Secure patient data transmission on resource constrained platform

被引:12
作者
Afzal, Ifrah [1 ]
Parah, Shabir A. [1 ]
Hurrah, Nasir N. [1 ]
Song, O. Y. [2 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar 190006, India
[2] Sejong Univ, Dept Software, Seoul, South Korea
关键词
Electronic Health Record; Chaotic encryption; Mobile-Cloud transmission; Bitplane encryption; e-Healthcare; IMAGE ENCRYPTION; CLOUD; STEGANOGRAPHY; HEALTH;
D O I
10.1007/s11042-020-09139-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Generally, some encryption algorithms are applied on the data (medical image) before transmission over the network. However, resource constrained devices cannot perform complex encryption sand the process of encryption is entrusted to some third party like Cloud. But this third-party encryption requires the privacy of data to be preserved. After ensuring the privacy and performing third party encryption, the encrypted data can be securely transmitted over the network. This concept is used in the proposed work and a secure data transmission method is implemented. We have used two encryption techniques viz, chaotic encryption and bitplane encryption on the medical image which gives extra security to the image. While using the facilities of cloud for encryption (chaotic) the proposed method ensures that the cloud administrators get no hint about the information present in the data that is sent to them. In addition, the authenticity of the medical images is ensured and the encryption time obtained is small (must criterion for real time applications). The objectives of our work are verified by experimentations that are carried out on various medical images. The experimental results and theoretical analysis confirm the effectiveness of proposed work in terms of encryption time, security and authenticity.
引用
收藏
页码:15001 / 15026
页数:26
相关论文
共 40 条
[1]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[2]   Efficient Quantum Information Hiding for Remote Medical Image Sharing [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Rahman, Md. Abdur ;
Alamri, Atif ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :21075-21083
[3]   A steganography embedding method based on edge identification and XOR coding [J].
Al-Dmour, Hayat ;
Al-Ani, Ahmed .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 46 :293-306
[4]   E-health: transforming the physician/patient relationship [J].
Ball, MJ ;
Lillis, J .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2001, 61 (01) :1-10
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[7]  
Dong L, 2011, MULAN'S LEGEND AND LEGACY IN CHINA AND THE UNITED STATES, P195
[8]   Secure Medical Data Transmission Model for IoT-Based Healthcare Systems [J].
Elhoseny, Mohamed ;
Ramirez-Gonzalez, Gustavo ;
Abu-Elnasr, Osama M. ;
Shawkat, Shihab A. ;
Arunkumar, N. ;
Farouk, Ahmed .
IEEE ACCESS, 2018, 6 :20596-20608
[9]  
ELLATIF AAA, 2020, OPTICS LASER TECHNOL
[10]   Computing Arbitrary Functions of Encrypted Data [J].
Gentry, Craig .
COMMUNICATIONS OF THE ACM, 2010, 53 (03) :97-105