Abstract
In healthcare environments, edge computing has emerged as a significant tool for providing real-time data processing and analysis. Yet, due to the sensitive nature of healthcare data, sophisticated security measures, including encryption methods, are required. While encryption techniques provide high-level security, they can also be computationally demanding and have an influence on edge device performance. As a result, this research study provides a survey of the literature on strategies for improving encryption algorithms in edge computing for smart hospitals. The research evaluates the performance of numerous encryption methods, including AES, DES, RSA, ECC, and HE, in edge computing. The research also looks at optimization strategies such protocol optimization, hardware acceleration, and cloud-assisted encryption. This paper’s results will be valuable for healthcare companies trying to utilize edge computing technologies while guaranteeing patient data security and privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jaiswal A, Garg S, Singh D (2021) An edge computing-based architecture for smart hospitals. J Ambient Intell Humaniz Comput 12(9):9777–9789
Gubbi J, Rajasegarar S, Buyya R (2013) A survey of edge computing in healthcare. IEEE Access 1:690–705
De D, Bhattacharya A, Chattopadhyay S, Islam S (2020) Edge computing-based solutions for patient monitoring in smart hospitals. Int J Pervasive Comput Commun 16(3):273–292
Bai L, Zhang S, Sun Q (2020) Privacy and security in edge computing for smart hospitals. IEEE Internet Things J 7(11):10799–10810
Liu Y, Wang X (2021) Edge computing for IoT-based healthcare applications. IEEE Netw 35(3):86–92
Balaji P, Dey S, Pal A, Buyya R (2019) A review of edge computing technologies for healthcare. J Parallel Distrib Comput 133:96–114
Zhao X, Zhang L, Xie J (2021) Edge computing and AI for healthcare. J Ambient Intell Humaniz Comput 12(9):9791–9802
Liang C, Zhou Q (2019) Edge computing for remote patient monitoring in smart hospitals. IEEE Access 7:25880–25888
Luo Y, Li L, Li S, Song H (2020) A systematic review of edge computing in healthcare. Int J Inf Manage 50:298–306
Zhang W, Peng Y, Zhang Y (2021) A review of encryption techniques for edge computing. J Phys Conf Ser 1842(1):012078
Wang H, Zhan J, Xu B, Zhang Y (2021) Secure data transmission in edge computing: a review of cryptographic techniques. Future Internet 13(8):200
Khan SA, Bilal M (2019) A comparative analysis of encryption algorithms in edge computing. Int J Comput Appl 181(37):10–15
Singh M, Verma AK (2020) A survey of lightweight cryptography for edge computing. Int J Intell Syst Appl 12(4):68–77
Wu L, Li Y, Gao Z, Zhou H (2020) Enhancing data security in edge computing with quantum key distribution. IEEE Commun Mag 58(3):68–74
Ding S, Chen Y, Qiao Y (2020) Optimizing homomorphic encryption for edge computing. IEEE Access 8:78493–78500
Hu L, Yang X (2021) An overview of elliptic curve cryptography for edge computing. Int J Future Gener Commun Netw 14(8):121–134
Liu H, Dong J (2021) Secure edge computing: a review of cryptography-based approaches. IEEE Access 9:87419–87433
Aslam MA, Li Y, Zhang X, Cai Z (2021) Optimizing the performance of encryption algorithms in edge computing using parallel computing. Concurrency Comput Pract Exp 33(7):e6462
El-Sappagh S, Ali F, Mohamed M (2021) A comparative study of encryption techniques for healthcare data in edge computing. Int J E-Health Med Commun 12(2):23–36
Zhang L, Sun Y, Huang T, Guo W (2021) Review on encryption techniques for edge computing. Int J Netw Sec 23(2):299–307
Wang X, Wu S, Chen Y, Wei W (2021) A survey on cryptographic techniques for secure data transmission in edge computing. IEEE Access 9:66935–66952
Khan MH, Bilal M (2019) Performance evaluation of encryption algorithms in edge computing. In: Proceedings of the 3rd international conference on computing and artificial intelligence. ACM, pp 101–106
Singh R, Verma A (2020) Survey on lightweight cryptography for edge computing. J Ambient Intell Humaniz Comput 11(12):5217–5231
Wu J, Wei B, Wang J, Xu J, Lu Y (2020) Quantum key distribution for edge computing: a survey. IEEE Commun Mag 58(12):68–73
Ding J, Liu K, Jia X, Wang X (2020) An optimized homomorphic encryption algorithm for edge computing. In: Proceedings of the 2nd international conference on industrial artificial intelligence. Springer, pp 267–274
Hu J, Yang Y (2021) An overview of elliptic curve cryptography for edge computing. J Ambient Intell Humaniz Comput 12(1):377–388
Liu C, Dong X (2021) Cryptography-based approaches for secure edge computing: a review. IEEE Internet Things J 8(4):2324–2337
Aslam F, Chen J, Abbasi QH (2021) Optimizing encryption algorithms in edge computing using parallel computing. J Ambient Intell Humaniz Comput 12(7):7421–7434
Khetani V, Gandhi Y, Bhattacharya S, Ajani SN, Limkar S (2023) Cross-domain analysis of ML and DL: evaluating their impact in diverse domains. Int J Intell Syst Appl Eng 11(7s):253–262
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Peshane, V.V., Baig, M.M., Sonekar, S.V., Sawwashere, S. (2024). Technique for Optimizing Encryption Algorithms in Edge Computing for Smart Hospital. In: Chakravarthy, V.V.S.S.S., Bhateja, V., Anguera, J., Urooj, S., Ghosh, A. (eds) Advances in Microelectronics, Embedded Systems and IoT. ICMEET 2023. Lecture Notes in Electrical Engineering, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-97-0767-6_39
Download citation
DOI: https://doi.org/10.1007/978-981-97-0767-6_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0766-9
Online ISBN: 978-981-97-0767-6
eBook Packages: EngineeringEngineering (R0)