An Efficient Hybrid Elliptic Curve Cryptography for Securing E-Healthcare Data in Cloud Environment

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 12
Year of Publication : 2024
Authors : D. Nagamany Abirami, M. S. Anbarasi
pdf
How to Cite?

D. Nagamany Abirami, M. S. Anbarasi, "An Efficient Hybrid Elliptic Curve Cryptography for Securing E-Healthcare Data in Cloud Environment," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 12, pp. 189-205, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I12P118

Abstract:

After COVID-19, establishing medical and health records, telemedicine, and mobile treatment has shown the potential to strengthen the healthcare system. Cloud computing is a major part of data communication between patients and medical experts. In healthcare, cloud computing stores and manages large volumes of data, such as Electronic Medical Records (EMRs), patient data, and medical images. Healthcare data contains very sensitive data that needs to be protected from hackers. This paper proposes a comprehensive security framework explicitly tailored for e-health systems, strengthened by integrating Advanced Elliptic Curve Cryptography (AECC) techniques, utilizing a hybrid approach combining Weierstrass and Montgomery forms. The framework addresses various security concerns in e-health systems, including data confidentiality, integrity, availability, and privacy. By leveraging a hybrid AECC approach, combining the advantages of both Weierstrass and Montgomery forms, the framework enhances the encryption and decryption processes critical for safeguarding sensitive health information. Key components of the proposed framework include robust access control mechanisms, advanced data encryption strategies, secure data transmission protocols, and resilient authentication mechanisms. By leveraging the strengths of both Weierstrass and Montgomery forms, the framework balances security and computational efficiency, ensuring seamless operation within cloud environments while maintaining robust protection for sensitive healthcare information. The efficiency of the proposed security framework is evaluated through comprehensive simulations and performance analyses, demonstrating its effectiveness in safeguarding e-health data while minimizing computational overhead. The results indicate that the hybrid ECC approach offers a practical and efficient solution for securing e-health systems and enhancing trust and compliance with regulatory requirements in the healthcare domain.

Keywords:

e-Health systems, Comprehensive security framework, Advanced Elliptic Curve Cryptography, Data encryption, Data integrity, Access control, Cloud computing, Data privacy.

References:

[1] P. Upender, and P.A. Harsha Vardhini, “Design Analysis of Rectangular and Circular Microstrip Patch Antenna with Coaxial Feed at S-Band for Wireless Applications,” Proceedings of the 4th International Conference on IoT in Social, Mobile, Analytics and Cloud (ISMAC), Palladam, India, pp. 274-279, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Vansh Arora, “A Framework for Cloud-Based EHR Security Using Hybrid Cryptographic Methods of AES and ECC,” Master Thesis, Dublin, National College of Ireland, pp. 1-24, 2023.
[Google Scholar] [Publisher Link]
[3] Jaganathan Logeshwaran et al., “Evaluating Key Management Strategies for Applied Cryptography Protocols,” Proceedings of the 5th International Conference on Information Management & Machine Intelligence, Jaipur India, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Prabhakar Marry et al., “Blockchain Based Smart Healthcare System,” Proceedings of the 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India, pp. 1480-1484, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] B. Ravi Krishna et al., “Artificial Intelligence Probabilities Scheme for Disease Prevention Data Set Construction in Intelligent Smart Healthcare Scenario,” SLAS Technology, vol. 29, no. 4, pp. 1-11, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Prathima Subramanian, and R. Durga, “PDHSMICK: A Partial Key-Based Secure EHRs with Distributed Cloud for Healthcare Systems Applying MI-CRYSTALS-Kyber,” Computer Software and Media Applications, vol. 6, no. 1, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Amjad Rehman et al., “A Novel Resilient and Intelligent Predictive Model for CPS-Enabled E-Health Applications,” Cognitive Computation, vol. 16, pp. 1321-1330, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] J. Logeshwaran et al., “Clinical Resource Management with AI/ML-Driven Automated Diagnostics in Smart Healthcare,” Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] B. Deena Divya Nayomi et al., “A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 1, pp. 313-327, 2023.
[Google Scholar] [Publisher Link]
[10] P. Lavanya Kumari et al., “Video Object Forgery Detection Using Image Processing Techniques,” 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Kirtipur, Nepal, pp. 785-788, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] B.V. Chowdary et al., “An Effective and Efficient Heart Disease Prediction Model Using Distributed High Performance Light GBM,” 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), India, pp. 662-667, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] J. Mahalakshmi et al., “Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-Based Approach for Access Control and Privacy Protection,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 6s, pp. 370-384, 2023.
[Google Scholar] [Publisher Link]
[13] Srinu Banothu, A. Govardhan, and Karnam Madhavi, “Performance Evaluation of Cloud Database Security Algorithms,” E3S Web of Conferences, vol. 309, pp. 1-8, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Harish Reddy Gantla et al., “Machine Learning-Based Trust-Aware Secure Traffic Mechanism to Identify DDOS Attacks over Cloud,” Proceedings of the 5th International Conference on Information Management & Machine Intelligence, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] R. Charanya, R.A.K. Saravanaguru, and M. Aramudhan, “Information Security Protection for eHealth Records Using Temporal Hash Signature,” International Journal of Intelligent Enterprise, vol. 10, no. 1, pp. 14-30, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Srinu. Banothu, A. Govardhan, and Karnam. Madhavi, “A Fully Distributed Secure Approach Using Nondeterministic Encryption for Database Security in Cloud,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 7, pp. 2218-2228, 2022.
[Google Scholar] [Publisher Link]
[17] Madhavi Karanam et al., “Performance Evaluation of Cryptographic Security Algorithms on Cloud,” E3S Web of Conferences, vol. 391, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Kaushik Sekaran et al., “Bio-Inspired Fuzzy Model for Energy Efficient Cloud Computing through Firefly Search Behaviour,” New Trends in Computational Vision and Bio-Inspired Computing, pp. 1043-1049, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] O. Sri Nagesh et al., “Providing Security Properties of Cloud Service by Using REST APIs,” Springer Proceedings in Mathematics and Statistics, Vizianagaram, India, vol. 421, pp. 631-639, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Santosh Kumar Srivastava et al., “Cloud-Integrated Big Data Algorithms for Deep Learning in Healthcare Systems,” Advances in Science, Technology and Innovation, pp. 169-179, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Srinu Banothu et al., “A Secure Data Storage Approach for Online Examination Platform Using Cloud DBAAS Service,” Scalable Computing, vol. 25, no. 5, pp. 3715-3724, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] T. Bala Murali Krishna et al., “Software-Driven Secure Framework for Mobile Healthcare Applications in IoMT,” Intelligent Decision Technologies, vol. 17, no. 2, pp. 377-393, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Udit Mamodiya et al., “Enhancing Security in Cloud Registration with Multi-Dimensional Features Fusion,” Proceedings of the 5th International Conference on Information Management & Machine Intelligence, Jaipur, India 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] G. Janardhan, et al., “Adaptive Network Traffic Reduction for Optimal Performance,” Proceedings of the 2024 International Conference on Expert Clouds and Applications (ICOECA), pp. 904-908, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] B.V. Chowdary et al., “An Effective and Efficient Alzheimer Disease Prediction System Using Machine Learning Model,” Proceedings of the 5th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC, India, pp. 342-347, 2021.
[CrossRef] [Google Scholar] [Publisher Link]