E-Health Privacy and Security through ECC, SHA-256, and Multi-Authority Approaches

Authors

  • Ensteih Silvia Department of Computer Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, Karnataka, India
  • Mohd Tajuddin Department of Computer Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.48001/joitc.2023.119-13

Keywords:

Ciphertext policy attribute-based encryption, Cloud computing, E-Health, ECC (Elliptic Curve Cryptography), Multi-authority, SHA-256

Abstract

The rapid digitization of healthcare services has led to the proliferation of electronic health (E-Health) systems, providing convenience and improved patient care. However, the increasing use of E-Health platforms also raises concerns about the privacy and security of sensitive medical information. This review paper explores the challenges surrounding E-Health privacy and security and presents a comprehensive approach to addressing these concerns through the implementation of Elliptic Curve Cryptography (ECC), Secure Hash Algorithm 256 (SHA-256), and multi-authority schemes. The synergistic application of these cryptographic techniques not only fortifies the protection of patient data but also establishes a robust framework for secure data sharing and management in E-Health systems.

Downloads

Download data is not yet available.

References

Almulhim, M., & Zaman, N. (2018, February). Proposing secure and lightweight authentication scheme for IoT based E-health applications. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 481-487). IEEE.

https://doi.org/10.23919/ICACT.2018.8323802.

Bodeis, W., & Corser, G. P. (2021, March). Blockchain adoption, implementation and integration in healthcare application systems. In SoutheastCon 2021 (pp. 1-3). IEEE. https://doi.org/10.1109/SoutheastCon45413.2021.9401885.

Chakraborty, S., Aich, S., & Kim, H. C. (2019, February). A secure healthcare system design framework using blockchain technology. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 260-264). IEEE. https://doi.org/10.23919/ICACT.2019.8701983.

Fernandez-Aleman, J. L., Senor, I. C., Lozoya, P. A. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541-562. https://doi.org/10.1016/j.jbi.2012.12.003.

Gupta, R., Shukla, A., Mehta, P., Bhattacharya, P., Tanwar, S., Tyagi, S., & Kumar, N. (2020, July). VAHAK: A blockchain-based outdoor delivery scheme using UAV for healthcare 4.0 services. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 255-260). IEEE. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162738.

Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625-1647. https://doi.org/10.3390/s120201625.

Kumar, R., Marchang, N., & Tripathi, R. (2020, January). Distributed off-chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. In 2020 International Conference on Communication Systems & Networks (COMSNETS) (pp. 1-5). IEEE. https://doi.org/10.1109/COMSNETS48256.2020.9027313.

Lee, Y. S., Alasaarela, E., & Lee, H. (2014, February). Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. In The International Conference on Information Networking 2014 (ICOIN2014) (pp. 453-457). IEEE. https://doi.org/10.1109/ICOIN.2014.6799723.

Tsai, K. L., Leu, F. Y., & Tan, J. S. (2016). An ECC-based secure EMR transmission system with data leakage prevention scheme. International Journal of Computer Mathematics, 93(2), 367-383. https://doi.org/10.1080/00207160.2014.955482.

Wang, S., Wang, J., Wang, X., Qiu, T., Yuan, Y., Ouyang, L., ... & Wang, F. Y. (2018). Blockchain-powered parallel healthcare systems based on the ACP approach. IEEE Transactions on Computational Social Systems, 5(4), 942-950. https://doi.org/10.1109/TCSS.2018.2865526.

Downloads

Published

2024-02-21

How to Cite

Ensteih Silvia, & Mohd Tajuddin. (2024). E-Health Privacy and Security through ECC, SHA-256, and Multi-Authority Approaches. Journal of Information Technology and Cryptography (e-ISSN: 3048-5290), 1(1), 9–13. https://doi.org/10.48001/joitc.2023.119-13

Issue

Section

Articles