Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm

被引:6
作者
Kumar, Pradeep [1 ,2 ]
Banerjee, Kakoli [1 ]
Singhal, Niraj [3 ]
Kumar, Ajay [1 ]
Rani, Sita [4 ]
Kumar, Raman [5 ]
Cioca, Adriana Lavinia [6 ]
机构
[1] JSS Acad Tech Educ, Dept Comp Sci & Engn, Noida 201301, Uttar Pradesh, India
[2] Shobhit Univ, Inst Engn & Technol, Meerut 250110, Uttar Pradesh, India
[3] Chotu Ram Engn Coll, Dept Comp Sci & Engn, Meerut 250001, Uttar Pradesh, India
[4] Guru Nanak Dev Engn Coll, Dept Comp Sci & Engn, Ludhiana 141006, Punjab, India
[5] Guru Nanak Dev Engn Coll, Dept Mech & Prod Engn, Ludhiana 141006, Punjab, India
[6] CMI Cioca Adriana Lavinia, 22 Dorobantilor St, Sibiu 550231, Romania
关键词
mobile agent migration; security; privacy; healthcare; threshold (k; n) secret sharing mechanism based on two polynomials; Blowfish; PROTECTION;
D O I
10.3390/s22228620
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wide assortment of medical care applications such as the medical information of a patient, the recovery of clinical information, the incorporation of information pertaining to their wellbeing, dynamic help, telemedicine, obtaining clinical data, patient administration, and so on. The accompanying security issues have grown in tandem with the complexity and improvements in mobile agent technologies. As mobile agents work in an insecure environment, their security is a top priority when communicating and exchanging data and information. Data integrity, data confidentiality and authentication, on-repudiation, denial of service, and access control, are all key security concerns with mobile agent migration. This paper proposes a Verifiable, Secure Mobile Agent Migration model, based on two polynomials (t, n), and an edge secret imparting plan with Blowfish encryption, to enable secure information transmission in clinical medical care.
引用
收藏
页数:20
相关论文
共 40 条
[1]  
Al-Jaljouli Raja, 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology, P610, DOI 10.1109/ISSPIT.2007.4458205
[2]   Applications of Mobile Agents in Healthcare Domain: A Literature Survey [J].
Bagga, Pallavi ;
Hans, Rahul .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05) :55-72
[3]  
Banerjee K, 2019, EAI Endorsed Transactions on Pervasive Health and Technology, V5, pe5, DOI [10.4108/eai.13-7-2018.164097, 10.4108/eai.13-7-2018.164097, DOI 10.4108/EAI.13-7-2018.164097]
[4]   Protection of a mobile agent with a reference clone [J].
Benachenhou, L ;
Pierre, S .
COMPUTER COMMUNICATIONS, 2006, 29 (02) :268-278
[5]   Two polynomials based (t, n) threshold secret sharing scheme with cheating detection [J].
Biswas, Anindya Kumar ;
Dasgupta, Mou .
CRYPTOLOGIA, 2020, 44 (04) :357-370
[6]  
Burstein F., 2005, CEUR WORKSHOP P, VVolume 144
[7]   A survey of security in multi-agent systems [J].
Cavalcante, Rodolfo Carneiro ;
Bittencourt, Ig Ibert ;
da Silva, Alan Pedro ;
Silva, Marlos ;
Costa, Evandro ;
Santos, Roberio .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (05) :4835-4846
[8]  
Chaouch Zineb, 2014, International Journal of Computational Models and Algorithms in Medicine, V4, P17, DOI 10.4018/ijcmam.2014010102
[9]   A Novel (t,n) Secret Sharing Scheme Based upon Euler's Theorem [J].
Chen, Hefeng ;
Chang, Chin-Chen .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[10]   Deployment of Secure Mobile Agents for Medical Information Systems [J].
Chen, Tzer-Long ;
Chung, Yu-Fang ;
Lin, Frank Y. S. .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (04) :2493-2503