Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment

被引:0
|
作者
Dutta, Aritra [1 ]
Bose, Rajesh [1 ]
Roy, Sandip [1 ]
Sutradhar, Shrabani [1 ]
机构
[1] Dept Computat Sci, 398,Ramkrishnapur Rd,Barasat, Kolkata 700125, West Bengal, India
关键词
Advanced encryption standard; Cryptography; Honey encryption; Proxy re-encryption algorithm;
D O I
10.51847/raeh8fHBt6
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
Data security is a primary concern in cloud computing as data is traveling over the internet and is originated from various sources. Encryption techniques are used to protect sensitive information from unauthenticated users, but sometimes brute force methods can identify the hidden data. To improve data privacy and authentication, we proposed a method that combines Advanced Encryption Standard and proxy re-encryption algorithm with a Honey encryption algorithm and N-th degree Truncated Polynomial Ring Unit (NTRU) or Number Theory Research Unit). Advanced Encryption Standard (AES) is a popular symmetric encryption method that encrypts and decrypts data using a secret key. Proxy re-encryption is a cryptographic technique that allows a third party to transform cipher texts from one key to another without seeing the plaintext. Honey encryption is a relatively new technique that adds realistic-looking but bogus data to encrypted messages, making it difficult for attackers to determine if the decrypted message is real or fake. NTRU is a cryptosystem that uses the public key on the polynomial ring. By combining these techniques, the proposed method can improve data security for outsourced data in the cloud. Unauthorized users may face challenges accessing messages that appear to be legitimate when Honey encryption is combined with Hybrid cryptography. Overall, the use of these techniques provides enhanced security and protection to the user's data, and ensure that only authorized user can access and manipulate sensitive data, stored in the cloud.
引用
收藏
页码:41 / 47
页数:7
相关论文
共 50 条
  • [21] A Novel Technique of Cloud Security Based on Hybrid Encryption by Blowfish and MD5
    Chauhan, Adviti
    Gupta, Jyoti
    [J]. PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 349 - 355
  • [22] Enhanced Symmetric Encryption Technique for Securing Users' Data in Public Cloud Environment
    Fairosebanu, A.
    Jebaseeli, A. Nisha
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 785 - 791
  • [23] A data encryption scheme for cloud storage security
    Wu, Wei-nong
    Zheng, Yuan-bing
    Wu, Bin
    Wu, Lie
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 666 - 674
  • [24] Encryption as a Service for Data Healthcare Cloud Security
    El Bouchti, Abdelali
    Bahsani, Samir
    Nahhal, Tank
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 48 - 54
  • [25] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [26] A Hybrid Data Encryption Technique using RSA and Blowfish for Cloud Computing on FPGAs
    Bansal, Viney Pal
    Singh, Sandeep
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [27] Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm
    Raipurkar, Kunal V.
    Deorankar, Anil V.
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [28] An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment
    Infantia, H. Niroshini
    Anbuananth, C.
    Kalarani, S.
    [J]. INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2023, 17 (04): : 983 - 1006
  • [29] Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage
    Oli, S. Arul
    Arockiam, L.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [30] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    [J]. 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325