Security for EHR Based on ECC with Reconstruction Method

Authors

  • Benil T  Department of Computer Science and Engineering, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India
  • Berlin Shaheema S  Department of Computer Science and Engineering, Annai Vailankanni College of Engineering, Nagercoil, Tamil Nadu, India
  • Jasper J  Department of Electrical and Electronics Engineering, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India

Keywords:

Electronic Health Record, Symmetric key, ECC, HealthCare

Abstract

Electronic Health Record plays vital role in hospitals and healthcare organizations. security is one of the main issues in EHR . Electronic Health Record allows only the licensed people can access the records. EHR ensure high-quality care. EHR contain treatment histories of patients. Using basic algorithms like symmetric algorithms, public key cryptography, RSA algorithm the Electronic health care can be secured, but there may be a few drawbacks to obtain integrity and confidentiality .The proposed ECC (Elliptical Curve Cryptography) will provide high security in EHR and obtain confidentiality and integrity. The doctors diagnoses, treatment plans, radiology images, and laboratory a test results. Treatments and guidance from doctors to patients mostly through e-mails, also many parties store and run computation while keeping the sensitive health data private.so cipher attack may cause heavy damage from the patients side therefore data may be secure. In order to address this issue this paper presents a patient healthcare data management system using reconstruction outsourcing mechanism to attain privacy in HC.

References

  1. M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E. Spafford. Secure outsourcing of scientific computations. Advances in Computers, 54:215–272, 2002.
  2. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou. New algorithms for secure outsourcing of modular exponentiations. IEEE Transactions on Parallel & Distributed Systems, 25(9):2386–2396, 2012.
  3. R. D’Souza, D. Jao, I. Mironov, and O. Pandey. Publicly verifiable secret sharing for cloud-based key management. In Proceedings of Indocrypt 2011, pages 290–309, 2011..
  4. J. Gill, J. Alberto, L. Hinojosa, and I. Svecs. System: Secure cloud storage, auditing, and access control for electronic health records. 2012..
  5. D. Hubbard, M. Sutton, et al. Top threats to cloud computing v1.0. Cloud Security Alliance, pages 1–14, 2010.
  6. J. Lin, W. Yu, X. Yang, Q. Yang, X. Fu, and W. Zhao.A real-time en- route route guidance decision scheme for transportation-based cyberphysical systems. IEEE Transactions on Vehicular Technology, 66(3):2551–2566, 2017.
  7. S. Salinas, C. Luo, X. Chen,W. Liao, and P. Li. Efficient secure outsourcing of large-scale sparse linear systems of equations. IEEE Transactions on Big Data, PP(99): 1–1, 2017.
  8. A. Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
  9. J. Yu and H. Wang. Strong key-exposure resilient auditing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 2017..
  10. H. Zhu, T. Liu, D. Zhu, and H. Li. Robust and simple n-party entangled authentication cloud storage protocol based on secret sharing scheme. Journal of Information Hiding & Multimedia Signal Processing, 4(2):110–117,2013..

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Benil T, Berlin Shaheema S, Jasper J, " Security for EHR Based on ECC with Reconstruction Method, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.377-382, March-April-2021.