Effective Stochastic Decoding Method for Electronic Medical Information Sharing

Authors

  • Reddy D Janardhan Assistant Professor, Department of Computer Science and Engineering, PACE Institute of Tec Author
  • GiriBabu Sadineni Associate Professor, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • Telikapalli Sai Krishna Gayathri Student, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • Gollamudi Venkata Sai Suchithra Student, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • Venkata Bhargavi Gopisetty Student, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • Samanthula Soundarya Student, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • Dammalapati Haritha Student, Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author

DOI:

https://doi.org/10.55524/ijircst.2023.11.3.17

Keywords:

Encryption, Decryption, Internet of Things, Personal Health Records

Abstract

Several IoT solutions have emerged as a  result of the industry's massive expansion. E-health has  the potential to provide high-quality, accessible treatment.  ' It's a challenge to keep the user 's private medical file  safe. Using a cryptography method, such as protecting  personal data, is one option. In order to communicate  information with several participants, each receiver must  have their own unique encryption key (physicians, health  agencies, etc.). Recompilation of the master password is  required by one side of the (t, n) cutoff selective encryp tion mechanism for data exchange. This study presents a  decentralized decoding method for PHR distribution that  is successful. It's simple to exchange information with  others without having to reassemble the decoding pass word. We test the chosen-ciphertext safety of our tech nique. The JPBC package is used to execute our method  on a PC. Our strategy seems to be viable and successful  in ePHR, according on the results of our tests. 

Downloads

Download data is not yet available.

References

G. Eysenbach, “What is e-health?” J. Med. Internet Res., vol. 3, no. 2, p. e20, 2001.

V. Chang, Y.-H. Kuo, and M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds,” Future Gener. Comput. Syst., vol. 57, pp. 24–41, Apr. 2016.

M. Obaidat and N. Boudriga, Security of E-Systems and Computer Networks. Cambridge, U.K.: Cambridge Univ. Press, 2007.

P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage, and D. Z. Sands, “Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption,” J. Amer. Med. Inform. Assoc., vol. 13, no. 2, pp. 121–126, Mar. 2006.

R. Pifer. Patient Use of Digital Health Tools Lags Behind Hype, Poll Finds. Accessed: Sep. 12, 2019. [Online]. Available: https://www. healthcaredive.com/news/patient use-of-digital-health-tools-lags-behindhype- poll finds/562778/

Protenus. (2018). 32 Million Breached Patient Records in First Half of 2019 Double Total for all of 2018. Accessed: Jul. 31, 2019. [Online]. Available: https://www.prnewswire.com/news-releases/32-million

breached-patient-records-in-first-half-of-2019-double total-forall-of-2018-300894237.html

J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya, and A. Toval, “Security and privacy in electronic health rec ords: A systematic literature review,” J. Biomed. Infor mat., vol. 46, no. 3, pp. 541–562, Jun. 2013.

M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud compu ting using attribute based encryption,” IEEE Trans. Paral lel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.

H. Qian, J. Li, Y. Zhang, and J. Han, “Privacy-preserving personal health record using multi-authority attribute based encryption with revocation,” Int. J. Inf. Secur., vol. 14, no. 6, pp. 487–497, Nov. 2015.

X. Liu, Y. Xia, W. Yang, and F. Yang, “Secure and effi cient querying over personal health records in cloud com puting,” Neurocomputing, vol. 274, pp. 99–105, Jan. 2018.

M. S. Obaidat, I. Traore, and I. Woungang, Biometric Based Physical and Cybersecurity Systems, vol. 368. Cham, Switzerland: Springer,2019.

D. Boneh and M. K. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology— CRYPTO (Lecture Notes in Computer Science), vol. 2139, J. Kilin, Eds. Berlin, Germany: Springer, Aug. 2001, pp. 213–229.

M. Focus. Voltage Securemail On-Premises On-Premises Email Encryption. Accessed: Oct. 20, 2018. [Online]. Available: https://www.microfocus.com/en us/products/email-encryption-security/

M. L. PURA and V. V. Patriciu, “Identity-based chryptog raphy: From proposals to everyday use,” Sci. Res. Educ. Air Force-AFASES, vol. 1, pp. 367–374, May 2014.

X. Boyen and L. Martin, Identity-Based Cryptography Standard (IBCS)#1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems,document RFC 5091, Dec. 2007.

A. De Caro and V. Iovino, “JPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun. (ISCC), Jun. 2011, pp. 850–855.

K. D. Mandl, W. W. Simons, W. C. Crawford, and J. M. Abbett, “Indivo: A personally controlled health record for health information exchange and communication,” BMC Med. Informat. Decis. Making, vol. 7, no. 1, p. 25, Dec. 2007.

J. Hu, H.-H. Chen, and T.-W. Hou, “A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations,” Comput. Standards Interfaces, vol. 32, nos. 5–6, pp. 274–280, Oct. 2010.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records,” in Proc. ACM Workshop Cloud Com put. Secur. (CCSW), 2009, pp. 103–114.

C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi, and G. S. Salvador, “A cloud computing solu tion for patient’s data collection in health care institu tions,” in Proc. 2nd Int. Conf. eHealth, Telemedi cine,Social Med., Feb. 2010, pp. 95–99.

J. A. Akinyele, M. W. Pagano, M. D. Green, C. U. Leh mann, Z. N. J. Peterson, and A. D. Rubin, “Securing elec tronic medical records using attribute-based encryption on mobile devices,” in Proc. 1st ACM Workshop Secur. Pri vacy Smartphones Mobile Devices (SPSM), 2011, pp. 75– 86.

Downloads

Published

2023-05-30

How to Cite

Effective Stochastic Decoding Method for Electronic Medical Information Sharing . (2023). International Journal of Innovative Research in Computer Science & Technology, 11(3), 90–93. https://doi.org/10.55524/ijircst.2023.11.3.17