Hybrid Security Model for Medical Image Protection in Cloud
Keywords:
Cloud Storage, Cloud Security, AES, RSA, Healthcare DataAbstract
A cloud computing environment provides a cost-effective approach for end-users to remotely store and retrieve private data through an internet connection anytime and anywhere. The security of these data cannot always be guaranteed because they can only be accessed by the end-user through a third-party interface, making them vulnerable to potential breaches of authentication and data integrity. This paper presents a secure hybrid approach for a medical image stored in the cloud that prioritises data security and integrity. The suggested model uses a combination of elliptic curve cryptography and advanced encryption standard algorithms to ensure authentication and data integrity. Results demonstrate the superior performance of the proposed model to existing methods, aligning it with compliance requirements for handling sensitive data stored in the cloud. This approach includes adherence to regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR), which prescribe specific guidelines for the secure handling, storage and processing of personal information. Contrary to traditional and other hybrid systems, this study suggests that this approach is one of the best in guaranteeing the security of medical images in the cloud.
Downloads
References
Z. Zhu, A. X. Liu, and F. Chen, ‘FPGA Resource Pooling in Cloud Computing’, IEEE Trans. Cloud Comput., vol. PP, no. c, p. 1, 2018, doi: 10.1109/TCC.2018.2874011. DOI: https://doi.org/10.1109/TCC.2018.2874011
I. A. Elgendy, W. Zhang, C. Liu, and C. Hsu, ‘An Efficient and Secured Framework for Mobile Cloud Computing’, vol. 7161, no. c, pp. 1–10, 2018, doi: 10.1109/TCC.2018.2847347. DOI: https://doi.org/10.1109/TCC.2018.2847347
J. Wang, J. Pan, F. Esposito, P. Calyam, Z. Yang, and P. Mohapatra, “Edge Cloud Offloading Algorithms,” ACM Computing Surveys, vol. 52, no. 1, pp. 1–23, Feb. 2019, doi: 10.1145/3284387. DOI: https://doi.org/10.1145/3284387
M. Shakor, M. Khaleel, and F. Abed, “Enhancing Cloud Storage Privacy (CSP) Based on Hybrid Cryptographic Techniques,” Journal of Garmian University, vol. 6, no. 1, pp. 582–594, Apr. 2019, doi: 10.24271/garmian.2000. DOI: https://doi.org/10.24271/garmian.2000
S. Raghavendra et al., “Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications,” Security and Communication Networks, vol. 2022, pp. 1–19, May 2022, doi: 10.1155/2022/1791491. DOI: https://doi.org/10.1155/2022/1791491
C. Liu, Z. Su, X. Xu, and Y. Lu, ‘Robotics and Computer-Integrated Manufacturing Service-oriented industrial internet of things gateway for cloud manufacturing’, Robot. Comput. Integr. Manuf., vol. 73, no. July 2021, p. 102217, 2022, doi: 10.1016/j.rcim.2021.102217. DOI: https://doi.org/10.1016/j.rcim.2021.102217
B. Alaya and L. Sellami, ‘Journal of Information Security and Applications Clustering method and symmetric / asymmetric cryptography scheme adapted to securing urban VANET networks’, J. Inf. Secur. Appl., vol. 58, p. 102779, 2021, doi: 10.1016/j.jisa.2021.102779. DOI: https://doi.org/10.1016/j.jisa.2021.102779
T. Wang, Y. Zhou, H. Ma, and R. Zhang, “Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud,” Security and Communication Networks, vol. 2022, pp. 1–21, May 2022, doi: 10.1155/2022/1867584. DOI: https://doi.org/10.1155/2022/1867584
T.-Y. Youn and H. S. Rhee, “Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services,” Security and Communication Networks, vol. 2021, pp. 1–8, Nov. 2021, doi: 10.1155/2021/2291470. DOI: https://doi.org/10.1155/2021/2291470
