5 research outputs found

    A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology

    Get PDF
    يعد التخزين الآمن للمعلومات الطبية السرية أمرًا بالغ الأهمية لمنظمات الرعاية الصحية التي تسعى إلى حماية خصوصية المريض والامتثال للمتطلبات التنظيمية. في هذا البحث، نقدم نظامًا جديدًا للتخزين الآمن للبيانات الطبية باستخدام تقنية تشفير Chaskey و blockchain. يستخدم النظام تشفير Chaskey لضمان سرية وسلامة البيانات الطبية، وتكنولوجيا blockchain لتوفير حلول تخزين البيانات الطبية بحيث يكون قابل للتطوير ويتميز باللامركزية. يستخدم النظام أيضًا تقنيات Bflow للتجزئة ومنها التجزئة الرأسية لتعزيز قابلية التوسع وإدارة البيانات المخزنة. بالإضافة إلى ذلك، يستخدم النظام العقود الذكية لفرض سياسات التحكم في الوصول والتدابير الأمنية الأخرى. سنقدم وصف للنظام المقترح بالتفصيل ونقدم تحليلاً لخصائصه الأمنية والأداء. تظهر نتائجنا أن النظام يوفر حلاً آمنًا للغاية وقابل للتطوير لتخزين البيانات الطبية السرية، مع تطبيقات محتملة في مجموعة واسعة من إعدادات الرعاية الصحية.Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings

    Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms

    Get PDF
    الستيكانوغرافي هو فن لإخفاء المعلومات او البيانات أو تضمينها في وسائط رقمية مختلفة مثل الصور، الفيديو، الصوت والنصوص. وان هناك الكثير من التقنيات لتحقيق عملية الإخفاء. في هذا البحث قمنا بحماية البيانات أو أي معلومات بطريقتين: التشفير والإخفاء. الغرض الأساسي من البحث هي تقديم طريقة تشفير مطورة للرسالة أولا باستخدام خوارزمية (التشفير القياسي المتقدم)AES   هو تشفير مفتاح متماثل حيث ان لكل شفرة من الشفرات بحجم كتلة 128 بت، حيث ان الأحجام الرئيسية هي  من 128، 192، 256 بت. ثانيا نقوم بإخفاء تلك الرسالة المشفرة في الحدود الخارجية للصورة الملونة (الإطار الخارجي للصورة الغلاف) باستخدام دالة LSB (البت الأقل اهمية) في ملفات الصورة الغلاف التي تكون بامتداد (bmp) أو(Jpeg) علما ان الخوارزمية الأخيرة تتسم بالضعف تجاه الهجمات لذلك تم تطويرها وتدعيمها بخوارزمية AES لزيادة الأمن ضد اي هجوم محتمل اثناء ارسالها عبر شبكة الانترنيت من المرسل الى المستلم.Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits.  Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack

    Investigation on the Integrated Cloud and BlockChain (ICBC)Technologies to Secure Healthcare Data Management Systems

    No full text
    International audienceBlockchain is emerging as one of the most promising and resourceful security technologies for cloud infrastructures. In a distributed database system, blockchain is used to store, read, and validate transactions. It can improve security, trustworthiness, and privacy by using an unchallengeable, shared distributed ledger on cloud nodes. Cloud-based healthcare systems (CHS) are vulnerable to various threats and attacks such as identity theft, medical fraud, insurance fraud, and alteration of critical patient data. Secure retrieval, access, and storage of data on CHS are necessary to protect critical medical data. Accordingly, the integrated cloud and BlockChain (ICBC) architecture emerge as a potential solution for shaping the next era of a healthcare system while providing efficient, secure, and effective patient care. In this context, this paper presents an in-depth exploration of advanced approaches to securing cloud-based healthcare data management systems using blockchain technologies. It provides a taxonomy and highlights the benefits and limitations of the approaches examined

    An Improved GIFT Lightweight Encryption Algorithm to Protect Medical Data In IoT

    No full text
    International audienceThe Internet of Things (IoT) enables the interconnection of devices that collect massive amounts of data, making IoT security requirements crucial and secured through encryption. However, traditional encryption protocols are no longer suitable for all IoT scenarios. We propose a new lightweight encryption method optimized for patient information protection in healthcare, considering the limited capacity of portable medical devices. Our method has been experimentally demonstrated to be effective, with a largest entropy of 7.9917 in medical images (computed tomography) and average coding and decoding times of 3.8952 sec and 3.0584 sec, respectively. The encoded image exhibits an even distribution of pixels and lower correlation coefficients between neighboring pixels, supporting the effectiveness of our less complex method compared to current state-of-The-Art methods

    Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing

    No full text
    The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A verified and authenticated decryption process for the cloud environment is the imperative feature of our proposed architecture. The data owner encrypts their data and sends it to the cloud. The cloud server performs partial decryption and the final decrypted data are shared for users as per their privileges. Thus, the data owner reduces complexity of productivity by delegating the decryption process to the cloud server. Analysis of the experimental results confirms that data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights scheme. Our performance evaluation results show that the proposed model condensed the communication overhead and made Digital Imaging and Communications in Medicine (DICOM) more secure
    corecore