An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 (KDF2)

An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 (KDF2)

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-9
Year of Publication : 2022
Authors : G. Dhanalakshmii, G. Victo Sudha George
DOI : 10.14445/22315381/IJETT-V70I9P229

How to Cite?

G. Dhanalakshmii, G. Victo Sudha George, "An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 (KDF2) " International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 290-297, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P229

Abstract
Cloud computing has become an integral part of everyone's life since it allows us to share our data with anyone at any time and from any location over the internet through a service provider. Cloud computing provides virtualized platforms that enable users to manage and analyze data without having to do it manually. The term "E-Health" is used by hospital executives to describe the electronic monitoring of health-related data. Various e-Health applications have been developed to use e-Health data to monitor patients' health successfully remotely. Patient-sensitive data must be safeguarded at all costs to prevent data manipulation. In the cloud, protecting E-Health data is a serious problem. They have used numerous security algorithms in the existing system and still have much work to do to enhance security levels. This proposed method to secure data for E-Health applications in cloud environments by securing improved versions of secure hash fixed-based output cryptographic algorithms (SHA-512) with a Password-Based Key Derivation Function (PBKDF2), which helps to secure patient data in e-health cloud environments. These methods identify the most common aggressions faced by end users, such as Man in the Middle, Brute Force and Rainbow attacks. Finally, all the cryptographic hash methods were compared in terms of CPU time, Memory space, and Execution time.

Keywords
Cloud Storage, Security Issue, Cryptography algorithms, Secure Hash Functions, Attacks.

