NETWORK SECURITY ENHANCEMENT FOR E-HEALTH SYSTEMS THROUGH DUAL ENCRYPTION TECHNIQUES

Main Article Content

Alya H. Zwiad
Faris Mutar Mahdi Al-Edam
Sanaa Ali Juber

Abstract

The increased use of e-health systems requires better methods for keeping patients’ sensitive information private, complete, and available.In this study, we propose the use of a dual encryption model which encompasses the RC4 stream cipher and the CBC-Twofish block cipher for providing end-to-end security in electronic health record (EHR) real-time transmissions as well as their storage.The encryption of RC4 is fast because it is also known for being extremely light in terms of computation. Therefore, this encryption uses the fastest means possible and still leaves room open if there are any other kinds of problems arising in connection with information transmissions.Physiological data is encrypted with a lightweight, high-speed cipher called RC4, which ensures that there is little delay when sending it over a communication link and the like.This cross-interference is important for additional protection measures because it hampers the smooth flow of information within block units. hence, It enhances overall system security,The proposed system has undergone evaluation through the NIST suite analysis tool to establish randomness as well as their performance measurements like encryption speed vis-à-vis scalability, among others.It is evident from the results that this framework has superior cryptographic strength and is more efficient than the usual AES or DES algorithmic encryption methods.The dual encryption approach guarantees end-to-end data confidentiality without Compromising security, Compromising the required performance specifications of real-time healthcare systems.This method can be seamlessly integrated into contemporary e-health infrastructures; hence providing effective means through which confidentiality of patient records may be achieved even in cases where medical facilities are located far from each other.

Article Details

Section

Articles

How to Cite

NETWORK SECURITY ENHANCEMENT FOR E-HEALTH SYSTEMS THROUGH DUAL ENCRYPTION TECHNIQUES. (2025). Innovative: International Multidisciplinary Journal of Applied Technology (2995-486X), 3(5), 46-59. https://multijournals.org/index.php/innovative/article/view/3502

References

[1] Ahmad, Gazi Imtiyaz, Jimmy Singla, and Kaiser J. Giri. "Security and Privacy of E-health Data." Multimedia Security: Algorithm Development, Analysis and Applications (2021): 199-214.‏

[2] Zhang, A., Lin, X. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain. J Med Syst 42, 140 (2018). https://doi.org/10.1007/s10916-018-0995-5

[3] Eshghi, Farshad, and Amin Zamani. "Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach." Information Systems & Telecommunication, (2018), Vol. 6, No. 3, 177-188.

[4] AHMAD, Rami; WAZIRALI, Raniyah; ABU-AIN, Tarik. "Machine learning for wireless sensor networks security: An overview of challenges and issues." Sensors, 2022, 22.13: 4730, https://doi.org/10.3390/s22134730.‏

[5] C. M. B. M. J. JENIFER S, “Deep Learning for Medical Image Analysis: A Review,” Journal of Information Systems and Telecommunication (JIST), 2023, vol. 11, no. 4, 347–358.

[6] A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP. 2020. doi: 10.1007/978-3-030-18732-3_9.

[7] L. Rikhtechi, V. Rafe, and A. Rezakhani, “Secured Access Control in Security Information and Event Management Systems,” Journal of Information Systems and Telecommunication, 2021, vol. 9, no. 33, pp. 67–78, doi: 10.52547/jist.9.33.67.

[8] S. S. Ambarkar and N. Shekokar, "Toward Smart and Secure IoT Based Healthcare System,". Springer International Publishing, 2020, vol. 266, doi: 10.1007/978-3-030-39047-1_13.

[9] J. C. in the C. M. C.-P. S. and D. T. C. I. Jimenez, H. Jahankhani, and S. Kendzierskyj, “Health Care in the Cyberspace: Medical Cyber-Physical System and Digital Twin Challenges,” Internet of Things, 2020, pp. 79–92, doi: 10.1007/978-3-030-18732-3_6.

[10] Y. Harold Robinson, X. Arogya Presskila, and T. Samraj Lawrence, “Utilization of Internet of Things in Health Care Information System,” Intelligent Systems Reference Library, 2020, vol. 180, pp. 35–46, doi: 10.1007/978-3-030-39119-5_3.

[11] S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, 2015, vol. 3, pp. 678–708, , doi: 10.1109/ACCESS.2015.2437951.

[12] D. K. Yadav and S. Behera, “EAI Endorsed Transactions A Survey on Secure Cloud-Based E-Health Systems,” , 2019, vol. 5, no. 20, pp. 1–21.

[13] A. Omotosho and J. Emuoyibofarhe, “A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records,” Int J Appl Inf Syst, 2014, vol. 7, no. 8, pp. 11–18, doi: 10.5120/ijais14-451225.

[14] Varsha, B. Sri, and P. S. Suryateja. "Using advanced encryption standard for secure and scalable sharing of personal health records in cloud." International Journal of Computer Science and Information Technologies (IJCSIT), 2014, 5.6, 7745-7747.‏

[15] J. Y. Oh, D. Il Yang, and K. H. Chon, “A selective encryption algorithm based on AES for medical information,” Healthc Inform Res, 2010, vol. 16, no. 1, pp. 22–29, doi: 10.4258/hir.2010.16.1.22.

[16] D. Shin, T. Sahama, and R. Gajanayake, “Secured e-health data retrieval in DaaS and Big Data,” IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013, no. October 2013, pp. 255–259, doi: 10.1109/HealthCom.2013.6720677.

[17] M. A. Kamoona and A. M. Altamimi, “Cloud E-health Systems: A Survay on Security Challenges and Solutions,” 2018 8th International Conference on Computer Science and Information Technology, CSIT 2018, pp. 189–194, doi: 10.1109/CSIT.2018.8486167.

[18] B. T. Asare, K. Quist-Aphetsi, and L. Nana, “Secure data exchange between nodes in IoT using TwoFish and DHE,” Proceedings - 2019 International Conference on Cyber Security and Internet of Things, ICSIoT 2019, pp. 101–104, 2, doi: 10.1109/ICSIoT47925.2019.00024.

[19] J. Zhang, H. Liu, and L. Ni, “A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR,” IEEE Access, 2020, vol. 8, pp. 38995–39012, doi: 10.1109/ACCESS.2020.2975208.

[20] P. Jindal and B. Singh, “Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm,” Wirel Pers Commun, 2017, vol. 92, no. 3, pp. 1221–1250, doi: 10.1007/s11277-016-3603-3.

[21] I. Sumartono, A. Putera, U. Siahaan, and N. Mayasari, “An Overview of the RC4 Algorithm,” IOSR J Comput Eng, 2016, vol. 18, no. 6, pp. 67–73, doi: 10.9790/0661-1806046773.

[22] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, and C. Hall, “Twofish : A 128-Bit Block Cipher,” NIST AES Proposal, 1998 vol. 15, no. 1, pp. 1–27, [Online].

[23]Vellore pichandi, K., Janarthanan, V., Annamalai, T., & Arumugam, M. (2024). Enhancing healthcare in the digital era: A secure e-health system for heart disease prediction and cloud security. Expert Syst. Appl., 255, 124479. doi: 10.1016/j.eswa.2024.124479

[24] Chaudhary, R. R. K., & Chatterjee, K. . An Efficient Lightweight Cryptographic Technique For IoT based E-healthcare System. 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE. doi: 10.1109/SPIN48934.2020.9071421

Similar Articles

You may also start an advanced similarity search for this article.