doi: 10.17586/2226-1494-2024-24-3-456-463


Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption

H. Aravindakshan, P. Rengasamy


Read the full article  ';
Article in English

For citation:
Aravindakshan H.A., Rengasamy P. Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2024, vol. 24, no. 3, pp. 456–463. doi: 10.17586/2226-1494-2024-24-3-456-463


Abstract
The primary idea of this paper is the implementation of the Optimal Key-Tuned Rivest Shamir Adelman technique, a dual authentication approach for effective data sharing in the cloud within hospital data management. The system begins with user registration with the Trusted Center where user details are provided. An authentication scheme utilizing the Caesar cipher and the Secure Hashing Algorithm 512 ensures integrity. The encryption process employs the Optimal Key-Tuned Rivest Shamir Adelman scheme for secure file transmission. To enhance key creation procedures in the Rivest Shamir Adelman model, the Improved Butterfly Optimization Algorithm technique is utilized to maximize throughput. Finally, dual authentication is conducted on the receiver side for file access and downloads from the cloud server. This additional layer of authentication fortifies the system resilience against unauthorized access, ensuring that only legitimate users can interact with the healthcare data stored in the cloud. The results indicate that the system outperforms other state-of-the-art systems enabling secure sharing and downloading of health data in cloud environments.

Keywords: healthcare security, dual authentication, secure data transmission, encryption, decryption, trusted center

References
  1. Pai M.M.M., Ganiga R., Pai R.M., Sinha R.K. Standard electronic health record (EHR) framework for Indian healthcare system. Health Services and Outcomes Research Methodology, 2021, vol. 21, no. 3, pp. 339–362. https://doi.org/10.1007/s10742-020-00238-0
  2. Zhao J., Zeng P., Choo K.K.R. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access, 2021, vol. 9, pp. 13789–13799. https://doi.org/10.1109/access.2021.3052247
  3. Chauhan R., Kaur H., Chang V. An optimized integrated framework of big data analytics managing security and privacy in healthcare data. Wireless Personal Communications, 2021, vol. 117, no. 1, pp. 87–108. https://doi.org/10.1007/s11277-020-07040-8
  4. Maathavan K.S.K., Venkatraman S. A secure encrypted classified electronic healthcare data for public cloud environment. Intelligent Automation & Soft Computing, 2022, vol. 32, no. 2, pp. 765–779. https://doi.org/10.32604/iasc.2022.022276
  5. Rani M., Guleria K., Panda S.N. Blockchain technology novel prospective for cloud security. Proc. of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2022, pp. 1–6. https://doi.org/10.1109/ICRITO56286.2022.9964666
  6. Xi P., Zhang X., Wang L., Liu W., Peng S. A review of blockchain-based secure sharing of healthcare data. Applied Sciences, 2022, vol. 12, no. 15, pp. 7912. https://doi.org/10.3390/app12157912
  7. Wu Y., Zhang L., Berretti S., Wan S. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Transactions on Industrial Informatics, 2023, vol. 19, no. 2, pp. 2089–2098. https://doi.org/10.1109/tii.2022.3194590
  8. Mani V., Manickam P., Alotaibi Y., Alghamdi S., Khalaf O.I. Hyperledger healthchain: patient-centric IPFS-based storage of health records. Electronics, 2021, vol. 10, no. 23, pp. 3003. https://doi.org/10.3390/electronics10233003
  9. Sivan R., Zukarnain Z.A. Security and privacy in cloud-based e-health system. Symmetry, 2021, vol. 13, no. 5, pp. 742. https://doi.org/10.3390/sym13050742
  10. Recent Advances in Blockchain Technology: Real-World Applications / ed. by S.K. Panda, V. Mishra, S.P. Dash, A.K. Pani. Springer, 2023. XXIX, 317 p. https://doi.org/10.1007/978-3-031-22835-3
  11. Masud M., Gaba G.S., Choudhary K., Alroobaea R., Hossain M.S. A robust and lightweight secure access scheme for cloud based E-healthcare services. Peer-to-peer Networking and Applications, 2021, vol. 14, no. 5, pp. 3043–3057. https://doi.org/10.1007/s12083-021-01162-x
  12. Ramachandra M.N., Srinivasa Rao M., Lai W.C., Parameshachari B.D., Ananda Babu J., Hemalatha K.L. An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data and Cognitive Computing, 2022, vol. 6, no. 4, pp. 101. https://doi.org/10.3390/bdcc6040101
  13. Zhong H., Zhou Y., Zhang Q., Xu Y., Cui J. An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Generation Computer Systems, 2021, vol. 115, pp. 486–496. https://doi.org/10.1016/j.future.2020.09.021
  14. Abdelfattah S., Baza M., Badr M.M., Mahmoud M.M., Srivastava G., Alsolami F., Ali A.M. Efficient search over encrypted medical data with known-plaintext/background models and unlinkability. IEEE Access, 2021, vol. 9, pp. 151129–151141. https://doi.org/10.1109/access.2021.3126200
  15. Ambika K., Moses M.B. TAR-AFT: A Framework to secure shared cloud data with group management. Intelligent. Automation & Soft Computing, 2022, vol. 31, no. 3, pp. 1809–1823. https://doi.org/10.32604/iasc.2022.018580


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика