Journal ArticleDOI
Medical Data Security for Healthcare Applications Using Hybrid Lightweight Encryption and Swarm Optimization Algorithm
K. Tamilarasi,A. Jawahar +1 more
TLDR
The main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method, which combines Paillier encryption and KATAN algorithm, which provides the lightweight features.Abstract:
In medical field, securing every patient’s record is main concern, ascribed to many fraudulent cases occurring in the health sector. The data of every individual must be engraved and sent into end-user without any issues. Mainly in the healthcare industry, where thoughts are often focused on saving someone’s life and rightly so, but securing access to interfaces and computer systems that store private data like medical records is also an essential factor to consider. Data security is a corresponding action between controlling access to information while allowing free and easy access to those who need that information. Still few problems are focused by the physician in the health sector. Patient’s data should be kept securely in medical provider servers so that physicians can provide proper treatments. To ensure secure storage and access management, we propose a novel hybrid lightweight encryption using swarm optimization algorithm (HLE–SO).The proposed HLE–SO technique merge Paillier encryption and KATAN algorithm, which provides the lightweight features. Generally, the lightweight encryption algorithms are affected by the key space. We introduce the swarm optimization algorithm to optimize the key space by changing the number of iteration round. Our main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method. Finally, the implementation is done with MATLAB tool with different EEG signal data set. The simulation results of proposed HLE–SO technique is compared with the existing state-of-art techniques in terms of different performance metrics are MSE, PSNR, SSIM, PRD, encryption time and decryption time.read more
Citations
More filters
Journal ArticleDOI
BEdgeHealth: A Decentralized Architecture for Edge-Based IoMT Networks Using Blockchain
TL;DR: A new decentralized health architecture is proposed, called BEdgeHealth that integrates MEC and blockchain for data offloading and data sharing in distributed hospital networks and a data sharing scheme which enables data exchanges among healthcare users by leveraging blockchain and interplanetary file system.
Journal ArticleDOI
A robust blind medical image watermarking approach for telemedicine applications
TL;DR: The proposed blind and robust approach for medical image protection consists in embedding patient information and image acquisition data in the image and the integration was performed in the medium frequencies of the image.
Posted Content
Dropping Activation Outputs with Localized First-layer Deep Network for Enhancing User Privacy and Data Security
TL;DR: This paper proposed a new architecture for deep network in which users do not reveal their original data to the model, and achieves the desirable privacy protection requirement and demonstrated several advantages over the traditional approach with encryption/decryption.
Journal ArticleDOI
Pivotal "New Normal" Telemedicine: secured psychiatric homeopathy medicine transmission in Post-COVID.
TL;DR: In this paper, the authors proposed a secure session key for telemedicine in the post-COVID-19 "New Normal" era, where the patients' sensitive medical data security is the matter of highest demands.
Journal ArticleDOI
A Novel Random Error Approximate Adder-Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data
Nagarajan Manikandan,Rajappa Muthaiah,Yuvaraja Teekaraman,Ramya Kuppusamy,Arun Radhakrishnan +4 more
TL;DR: In this paper, a lightweight, secure medical image encryption scheme for the remote monitoring of health data is proposed, which uses computationally less complex weighted shift approximate adder (WSAA)-based encryption logic.
References
More filters
Proceedings ArticleDOI
Particle swarm optimization: developments, applications and resources
TL;DR: Developments in the particle swarm algorithm since its origin in 1995 are reviewed and brief discussions of constriction factors, inertia weights, and tracking dynamic systems are included.
Journal ArticleDOI
Data Security in the World of Cloud Computing
TL;DR: To ensure that decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.
Journal ArticleDOI
Data security and privacy in wireless body area networks
Ming Li,Wenjing Lou,Kui Ren +2 more
TL;DR: Two important data security issues are looked into: secure and dependable distributed data storage, and fine-grained distributed data access control for sensitive and private patient medical data.
Journal ArticleDOI
Security and Privacy for Implantable Medical Devices
TL;DR: The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.