Secure and Privacy-Preserving Storage of E-Healthcare Data in the Cloud: Advanced Data Integrity Measures and Privacy Assurance
Secure and Privacy-Preserving Storage of E-Healthcare Data in the Cloud: Advanced Data Integrity Measures and Privacy Assurance |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-10 |
||
Year of Publication : 2023 | ||
Author : G. Dhanalakshmi, G. Victo Sudha George |
||
DOI : 10.14445/22315381/IJETT-V71I10P222 |
How to Cite?
G. Dhanalakshmi, G. Victo Sudha George, "Secure and Privacy-Preserving Storage of E-Healthcare Data in the Cloud: Advanced Data Integrity Measures and Privacy Assurance," International Journal of Engineering Trends and Technology, vol. 71, no. 10, pp. 238-253, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I10P222
Abstract
Cloud-based E-Healthcare systems require effective management of both internal and external security risks, which can be addressed through a range of cloud security practices and technologies. However, the need for significant storage capacity raises concerns about data security and cyberattacks. Thus, improving the security levels of cloud-based E-Healthcare systems remains a complex challenge that requires ongoing attention and resources. In this research, a unique method for creating a safe and private cloud storage system for electronic healthcare data is proposed. Moreover, it employs a hybrid cryptography technique that combines symmetric and asymmetric key encryption algorithms to enhance data security and privacy. The system also integrates advanced data integrity measures, including hash functions and checksums, to ensure data authenticity, integrity, and non-repudiation. The proposed system employs a range of trustworthy security measures, including advanced encryption techniques, role-based access control mechanisms, robust data validation utilising hash functions, and admin activity with data access and audit trails to safeguard against unauthorised access and prevent data leakage. The system is deployed in a cloud environment to provide scalable and cost-effective storage solutions for E-Healthcare systems. Experimental results show that the suggested system outperforms alternatives regarding efficiency, security, and privacy. It can help improve the quality of healthcare services by ensuring patient privacy and confidentiality.
Keywords
Cloud security, E-Healthcare systems, Data security, Hybrid cryptography, Access control mechanisms.
References
[1] Binanda Sengupta, Akanksha Dixit, and Sushmita Ruj, “Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques,” IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 2090-2101, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Zahid Ghaffar et al., “An Improved Authentication Scheme for Remote Data Access and Sharing over Cloud Storage in Cyber-Physical-Social-Systems,” IEEE Access, vol. 8, pp. 47144-47160, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shuming Xiong et al., “SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2914-2927, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Shuzhou Sun et al., “WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1871-1884, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] R. Jeena et al., “A Novel Approach for Healthcare Information System using Cloud,” International Journal of Recent Technology and Engineering, vol. 9, no. 6, pp. 189-191, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Fursan Thabit et al., “A New Lightweight Cryptographic Algorithm for Enhancing Data Security in Cloud Computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91-99, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Qian He, and Hong He, “A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining,” Sustainability, vol. 13, no. 1, p. 101, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Rajiv Ranjan Suman, Bhaskar Mondal, and Tarni Mandal, “A Secure Encryption Scheme Using a Composite Logistic Sine Map (CLSM) and SHA-256,” Multimedia Tools and Applications, vol. 81, pp. 27089-27110, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yang Yang et al., “Efficient Regular Language Search for Secure Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 8, no. 3, pp. 805-818, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Miguel Morales-Sandoval et al., “Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud,” IEEE Access, vol. 8, pp. 170101-170116, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ashwani Kumar, “A Cloud-Based Buyer-Seller Watermarking Protocol (CB-BSWP) Using Semi-Trusted Third Party for Copy Deterrence and Privacy-Preserving,” Multimedia Tools and Applications, vol. 81, pp. 21417-21448, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ye Tao, Peng Xu, and Hai Jin, “Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage,” IEEE Access, vol. 8, pp. 15963-15972, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Yang Ming, and Wenchang Shi, “Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage,” IEEE Access, vol. 7, pp. 122091-122105, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Yinghui Zhang et al., “Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage,’ IEEE Access, vol. 7, pp. 113832-113843, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Hua Wang et al., “An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing,” IEEE Access, vol. 8, pp. 61138-61147, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Rashmi V. Bhat, and Shruti H. Hegde, “A Survey on Applications of Blockchain in Healthcare Sector,” International Journal of Recent Engineering Science, vol. 7, no. 3, pp. 36-39, 2020.
