The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm

Now-a-days, healthcare monitoring system is very much important system in the medical field to know the patient‘s health status immediately. In the proposed system, the sensors are fixed over the patient’s body or placed at some distances around the body to collect patient’s significant parameters like blood pressure, temperature, heart beat rate, etc. These parameters are collected by the healthcare professionals through some connectivity mechanisms like Bluetooth, ZigBee, etc. These significant data will be outsourced to the cloud storage in a secure way to avoid attack from the attackers. So, we need some protection mechanism to safeguard this information. This article proposes a light weight cryptographic algorithm (symmetric key) via random number key generation using Diffie-Hellman key exchange based on Elliptic Curve (ECDH) cryptography. As a result of substituting bytes (S-box) and folding (horizontal and vertical) operations, the proposed symmetric key algorithm achieves the foremost properties of cryptography such as confusion and diffusion quite well. Experimental results showed that the overall execution time of the proposed algorithm is superior to the standard Advanced Encryption Standard (AES) algorithm. The throughput rate of the proposed algorithm is 20.525095 KB/seconds whereas for the standard AES algorithm throughput rate is 18.727215 KB/seconds. So, the proposed algorithm is faster than the existing AES algorithm. Moreover, the construction of S-box, IS-box and the key generation procedures are entirely different in the proposed algorithm so, it increases the complexity for the attacker and it will create confusion to the attacker.

[1] Abba Ari A., Ngangmo O., Titouna C., Thiare O., Mohamadou A., and Gueroui A., “Enabling Privacy and Security in Cloud of Things: Architecture, Applications, Security and Privacy Challenges,” Applied Computing and Informatics, vol. 169, pp. 1-13, 2019. https://doi.org/10.1016/j.aci.2019.11.005

[2] Abikoye O., Haruna A., Abubakar A., Akande N., and Asani S., “Modified Advanced Encryption Standard Algorithm for Information Security,” Symmetry, vol. 11, no. 12, pp. 1484, 2019. https://doi.org/10.3390/sym11121484

[3] Aceto G., Persico V., and Pescapé A., “Industry 4.0 and Health: Internet of Things, Big data, and Cloud Computing for Healthcare 4.0,” Journal of Industrial Information Integration, vol. 18, pp. 100129, 2020. https://doi.org/10.1016/j.jii.2020.100129

[4] Amin R., Kumar N., Biswas G., Iqbal R., and Chang V., “A Lightweight Authentication Protocol for IoT-enabled Devices in Distributed Cloud Computing Environment,” Future Generation Computer Systems, vol. 78, pp. 1005- 1019, 2018. https://doi.org/10.1016/j.future.2016.12.028

[5] Arumugam S., “An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security,” The International Arab Journal of Information Technology, vol. 20, no. 5, pp. 796- 807, 2023. https://doi.org/10.34028/iajit/20/5/12

[6] Cha S., Hsu T., Xiang Y., Yeh K., “Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2159-2187, 2019. DOI:10.1109/JIOT.2018.2878658

[7] Chattopadhyay A., Nag A., Ghosh D., and Chanda K., “A Secure Framework for IoT-Based Healthcare System,” in Proceedings of the International Ethical Hacking Conference, Kolkata, pp. 383-393, 2018. https://doi.org/10.1007/978-981-13-1544-2_31

[8] Dang L., Piran M., Han D., Min K., and Moon H., “A Survey on Internet of Things and Cloud Computing for Healthcare,” Electronics, vol. 8, no. 7, pp. 768, 2019. https://doi.org/10.3390/electronics8070768

[9] Detrano R., Janosi A., Steinbrunn W., and Pfisterer M., UCI Machine Learning Repository, Heart Disease, https://archive.ics.uci.edu/dataset/45/heart+diseas e, Last Visited, 2023.

[10] Gadde S., Amutharaj J., and Usha S., “A Security Model to Protect the Isolation of Medical Data in the Cloud using Hybrid Cryptography,” Journal of Information Security and Applications, vol. 73, pp. 103412, 2023. https://doi.org/10.1016/j.jisa.2022.103412

[11] Gia T., Jiang M., Sarker V., Rahmani A., Westerlund T., Liljeberg P., and Tenhunen H., “Low-Cost Fog-assisted Health-Care IoT System with Energy Efficient Sensor Nodes,” in Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, Valencia, pp. 1765-1770, 2017. DOI:10.1109/IWCMC.2017.7986551

[12] Hu J., Chen C., Fan C., and Wang K., “An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing,” Journal of Sensors, vol. 2017, pp. 1-11, 2017. https://doi.org/10.1155/2017/3734764

