Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments

被引:0
作者
Awadh W.A. [1 ]
Hashim M.S. [2 ]
Alasady A.S. [3 ]
机构
[1] Department of Computer Information Systems, University of Basrah, Basrah
[2] Department of Computer science, Education College for Pure Sciences, University of Basrah, Basrah
[3] Department of Computer Science, University of Basrah, Basrah
来源
Informatica (Slovenia) | 2024年 / 48卷 / 06期
基金
英国科研创新办公室;
关键词
cloud computing; data encryption standard; healthcare data; security; triple-data encryption standard;
D O I
10.31449/inf.v48i6.5641
中图分类号
学科分类号
摘要
Recently, big data analysis has been a very active research area with a significant impact on industrial and scientific domains. Thus, the security of big data provides the conditions for securing and monitoring cloud applications that need protect highly sensitive data hosted in cloud platforms. Nevertheless, the big data security issues have become increasingly problematic, leading organizations to restrict the utilization of cloud services. The existing security methods have revealed several issues, including a weakness of data security and Inaccuracy in data analysis, inefficiencies in performance and dependence on a third party. To address these issues, this study proposed a simpler technique as known a triple-data encryption standard (3DES) through providing the long keys sizes in Data Encryption Standard (DES) to protect the privacy of data against the potential attack in cloud computing environments. The experimental results confirm the efficiency of the proposed method in enhancing the secure of big healthcare data storage in cloud computing environment with less computational time compared to the existing method of Intelligent Framework for Healthcare Data Security. In conclusion, the proposed 3DES is recommended as a candidate encryption and decryption method in healthcare applications in cloud computing environments. © 2024 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:173 / 184
页数:11
相关论文
共 36 条
  • [1] Hajjaji Y., Boulila W., Farah I. R., Romdhani I., Hussain A., Big data and IoT-based applications in smart environments: A systematic review, Comput. Sci. Rev, 39, (2021)
  • [2] Deepa N., Et al., A survey on blockchain for big data: Approaches, opportunities, and future directions, Futur. Gener. Comput. Syst, 131, pp. 209-226, (2022)
  • [3] ThiBac D., Minh N. H., Design of network security storage system based on under cloud computing technology, Comput. Electr. Eng, 103, (2022)
  • [4] Awadh W. A., Alasady A. S., Hamoud A. K., Hybrid information security system via combination of compression, cryptography, and image steganography, Int. J. Electr. Comput. Eng, 12, 6, pp. 6574-6584, (2022)
  • [5] Ramachandra M. N., Srinivasa Rao M., Lai W. C., Parameshachari B. D., Ananda Babu J., Hemalatha K. L., An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard, Big Data Cogn. Comput, 6, 4, (2022)
  • [6] Berisha B., Meziu E., Shabani I., Big data analytics in Cloud computing: an overview, J. Cloud Comput, 11, 1, (2022)
  • [7] Arisdakessian S., Wahab O. A., Mourad A., Otrok H., Guizani M., A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions, IEEE Internet Things J, 10, 5, pp. 4059-4092, (2023)
  • [8] Bello S. A., Et al., Cloud computing in construction industry: Use cases, benefits and challenges, Autom. Constr, 122, (2021)
  • [9] Nikiforova A., Daskevics A., Azeroual O., NoSQL security: Can my data-driven decision-making be influenced from outside?, Big Data Decis. Appl. Uses Public Priv. Sect, pp. 59-73, (2023)
  • [10] Hashim M. S., Yassin A., Breast Cancer Prediction Using Soft Voting Classifier Based on Machine Learning Models, Iraqi J. Electr. Electron. Eng, 19, 2, pp. 42-51, (2023)