DOI QR코드

DOI QR Code

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • 투고 : 2019.06.02
  • 심사 : 2019.06.13
  • 발행 : 2019.06.30

초록

Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

키워드

OTNBCL_2019_v8n2_204_f0001.png 이미지

Figure 1. Public-key cryptography or asymmetric cryptography

OTNBCL_2019_v8n2_204_f0002.png 이미지

Figure 2. Hash chain Block Diagram

OTNBCL_2019_v8n2_204_f0003.png 이미지

Figure 4. An Efficient Multi-Layer Encryption Framework with Authentication

OTNBCL_2019_v8n2_204_f0004.png 이미지

Figure 3. Block Elements

Table 1. Hash Function Property used in cryptography.

OTNBCL_2019_v8n2_204_t0001.png 이미지

Table 2. Hash / MAC / Digital Signature - Security Goals.

OTNBCL_2019_v8n2_204_t0002.png 이미지

참고문헌

  1. K. Zheng, M. Li, and H. Jiang (Eds.), Honeybee: A Programming Framework for Mobile Crowd Computing MOBIQUITOUS", 2013, LNICST 120, pp. 224-236, 2013.
  2. Ivan Stojmenovic, ": Mobile Cloud and Green Computing", Procedia Computer Science,2012.
  3. M. Somasundaram, S.Gitanjali, T.C.Govardhani, G. Lakshmi Priya and R. Sivakumar, "Medical Image Data Management System in Mobile Cloud Computing Environment", IPCSIT, 2011.
  4. Derek G. Murray, Eiko Yoneki Jon, Crowcroft Steven Hand, "The Case for Crowd Computing", MobiHeld 2010.
  5. Cheng Ye, Joseph Coco, Anna Epishova, Chen Hajaj, Henry Bogardus, Laurie Novak, Joshua Denny, Yevgeniy Vorobeychik, Thomas Lasko, Bradley Malin, Daniel Fabbri, "A Crowdsourcing Framework for Medical Data Sets", Vanderbilt University, Nashville, TN, US
  6. Imdat As, Maria Angelico, "CROWDSOURCING ARCHITECTURE: A DISRUPTIVE MODEL IN ARCHITECTURAL PRACTICE", University of Hartfor
  7. Kerri Wazny, "Applications of crowdsourcing in health: an overview", global journal of health.
  8. Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure Isma Masood, 1 YongliWang,1 AliDaud,2 NaifRadiAljohani,3 and Hassan Dawood4 Hindawi Wireless Communications and Mobile Computing Volume 2018, Article ID 2143897, 23 pages
  9. Ahmad Habboush, Multi-Level Encryption Framework (IJACSA) International Journal of Advanced Computer Science and Applications, I Page -130, Vol. 9, No. 4, 2018.
  10. Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm Massoud Sokouti1, Ali Zakerolhosseini2 and Babak Sokouti3, * -- Article in The Open Medical Informatics Journal. 2016
  11. Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing Aymen Mudheher Badr 1, Yi Zhang 1 and Hafiz Gulfam Ahmad Umar 2, -- MDPI 2019.
  12. International Conference on Medical Imaging Understanding and Analysis 2016, Loughborough, UK--Security of multi-frame DICOM images using XOR encryption approach Q. N. Natsheh*, B. Li, A. G. Gale.
  13. A Survey about Consensus Algorithms Used in Blockchain- Giang-Truong Nguyen* and Kyungbaek Kim Inf Process Syst, Vol.14, No.1, pp.101-128, February 2018 ISSN 1976-913X (Print).
  14. DIP Using Image Encryption and XOR Operation Affine Transform Anurag Singh1, Dr. Namrata Dhanda 2 -(IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar -Apr. 2015), PP 07-15
  15. Dirk Rijmenants, Secure Communications with the One Time Pad Cipher Version 6.2, 18 December 2014.
  16. One-time password based on hash chain without shared secret and re-registration- Chang-Seop Park Elsevier - 19 February 2018 Available online 28 February 2018.