Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption Hema Ambiha Aravindakshan1, Pragaladan Rengasamy2
https://doi.org/10.17586/2226-1494-2024-24-3-456-463
Abstract
The primary idea of this paper is the implementation of the Optimal Key-Tuned Rivest Shamir Adelman technique, a dual authentication approach for effective data sharing in the cloud within hospital data management. The system begins with user registration with the Trusted Center where user details are provided. An authentication scheme utilizing the Caesar cipher and the Secure Hashing Algorithm 512 ensures integrity. The encryption process employs the Optimal Key-Tuned Rivest Shamir Adelman scheme for secure file transmission. To enhance key creation procedures in the Rivest Shamir Adelman model, the Improved Butterfly Optimization Algorithm technique is utilized to maximize throughput. Finally, dual authentication is conducted on the receiver side for file access and downloads from the cloud server. This additional layer of authentication fortifies the system resilience against unauthorized access, ensuring that only legitimate users can interact with the healthcare data stored in the cloud. The results indicate that the system outperforms other state-of-the-art systems enabling secure sharing and downloading of health data in cloud environments.
About the Authors
H. А. AravindakshanIndia
Hema Ambiha Aravindakshan — PhD, Researcher
Erode, 636316
P. Rengasamy
India
Pragaladan Rengasamy — PhD, Associate Professor, Head
Erode, 636316
References
1. Pai M.M.M., Ganiga R., Pai R.M., Sinha R.K. Standard electronic health record (EHR) framework for Indian healthcare system // Health Services and Outcomes Research Methodology. 2021. V. 21. N 3. P. 339–362. https://doi.org/10.1007/s10742-020-00238-0
2. Zhao J., Zeng P., Choo K.K.R. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health // IEEE Access. 2021. V. 9. P. 13789–13799. https://doi.org/10.1109/access.2021.3052247
3. Chauhan R., Kaur H., Chang V. An optimized integrated framework of big data analytics managing security and privacy in healthcare data // Wireless Personal Communications. 2021. V. 117. N 1. P. 87–108. https://doi.org/10.1007/s11277-020-07040-8
4. Maathavan K.S.K., Venkatraman S. A secure encrypted classified electronic healthcare data for public cloud environment // Intelligent Automation & Soft Computing. 2022. V. 32. N 2. P. 765–779. https://doi.org/10.32604/iasc.2022.022276
5. Rani M., Guleria K., Panda S.N. Blockchain technology novel prospective for cloud security // Proc. of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). 2022. P. 1–6. https://doi.org/10.1109/ICRITO56286.2022.9964666
6. Xi P., Zhang X., Wang L., Liu W., Peng S. A review of blockchainbased secure sharing of healthcare data // Applied Sciences. 2022. V. 12. N 15. P. 7912. https://doi.org/10.3390/app12157912
7. Wu Y., Zhang L., Berretti S., Wan S. Medical image encryption by content-aware DNA computing for secure healthcare // IEEE Transactions on Industrial Informatics. 2023. V. 19. N 2. P. 2089–2098. https://doi.org/10.1109/tii.2022.3194590
8. Mani V., Manickam P., Alotaibi Y., Alghamdi S., Khalaf O.I. Hyperledger healthchain: patient-centric IPFS-based storage of health records // Electronics. 2021. V. 10. N 23. P. 3003. https://doi.org/10.3390/electronics10233003
9. Sivan R., Zukarnain Z.A. Security and privacy in cloud-based e-health system // Symmetry. 2021. V. 13. N 5. P. 742. https://doi.org/10.3390/sym13050742
10. Recent Advances in Blockchain Technology: Real-World Applications / ed. by S.K. Panda, V. Mishra, S.P. Dash, A.K. Pani. Springer, 2023. XXIX, 317 p. https://doi.org/10.1007/978-3-03122835-3
11. Masud M., Gaba G.S., Choudhary K., Alroobaea R., Hossain M.S. A robust and lightweight secure access scheme for cloud based E-healthcare services // Peer-to-peer Networking and Applications. 2021. V. 14. N 5. P. 3043–3057. https://doi.org/10.1007/s12083-02101162-x
12. Ramachandra M.N., Srinivasa Rao M., Lai W.C., Parameshachari B.D., Ananda Babu J., Hemalatha K.L. An efficient and secure big data storage in cloud environment by using triple data encryption standard // Big Data and Cognitive Computing. 2022. V. 6. N 4. P. 101. https://doi.org/10.3390/bdcc6040101
13. Zhong H., Zhou Y., Zhang Q., Xu Y., Cui J. An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare // Future Generation Computer Systems. 2021. V. 115. P. 486–496. https://doi.org/10.1016/j.future.2020.09.021
14. Abdelfattah S., Baza M., Badr M.M., Mahmoud M.M., Srivastava G., Alsolami F., Ali A.M. Efficient search over encrypted medical data with known-plaintext/background models and unlinkability // IEEE Access. 2021. V. 9. P. 151129–151141. https://doi.org/10.1109/access.2021.3126200
15. Ambika K., Moses M.B. TAR-AFT: A Framework to secure shared cloud data with group management // Intelligent Automation & Soft Computing. 2022. V. 31. N 3. P. 1809–1823. https://doi.org/10.32604/iasc.2022.018580
Review
For citations:
Aravindakshan H.А., Rengasamy P. Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption Hema Ambiha Aravindakshan1, Pragaladan Rengasamy2. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2024;24(3):456-463. https://doi.org/10.17586/2226-1494-2024-24-3-456-463