A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach

Authors

  • Dac-Nhuong Le Faculty of Information Technology, Haiphong University, Haiphong, Vietnam
  • Bijeta Seth Department of Computer Science & Engineering, SRM University, Sonepat, Haryana, India
  • Surjeet Dalal Department of Computer Science & Engineering, SRM University, Sonepat, Haryana, India

DOI:

https://doi.org/10.13052/2245-1439.742

Keywords:

Cloud Computing, Healthcare, Database Outsourcing, Secret Sharing, Fragmentation, Encryption

Abstract

Cloud Computing is observed as the greatest paradigm change in Information technology. Data outsourcing is an inventive representation with the intention of trustworthy storage and proficient query execution to customers. Data stored on the cloud is showing great attention. However, the security issues allied with data storage over the cloud is a chief daunting cause for potential adopters. Hence the focus is to find techniques that will offer more security. Many diseases fighting organizations are working together io implement cloud as a data sharing vehicle. It is obligatory to build up innovative solutions with the intention of amalgamate diverse approaches in order to generate flexible and adaptable systems, particularly for achieving elevated levels of utilization of developed algorithms. In this document, we suggest an innovative model based on fragmentation, secret sharing and encryption for medical databases which will divide the data amongst several cloud service providers. We develop a systematic structure exploiting the sensitive nature of information and results in enhanced security level. A database for medical system is represented as Entity association and Relational model. A cloud based model is proposed to offer secure patient centric right to access PHR in a competent way. The simulation results implemented in NetBeans Java for performance evaluation of existing cryptographic techniques are shown. Our security model is evaluated using CrypTool 1.4.30 considering the entropy of algorithms. The future work includes development of a computerized system retrieving, storing and maintaining data efficiently and quickly.

 

Downloads

Download data is not yet available.

Author Biographies

Dac-Nhuong Le, Faculty of Information Technology, Haiphong University, Haiphong, Vietnam

Dac-Nhuong Le has a M.Sc. and Ph.D. in computer science from Vietnam National University, Vietnam in 2009 and 2015, respectively. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam.

He has a total academic teaching experience of 12 years with more than 50 publications in reputed international conferences, journals and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, ESCI, Scopus, ACM, DBLP). His areas of research include: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical.

His core work in network security, soft computing and IoT and image processing in biomedical. Recently, he has been the technique program committee, the technique reviews, the track chair for international conferences: FICTA 2014, CSI 2014, IC4SD 2015, ICICT 2015, INDIA 2015, IC3T 2015, INDIA 2016, FICTA 2016, ICDECT 2016, IUKM 2016, INDIA 2017, CISC 2017, FICTA 2018, ICICC 2018, CITAM 2018 under Springer-ASIC/LNAI Series. Presently, he is serving in the editorial board of international journals and he authored 8 computer science books by Springer, Wiley, Chapman and Hall/CRC Press, Lambert Publication, Scholar Press, and VSRD Academic Publishing.

Bijeta Seth, Department of Computer Science & Engineering, SRM University, Sonepat, Haryana, India

Bijeta Seth is pursuing a Ph.D. from the Department of Computer Science & Engineering at SRM University, received her M.Tech Degree from the Department of Computer Science & Engineering at Seth Jai Prakash Mukand Lal Institute of Engineering & Technology, Radaur in 2011. She has completed her B.Tech from Department of Computer Science and Engineering at Haryana Engineering College, Jagadhri in 2005. Her research interests are in the areas of Cloud Computing and Artificial Intelligence and she has published many papers in the national and international journals and confereces.

Surjeet Dalal, Department of Computer Science & Engineering, SRM University, Sonepat, Haryana, India

Surjeet Dalal received his Ph.D. Degree in 2014 from Suresh Gyan Vihar University Jaipur (Rajasthan) and M.Tech Degree in 2010 from PDM College of Engineering, Bahadurgarh Haryana. He has completed B.Tech (Computer Science & Engineering) from Jind institute of Engineering & Technology Jind (Haryana) in 2005. He has more than nine years of teaching experience in various colleges under Kurukshetra University Kurukshetra. His current research area is Artificial Intelligence, Multi-agent system, Case-based reasoning and Cloud Computing. He has presented more than twenty papers in the national/international conferences. He has published more than thirty papers in the national and international journals. He has guided many M.Tech students for their thesis work under Kurukshetra University, Kurukshetra.

He is the reviewer of many national/international journal of repute in India and Abroad. He is the professional member of various professional and research committees. He is the professional member of CSI India, IEEE New York, IETE Chandigarh and ISTE-AICTE New Delhi.

References

Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., and Salvador, G. S. (2010). A cloud computing solution for patient’s data collection in health care institutions. In Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10. (pp. 95–99). IEEE. DOI: 10.1109/eTELEMED 2010.19

Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.

Nkosi, M. T., and Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), 629–633. IEEE.

Ikuomola, A. J., and Arowolo, O. O. (2014). Securing patient privacy in e-health cloud using homomorphic encryption and access control. International Journal of Computer Networks and Communications Security, 2(1), 15–21.

