Skip to main content

Securing Healthcare Information over Cloud Using Hybrid Approach

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 714))

Abstract

Cloud computing has increased the attention for accessing and storing information. To share and store healthcare information over Cloud is playing crucial role to provide cost-effective and flexible and reliable solution to the users. Despite advantages of Cloud-based Healthcare system, security of data is major factor, which restricts the acceptance of the Cloud-based model. As a solution to the security challenge, our work advocates the use of linear network coding and re-encryption based on ElGamal cryptography in the form of hybrid approach to secure healthcare information over cloud. To provide security and fault tolerance for cloud storage, we have considered linear network coding mechanism. To exchange the encoding key matrix securely with the receiver, ElGamal re-encryption scheme is used. As a proposed approach, we present how securely the data can be transferred between sender and the receiver over cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rathi G., Abinaya M., Deepika. M., Kavyasri. T.: Healthcare Data Security in Cloud Computing, IJIRCCE (2015).

    Google Scholar 

  2. Ahlswede, R., Cai, N., Li, S. Y., & Yeung, R. W.: Network information flow. Vol. 46 No. 4 IEEE Transactions on information theory (2000).

    Google Scholar 

  3. Garg, P., & Sharma, V.: An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function. In Issues and Challenges in Intelligent Computing Techniques (ICICT) International Conference on IEEE (2014).

    Google Scholar 

  4. Rewadkar, D. N., & Ghatage, S. Y.: Cloud storage system enabling secure privacy preserving third party audit. In Control, Instrumentation, Communication and Computational Technologies (ICCICCT), International Conference on IEEE (2014).

    Google Scholar 

  5. Khanezaei, N., & Hanapi, Z. M.: A framework based on RSA and AES encryption algorithms for cloud computing services. In Systems, Process and Control (ICSPC), 2014 IEEE Conference on IEEE (2014).

    Google Scholar 

  6. Thiranant, N., Sain, M., & Lee, H. J.: A design of security framework for data privacy in e-health system using web service. In Advanced Communication Technology (ICACT), 2014 16th International Conference on IEEE (2014).

    Google Scholar 

  7. Mahalle, V. S., & Shahade, A. K.: Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. In Power, Automation and Communication (INPAC), 2014 International Conference on IEEE (2014).

    Google Scholar 

  8. Gupta, S. K., Rawat, S., & Kumar, P.: A novel based security architecture of cloud computing. In Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on IEEE (2014).

    Google Scholar 

  9. Louk, M., Lim, H.: Homomorphic encryption in mobile multi cloud computing. In Information Networking (ICOIN), 2015 International Conference on IEEE (2015).

    Google Scholar 

  10. Huang, K., & Tso, R.: A commutative encryption scheme based on ElGamal encryption. In Information Security and Intelligence Control (ISIC), 2012 International Conference on IEEE (2012).

    Google Scholar 

  11. Chen, C. Y., & Tu, J. F.: A novel cloud computing algorithm of security and privacy. Mathematical Problems in Engineering (2013).

    Google Scholar 

  12. Govinda, K.: Secure Framework for cloud environment in collaboration with customers (2015).

    Google Scholar 

  13. Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A.: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data (2015).

    Google Scholar 

  14. Sipos, M., Fitzek, F. H., Lucani, D. E., & Pedersen, M. V.: Distributed cloud storage using network coding. In Consumer Communications and Networking Conference (CCNC). IEEE (2014).

    Google Scholar 

  15. Heide, J., Pedersen, M. V., Fitzek, F. H., & Larsen, T.: Network coding for mobile devices-systematic binary random rateless codes. In Communications Workshops, 2009. ICC Workshops 2009. IEEE International Conference on IEEE (2009).

    Google Scholar 

  16. Ho, T., Médard, M., Koetter, R., Karger, D. R., Effros, M., Shi, J., & Leong, B.: A random linear network coding approach to multicast Vol. 52 No. 10. IEEE Transactions on Information Theory (2006).

    Google Scholar 

  17. Meier, A. V.: The elgamal cryptosystem (2005).

    Google Scholar 

  18. Fitzek, F. H., Toth, T., Szabados, A., Pedersen, M. V., Lucani, D. E., Sipos, M., Medard, M.: Implementation and performance evaluation of distributed cloud storage solutions using random linear network coding. In Communications Workshops (ICC), 2014 IEEE International Conference on IEEE (2014).

    Google Scholar 

  19. Hu, Y., Chen, H. C., Lee, P. P., & Tang, Y.: NCCloud: applying network coding for the storage repair in a cloud-of-clouds. In FAST (2012).

    Google Scholar 

  20. Fragouli, C., Le Boudec, J. Y., & Widmer, J.: Network coding: an instant primer Vol. 36. No. 1 ACM SIGCOMM Computer Communication Review (2006) 63–68.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kirit J. Modi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Modi, K.J., Kapadia, N. (2019). Securing Healthcare Information over Cloud Using Hybrid Approach. In: Panigrahi, C., Pujari, A., Misra, S., Pati, B., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore. https://doi.org/10.1007/978-981-13-0224-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0224-4_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0223-7

  • Online ISBN: 978-981-13-0224-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics