A Robust and Secure Access Scheme for Cloud Based E-Healthcare Services

  • Glena Aziz Qadir
  • [email protected]
  • 0750 468 5352
  • print
  • E-healthcare is a digital version of a patient’s medical history, which
    includes information about their medical conditions, treatments, and
    medications. E-healthcare is typically used by healthcare providers to improve
    the quality of patient care. E-healthcare systems are essential tools that contain
    sensitive patient information and are subject to strict privacy and security
    regulations. Since the rise of the cloud computing many healthcare providers
    are now storing their E-healthcare data on cloud-based systems. Transferring
    E-healthcare data to the cloud computing can introduce a variety of security
    challenges that must be carefully considered and managed. One of the main
    security concerns when moving E-healthcare data to the cloud computing is the
    risk of unauthorized access to patient information. The access control is a
    critical component of E-healthcare systems, and ensuring secure and
    appropriate access to patient data is essential for protecting security. Also,
    privacy is maintained for the integrity of the healthcare system by encrypting
    data when storing it in the cloud. The access control allows only authorized
    users to access E-health data. In healthcare, timely access to patient data is
    critical for effective care delivery. Time delays in accessing data can lead to
    serious consequences for patient care that including delayed diagnosis and
    inappropriate treatment. For this reason, the time delay of user access is
    decreased using the proposed algorithms.
    In this thesis, the Generate Access Key (GAK) algorithm is proposed
    based on Message Authentication Code (MAC) and Hashing technique to
    produce a Security Secret Key (SSK). The GAK would work by providing
    users with a unique SSK that would be used to allow them to access data in the
    E-healthcare based cloud system with the minimum of delay. Users are also
    given flexible access rights based on their role and rights according to User
    Access Rights (UAR) algorithm. In order to protect the privacy of users, the
    X
    data is encrypted using the Database Encryption (DBE) algorithm before being
    stored in the database and to read by the users the data in the system must be
    decrypted based on the Database Decryption (DBD) algorithm. The simulation
    results of our algorithms show that the delay for authenticating two hundred
    users is 440 milliseconds, and the data response time is 150 milliseconds for
    200 participants requesting data simultaneously. The computational cost was
    compared with other related works and found that in our algorithm, 0.035
    milliseconds were needed for all the registration, login, and authentication
    stages.

  • Erbil Technical Engineering College
  • Information System Engineering
  • Security

Leave a Reply

Your email address will not be published.

You may use these <abbr title="HyperText Markup Language">HTML</abbr> tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>