F. Alidadi, S. Shaghayegh, and B. Chehelcheshmeh, ‘A cloud ‑ based mobile payment system using identity ‑ based signature providing key revocation’, J. Supercomput., no. 0123456789, 2021, doi: 10.1007/s11227-021-03830-4. DOI: https://doi.org/10.1007/s11227-021-03830-4
D. He and S. Xiong, “Image Processing Design and Algorithm Research Based on Cloud Computing,” Journal of Sensors, vol. 2021, pp. 1–10, Oct. 2021, doi: 10.1155/2021/9198884. DOI: https://doi.org/10.1155/2021/9198884
R. Denis and P. Madhubala, “Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems,” Multimedia Tools and Applications, vol. 80, no. 14, pp. 21165–21202, Mar. 2021, doi: 10.1007/s11042-021-10723-4. DOI: https://doi.org/10.1007/s11042-021-10723-4
S. Domanal, S. Member, R. Mohana, R. Guddeti, and S. Member, ‘A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment’, vol. X, no. X, pp. 1–14, 2017, doi: 10.1109/TSC.2017.2679738. DOI: https://doi.org/10.1109/TSC.2017.2679738
H. S. Yahia et al., ‘Comprehensive Survey for Cloud Computing Based Nature-Inspired Algorithms Optimization Scheduling’, vol. 8, no. 2, pp. 1–16, 2021, doi: 10.9734/AJRCOS/2021/v8i230195. DOI: https://doi.org/10.9734/ajrcos/2021/v8i230195
H. Li, C. Lan, X. Fu, C. Wang, F. Li, and H. Guo, “A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing,” Sensors, vol. 20, no. 17, p. 4720, Aug. 2020, doi: 10.3390/s20174720. DOI: https://doi.org/10.3390/s20174720
A. Odeh and Q. A. Al-haija, ‘Medical image encryption techniques : a technical survey and potential challenges’, no. January, pp. 3170–3177, 2023, doi: 10.11591/ijece.v13i3.pp3170-3177. DOI: https://doi.org/10.11591/ijece.v13i3.pp3170-3177
N. M. S. Surameery, ‘Modified Advanced Encryption Standard for Boost Image Encryption’, vol. 6, no. 1, pp. 1–4, 2022, doi: 10.21928/uhdjst.v6n1y2022.pp52-59. DOI: https://doi.org/10.21928/uhdjst.v6n1y2022.pp52-59
J. Srivastava, S. Routray, S. Ahmad, and M. M. Waris, “Internet of Medical Things (IoMT)-Based Smart Healthcare System: Trends and Progress,” Computational Intelligence and Neuroscience, vol. 2022, pp. 1–17, Jul. 2022, doi: 10.1155/2022/7218113. DOI: https://doi.org/10.1155/2022/7218113
B. Prabhu Kavin, S. Ganapathy, U. Kanimozhi, and A. Kannan, “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” Wireless Personal Communications, vol. 115, no. 2, pp. 1107–1135, Jun. 2020, doi: 10.1007/s11277-020-07613-7. DOI: https://doi.org/10.1007/s11277-020-07613-7
B.-H. Lee, E. K. Dewi, and M. F. Wajdi, “Data security in cloud computing using AES under HEROKU cloud,” 2018 27th Wireless and Optical Communication Conference (WOCC), Apr. 2018, doi: 10.1109/wocc.2018.8372705. DOI: https://doi.org/10.1109/WOCC.2018.8372705
S. Roldán, L. Fatih, and B. Subhadeep, ‘Six shades lighter : a bit-serial implementation of the AES family’, J. Cryptogr. Eng., vol. 11, no. 4, pp. 417–439, 2021, doi: 10.1007/s13389-021-00265-8. DOI: https://doi.org/10.1007/s13389-021-00265-8
C. Jacobs et al., “Finding high-redshift strong lenses in DES using convolutional neural networks,” Monthly Notices of the Royal Astronomical Society, vol. 484, no. 4, pp. 5330–5349, Jan. 2019, doi: 10.1093/mnras/stz272. DOI: https://doi.org/10.1093/mnras/stz272
A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” The Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, May 2019, doi: 10.1007/s11227-019-02878-7. DOI: https://doi.org/10.1007/s11227-019-02878-7
A. K. Et. al., “An Information Security Using DNA Cryptography along with AES Algorithm,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 1S, pp. 183–192, Apr. 2021, doi: 10.17762/turcomat.v12i1s.1607. DOI: https://doi.org/10.17762/turcomat.v12i1S.1607
N. Kheshaifaty and A. Gutub, “Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication,” Journal of Engineering Research, Nov. 2021, doi: 10.36909/jer.13761. DOI: https://doi.org/10.36909/jer.13761
