Abstract
The electronic patient record (EPR) data sharing is a critical and major challenging issue in cloud environment. The processing chain of EPR mainly includes record collection, record storage, record sharing, etc. Conventional healthcare system often requires the delivery of EPR to the cloud which involves user-sensitive information and causes correspondence vitality utilization. Practically, EPR data sharing is a critical and challenging issue. In this work, we proposed a novel technique healthcare system by effectively handling the EPR data in cloud storage. The management of keys has consistently been a security threat of healthcare system; anyway, its belonging has been intensified after presentation of the cloud; that is why key management needs to be performed effectively. Our novel approach can only be done by securing the process of key management. This is the best way to guarantee that touchy data is not weak when it is setting off to the cloud. Furthermore, keys should be mutually made sure about, and the recovery cycle ought to be troublesome and tedious to ensure that information can never be gotten to without authorization. Finally, in order to protect the healthcare data from criminal attackers by our approach, our experiments are demonstrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim H, Lee H, Kim W, Kim Y (2010) A trust evaluation model for QoS guarantee in cloud systems. Int J Grid Dis Comput 3(1):1–10
Yang Z, Qiao L, Liu C, Yang C Wan G (2010) A collaborative trust model of firewall-through based on Cloud Computing. In: The 2010 14th international conference on computer supported cooperative work in design (IEEE), pp 329–334
Ahmed M, Xiang Y, Ali S (2010) Above the trust and security in cloud computing: A notion towards innovation. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (IEEE), pp 723–730
Brodkin J (2008) Gartner: Seven cloud-computing security risks. Infoworld, pp 1–3
Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 international conference on computer science and electronics engineering (IEEE), pp 647–651
Grobauer B, Walloschek T, Stocker E (2010) Understanding cloud computing
Altowaijri S, Mehmood R, Williams J (2010) A quantitative model of grid systems performance in healthcare organisations. In: 2010 international conference on intelligent systems, modelling and simulation. IEEE, pp 431–436
Mehmood R, Faisal M.A., Altowaijri S (2015) Future networked healthcare systems: a review and case study. In: Handbook of research on redesigning the future of internet architectures. IGI Global, pp 531–558
Alazawi Z, Alani O, Abdljabar MB, Altowaijri S, Mehmood R (2014) A smart disaster management system for future cities. In: Proceedings of the 2014 ACM international workshop on wireless and mobile technologies for smart cities, pp 1–10
Alazawi Z, Altowaijri S, Mehmood R, Abdljabar MB (2011) Intelligent disaster management system based on cloud-enabled vehicular networks. In: 2011 11th international conference on ITS telecommunications (IEEE), pp 361–368
Mehmood R, Alam F, Albogami NN, Katib I, Albeshri A, Altowaijri SM (2017) UTiLearn: a personalised ubiquitous teaching and learning system for smart societies. IEEE Access 5:2615–2635(2017)
Panda M (2016) Performance analysis of encryption algorithms for security. In: 2016 international conference on signal processing, communication, power and embedded system. SCOPES—IEEE, pp 278–284
Altowaijri SM (2020) An architecture to improve the security of cloud computing in the healthcare sector. In: Smart Infrastructure and Applications. Springer, pp 249–266
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun CM 21(2):120–126
Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comp Appl 67(19)
Abd Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10(3):216–222
Singh G, Kinger S (2013) Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. Int J Sci Eng Res 4(7): 2058
Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (Blowfish). In: International workshop on fast software encryption. Springer, Berlin, Heidelberg, pp 191–204
Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: Tencon 2009–2009 IEEE region 10 conference, pp 1–4
Rajkumar N, Kannan E (2020) Attribute-based collusion resistance in group-based cloud data sharing using LKH model. J Circ Syst Comput 29(02):2030001–2030020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajkumar, N., Kannan, E. (2021). Security Enhancement of E-Healthcare System in Cloud Using Efficient Cryptographic Method. In: Singh Pundir, A.K., Yadav, A., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-0167-5_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-0167-5_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0166-8
Online ISBN: 978-981-16-0167-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)