Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment

被引:0
|
作者
Dutta, Aritra [1 ]
Bose, Rajesh [1 ]
Roy, Sandip [1 ]
Sutradhar, Shrabani [1 ]
机构
[1] Dept Computat Sci, 398,Ramkrishnapur Rd,Barasat, Kolkata 700125, West Bengal, India
关键词
Advanced encryption standard; Cryptography; Honey encryption; Proxy re-encryption algorithm;
D O I
10.51847/raeh8fHBt6
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
Data security is a primary concern in cloud computing as data is traveling over the internet and is originated from various sources. Encryption techniques are used to protect sensitive information from unauthenticated users, but sometimes brute force methods can identify the hidden data. To improve data privacy and authentication, we proposed a method that combines Advanced Encryption Standard and proxy re-encryption algorithm with a Honey encryption algorithm and N-th degree Truncated Polynomial Ring Unit (NTRU) or Number Theory Research Unit). Advanced Encryption Standard (AES) is a popular symmetric encryption method that encrypts and decrypts data using a secret key. Proxy re-encryption is a cryptographic technique that allows a third party to transform cipher texts from one key to another without seeing the plaintext. Honey encryption is a relatively new technique that adds realistic-looking but bogus data to encrypted messages, making it difficult for attackers to determine if the decrypted message is real or fake. NTRU is a cryptosystem that uses the public key on the polynomial ring. By combining these techniques, the proposed method can improve data security for outsourced data in the cloud. Unauthorized users may face challenges accessing messages that appear to be legitimate when Honey encryption is combined with Hybrid cryptography. Overall, the use of these techniques provides enhanced security and protection to the user's data, and ensure that only authorized user can access and manipulate sensitive data, stored in the cloud.
引用
收藏
页码:41 / 47
页数:7
相关论文
共 50 条
  • [1] Cloud data security with hybrid symmetric encryption
    Kaushik, Shweta
    Gandhi, Charu
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [2] Hybrid Approach to Enhance Data Security on Cloud
    Saxena, Pratishtha
    Yadav, Samarjeet
    Dayal, Neelam
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 735 - 743
  • [3] Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms
    Prabu, S.
    Ganapathy, Gopinath
    Goyal, Ranjan
    [J]. Scalable Computing, 2018, 19 (04): : 351 - 360
  • [4] ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS
    Prabu, S.
    Ganapathy, Gopinath
    Goyal, Ranjan
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 351 - 360
  • [5] Enhanced Data Storage Security in Cloud Environment using Encryption, Compression and Splitting technique
    Rani, Kajal
    Sagar, Raj Kumar
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 366 - 370
  • [6] Applying Encryption Algorithm to Enhance Data Security in Cloud Storage
    Kartit, Zaid
    El Marraki, Mohamed
    [J]. ENGINEERING LETTERS, 2015, 23 (04) : 277 - 282
  • [7] Applying encryption algorithm to enhance data security in cloud storage
    Laboratory of Research in Informatics and Telecommunication , University of Mohammed V,Faculty of Science, Rabat, Morocco
    [J]. Eng. Lett, 4 (277-282):
  • [8] A novel model to enhance the data security in cloud environment
    Verma, Garima
    Kanrar, Soumen
    [J]. MULTIAGENT AND GRID SYSTEMS, 2022, 18 (01) : 45 - 63
  • [9] Improving cloud data security through hybrid verification technique based on biometrics and encryption system
    Hossain, Md. Alamgir
    Al Hasan, Md. Abdullah
    [J]. International Journal of Computers and Applications, 2022, 44 (05) : 455 - 464
  • [10] A Hybrid Approach to Enhance Data Security in Cloud Storage
    Udendhran, R.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,