Affiliation:
1. Department of Computer Science and Engineering, AMET University, India.
Abstract
Data security and sharing remains nuisance among many applications like business data, medical data, banking data etc. In this research, block chain technology is built with encryption algorithm for high level data security in cloud storage. Medical data security seems critical aspect due to sensitivity of patient’s information. Unauthorized access of medical data creates major issue to patients. This article proposed block chain with hybrid encryption technique for securing medical data stored in block chain model at cloud storage. New Two fish encryption model is implemented based on RSA Multiple Precision Arithmetic (MPA). MPA works by using library concept. The objective of using this methodology is to enhance security performance with less execution time. Patient data is processed by encryption algorithm and stored at blockchain infrastructure using encrypted key. Access permission allows user to read or write the medical data attached in block chain framework. The performance of traditional cryptographic techniques is very less in providing security infrastructure. Proposed blockchain based Two fish encryption technique provides high security in less encryption and decryption time.
Subject
Electrical and Electronic Engineering,Computational Theory and Mathematics,Human-Computer Interaction,Computational Mechanics
Reference53 articles.
1. E. R. Weitzman, L. Kaci, and K. D. Mandl, “Sharing Medical Data for Health Research: The Early Personal Health Record Experience,” Journal of Medical Internet Research, vol. 12, no. 2, p. e14, May 2010, doi: 10.2196/jmir.1356.
2. D. B. Taichman et al., ``Sharing clinical trial data: A proposal from the international committee of medical journal editors free,'' PLoSMed.,vol. 13, no. 1, pp. 505-506, Apr. 2016.
3. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du and M. Guizani, "MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain," in IEEE Access, vol. 5, pp. 14757-14767, 2017, doi: 10.1109/ACCESS.2017.2730843.
4. Summary of the HIPAA Security Rule. [Online] ,2017 Available:https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/
5. General Data Protection Regulation. [Online]. Available:https://eugdpr.org/the-regulation/, 2016.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Utilizing Cloud Computing for Distributed Training of Deep Learning Models;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17
2. Machine Learning and AI in Tele-Communication Networks and Iota for Predictive Maintenance;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17
3. Multiple Precision Arithmetic with Blowfish Crypto Method for Medical Data Storage Using Blockchain Technology;2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES);2023-12-14
4. Predicting and Analysing University Dropout Rates using Machine Learning Methods;2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES);2023-12-14
5. Raspberry Pi Assisted Automatic Pressure Control in Hydraulic Systems;2023 Fourth International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE);2023-12-08