Unified Security Paradigm: Bi-Factor Authentication and Hyper Elliptical Curve Cryptography in IoT-Enabled Cloud Data Protection (BFHECC - IoMT)
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 2 |
Year of Publication : 2024 |
Authors : T.A. Mohanaprakash, K. Sivakumar, Nirmalrani Vairaperumal, M. Ramya, K. Cinthuja |
How to Cite?
T.A. Mohanaprakash, K. Sivakumar, Nirmalrani Vairaperumal, M. Ramya, K. Cinthuja, "Unified Security Paradigm: Bi-Factor Authentication and Hyper Elliptical Curve Cryptography in IoT-Enabled Cloud Data Protection (BFHECC - IoMT)," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 2, pp. 33-40, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I2P104
Abstract:
Ensuring robust security for cloud-stored sensitive information and medical data is critical in contemporary technological landscapes. Safeguarding cloud data involves encryption, access controls, and authentication methods like TLS and multi-factor authentication. Yet, vulnerabilities such as breaches or misconfigurations pose ongoing threats, necessitating continual improvements. The proposed (BFHECC-IoMT) solution integrates a two-factor authentication model and “Hyper Elliptical Curve Cryptography,” presenting a formidable security infrastructure for cloud storage. This framework strengthens data encryption using conventional (password or PIN) and hyper elliptical curve-based authentication methods. It fortifies security beyond typical measures, increasing resistance to cryptographic attacks during data transmission or storage. On the other hand, integrating IoMT and cloud security, bolstered by Homomorphic Encryption and Elliptic Curve Cryptography (HECC), establishes a robust security framework for managing sensitive medical information. Addressing the oversight in existing healthcare systems, this integration ensures enhanced data confidentiality and integrity during transmission and storage. Seamlessly uniting IoMT, cloud security, Homomorphic Encryption, and ECC facilitates secure data transfer from IoT devices to cloud systems, ensuring stringent security standards for maintaining confidentiality, integrity, and availability. This comprehensive approach secures patient data transmission and provides privacy during analysis, compliance with healthcare regulations, and the overall secure handling and analysis of health data in the healthcare sector.
Keywords:
Elliptic Curve Cryptography, Homomorphic Encryption, Internet of Medical Things, Authentication, Medical data.
References:
[1] Md. Alimul Haque et al., “Security and Privacy in Internet of Things,” International Conference on Emerging Technologies in Computer Engineering, Switzerland, pp. 226-235, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] M. Vijayakumar, and T.S. Shiny Angel, “A Survey on IoT Security: Security Threads and Analysis of Botnet Attacks over IoT and Avoidance,” Cyber Security, Privacy and Networking, pp. 141–154, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] El Mahdi Boumait et al., “Survey IOT Systems Security Based on Machine Learning,” International Conference on Digital Technologies and Applications, Fez, Morocco, pp. 251-258, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Sachin Gupta, Babita Yadav, and Bhoomi Gupta, “Security of IoT-Based e-Healthcare Applications Using Blockchain,” Advances in Blockchain Technology for Cyber Physical Systems, pp. 79–107, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Volkan Dedeoglu et al., “A Trust Architecture for Blockchain in IoT,” Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, USA, pp. 190–199, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Bhabendu Kumar Mohanta et al., “Addressing Security and Privacy Issues of IoT Using Blockchain Technology,” IEEE Internet Things Journal, pp. 881-888, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mohammad Wazid, Ashok Kumar Das, and Sachin Shetty, “TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge Enabled IoT Systems,” IEEE Internet Things Journal, vol. 9, no. 22, pp. 22643–22656, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Qi Xie, Zixuan Ding, and Bin Hu, “A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things,” Security, Privacy and Reliability in Cloud-Based Internet of Things, vol. 2021, pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] A. Pasumpon Pandian, “Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection,” Journal of Soft Computing Paradigm, vol. 2, no. 1, pp. 24-35, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Shubham Gupta, Anand Gupta, and Gori Shankar, “Cloud Computing: Services, Deployment Models and Security Challenges,” 2nd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, pp. 414-418, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Smitha Nisha Mendonca, “Data Security in Cloud Using AES,” International Journal of Engineering Research & Technology (IJERT), vol. 7, no. 1, pp. 205-208, 2018.
[Google Scholar] [Publisher Link]
[12] Adesh Kumari et al., “A Secure User Authentication Protocol Using Elliptic Curve Cryptography,” Journal of Discrete Mathematics and Cryptography, vol. 22, pp. 521-530, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Eric Conrad, Seth Misenar, and Joshua Feldman, Advanced Encryption Standard- An Overview, Eleventh Hour CISSP:: Study Guide, 3rd Ed, pp. 1-221, 2016.
[Google Scholar] [Publisher Link]
[14] Raghunadha Reddi Dornala, “Ensemble Security and Multi-Cloud Load Balancing for Data in Edge-Based Computing Applications,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 14, no. 8, pp. 7-13, 2023.
[Google Scholar] [Publisher Link]
[15] Nesrine Kaaniche, and Maryline Laurent, “Data Security and Privacy Preservation in Cloud Storage Environments Based on Cryptographic Mechanisms,” Computer Communications, vol. 111, pp. 120-141, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ren-Junn Hwang, Chih-Hua Lai, and Feng-Fu Su, “An Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve,” Applied Mathematics and Computation, vol. 167, no. 2, pp. 870-881, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Caixue Zhou et al., “Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings,” Security and Communication Networks, vol. 2017, pp. 1-17, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hassan M. Elkamchouchi, Mohamed H. El-Atiky, and Eman Abouelkheir, “A Public Verifiability Signcryption Scheme without Pairings,” International Journal of Computer Applications, vol. 157, no. 9, pp. 35–40, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Insaf Ullah et al., “A Novel Provable Secured Signcryption Scheme: A Hyper-Elliptic Curve-Based Approach,” Mathematics, vol. 7, no. 8, pp. 1-16, 2019.
[CrossRef] [Google Scholar] [Publisher Link]