[Google Scholar] [Publisher Link]
[17] Jin Sun et al., “Blockchain-Based Secure Storage and Access Scheme for Electronic Medical Records in IPFS,” IEEE Access, vol. 8, pp. 59389-59401, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Minkyung Park et al., “An SGX-Based Key Management Framework for Data Centric Networking,” IEEE Access, vol. 8, pp. 45198-45210, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Yen-Wu Ti et al., “Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications,” IEEE Access, vol. 8, pp. 1715-1732, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Chen Shen, Yang Lu, and Jiguo Li, “Expressive Public-Key Encryption with Keyword Search: Generic Construction from KP-ABE and an Efficient Scheme Over Prime-Order Groups,” IEEE Access, vol. 8, pp. 93-103, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Xuqi Wang, Xiangguo Cheng, and Yu Xie, “Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage,” IEEE Access, vol. 8, pp. 11732-11742, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jung-Shian Li et al., “Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality,” IEEE Access, vol. 8, pp. 114940-114952, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Enrico Bacis et al., “Securing Resources in Decentralized Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 286-298, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Jingting Xue et al., “Identity-Based Public Auditing for Cloud Storage Systems against Malicious Auditors via Blockchain,” Science China Information Sciences, vol. 62, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Xin Tang et al., “Efficient Real-Time Integrity Auditing with Privacy-Preserving Arbitration for Images in Cloud Storage System,” IEEE Access, vol. 7, pp. 33009-33023, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Miguel Morales-Sandoval et al., “Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud,” IEEE Access, vol. 8, pp. 170101-170116, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Khaled Ali Abuhasel, and Mohammad Ayoub Khan, “A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing,” IEEE Access, vol. 8, pp. 117354-117364, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Junfeng Tian, Guo Ruifang, and Xuan Jing, “Stern-Brocot-Based Non-Repudiation Dynamic Provable Data Possession,” IEEE Access, vol. 7, pp. 96686-96694, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Dino Macedo Amaral et al., “Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems,” IEEE Access, vol. 7, pp. 90082-90093, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Wenting Shen, Ye Su, and Rong Hao, “Lightweight Cloud Storage Auditing with Deduplication Supporting Strong Privacy Protection,” IEEE Access, vol. 8, pp. 44359-44372, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Junfeng Tian, and Xuan Jing, “A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage,” IEEE Access, vol. 7, pp. 68071-68082, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Pradip Kumar Sharma et al., “Li-Fi based on Security Cloud Framework for Future IT environment,” Human-centric Computing and Information Sciences, vol. 8, no. 23, pp. 1-13, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Sreeja Cherillath Sukumaran, and Misbahuddin Mohammed, “DNA Cryptography for Secure Data Storage in Cloud,” International Journal of Network Security, vol. 20, no. 3, pp. 447-454, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Pei Huang et al., “A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System,” IEEE Access, vol. 8, pp. 94780-94794, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Damisetti Veerabhadrarao, G. Apparao, and S. Anuradha, “BE-MCSDMA: BI-Level Encrypted Multi-Cloud Secure Data Management Architecture,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 23, 2022.
[Google Scholar] [Publisher Link]
[36] Butpheng Chanapha, Kuo-Hui Yeh, and Jia-Li Hou, “A Secure IoT and Cloud Computing-Enabled e-Health Management System,” Security and Communication Networks, vol. 2022, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Kirtirajsinh Zala et al., “PRMS: Design and Development of Patients' E-Healthcare Records Management System for Privacy Preservation in Third Party Cloud Platforms,” IEEE Access, vol. 10, pp. 85777-85791, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Chinmay Chakraborty et al., “FC-SEEDA: fog Computing-Based Secure and Energy Efficient Data Aggregation Scheme for Internet of Healthcare Things,” Neural Computing and Applications, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]