[13] Islam M., Humaira F., and Nur F., “Healthcare Applications in IoT,” Global Journal of Medical Research-B Pharma, Drug Discovery, Toxicology and Medicine, vol. 20, pp. 21-23, 2020. https://globaljournals.org/GJMR_Volume20/E- Journal_GJMR_(B)_Vol_20_Issue_2.pdf

[14] Ismail Y., Internet of Things (IoT) for Automated and Smart Applications, IntechOpen, 2019. http://dx.doi.org/10.5772/intechopen.90022

[15] Khatoon N., Roy S., and Pranav P., Intelligent Systems Reference Library, Springer Nature, 2020. https://doi.org/10.1007/978-3-030-39119- 5_6

[16] Kumar P. and Rana S., “Development of Modified AES algorithm for Data Security,” Optik, vol. 127, no. 4, pp. 2341-2345, 2016. https://doi.org/10.1016/j.ijleo.2015.11.188

[17] Maksimovi´c M., “Improving Computing Issues in the Internet of Things Driven E-Health Systems,” in Proceedings of the International Conference for Young Researchers in Informatics, Mathematics, and Engineering, Kaunas, pp. 14- 17, 2017. https://ceur-ws.org/#Vol-1852

[18] Msolli A., Helali A., and Maaref H., “New Security Approach in Real-time Wireless Multimedia Sensor Networks,” Computers and Electrical Engineering, vol. 72, pp. 910-925, 2018. https://doi.org/10.1016/j.compeleceng.2018.01.0 16

[19] Munjal K. and Bhatia R., “Analysing RSA and PAILLIER Homomorphic Property for Security in Cloud,” Procedia Computer Science, vol. 215, pp. 240-246, 2022. https://doi.org/10.1016/j.procs.2022.12.027

[20] Robinson Y., Presskila X., and Lawrence T., Intelligent Systems Reference Library, Springer 66 The International Arab Journal of Information Technology, Vol. 21, No. 1, January 2024 Nature, 2020. https://doi.org/10.1007/978-3-030- 39119-5_3

[21] Shewale A. and Sankpal S., “IOT and Raspberry Pi based Smart and Secure Health Care System using BSN,” International Journal for Research in Applied Science and Engineering Technology, vol. 8, no. II, pp. 506-510, 2020. DOI:10.22214/ijraset.2020.2077

[22] Suganya S. and Dhamodharan P., “Enhancing Security for Storage Services in Cloud Computing,” in Proceedings of the International Conference on Current Trends in Engineering and Technology, Coimbatore, pp. 396-398, 2013. DOI:10.1109/ICCTET.2013.6675995

[23] Thabit F., Alhomdy S., Al-Ahdal A., and Jagtap S., “A New Lightweight Cryptographic Algorithm for Enhancing Data Security in Cloud Computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91-99, 2021. https://doi.org/10.1016/j.gltp.2021.01.013

[24] Tuli S., Basumatary N., Gill S., Kahani M., Arya R., Wander G., and Buyya R., “HealthFog: An Ensemble Deep Learning-based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and Fog Computing Environments,” Future Generation Computer Systems, vol. 104, pp. 187-200, 2020. https://doi.org/10.1016/j.future.2019.10.043

[25] Tyagi S., Agarwal A., and Maheshwari P., “A Conceptual Framework for IoT-Based Healthcare System using Cloud Computing,” in Proceedings of the 6th International Conference-Cloud System and Big Data Engineering, Noida, pp. 503-507, 2016. DOI:10.1109/CONFLUENCE.2016.7508172

[26] Usman M., Ahmed I., Aslam M., Khan S., and Shah U., “SIT: A Lightweight Encryption Algorithm for Secure Internet of Things,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, 2017. DOI:10.14569/IJACSA.2017.080151

[27] Wilt T., Versluis A., Goedhart A., Talboom-Kamp E., and Van Delft S., “General Practitioners’ Attitude Towards the Use of eHealth and Online Testing in Primary Care,” Clinical eHealth, vol. 3, pp. 16-22, 2020. https://doi.org/10.1016/j.ceh.2020.02.002

[28] Yeh K., “A Secure IoT-Based Healthcare System with Body Sensor Network,” IEEE Access, vol. 4, pp. 10288-10299, 2016. DOI:10.1109/ACCESS.2016.2638038

[29] Zhang W., Bao Z., Lin D., Rijmen V., and BoHan Y., “Rectangle: A Bit-Slice Lightweight Block Cipher Suitable for Multiple Platforms,” Science China Information Sciences, vol. 58, pp. 1-15, 2015. DOI: 10.1007/s11432-015-5459-7