Advertisement

A New Framework for Secure Outsourcing of Medical Data

  • J. Hyma
  • Moulica SudamallaEmail author
  • Dharma Teja Vanaparthi
  • Koushik Vinnakota
  • Vamsi Krishna Choppavarapu
Conference paper
  • 17 Downloads
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 169)

Abstract

Nowadays security has become one of the challenging problems in almost all fields like IT, Banking, Medical, MNC companies, and many more. Cryptography and steganography are some of the few techniques used to provide the security for the text, images and many other multimedia data which is to be transferred over the network. Although the researchers are coming up with more and more enhancements in these fields, still there is a demand for new security challenges for the present-day digital data expansion. The limitation of the Cryptography is after encryption the ciphertext looks meaningless and it is vulnerable to the attacker and thus it raises a transmission interruption. On the other hand, the limitation of steganography is once the hidden information is revealed message is disclosed. The digital users regularly transfer a lot of files from one system to other system either within the range or far range by using the internet or intranet and simultaneously they also look for more security. In this work, a merged technique is proposed to improve the security in which first the message is encrypted using primitive cryptography algorithm—BlowFish and the obtained ciphertext is embedded into an image file using Least Significant Bit (LSB) technique. Here the medical image file is also considered as sensitive data and it is encrypted using a double embedding process with another cover image. This client-side encryption framework helps in providing secure outsourcing of medical data to a third party environment like any cloud service.

Keywords

Cryptography Image steganography LSB Encryption Decryption BlowFish 

References

  1. 1.
    Nawaz, S., Adib, M., Nawaz, M., Kamran, R.: Identifying and analyzing security threats to virtualized cloud computing infrastructures. In: Proceedings of IEEE International Conference on Cloud Computing Technologies, Applications and Managements, pp. 151–155 (2012)Google Scholar
  2. 2.
    Karthikeyan, B., Deepak, A., Subalakshmi, K.S., Anishin Raj, M.M., Vaithiyanathan, V.: A combined approach of steganography with LSB encoding technique and DES algorithm. In: Proceedings of 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bioinformatics (2017)Google Scholar
  3. 3.
    Ranjan, A., Bhonsle, M.: Advanced technics to shared protect cloud data using multilayer steganography and cryptography. In: Proceedings of IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (2016)Google Scholar
  4. 4.
    Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB color images. In: Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4 (2015)Google Scholar
  5. 5.
    Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press)Google Scholar
  6. 6.
    Zhang, Y., Xu, C., Liang, X., Li, H.: Cryptographic public verification of data integrity for cloud storage system. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRefGoogle Scholar
  7. 7.
    Prakash, G.L., Prateak, M., Singh, I.: Efficient data security method to control data in cloud storage system using cryptographic techniques. In: Proceedings of IEEE International Conference on Recent Advances and Innovations in Engineering, pp. 1–6 (2014)Google Scholar
  8. 8.
    Mainberger, M., Schmaltz, C., Berg, M., Weickert, J., Backes, M.: Diffusion-based image compression in steganography. Proceedings of LNCS, vol. 7432(II), pp. 219–228 (2012)Google Scholar
  9. 9.
    Gomathymeenakshi, M., Sruti, S., Karthikeyan, B., Nayana, M.: An efficient arithmetic coding data compression with steganography. In: Proceedings of IEEE International Conference on Emerging Trends in Computing and Nanotechnology, pp. 342–345 (2013)Google Scholar
  10. 10.
    Sarkar, M.K., Chatterjee, T.: Enhancing data storage security in cloud computing through steganography. In: Proceedings of ACEEE International Conference on Network Security, vol. 5, no. 1 (2014)Google Scholar
  11. 11.
    Chauhan, S., Kumar, J.J., Doegar, A.: Multiple layer text security using variable block size cryptography and image steganography. In: Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology (2017)Google Scholar
  12. 12.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of Financial Cryptography and Data Security Workshops, pp. 136–149 (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • J. Hyma
    • 1
  • Moulica Sudamalla
    • 1
    Email author
  • Dharma Teja Vanaparthi
    • 1
  • Koushik Vinnakota
    • 1
  • Vamsi Krishna Choppavarapu
    • 1
  1. 1.Department of CSEAnil Neerukonda Institute of Technology and SciencesVisakhapatnamIndia

Personalised recommendations