Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES

  • A. M. AdeshinaEmail author
  • R. Hashim
Original Research Article


Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare procedures have immensely benefitted from the contemporary information technology revolutions, apparently revolutionizing those approaches to acquiring, storing and sharing of diagnostic data for efficient and timely diagnosis of diseases. Connected health network was introduced as an alternative to the ageing traditional concept in healthcare system, improving hospital–physician connectivity and clinical collaborations. Undoubtedly, the modern medicinal approach has drastically improved healthcare but at the expense of high computational cost and possible breach of diagnosis privacy. Consequently, a number of cryptographical techniques are recently being applied to clinical applications, but the challenges of not being able to successfully encrypt both the image and the textual data persist. Furthermore, processing time of encryption–decryption of medical datasets, within a considerable lower computational cost without jeopardizing the required security strength of the encryption algorithm, still remains as an outstanding issue. This study proposes a secured radiology-diagnostic data framework for connected health network using high-performance GPU-accelerated Advanced Encryption Standard. The study was evaluated with radiology image datasets consisting of brain MR and CT datasets obtained from the department of Surgery, University of North Carolina, USA, and the Swedish National Infrastructure for Computing. Sample patients’ notes from the University of North Carolina, School of medicine at Chapel Hill were also used to evaluate the framework for its strength in encrypting–decrypting textual data in the form of medical report. Significantly, the framework is not only able to accurately encrypt and decrypt medical image datasets, but it also successfully encrypts and decrypts textual data in Microsoft Word document, Microsoft Excel and Portable Document Formats which are the conventional format of documenting medical records. Interestingly, the entire encryption and decryption procedures were achieved at a lower computational cost using regular hardware and software resources without compromising neither the quality of the decrypted data nor the security level of the algorithms.


Radiology data Diagnosis privacy Encryption algorithms High-performance algorithms Medical visualization 


  1. 1.
    Yang J-J, Li J-Q, Nui Y (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43–44:74–86CrossRefGoogle Scholar
  2. 2.
    Das AK, Goswami A (2013) A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37:9948CrossRefPubMedGoogle Scholar
  3. 3.
    Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3):e0119660. doi: 10.1371/journal.pone.0119660 CrossRefPubMedPubMedCentralGoogle Scholar
  4. 4.
    Luo X, Qi Y, Wan T, Wang Q, Zhang H (2014) A fast aes encryption method based on single lut for industrial wireless network. In: International conference on identification, information and knowledge in the internet of things, Beijing, pp 158–161Google Scholar
  5. 5.
    Morioka S, Satoh A (2004) A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. IEEE Trans VLSI Syst 12(7):686–691CrossRefGoogle Scholar
  6. 6.
    Rahimunnisaa K, Karthigaikumara P, Kirubavathya J, Jayakumarb J, Kumarc SS (2014) A 0.13-μm implementation of 5 Gb/s and 3-mW folded parallel architecture for AES algorithm. Int J Electron 101(2):182–193CrossRefGoogle Scholar
  7. 7.
    Bertoni G, Breveglieri L, Fragneto P, Macchetti M, Marchesin S (2003) Efficient software implementation of AES on 32-bit platforms. Cryptographic hardware and embedded systems-CHES 2002. Springer, Berlin, pp 159–171CrossRefGoogle Scholar
  8. 8.
    Atasu K, Breveglieri L, Macchetti M (2004) Efficient AES implementations for ARM based platforms. In: Proceedings of the ACM symposium on applied computing. ACM, pp 841–845Google Scholar
  9. 9.
    Käsper E, Schwabe P (2009) Faster and timing-attack resistant AES-GCM. Cryptographic hardware and embedded systems. Springer, Berlin, pp 1–17Google Scholar
  10. 10.
    Nadeem A, Javed MY (2005) A performance comparison of data encryption algorithms. In: First international conference on information and communication technologies, pp 84–89Google Scholar
  11. 11.
    Abugharsa AB, Basari ASH, Almangush H (2012) A new image encryption approach using the integration of a shifting technique and the AES algorithm. Int J Comput Appl 42:38–45Google Scholar
  12. 12.
    Tanvi T (2013) An image cryptosystem based on pixel scrambling and AES algorithm. Int J Comput Appl 80:15–18Google Scholar
  13. 13.
    Muhaya F, Usama M, Akhter F (2014) Chaos based secure storage and transmission of digital medical images. Appl Math Inf Sci 8:27–33CrossRefGoogle Scholar
  14. 14.
    Suganya G, Amudha K (2014). Medical image integrity control using joint encryption and watermarking techniques. In: International conference on green computing communication and electrical engineering, Coimbatore, pp 1–5Google Scholar
  15. 15.
    Khalilian R, Rezai A, Abedini E (2014) An efficient method to improve WBAN security. Adv Sci Technol Lett 64:43–46CrossRefGoogle Scholar
  16. 16.
    Aliyu A, Khaitan S, Yarima KI, Rabiu UI (2015) High speed VPN using enhanced AES algorithm. Int J Res Technol 4(3):744–746Google Scholar
  17. 17.
    Nie T, Zhang T (2009). A study of DES and blowfish encryption algorithm. In: IEEE region 10 conference, Singapore, pp 1–4Google Scholar
  18. 18.
    National Bureau of Standard (US) (1997) Data encryption Standard (DES). Federal information processing standards publication 46, national technical information service, SpringfieldGoogle Scholar
  19. 19.
    Kerckhoffs A (1883) The military cryptography. J Mil Sci 9:5–38Google Scholar
  20. 20.
    Huang Y-L, Leu F-Y, Liu J-C, You I, Yim K, Chen J-H, Chu W, C-C (2014) A random wrapping encryption method. In: Consumer communications and networking conference: mobility management in the networks of the future world. Las Vegas, pp 151–156Google Scholar
  21. 21.
    National Institute of Standards and Technology (NIST) (2001) Advanced encryption standard (AES), national institute of standards and technology, US Department of CommerceGoogle Scholar
  22. 22.
    Chang C-C, Hwang M-S, Chen T-S (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58(2):83–91CrossRefGoogle Scholar
  23. 23.
    Adeshina AM, Hashim R, Khalid NEA (2014) CAHECA: computer aided hepatocellular carcinoma therapy planning. Interdiscip Sci Comput Life Sci 6:222–234CrossRefGoogle Scholar
  24. 24.
    Adeshina AM, Hashim R, Khalid NEA, Abidin SZZ (2012) Locating abnormalities in brain blood vessels using parallel computing architecture. Interdiscip Sci Comput Life Sci 4:161–172CrossRefGoogle Scholar
  25. 25.
    Daemen J, Rijmen V (2002) The design of rijndael, AES: the advanced encryption standard. Springer, New YorkCrossRefGoogle Scholar
  26. 26.
    Adeshina AM, Hashim R (2015) ConnectViz: accelerated approach for brain structural connectivity using Delaunay triangulation. In: Interdisciplinary sciences: computational life sciences, pp 1–13Google Scholar
  27. 27.
    Adeshina AM, Hashim R, Khalid NEA, Abidin SZZ (2013) Multimodal 3-D reconstruction of human anatomical structures using surlens visualization system. Interdiscip Sci Comput Life Sci 4:161–172CrossRefGoogle Scholar

Copyright information

© International Association of Scientists in the Interdisciplinary Areas and Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  1. 1.Faculty of Computer Science and Information TechnologyUniversiti Tun Hussein Onn MalaysiaParit Raja, Batu PahatMalaysia

Personalised recommendations