D., Ananda Babu J., Hemalatha K.L. An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data and Cognitive Computing, 2022, vol. 6, no. 4, pp. 101. https://doi.org/10.3390/bdcc6040101
- Zhong H., Zhou Y., Zhang Q., Xu Y., Cui J. An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Generation Computer Systems, 2021, vol. 115, pp. 486–496. https://doi.org/10.1016/j.future.2020.09.021
- Abdelfattah S., Baza M., Badr M.M., Mahmoud M.M., Srivastava G., Alsolami F., Ali A.M. Efficient search over encrypted medical data with known-plaintext/background models and unlinkability. IEEE Access, 2021, vol. 9, pp. 151129–151141. https://doi.org/10.1109/access.2021.3126200
- Ambika K., Moses M.B. TAR-AFT: A Framework to secure shared cloud data with group management. Intelligent. Automation & Soft Computing, 2022, vol. 31, no. 3, pp. 1809–1823. https://doi.org/10.32604/iasc.2022.018580