Security for personal health records occupying terabytes using cryptography and encoder decoder
-
2019-05-27 https://doi.org/10.14419/ijet.v7i4.26455 -
Encoder, Cloud Security, Cryptology, Decoder, Personal Health Records. -
Abstract
Personal Health Records may contain personal data along with medical data that is available in Electronic Health Records. This research proposes an encryption decryption method with encoder decoder for records in well established hospitals that store medical records in terms of terabytes. For encryption, the medical information including images is converted into binary. This is sent to an encoder and the information is stored in chunks to form a matrix. Then it undergoes matrix transformation and split into sub matrices. This is sent to the destination. The reverse is done in the decryption module. Cryptanalysis for the algorithm used and brute force attack is almost impossible or takes a number of years. A comparative study of the proposed algorithm is done with DES, AES, IDEA and BLOWFISH and it is realized the proposed algorithm is immune to cryptanalysis methods to which the compared algorithms are not. The personal health records are located in the cloud. The encryption decryption provides data security which is used to provide cloud security.
Â
Â
-
References
[1] Data Server Implementation. https://www.indiamart.com/proddetail/data-server-implementation-8993920612.html. India Mart Member since 2013. Accessed Aug 2018.
[2] IT Engg Portal. Symmetric Key Encryption. http://www.itportal.in/2011/12/encryption-decryption-information.html. Copyright @2011. Accessed Aug 2018.
[3] Z.E. Dawahdeh, S.N.Yaakob, R.R. bin Othman, A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher, Journal of King Saud University-Computer and Information Sciences, 30(3) (2018) 349-355.https://doi.org/10.1016/j.jksuci.2017.06.004.
[4] E.H. Bensikaddour, Y. Bentoutou, N. Taleb, Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher, Journal of King Saud University-Computer and Information Sciences. (2018)https://doi.org/10.1016/j.jksuci.2018.05.002.
[5] A. Karmel, A. Multi-Level Privacy Preservation and Transmission of Medical Records Using Cryptographic Technique, International Journal of Applied Engineering Research, 12(17) (2017), 6735-6740.
[6] S.A. Brown, H. Jouni, T.S. Marroush, I.J. Kullo, Disclosing Genetic Risk for Coronary Heart Disease: Attitudes Toward Personal Information in Health Records, American journal of preventive medicine, 52(4) (2017), 499-506.https://doi.org/10.1016/j.amepre.2016.11.005.
[7] C.S. Kruse, B. Smith, H. Vanderlinden, Nealand, A, Security Techniques for the Electronic Health Records, Journal of Medical Systems, 41(8) (2017), 127.https://doi.org/10.1007/s10916-017-0778-4.
[8] D.M. Walker, T. Johnson, E.W. Ford, T.R. Huerta, Trust Me, I’ma Doctor: Examining Changes in How Privacy Concerns Affect Patient Withholding Behavior, Journal of medical Internet research, 19(1) (2017).https://doi.org/10.2196/jmir.6296.
[9] R. Clarke, Introduction to dataveillance and information privacy, and definitions of terms. Roger Clarke's Dataveillance and Information Privacy Pages. (1999)
[10] A. Stubbs, Ö Uzuner, De-identification of medical records through annotation. In Handbook of Linguistic Annotation, Springer Netherlands (2017) 1433-1459.https://doi.org/10.1007/978-94-024-0881-2_55.
[11] S. Kim, J. Jung, J. Kim, A Study on FIDO Authentication System for Reinforcing the Security of Electronic Medical Records. In MATEC Web of Conferences, EDP Sciences (Vol. 108 (2017)., p. 09001).https://doi.org/10.1051/matecconf/201710809001.
[12] D. Kotz, R. Halter, C. Cornelius, et.al., U.S. Patent No. 9,595,187. Washington, DC: U.S. Patent and Trademark Office.
[13] B. Yüksel, A. Küpçü, Ö. Özkasap, Research issues for privacy and security of electronic health services. Future Generation Computer Systems, 68, (2017), 1-13.https://doi.org/10.1016/j.future.2016.08.011.
[14] B. H. Walters, Veillance and Electronic Medical Records in Disease Management Programs in the Netherlands. In Under Observation: The Interplay Between eHealth and Surveillance, Springer International Publishing (2017) 91-106.https://doi.org/10.1007/978-3-319-48342-9_6.
-
Downloads
-
How to Cite
Sankaran, S., & Rajasekaran, R. (2019). Security for personal health records occupying terabytes using cryptography and encoder decoder. International Journal of Engineering & Technology, 7(4), 6211-6215. https://doi.org/10.14419/ijet.v7i4.26455Received date: 2019-01-24
Accepted date: 2019-05-03
Published date: 2019-05-27