Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment

被引:0
|
作者
Hema, Sri Vigna V. [1 ]
Ramesh, K. [2 ]
机构
[1] Bannari Amman Inst Technol, Dept Informat Technol, Erode, Tamil Nadu, India
[2] Anna Univ, Dept Comp Applicat, Reg Campus Tirunelveli, Tirunelveli, Tamil Nadu, India
来源
关键词
cloud computing; cloud security; cloud storage; data confidentiality; data integrity; electronic health record; elliptic curve cryptography; health cloud; healthcare; obfuscation; ENCRYPTION;
D O I
10.1002/cpe.7275
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the past few years, the growing demands of cloud computing became high in the healthcare sector. The electronic health record (EHR) has turned out to be the chosen system to uphold patient's healthcare data. Due to the advancement of cloud computing, the users in the cloud are empowered to access their data with elasticity and offering huge storage capability at minimum costs. This motivates EHR maintainers to transfer their personal storage to the remote cloud servers as it significantly reduces the burden of storage and computation. Nevertheless, securing healthcare data file poses a gigantic challenge as data outsourced in the cloud are too sensitive. Several security features such as data confidentiality, data privacy, access control, data integrity, and data security necessities to be satisfied. This article proposed a secure sharing of healthcare data file by incorporating obfuscation technique and elliptic curve cryptography (ECC) algorithm to enforce better data confidentiality and integrity. Data obfuscation is a beneficial technique in preserving the data confidentiality on the cloud by minimizing the risk of data theft and data leakage. Moreover, ECC methodology aims to provide a high level of security, low communication and computation cost with smaller key size. Experimental analysis reveals better performance than other existing schemes in terms of computation time, communication time, key generation time, throughput rate, turnaround time, and uploading speed. Besides, it exposes that the proposed framework is highly secure and efficient in the field of healthcare system.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [2] Security in Data Forwarding Through Elliptic Curve Cryptography in Cloud
    Divya, S. V.
    Shaji, R. S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1083 - 1088
  • [3] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [4] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
  • [5] Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud
    Suthanthiramani, Pradeep
    Sannasy, Muthurajkumar
    Sannasi, Ganapathy
    Arputharaj, Kannan
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (01) : 56 - 66
  • [6] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [7] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [8] A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security
    Ranganatha Rao, B.
    Sujatha, B.
    [J]. Measurement: Sensors, 2023, 29
  • [9] Enabled Security based on Elliptic Curve Cryptography with optimal Resource Allocation schema in cloud computing environment
    Nagalakshmi, N.
    Rajalakshmi, S.
    [J]. 2015 IEEE SEVENTH NATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND INFORMATION SYSTEMS (NCCCIS), 2015, : 17 - 22
  • [10] Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
    Shanthakumari, R.
    Malliga, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3975 - 3991