scispace - formally typeset
Journal ArticleDOI

Medical Data Security for Healthcare Applications Using Hybrid Lightweight Encryption and Swarm Optimization Algorithm

TLDR
The main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method, which combines Paillier encryption and KATAN algorithm, which provides the lightweight features.
Abstract
In medical field, securing every patient’s record is main concern, ascribed to many fraudulent cases occurring in the health sector. The data of every individual must be engraved and sent into end-user without any issues. Mainly in the healthcare industry, where thoughts are often focused on saving someone’s life and rightly so, but securing access to interfaces and computer systems that store private data like medical records is also an essential factor to consider. Data security is a corresponding action between controlling access to information while allowing free and easy access to those who need that information. Still few problems are focused by the physician in the health sector. Patient’s data should be kept securely in medical provider servers so that physicians can provide proper treatments. To ensure secure storage and access management, we propose a novel hybrid lightweight encryption using swarm optimization algorithm (HLE–SO).The proposed HLE–SO technique merge Paillier encryption and KATAN algorithm, which provides the lightweight features. Generally, the lightweight encryption algorithms are affected by the key space. We introduce the swarm optimization algorithm to optimize the key space by changing the number of iteration round. Our main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method. Finally, the implementation is done with MATLAB tool with different EEG signal data set. The simulation results of proposed HLE–SO technique is compared with the existing state-of-art techniques in terms of different performance metrics are MSE, PSNR, SSIM, PRD, encryption time and decryption time.

read more

Citations
More filters
Journal ArticleDOI

BEdgeHealth: A Decentralized Architecture for Edge-Based IoMT Networks Using Blockchain

TL;DR: A new decentralized health architecture is proposed, called BEdgeHealth that integrates MEC and blockchain for data offloading and data sharing in distributed hospital networks and a data sharing scheme which enables data exchanges among healthcare users by leveraging blockchain and interplanetary file system.
Journal ArticleDOI

A robust blind medical image watermarking approach for telemedicine applications

TL;DR: The proposed blind and robust approach for medical image protection consists in embedding patient information and image acquisition data in the image and the integration was performed in the medium frequencies of the image.
Posted Content

Dropping Activation Outputs with Localized First-layer Deep Network for Enhancing User Privacy and Data Security

TL;DR: This paper proposed a new architecture for deep network in which users do not reveal their original data to the model, and achieves the desirable privacy protection requirement and demonstrated several advantages over the traditional approach with encryption/decryption.
Journal ArticleDOI

Pivotal "New Normal" Telemedicine: secured psychiatric homeopathy medicine transmission in Post-COVID.

TL;DR: In this paper, the authors proposed a secure session key for telemedicine in the post-COVID-19 "New Normal" era, where the patients' sensitive medical data security is the matter of highest demands.
Journal ArticleDOI

A Novel Random Error Approximate Adder-Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data

TL;DR: In this paper, a lightweight, secure medical image encryption scheme for the remote monitoring of health data is proposed, which uses computationally less complex weighted shift approximate adder (WSAA)-based encryption logic.
References
More filters
Proceedings ArticleDOI

Particle swarm optimization: developments, applications and resources

TL;DR: Developments in the particle swarm algorithm since its origin in 1995 are reviewed and brief discussions of constriction factors, inertia weights, and tracking dynamic systems are included.
Journal ArticleDOI

Data Security in the World of Cloud Computing

TL;DR: To ensure that decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.
Journal ArticleDOI

Data security and privacy in wireless body area networks

TL;DR: Two important data security issues are looked into: secure and dependable distributed data storage, and fine-grained distributed data access control for sensitive and private patient medical data.
Journal ArticleDOI

Security and Privacy for Implantable Medical Devices

TL;DR: The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.
Related Papers (5)