
Secure Electronic Medical Records Using Lattice Cryptography and Fog Computing Techniques
- 1 Osun State University Osogbo, Nigeria yemi.fatokun@uniosun.edu.ng
- 2 Department of Cyber Security, Federal University of Technology, Akure, Nigeria ajgabriel@futa.edu.ng
- 3 Department of Cyber Security, Federal University of Technology, Akure, Nigeria ajgabriel@futa.edu.ng
* Author to whom correspondence should be addressed.
Abstract
The usage of Information Technologies (IT), as well as data has increased over the years to improve businesses and human life generally thereby increasing productivity. In the health sector, Electronic Health Records (EHR) has helped in collecting demographic medical data which helps healthcare practitioners to provide quality health care. The EHR generates lots of medical data and are analyzed and processed to form big health data and sent to Agencies, Government to influence decisions in improving quality of life and to predict or prevent premature deaths and disease development. In this research work, we propose a model using lattice-based cryptography to encrypt health big data and deploy a decoy model which will be coined in fog computing facility to serve as honeypot or trap machine to attract attackers.
Keywords
Medical Health Records, Cloud Computing, Fog Computing, Information Security, Post Quantum Cryptography
[1]. Gabriel A. J., BK Alese, AO Adetunmbi, OS Adewale, (2015). “Post-quantum crystography based security framework for cloud computing”, Journal of Internet Technology and Se-cured Transactions (JITST), Pages 351-357.
[2]. Quek Kia Fatt and Amutha Ramadas (2018) “The Usefulness and Challenges of Big Data in Healthcare”, Journal of Healthcare Communications, ISSN 2472-1654 Vol.3 No.2:21
[3]. Ajala F., Awokola J., and Emuoyibofarhe O.(2015) Development Of An Electronic Medical Rec-ord (EMR) System For A Typical Nigerian Hospital. Journal of Multidisciplinary Engineer-ing Science and Technology (JMEST) ISSN: 3159- 0040 Vol. 2 Issue 6.
[4]. Abouelmehdi Karim, Beni-Hessane Abderrahim, Khaloufi Hayat (2018), “Big Healthcare data: preserving security and privacy”, Journal of Big Data, https://doi.org/10.1186/s40537-017-0110-7.
[5]. Asonganyi Jeffrey Nkwetta Matricule No: CT14A019 Degree for which submitted: B.Tech De-partment: Computer Engineering Project Title: Honey-System: Design, Implementation and Attack Analysis Project Supervisor: Dr. Sone Ekonde Michael Date: July, 2018.
[6]. Wang X. (2010) Application of Cloud Computing in the Health Information System, International Conference on Computer Application and System Modeling (ICCASM).
[7]. Akinyele J., Pagano M, Green M, Rubin A, Lehmann C , Peterson Z, (2011) Securing electronic medical records using attribute-based encryption on mobile devices DOI: 10.1145/2046614.2046628.
[8]. Boyinbode O. and Toriola G. (2015) CloudeMR: A Cloud Based Electronic Medical Record Sys-tem. International Journal of Hybrid Information Technology Vol.8, No.4 (2015), pp. 201-212.
[9]. Tsai K., Leu F., Tien-Han W., Chiou S., Liu Y., and Liu.H (2014) Secure ECC based Electronic Medical Record System. Journal of Internet Services and Information Security (JISIS), vol-ume: 4, number: 1, pp. 47-57.
[10]. Premarathne U., Abuadbba A., Alabdulatif A., Khalil I., Tari Z., Zomaya A., and Buyya, R. (2015) Hybrid Cryptographic Access Control for Cloud-Based EHR Systems. IEEE Cloud Computing, 3(4), 58–64. doi:10.1109/mcc.2016.76.
[11]. Kwangsoo et al. (2018) Privacy-preserving Attribute-based Access Control Model for XML-based Electronic Health Record System. IEEE Access PP (99):1-1 DOI: 10.1109/ACCESS.2018.2800288.
[12]. Afshar M., Samet S., and Hu T. (2018) an Attribute Based Access Control Framework for Healthcare System IOP Conf. Series: Journal of Physics: Conf. Series 933 (2018) 012020 doi :10.1088/1742-6596/933/1/012020.
