banner

Intelligent encryption with improved zealous method to enhance the anonymization of public health records in cloud

P. Malathi, Devi S. Suganthi, J. Jospin Jeya

Abstract


In order to keep the cost of installing advanced encryption scheme (AES) hardware to a minimum and to hide the protected key from hackers, existing networks’ tactics are employed in this study. This is the biggest drawback of the present methods since there is no security while keeping the concealed key of the AES encryption method. The user is unable to remember all the AES keys since it is necessary to connect with several people using various AES keys. The suggested approach successfully counters both facet and brute force assaults. The advanced encryption method is the safest algorithm to utilize for trustworthy encryption, according to the findings. But the issue is that the advanced encryption scheme makes brute force attack less effective. Honey encryption is thus used. The recommended method encrypts the dataset after dataset anonymization to ensure privacy. An enhanced zealous technique is used to do anonymization when a middle dataset is created using the supplied key. After the dataset has been sorted, the dataset with the higher rank is the one that gets encrypted first. The user receives these datasets together with a decryption key for the encrypted records, enabling them to swiftly obtain the data they need.


Keywords


honey encryption; advanced encryption scheme; security; brute force attack; public health record; improved zealous method

Full Text:

PDF

References


1. Majeed A. Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. Journal of King Saud University—Computer and Information Sciences 2019; 31(4): 426–435. doi: 10.1016/j.jksuci.2018.03.014

2. Juels A, Rivest RL. Honeywords: Making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS’13); 4–8 November 2013; Berlin, Germany.

3. Alvarez R. The electronic health record: A leap forward in patient safety. Healthcare Papers 2004; 5(3): 33–36. doi: 10.12927/hcpap.2004.16862

4. Mewada A, Gedam P, Khan S, Reddy MU. Network intrusion detection using multiclass support vector machine. International Journal of Computer and Communication Technology 2010; 1(4): 7. doi: 10.47893/IJCCT.2010.1054

5. Cao B, Xia S, Han J, Li Y. A distributed game methodology for crowdsensing in uncertain wireless scenario. IEEE Transactions on Mobile Computing 2020; 19(1): 15–28. doi: 10.1109/TMC.2019.2892953

6. Boneh D, Boyen X, Shacham H. Short group signatures. In: Lecture Notes in Computer Science, Proceedings of the 24rd Annual International Cryptology Conference; 15–19 August 2004; California, USA. Springer; 2004. Volume 3152, pp. 41–55.

7. Bustamante C, Garrido L, Soto R. Fuzzy naive bayesian classification in robosoccer 3D: A hybrid approach to decision making. In: Lecture Notes in Computer Science, Proceedings of the RoboCup 2006: Robot Soccer World Cup X; Berlin, Germany. Springer; 2007. Volume 4434, pp. 507–515.

8. Chase M, Chow SSM. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security; 9–13 November 2009; Chicago, USA. pp. 121–130.

9. Li Y, Liu J, Cao B, Wang C. Joint optimization of radio and virtual machine resources with uncertain user demands in mobile cloud computing. IEEE Transactions on Multimedia 2018; 20(9): 2427–2438. doi: 10.1109/TMM.2018.2796246

10. Chatterjee R, Bonneau J, Juels A, Ristenpart T. Cracking-resistant password vaults using natural language encoders. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy; 17–21 May 2015; Washington, USA.

11. Chen YY, Lu JC, Jan JK. A secure EHR system based on hybrid clouds. Journal of Medical Systems 2012; 36(5): 3375–3384. doi: 10.1007/s10916-012-9830-6

12. Danwei C, Linling C, Xiaowei F, et al. Securing patient-centric personal health records sharing system in cloud computing. China Communications 2014; 11(13): 121–127. doi: 10.1109/CC.2014.7022535

13. Kwon D, Natarajan K, Suh SC, et al. An empirical study on network anomaly detection using convolutional neural networks. In: Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS); 2–6 July 2018; Vienna, Austria.

14. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 30 October–3 November 2006; Alexandria, USA. pp. 89–98.

15. Hababeh I, Gharaibeh A, Nofal S, Khalil I. An integrated methodology for big data classification and security for improving cloud systems data mobility. IEEE Access 2019; 7: 9153–9163.

16. Leng C, Yu H, Wang J, Huang J. Securing personal health records in the cloud by enforcing sticky policies. Indonesian Journal of Electrical Engineering and Computer Science 2013; 11(4): 2200–2208. doi: 10.11591/telkomnika.v11i4.2406

17. Li M, Yu S, Zheng Y, et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 2013; 24(1): 131–143. doi: 10.1109/TPDS.2012.97

18. Hemant P, Chawande NP, Sonule A, Wani H. Development of server in cloud computing to solve issues related to security and backup. In: Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems; 15–17 September 2011; Beijing, China. pp. 158–163.

19. Razak SA, Nazari NHM, Al-Dhaqm A. Data anonymization using pseudonym system to preserve data privacy. IEEE Access 2020; 8: 43256–43264. doi: 10.1109/ACCESS.2020.2977117

20. Suh SC, Kim H, Kim J, et al. An encoding technique for CNN-based network anomaly detection. In: Proceedings of the 2018 IEEE International Conference on Big Data; 10–13 December 2018; Seattle, USA.

21. Shekelle PG, Morton SC, Keeler EB. Costs and benefits of health information technology. Evidence Report Technology Assessment 2006; 132: 1–71. doi: 10.23970/ahrqepcerta132

22. Zhao G, Rong C, Li J, et al. Trusted data sharing over un-trusted cloud storage providers. In: Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science; 30 November–3 December 2010; Indianapolis, USA. pp. 97–103.




DOI: https://doi.org/10.32629/jai.v7i1.567

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 P. Malathi, Devi S. Suganthi, J. Jospin Jeya

License URL: https://creativecommons.org/licenses/by-nc/4.0/