A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach
DOI:
https://doi.org/10.13052/2245-1439.742Keywords:
Cloud Computing, Healthcare, Database Outsourcing, Secret Sharing, Fragmentation, EncryptionAbstract
Cloud Computing is observed as the greatest paradigm change in Information technology. Data outsourcing is an inventive representation with the intention of trustworthy storage and proficient query execution to customers. Data stored on the cloud is showing great attention. However, the security issues allied with data storage over the cloud is a chief daunting cause for potential adopters. Hence the focus is to find techniques that will offer more security. Many diseases fighting organizations are working together io implement cloud as a data sharing vehicle. It is obligatory to build up innovative solutions with the intention of amalgamate diverse approaches in order to generate flexible and adaptable systems, particularly for achieving elevated levels of utilization of developed algorithms. In this document, we suggest an innovative model based on fragmentation, secret sharing and encryption for medical databases which will divide the data amongst several cloud service providers. We develop a systematic structure exploiting the sensitive nature of information and results in enhanced security level. A database for medical system is represented as Entity association and Relational model. A cloud based model is proposed to offer secure patient centric right to access PHR in a competent way. The simulation results implemented in NetBeans Java for performance evaluation of existing cryptographic techniques are shown. Our security model is evaluated using CrypTool 1.4.30 considering the entropy of algorithms. The future work includes development of a computerized system retrieving, storing and maintaining data efficiently and quickly.
Downloads
References
Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., and Salvador, G. S. (2010). A cloud computing solution for patient’s data collection in health care institutions. In Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10. (pp. 95–99). IEEE. DOI: 10.1109/eTELEMED 2010.19
Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.
Nkosi, M. T., and Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), 629–633. IEEE.
Ikuomola, A. J., and Arowolo, O. O. (2014). Securing patient privacy in e-health cloud using homomorphic encryption and access control. International Journal of Computer Networks and Communications Security, 2(1), 15–21.
Soubhagya, B. (2013). A homomorphic encryption technique for scalable and secure sharing of personal health record in cloud computing. International Journal of Computer Applications, 67(11).
Deng, M., Petkovic, M., Nalin, M., and Baroni, I. (2011). A Home Healthcare System in the Cloud–Addressing Security and Privacy Challenges. In IEEE International Conference on Cloud Computing (CLOUD), (pp. 549–556). IEEE. DOI: 0.1109/CLOUD.2011.108
Sundararaman, K., Parthasarathi, J., Rao, S. V., and Rao, G. A. (2008). Hridaya A tele-medicine initiative for cardiovascular disease through convergence of grid, Web 2.0 and SaaS. In Second International Conference on Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth (pp. 15–18). IEEE. DOI: 10.1109/PCTHEALTH.2008.471015
Zafar, Z., Islam, S., Aslam, M. S., and Sohaib, M. (2014). Cloud computing services for the healthcare industry. Int. J. Multidiscip. Sci. Eng., 5, 25–29.
Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009). Patient controlled encryption: ensuring privacy of electronic medical records. In Proceedings of the 2009 ACM workshop on Cloud computing security (pp. 103–114). ACM.
Reddy, G. N., and Reddy, G. J. (2014). Study of Cloud Computing in HealthCare Industry. arXiv preprint arXiv:1402.1841.
Huda, M. N., Sonehara, N., and Yamada, S. (2009). A privacy management architecture for patient-controlled personal health record system. J. Engineering Science and Technology, 4(2), 154–170.
Li, M., Yu, S., Ren, K., and Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International conference on security and privacy in communication systems (pp. 89–106). Springer, Berlin, Heidelberg.
Sareen, S., Sood, S. K., and Gupta, S. K. (2016). Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. Information Security Journal: A Global Perspective, 25(1–3), 39–53.
Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., Fernandez, J. M., and Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. JoWUA, 4(2), 39–62.
Pundkar, S. N., and Shekokar, N. (2016). Cloud computing security in multi-clouds using Shamir’s secret sharing scheme. In International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), (pp. 392–395). IEEE.
Ren, K., Wang, C., and Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73. DOI: 1089-7801/12/$31.00 IEEE Computer Society.
Arun, V., Padma, S. K., and Shyam, V. (2015). Mobile admittance of Health Information with privacy and analysis in Telemedicine. In International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15), (pp. 1–6). IEEE. DOI: 978-1-4673-6667-0/15/$31.00
Hossain, M. A., Hossain, M. B., Uddin, M. S., and Imtiaz, S. M. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).
Navathe, S., Ceri, S., Wiederhold, G., and Dou, J. (1984). Vertical partitioning algorithms for database design. ACM Transactions on Database Systems (TODS), 9(4), 680–710. DOI: 10.1145/1994.2209
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613. DOI: 1145/359168.359176
Huang, J., Sharaf, M., and Huang, C. T. (2012). A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud. In 41st International Conference on Parallel Processing Workshops (ICPPW), (pp. 279–287). IEEE. DOI: 10.1109/ICPPW.2012.42
Liu, C. H., Chen, T. L., Lin, H. Y., Lin, F. Q., Liu, C. M., Wu, E. P., and Chen, T. S. (2013). Secure PHR Access Control Scheme in Cloud Computing. International Journal of Information and Electronics Engineering, 3(3), 329. DOI: 10.7763/IJIEE.2013.V3.328
Jain, A., and Soni, B. K. (2017). Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data. International Journal of Advanced Networking and Applications, 8(6), 3283.
Gupta, P., Koushal, V., Narayan, C., and Anand, A. (2017). Building Genetic Database at Medical Institutes: Implement Patient Cost Audit and Improve Biomedical Research. Annals of neurosciences, 24(1), 3–4.
Van, V. N., Long, N. Q., and Le, D. N. (2016). Performance analysis of network virtualization in cloud computing infrastructures on openstack. In Innovations in Computer Science and Engineering (pp. 95–103). Springer, Singapore.
Bamiah, M., Brohi, S., and Chuprat, S. (2012). A study on significance of adopting cloud computing paradigm in healthcare sector. In International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), (pp. 65–68). IEEE.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., and Vasilakos, A. V. (2015). Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), 33.
Sandhu, R., Gill, H. K., and Sood, S. K. (2016). Smart monitoring and controlling of Pandemic Influenza A (H1N1) using Social Network Analysis and cloud computing. Journal of Computational Science, 12, 11–22.
Van, V. N., Long, N. Q., Nguyen, G. N., and Le, D. N. (2016). A performance analysis of openstack open-source solution for iaas cloud computing. In Proceedings of the Second International Conference on Computer and Communication Technologies (pp. 141–150). Springer, New Delhi.
Le, D. N., Kumar, R., Nguyen, G. N., and Chatterjee, J. M. (2018). Cloud Computing and Virtualization. John Wiley & Sons.