Improvement of medical data security using SABES optimization algorithm

被引:3
|
作者
Sharma, Suvita Rani [1 ]
Singh, Birmohan [1 ]
Kaur, Manpreet [2 ]
机构
[1] St Longowal Inst Engn & Technol, Dept Comp Sci & Engn, Longowal 148106, Punjab, India
[2] St Longowal Inst Engn & Technol, Dept Elect & Instrumentat Engn, Longowal 148106, Punjab, India
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 09期
关键词
Chaotic system; Medical data; Metaheuristic optimization algorithm; Parameter optimization; ENCRYPTION SCHEME; IMAGE; MAP;
D O I
10.1007/s11227-024-05937-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a bit-level cryptographic model for encrypting medical signals, patient information, clinical data, and images of various modalities. The model has utilized chaotic maps due to properties like non-periodicity, nonlinearity, ergodicity, deterministic, unpredictable, and sensitive to the initial conditions. Three chaotic maps are employed in a chained sequence at different levels of the model to elevate the randomness and provide uniform key distribution with larger key space. Also, the self-adaptive bald eagle search optimization algorithm has been employed to enhance the properties of chaotic maps by optimizing the initialization and control parameters. The cyclic redundancy check approach is involved to detect any change in the data during the transmission at the receiver side along with circular shift to make encrypted data resilient of differential attack. Therefore, the encryption model boosts the unpredictability, security, and protection against a wide range of threats. The encryption model performance efficiency is demonstrated using different types of security analysis to show resistance against statistical, entropy, differential, cropping, and brute-force attacks.
引用
收藏
页码:12929 / 12965
页数:37
相关论文
共 50 条
  • [31] An improvement over RED algorithm by using particle swarm optimization
    Jamali, Shahram
    Zahedi, Seyed Reza
    IEICE ELECTRONICS EXPRESS, 2010, 7 (17): : 1276 - 1282
  • [32] A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment
    Ashok, Kanneboina
    Gopikrishnan, S.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [33] Using Image Steganography for Providing Enhanced Medical Data security
    Usmani, Muhammad Arslan
    Usman, Muhammad Rehan
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [34] Improving security of medical big data by using Blockchain technology
    Sharma, Pratima
    Borah, Malaya Dutta
    Namasudra, Suyel
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [35] The Optimization and Improvement of the Apriori Algorithm
    Xie, Yiwu
    Li, Yutong
    Wang, Chunli
    Lu, Mingyu
    2008 INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND TRAINING AND 2008 INTERNATIONAL WORKSHOP ON GEOSCIENCE AND REMOTE SENSING, VOL 2, PROCEEDINGS,, 2009, : 663 - 665
  • [36] The Optimization and Improvement of the Apriori Algorithm
    Xie, Yiwu
    Li, Yutong
    Wang, Chunli
    Lu, Mingyu
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 1101 - 1103
  • [37] Ensuring Cloud Data Security Using the Soldier Ant Algorithm
    Dawson, John Kwao
    Ayawli, Ben Beklisi Kwame
    Agyemang, Sylvester
    Baah, Philemon
    Akyeramfo-Sam, Samuel
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (01) : 130 - 137
  • [38] Enhancing Data Security in Fitness Tracker Using HAN Algorithm
    Sudhakaran, Pradeep
    Preetha, M.
    Sindhu, V
    JOURNAL OF PHARMACEUTICAL NEGATIVE RESULTS, 2022, 13 : 460 - 464
  • [39] Proposed Encryption Algorithm for Data Security Using Matrix Properties
    Jha, Deeksha Priya
    Kohli, Rashi
    Gupta, Archana
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 86 - 90
  • [40] A hybrid algorithm-based optimization protocol to ensure data security in the cloud
    Zubair S.
    Ahmed H.M.A.
    International Journal of Information Technology, 2024, 16 (5) : 3057 - 3064