[13]. Bandar S Alhaqbani. (2010) Privacy and Trust Management for Electronic Health Records. Queensland University of Technology, Brisbane, Australia.
[14]. Saghar B. and Stephen M. (2017) Trust-based framework for Information Sharing in Health care. University of Ontario Institute of Technology.
[15]. Suraj Shukla, Detailed Review of Different Security Techniques for Data Protection in Cloud Computing (April 20, 2020). Available at https://ssrn.com/abstract=3580863 or http://dx.doi.org/10.2139/ssrn.3580863.
[16]. Gabriel, A., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2013).” Post-Quantum Crystography: A combination of Post- Quantum Cryptography and Steganography”, 8th In-ternational Conference for Internet Technology and Secured Transactions (ICITST 2013) doi:10.1109/icitst.2013.6750240.
[17]. Alowolodu O.D., Alese B.K., Adetunmbi A.O., Ogundele O.S. (2013). “Elliptic Curve Cryp-tography for Securing Cloud Computing Applications”, International Journal of Computer Applications, Volume 66 Issue 23.
[18]. Gabriel, A. J. (2021). Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography. Journal of Information technology and Se-cure Transactions (JITST), 9(1):735-740. Infornomics Society. DOI: 10.20533/jitst.2046.3723.2021.0090.
[19]. Thompson, A., Abayomi, A., Gabriel, A.J. (2022). Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies. In: Misra, S., Kumar Tyagi, A. (eds) Blockchain Applications in the Smart Era. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-89546-4_14.
[20]. Bowen B. M., Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo (2009) “Baiting Inside Attackers using Decoy Documents”, Department of Computer Science Columbia University New York, NY 10027.
[21]. Hamid, H. Rahman, S M., Hossain, M. S., Ahmad A., Alamri, A. (2017). A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2757844.
[22]. Alowolodu, Olufunso Dayo, Gabriel Kayode Adelaja, Boniface Kayode Alese, Olufunke Cath-erine Olayemi (2018) “Medical Image Security Using Quantum Cryptography”, Issues in Informing Science & Information Technology, Informing Science Institute, Pages 57-68.
[23]. Spitzner, Lance (2003). Honeypots: Sticking it to hackers. 18. 48-51.
[24]. David R.Matos, Migue lL.Pardal, PedroAd˜ao Ant´onio RitoSilva, Miguel Correia (2018) Se-curing Electronic Health Records in the Cloud INESCID, Instituto Superior T´ecnico, Uni-versidade de Lisboa, Portugal 2 Instituto de Telecomunica¸c˜oes, Lisboa, Portugal.
[25]. Sriram M., Vaibhav Patel, Harishma D., Nachammai Lakshmanan, (2014), “A Hybrid Protocol to Secure the Cloud from Insider Threats”, DOI: 10.1109/CCEM.2014.7015476.
[26]. Wang, Lidong & Alexander, Cheryl. (2013). “Medical Applications and Healthcare Based on Cloud Computing”, International Journal of Cloud Computing and Services Science (IJ-CLOSER). 2. 10.11591/closer.v2i4.3452.
[27]. Thavamani S., M.Rajakumar (2019) Privacy Preserving Healthcare Data using Cloud Compu-ting International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-10S.
[28]. Hey T. (1999) Quantum computing: An introduction. Computing & Control Engineering Jour-nal, 10(3):105–112.
[29]. Kraemer Frank Alexander, Anders Eivind Bråten, Lindner, R., & Peikert, C. (2011). Better Key Sizes (and Attacks) for LWE-Based Encryption. IACR Cryptol. ePrint Arch., 2010, 592.
[30]. Yuan Y.et. al. (2016) Portable implementation of lattice-based cryptography using javascript. InCANDAR.
Cite this article
Tunrayo,F.Y.;Gabriel,A.J.;Dayo,A.O. (2023). Secure Electronic Medical Records Using Lattice Cryptography and Fog Computing Techniques. Applied and Computational Engineering,2,314-321.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 4th International Conference on Computing and Data Science (CONF-CDS 2022)
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).