Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach

被引:8
|
作者
Adeniyi, A. E. [1 ]
Abiodun, K. M. [2 ,3 ,4 ]
Awotunde, J. B. [5 ]
Olagunju, M. [6 ]
Ojo, O. S. [7 ]
Edet, N. P. [2 ,3 ,4 ]
机构
[1] Precious Cornerstone Univ, Dept Comp Sci, Ibadan, Oyo State, Nigeria
[2] Landmark Univ, SDG 4 Qual Educ Grp, Omu Aran, Nigeria
[3] Landmark Univ, SDG 9 Ind Innovat & Infrastruct Res Grp, Omu Aran, Nigeria
[4] Landmark Univ, Dept Comp Sci, Omu Aran, Kwara State, Nigeria
[5] Univ Ilorin, Dept Comp Sci, Ilorin, Kwara State, Nigeria
[6] Fed Univ Oye Ekiti, Dept Comp Sci, Oye, Ekiti State, Nigeria
[7] Ajayi Crowther Univ, Dept Comp Sci, Oyo, Nigeria
关键词
Encryption algorithm; AES; Medical information; Cloud; Security; CHALLENGES;
D O I
10.1007/s11042-023-14338-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an inaccurate diagnosis, which could result in severe medical issues and death. The transition from paper to electronic health records (EHRs) has considerably improved patient care quality and efficiency. However, for many healthcare service providers, it has extended the attack surface. Because of the value of a patient's medical information, this has posed a threat to both patients and healthcare providers. When security is not taken into account in healthcare systems, patients' privacy is jeopardized. The intended solution to this challenge is to create a modified AES algorithm to secure patient medical information. Although, the AES algorithm is secure, however, there is always a need for improvement on any cryptographic algorithms in terms of computational cost. This study implements AES and modified the last round of the AES and their performance has been measured by scrambling input datasets of various contents and volumes. The experimental results show that modified AES outperforms AES algorithms in terms of Encryption time while AES outperform modified AES in terms of decryption time. Also, the Avalanche effect results revealed that modified AES has a higher avalanche effect for small-size files while a smaller avalanche effect for larger file sizes. This signifies that modified AES security is stronger for a small size file while conventional AES has higher security for larger file sizes. The average encryption time of the AES algorithm for text files is 1513.3ms while the modified AES average encryption time gives 1293.837ms. The average decryption time for conventional AES is 1289.627ms while the average decryption time for modified AES give 1400.136ms. Modified AES uses lesser time complexity during the encryption of all categories of data files while conventional AES uses lesser time complexity during the decryption of all categories of data files.
引用
收藏
页码:20537 / 20551
页数:15
相关论文
共 29 条
  • [21] An Implementation of SLICE Algorithm to Enforce Security for Medical Images using DNA Approach
    Bharghavi, G.
    Kumar, Pabolu Sravan
    Geetha, K.
    Devi, Sasikala N.
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 984 - 988
  • [22] EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
    Suthar, Krunal
    Patel, Jayesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 323 - 331
  • [23] Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method
    Samy, Ganthan Narayana
    Shanmugam, Bharanidharan
    Maarop, Nurazean
    Magalingam, Pritheega
    Perumal, Sundresan
    Albakri, Sameer Hasan
    Ahmad, Rabiah
    ADVANCED SCIENCE LETTERS, 2018, 24 (01) : 739 - 743
  • [24] Retraction Note to: High-throughput field-programable gate array implementation of the advanced encryption standard algorithm for automotive security applications
    Prateek Sikka
    Abhijit R. Asati
    Chandra Shekhar
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 555 - 555
  • [25] RETRACTED ARTICLE: High-throughput field-programable gate array implementation of the advanced encryption standard algorithm for automotive security applications
    Prateek Sikka
    Abhijit R. Asati
    Chandra Shekhar
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 7273 - 7279
  • [26] Retraction Note to: R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment
    N. Indira
    S. Rukmani Devi
    A. V. Kalpana
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 453 - 453
  • [27] RETRACTED ARTICLE: R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment
    N. Indira
    S. Rukmani Devi
    A. V. Kalpana
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 4643 - 4654
  • [28] RETRACTED: High-throughput field-programable gate array implementation of the advanced encryption standard algorithm for automotive security applications (Retracted Article)
    Sikka, Prateek
    Asati, Abhijit R.
    Shekhar, Chandra
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (07) : 7273 - 7279
  • [29] RETRACTED: R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment (Retracted Article)
    Indira, N.
    Rukmani Devi, S.
    Kalpana, A. V.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (05) : 4643 - 4654