Medical Data Privacy Representation with Improved Encryption Algorithm

Authors

  • Zaheer Sultana PhD Student, Department of computer science Banasthali Vidyapith University, India.
  • Deepak Kumar Assistant professor, Department of computer science Banasthali Vidyapith University, India.

Keywords:

medical records, privacy, Data preservation, integrity, confidentiality, encryption, decryption, cloud, optimal key

Abstract

For research projects involving health care, it might be necessary to collect patient health records from several locations, with various rules governing the release of personal health data. Due to the sensitive nature of health information; privacy is a major concern when patients' health care records are used for dissertation.  Data preservation is a technique for defending the integrity and confidentiality of data. Huge databases may contain metadata—uncertain, unstable elements—in their data that may include sensitive information, user profiles, and other information that is subject to intrusion from outside parties like hackers or attackers. They may abuse the information, which would compromise its privacy and confidentiality. The data must be stored safely and made accessible for future use. In order to preserve and safeguard people's data privacy in terms of secrecy and dependability, an effective approach is required. In this paper, for encryption a new Advanced Twofish Encryption standard (ATFES) algorithm is proposed that helps to encrypt the collected raw data. Then, in order to generate the optimal key for encryption and decryption Optimized Radial Basis Function Networks (RBFNs) leveraged with Mayfly-Levy optimization algorithm (MLOA). This encrypted data will be stored in the cloud, and it will be transmitted via the blocks of the blockchain. The same ideal code that was used for encryption will be utilised to recover the encrypted data at the receiving end. The receiver is unable to get the data if the same key is not utilised. The research shows that the suggested techniques are more effective at encrypting and decrypting data over the other state-of-the-art methods. The Matlab platform is used to carry out the implementation.

Downloads

Download data is not yet available.

References

Chen, Y., Ding, S., Xu, Z., Zheng, H. and Yang, S., 2019. Blockchain-based medical records secure storage and medical service framework. Journal of medical systems, 43(1), pp.1-9.

Bagloee, S.A., Heshmati, M., Dia, H., Ghaderi, H., Pettit, C. and Asadi, M., 2021. Blockchain: the operating system of smart cities. Cities, 112, p.103104.

Argaw, S.T., Troncoso-Pastoriza, J.R., Lacey, D., Florin, M.V., Calcavecchia, F., Anderson, D., Burleson, W., Vogel, J.M., O’Leary, C., Eshaya-Chauvin, B. and Flahault, A., 2020. Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks. BMC medical informatics and decision making, 20(1), pp.1-10.

Das, M., Luo, H. and Cheng, J.C., 2020. Securing interim payments in construction projects through a blockchain-based framework. Automation in construction, 118, p.103284.

Ghimire, T., Joshi, A., Sen, S., Kapruan, C., Chadha, U. and Selvaraj, S.K., 2021. Blockchain in additive manufacturing processes: recent trends & its future possibilities. Materials Today: Proceedings.

Dwivedi, V., Norta, A., Wulf, A., Leiding, B., Saxena, S. and Udokwu, C., 2021. A formal specification smart-contract language for legally binding decentralized autonomous organizations. IEEE Access, 9, pp.76069-76082.

Amir Latif, R.M., Hussain, K., Jhanjhi, N.Z., Nayyar, A. and Rizwan, O., 2020. A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology. Multimedia tools and applications, pp.1-24.

Moin, S., Karim, A., Safdar, Z., Safdar, K., Ahmed, E. and Imran, M., 2019. Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Generation Computer Systems, 100, pp.325-343.

Deng, H., Qin, Z., Wu, Q., Guan, Z. and Zhou, Y., 2020. Flexible attribute-based proxy re-encryption for efficient data sharing. Information Sciences, 511, pp.94-113.

Sun, S., Ma, H., Song, Z. and Zhang, R., 2020. WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms. IEEE Transactions on Dependable and Secure Computing.

Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q. and Zheng, D., 2019. Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals of Telecommunications, 74(7), pp.401-411.

Al-Asli, M., Elrabaa, M.E. and Abu-Amara, M., 2018. FPGA-based symmetric re-encryption scheme to secure data processing for cloud-integrated internet of things. IEEE Internet of Things Journal, 6(1), pp.446-457.

Sun, J., Xu, G., Zhang, T., Xiong, H., Li, H. and Deng, R., 2021. Share your data carefree: An efficient, scalable and privacy-preserving data sharing service in cloud computing. IEEE Transactions on Cloud Computing.

Awotunde, J.B., Folorunso, S.O., Bhoi, A.K., Adebayo, P.O. and Ijaz, M.F., 2021. Disease diagnosis system for IoT-based wearable body sensors with machine learning algorithm. In Hybrid Artificial Intelligence and IoT in Healthcare (pp. 201-222). Springer, Singapore.

Wang, S., Zhang, Y. and Zhang, Y., 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. Ieee Access, 6, pp.38437-38450.

Jing Li, XiaohuiKuang, Shujie Lina, Xu Ma, Yi Tange, "Privacy preservation for machine learning training and classification based on homomorphic encryption schemes", Information Sciences, Vol. 526, pp. 166-179, 2020.

Qi Wang, Dehua Zhou, Shiyin Yang, Peng Li, Chuansheng Wang, Quanlong Guan, “Privacy Preserving Computations over Healthcare Data”, IEEE, 2019.

Haiping Huang, Peng Zhua,b, Fu Xiao, Xiang, Qinglong Huang, “A blockchain-based scheme for privacy-preserving and secure sharing of medical data”, Computer & Security, Vol.99, 2020.

Koosha Mohammad Hossein, Mohammad EsmaeilEsmaeili, TooskaDargahi, Ahmad Khonsari, Mauro Conti, “BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications”, Computer Communications, vol.180, pp. 31-47, 2021.

A. Sathya, S.Kanaga Suba Raja, “Privacy Preservation Based Access Control Intelligence for Cloud Data Storage in Smart Healthcare Infrastructure”, Springer, 2021.

NikunjDomadiya, UdaiPratap Rao, “Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining”, Springer, 2020.

Zijie Yue, Shuai Ding, Lei Zhao, Youtao Zhang, Zehong Cao, M. Tanveer, AlirezaJolfaei, Xi Zheng, “Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework”, ACM Transactions on Internet Technology, Vol.21, 2021.

Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li, “Privacy-preserving range query over multi-source electronic health records in public clouds”, Journal of Parallel and Distributed Computing, vol.135, pp. 127-139, 2020.

R. Ramya Devi, V. VijayaChamundeeswari, “Triple DES: Privacy Preserving in Big Data Healthcare”, International Journal of Parallel Programming, 2018.

TehsinKanwal, AdeelAnjum, SaifU.R.Malik, Abid Khan, MuazzamA.Khan, “Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud”, Computer Standards & Interfaces, Vol.78, 2021.

Dataset collected from http://www.cell.com/cell/fulltext/S0092-8674(18)30154-5, 2022-10-15

Rajiv, A., Saxena, A.K., Singh, D., Awasthi, A., Dhabliya, D., Yadav, R.K., Gupta, A. IoT and machine learning on smart home-based data and a perspective on fog computing implementation (2023) Handbook of Research on Machine Learning-Enabled IoT for Smart Applications Across Industries, pp. 336-349.

Chaudhury, S., Dhabliya, D., Madan, S., Chakrabarti, S. Blockchain technology: A global provider of digital technology and services (2023) Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance, pp. 168-193.

Downloads

Published

13.12.2023

How to Cite

Sultana, Z. ., & Kumar , D. . (2023). Medical Data Privacy Representation with Improved Encryption Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 581–591. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4230

Issue

Section

Research Article