scholarly journals Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.

Author(s):  
Yogi Suryo Santoso

The process of exchanging digital messages is increasingly being used due to its easy and practical use. But the process of exchanging digital messages is vulnerable to being tapped by unauthorized people. Cryptography is the study of mathematical techniques related to aspects of information security, such as data confidentiality, data validity, data integrity, and data authentication. With cryptography, the process of exchanging messages between two people can be done securely. Thus, cryptographic techniques are used to overcome security issues when exchanging messages. The methods used in this study are hybrid hill cipher and RSA cryptography. In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by unauthorized people.


2021 ◽  
Author(s):  
HariPriya K ◽  
Brintha NC ◽  
Yogesh C K

Security is a major concern in every technology that is introduced newly to facilitate the existing mechanism for better maintenance and handling. This is also the case in electronic health records. The data of the hospitals and the associated patients gets digital in the past few decades. The data is stored in the cloud for various reasons such as convenience of the participating entities to access it, easy maintenance. But, with this there also arises various security concerns. It has been observed from the reason studies that blockchain is used as the means of securing the healthcare data in the cloud environment.This study discusses the following. 1) Applications of blockchain in cloud environment, 2) Applications of blockchain in securing healthcare data 3) General issues and security concerns in blockchain technology and what features of block chain makes it suitable for securing health care a nd what features restricts it from using.This work helps the future researchers in getting a deep understanding of the in and out of applying blockchain in cloud and healthcare environment.


This paperis based on security measures to be provided to IoT related data, as there is an increasing demand to secure the IoT devices, networks and applications. The network resources are getting affected as the cybercrimes are increasing day-by-day. In this paper, first we highlight upon the key challenges and security issues in IoT architecture and then focus upon the case study of IoT application in healthcare IoMT, In Healthcare, prevention and cure have seen various advancement in technological schema. The Medical equipment when used with the Internet of Things are termed as Internet of Medical things (IOMT). IoMT is transforming healthcare industry by providing large scale connectivity for medical devices, patients, physicians, clinical and nursing staff who use them and facilitate real-time monitoring supportingthe knowledge gathered from the connected things. Security constraints for IoMT take confidentiality, integrity and authentication as prime key aspect. These can be achievedbytheintegration of physical devices like sensors for connectivity and communication in cloud-based facility which in course is delivered by interface. Access Control security is obtained through key generation for data owners and the user of private health records whilethedata confidentiality is obtained by use of Advanced Encryption Standard (AES)as an efficientencryptionalgorithm


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.


Author(s):  
P.Hemalatha , Et. al.

Blockchain and Internet of Things (IoT) technologies are used in many domains, predominantly for electronic-healthcare. Here, IoT devices has the ability to provide real-time sensor data from patients to get processed and analyzed. As a single point of failure, mistrust, data manipulation and tampering, and privacy avoidance may all occur as a result of such a method. Through offering shared computing and storage for IoT data, blockchain can help solve such issues.Maintaining and sharing Medical data is necessary here.If there occurs loss of confidence means it threatens the medical data and loss of integrity creates impact on the life of patient. So, the first objective is to protect the medical records. Also, a central server to the records will pretend the hackers to attack and continuous fetching is difficult.Therefore, combining Blockchain and IoT will be a threat breaker for computerized medical records.


Author(s):  
Я.О. Ключка ◽  
О.В. Шматко ◽  
С.П. Євсеєв ◽  
С.В. Милевський

The current situation in the field of health care is considered and the key problems faced by this industry are described. Today, there are two main issues to be addressed in healthcare: data ownership and data security. The patient's medical data is preferably stored in centralized, isolated systems that are incompatible with each other. This situation creates difficulties in terms of timely exchange of medical data and access to them. The lack of data complicates further diagnosis and treatment of the patient. In addition, systems that store medical data are not completely reliable. Third parties can easily access and modify medical data. It is expected that blockchain technology can solve the problems that currently exist in the field of health care. Blockchain technology will create distributed, decentralized systems that will significantly improve the quality of care provided. The paper considers the areas in the field of health care, in which blockchain technology is beginning to develop, as well as related projects. All considered projects can be divided into four areas: supply chain surveillance and fight against counterfeit products, telemedicine, diagnostics, storage and management of medical data. The healthcare sector is developing rapidly and new areas are expected in which the blockchain will be used. Although there are still some problems that need to be overcome for the blockchain to be fully used.


2018 ◽  
Vol 7 (2.14) ◽  
pp. 559
Author(s):  
Sharath Aradhyamath ◽  
Joy Paulose

Healthcare data is crucial in patient’s surveillance. To give the finest treatment to patients the data should be of the best quality. Many security threats affect the integrity and ingenuity of the medical data. In the recent times, medical data can be accessed anytime and anywhere with the help of an overwhelming technology called the Internet of Things (IoT). IoT has numerous applications based on healthcare, however, it facilitates data misuse such as data breach and health care fraud. Sensitive and protected data is stolen and modified by an unauthorized person. Due to these data abuses, it degrades the quality of medical data and service. In this paper, secure data transfer is done in IoT based healthcare to enhance the security of the medical data. Data confidentiality can be achieved using encryption algorithms such as Tiny Encryption Algorithm (TEA) which is lightweight and suitable for resource constraint devices. The results of the proposed system show that the modified TEA overcomes the drawback of the equivalent key and also provides a better security to healthcare data.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Naresh Sammeta ◽  
Latha Parthiban

Recent healthcare systems are defined as highly complex and expensive. But it can be decreased with enhanced electronic health records (EHR) management, using blockchain technology. The healthcare sector in today’s world needs to address two major issues, namely data ownership and data security. Therefore, blockchain technology is employed to access and distribute the EHRs. With this motivation, this paper presents novel data ownership and secure medical data transmission model using optimal multiple key-based homomorphic encryption (MHE) with Hyperledger blockchain (OMHE-HBC). The presented OMHE-HBC model enables the patients to access their own data, provide permission to hospital authorities, revoke permission from hospital authorities, and permit emergency contacts. The proposed model involves the MHE technique to securely transmit the data to the cloud and prevent unauthorized access to it. Besides, the optimal key generation process in the MHE technique takes place using a hosted cuckoo optimization (HCO) algorithm. In addition, the proposed model enables sharing of EHRs by the use of multi-channel HBC, which makes use of one blockchain to save patient visits and another one for the medical institutions in recoding links that point to EHRs stored in external systems. A complete set of experiments were carried out in order to validate the performance of the suggested model, and the results were analyzed under many aspects. A comprehensive comparison of results analysis reveals that the suggested model outperforms the other techniques.


Sign in / Sign up

Export Citation Format

Share Document