H. E. Hassan, M. Tahoun, and G. S. Eltaweel, ‘ORIGINAL ARTICLE A robust computational DRM framework for protecting multimedia contents using AES and ECC’, Alexandria Eng. J., 2020, doi: 10.1016/j.aej.2020.02.020. DOI: https://doi.org/10.1016/j.aej.2020.02.020
Y. Naito, Y. Sasaki, and T. Sugawara, ‘AES-LBBB : AES Mode for Lightweight and BBB-Secure Authenticated Encryption’, IACR Trans. Cryptogr. Hardw. Embed. Syst., vol. 2021, no. 3, pp. 298–333, 2021, doi: 10.46586/tches.v2021.i3.298-333. DOI: https://doi.org/10.46586/tches.v2021.i3.298-333
H. M. Mohammad and A. A. Abdullah, ‘Enhancement process of AES : a lightweight cryptography algorithm-AES for constrained devices’, vol. 20, no. 3, pp. 551–560, 2022, doi: 10.12928/TELKOMNIKA.v20i3.23297. DOI: https://doi.org/10.12928/telkomnika.v20i3.23297
M. Nabil, A. A. M. Khalaf, and S. M. Hassan, ‘Design and implementation of pipelined and parallel AES encryption systems using FPGA’, vol. 20, no. 1, pp. 287–299, 2020, doi: 10.11591/ijeecs.v20.i1.pp287-299. DOI: https://doi.org/10.11591/ijeecs.v20.i1.pp287-299
F. T. Abdul Hussien, A. M. S. Rahma, and H. B. Abdul Wahab, “A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites,” Security and Communication Networks, vol. 2021, pp. 1–15, Dec. 2021, doi: 10.1155/2021/9961172. DOI: https://doi.org/10.1155/2021/9961172
B. Jacobs and J. Popma, ‘Medical research , Big Data and the need for privacy by design’, no. June, pp. 1–5, 2019, doi: 10.1177/2053951718824352. DOI: https://doi.org/10.1177/2053951718824352
J. Gutiérrez-martínez, M. A. Núñez-gaona, and H. Aguirre-meneses, ‘Business Model for the Security of a Large-Scale PACS , Compliance with ISO / 27002 : 2013 Standard’, pp. 481–491, 2015, doi: 10.1007/s10278-014-9746-4. DOI: https://doi.org/10.1007/s10278-014-9746-4
B. R. B. P. Chitra, ‘ECC ‑ CRT : An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud’, Wirel. Pers. Commun., no. 0123456789, 2020, doi: 10.1007/s11277-020-07756-7. DOI: https://doi.org/10.1007/s11277-020-07756-7
S. Banerjee and A. Patil, “ECC Based Encryption Algorithm for Lightweight Cryptography,” Intelligent Systems Design and Applications, pp. 600–609, Apr. 2019, doi: 10.1007/978-3-030-16657-1_56. DOI: https://doi.org/10.1007/978-3-030-16657-1_56
L. Ertaul and W. Lu, “ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I),” Lecture Notes in Computer Science, pp. 102–113, 2005, doi: 10.1007/11422778_9. DOI: https://doi.org/10.1007/11422778_9
N. M. S. Surameery and M. Y. Shakor, "CBES: Cloud Based Learning management System for Educational Institutions," 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT), Surabaya, Indonesia, 2021, pp. 270-275, doi: 10.1109/EIConCIT50028.2021.9431932. DOI: https://doi.org/10.1109/EIConCIT50028.2021.9431932
N. M. S. Surameery and M. Y. Shakor, "Blockchain as a foundation to support healthcare systems". International Journal of Nonlinear Analysis and Applications. 2022 Dec 5, doi: https://doi.org/10.22075/ijnaa.2022.7186.
R. Lin and S. Li, “An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm,” Security and Communication Networks, vol. 2021, pp. 1–18, Apr. 2021, doi: 10.1155/2021/5586959. DOI: https://doi.org/10.1155/2021/5586959
S. Fatima, T. Rehman, M. Fatima, S. Khan, and M. A. Ali, “Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing,” IEEC 2022, Jul. 2022, doi: 10.3390/engproc2022020014. DOI: https://doi.org/10.3390/engproc2022020014
Published
How to Cite
Issue
Section
Copyright (c) 2023 Mohammed Y. Shakor , Nigar M. Shafiq Surameery, Zuheir N. Khlaif
This work is licensed under a Creative Commons Attribution 4.0 International License.