Soubhagya, B. (2013). A homomorphic encryption technique for scalable and secure sharing of personal health record in cloud computing. International Journal of Computer Applications, 67(11).

Deng, M., Petkovic, M., Nalin, M., and Baroni, I. (2011). A Home Healthcare System in the Cloud–Addressing Security and Privacy Challenges. In IEEE International Conference on Cloud Computing (CLOUD), (pp. 549–556). IEEE. DOI: 0.1109/CLOUD.2011.108

Sundararaman, K., Parthasarathi, J., Rao, S. V., and Rao, G. A. (2008). Hridaya A tele-medicine initiative for cardiovascular disease through convergence of grid, Web 2.0 and SaaS. In Second International Conference on Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth (pp. 15–18). IEEE. DOI: 10.1109/PCTHEALTH.2008.471015

Zafar, Z., Islam, S., Aslam, M. S., and Sohaib, M. (2014). Cloud computing services for the healthcare industry. Int. J. Multidiscip. Sci. Eng., 5, 25–29.

Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009). Patient controlled encryption: ensuring privacy of electronic medical records. In Proceedings of the 2009 ACM workshop on Cloud computing security (pp. 103–114). ACM.

Reddy, G. N., and Reddy, G. J. (2014). Study of Cloud Computing in HealthCare Industry. arXiv preprint arXiv:1402.1841.

Huda, M. N., Sonehara, N., and Yamada, S. (2009). A privacy management architecture for patient-controlled personal health record system. J. Engineering Science and Technology, 4(2), 154–170.

Li, M., Yu, S., Ren, K., and Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International conference on security and privacy in communication systems (pp. 89–106). Springer, Berlin, Heidelberg.

Sareen, S., Sood, S. K., and Gupta, S. K. (2016). Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. Information Security Journal: A Global Perspective, 25(1–3), 39–53.

Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., Fernandez, J. M., and Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. JoWUA, 4(2), 39–62.

Pundkar, S. N., and Shekokar, N. (2016). Cloud computing security in multi-clouds using Shamir’s secret sharing scheme. In International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), (pp. 392–395). IEEE.

Ren, K., Wang, C., and Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73. DOI: 1089-7801/12/$31.00 IEEE Computer Society.

Arun, V., Padma, S. K., and Shyam, V. (2015). Mobile admittance of Health Information with privacy and analysis in Telemedicine. In International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15), (pp. 1–6). IEEE. DOI: 978-1-4673-6667-0/15/$31.00

Hossain, M. A., Hossain, M. B., Uddin, M. S., and Imtiaz, S. M. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).

Navathe, S., Ceri, S., Wiederhold, G., and Dou, J. (1984). Vertical partitioning algorithms for database design. ACM Transactions on Database Systems (TODS), 9(4), 680–710. DOI: 10.1145/1994.2209

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613. DOI: 1145/359168.359176

Huang, J., Sharaf, M., and Huang, C. T. (2012). A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud. In 41st International Conference on Parallel Processing Workshops (ICPPW), (pp. 279–287). IEEE. DOI: 10.1109/ICPPW.2012.42

Liu, C. H., Chen, T. L., Lin, H. Y., Lin, F. Q., Liu, C. M., Wu, E. P., and Chen, T. S. (2013). Secure PHR Access Control Scheme in Cloud Computing. International Journal of Information and Electronics Engineering, 3(3), 329. DOI: 10.7763/IJIEE.2013.V3.328

Jain, A., and Soni, B. K. (2017). Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data. International Journal of Advanced Networking and Applications, 8(6), 3283.

Gupta, P., Koushal, V., Narayan, C., and Anand, A. (2017). Building Genetic Database at Medical Institutes: Implement Patient Cost Audit and Improve Biomedical Research. Annals of neurosciences, 24(1), 3–4.

Van, V. N., Long, N. Q., and Le, D. N. (2016). Performance analysis of network virtualization in cloud computing infrastructures on openstack. In Innovations in Computer Science and Engineering (pp. 95–103). Springer, Singapore.

Bamiah, M., Brohi, S., and Chuprat, S. (2012). A study on significance of adopting cloud computing paradigm in healthcare sector. In International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), (pp. 65–68). IEEE.

Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., and Vasilakos, A. V. (2015). Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), 33.

Sandhu, R., Gill, H. K., and Sood, S. K. (2016). Smart monitoring and controlling of Pandemic Influenza A (H1N1) using Social Network Analysis and cloud computing. Journal of Computational Science, 12, 11–22.

Van, V. N., Long, N. Q., Nguyen, G. N., and Le, D. N. (2016). A performance analysis of openstack open-source solution for iaas cloud computing. In Proceedings of the Second International Conference on Computer and Communication Technologies (pp. 141–150). Springer, New Delhi.

Le, D. N., Kumar, R., Nguyen, G. N., and Chatterjee, J. M. (2018). Cloud Computing and Virtualization. John Wiley & Sons.

Downloads

Published

2018-03-17

How to Cite

1.
Le D-N, Seth B, Dalal S. A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. JCSANDM [Internet]. 2018 Mar. 17 [cited 2024 Apr. 20];7(4):379-408. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5311

Issue

Section

Articles