Reference
[1] Chang, B. Shao, Y. Ji, and G. Bian, “Comment on A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage,” IEEE Trans. Serv. Comput., pp. 1–1, 2020. Doi: 10.1109/TSC.2021.3056660.
[2] K. Lee, ''Comments on ‘Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption,” IEEE Trans. Cloud Comput., vol. 8, no. 4, pp. 1299–1300, 2020. Doi: 10.1109/TCC.2020.2973623.
[3] J. Zhao, Y. Ma, J. Cui, Y. Peng, K. Li, and T. Wang, “SecSky: A Secure Dynamic Skyline Query Scheme with Data Privacy,” IEEE Access, vol. 9, pp. 1–1, 2020. Doi: 10.1109/access.2020.3047950.
[4] H. Cui, R. H. Deng, Y. Li, and G. Wu, “Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud,” IEEE Trans. Big Data, vol. 5, no. 3, pp. 648–660, 2019. Doi: 10.1109/TBDATA.2017.2656120.
[5] Y. Liu, S. Xiao, H. Wang, and X. Wang, “New Provable Data Transfer from Provable Data Possession and Deletion for Secure Cloud Storage,” Int. J. Distrib. Sens. Networks, vol. 15, no. 4, 2020. Doi: 10.1177/1550147719842493.
[6] Z. Ding, Y. Wang, G. Wang, D. Zhang, and D. Kifer, “Detecting Violations of Differential Privacy,” Proc. ACM Conf. Comput. Commun. Secur., 2020. Doi: 10.1145/3243734.3243818.
[7] Z. Zhang, F. Zhou, S. Qin, Q. Jia, and Z. Xu, “Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications,” IEEE Access, vol. 8, pp. 66828–66838, 2020. Doi: 10.1109/ACCESS.2020.2984916.
[8] H. Wang, Z. Xia, J. Fei, and F. Xiao, “An AES-Based Secure Image Retrieval Scheme using Random Mapping and BOW in Cloud Computing,” IEEE Access, vol. 8, pp. 61138–61147, 2020. Doi: 10.1109/ACCESS.2020.2983194.
[9] J. Sun, X. Yao, S. Wang, and Y. Wu, “Blockchain-Based Secure Storage and Access Scheme for Electronic Medical Records in IPFS,” IEEE Access, vol. 8, pp. 59389–59401, 2020. Doi: 10.1109/ACCESS.2020.2982964.
[10] Vincent Manuceau, "About a Fast Cryptographic Hash Function Using Cellular Automata Ruled by Far-Off Neighbours," SSRG International Journal of Engineering Trends and Technology, vol. 69, no. 2, pp. 39-41, 2021. Crossref, https://doi.org/10.14445/22315381/IJETT-V69I2P206
[11] Q. He and H. He, “A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining,” Sustain., vol. 13, no. 1, pp. 1–17, 2021. Doi: 10.3390/su13010101.
[12] B. Sengupta, A. Dixit, and S. Ruj, “Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques,” IEEE Trans. Cloud Comput., pp. 1–1, 2020. Doi: 10.1109/tcc.2020.3000342.
[13] Z. Ghaffar, S. Ahmed, K. Mahmood, S. H. Islam, M. M. Hassan, and G. Fortino, “An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems,” IEEE Access, vol. 8, pp. 47144–47160, 2020. Doi: 10.1109/ACCESS.2020.2977264.
[14] S. Xiong, Q. Ni, L. Wang, and Q. Wang, “SEM-ACSIT: Secure and Efficient Multi Authority Access Control for IoT Cloud Storage,” IEEE Internet Things J., vol. 7, no. 4, pp. 2914–2927, 2020. Doi: 10.1109/JIOT.2020.2963899.
[15] S. Sun, H. Ma, Z. Song, and R. Zhang, “WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms,” IEEE Trans. Dependable Secur. Comput., 2020. Doi: 10.1109/TDSC.2020.3040784.
[16] Ogiela L, Ogiela MR, Ko H, “Intelligent Data Management and Security in Cloud Computing,” Sensors, Basel, Switzerland, vol. 20, no. 12, 2020.
[17] Tabrizchi H, Rafsanjani MK, “A Survey on Security Challenges in Cloud Computing: Issues, Threats, and Solutions,” The Journal of Supercomputing, pp. 1-40, 2020.
[18] Wu B, Wang C, Yao H, “Security Analysis and Secure Channel-Free Certificate Less Searchable Public Key Authenticated Encryption for a Cloud-Based Internet of Things,” PloS one, vol. 15, no. 4, pp. e0230722, 2020.
[19] Arun Pratap Singh, Himanshu Pundir, "Secure File Storage on Cloud Using Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 5, pp. 12-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I5P104
[20] Dr.G.Victo Sudha George G, “A Review of Classifying and Securing Sensitive Customer Data on Cloud Environments using Cryptographic Algorithms,” Design Engineering, pp. 12424-12444, 2021. [Online]. Available: http://www.thedesignengineering.com/index.php/DE/article/view/4402
[21] V.Rajeswari, M.Gobinath, G. S. R. A. R., “Securing an E-Health Care Information Systems on Cloud Environments with Big Data Approach,” Design Engineering, pp. 6986-6994, 2021. [Online]. Available: http://www.thedesignengineering.com/index.php/DE/article/view/3215.
[22] G. Dhanalakshmi, Victo Sudha George, “Security Threats and Approaches in E-Health Cloud Architecture System with Big Data Strategy Using Cryptographic Algorithms,” Materials Today: Proceedings, 2022. https://doi.org/10.1016/j.matpr.2022.03.254. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214785322015978).
[23] Saritha Gattoju, and Vadlamani Naga Lakshmi, "An Adaptive Wolf Based Dansing System for Securing Hadoop at the Data Cleaning Stage," SSRG International Journal of Engineering Trends and Technology, vol. 70, no. 4, pp. 31-43, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I4P204
[24] Kalaichelvi.T. Jabasheela, L,Ramapraba, P S,Shobana, M, “MAC-Based Secure Data Transmission in Vehicular Ad hoc Networks,” In: Pandian, A.P., Fernando, X., Haoxiang, W. eds., Computer Networks, Big Data and IoT, Lecture Notes on Data Engineering and Communications Technologies, Springer, Singapore. vol 117, 2022. https://doi.org/10.1007/978-981-19-0898- 9_4.
[25] Parvathaneni Rajendra Kumar, et al., "Heart Disease Prediction based on Ensemble Classification Model with Tuned Training Weights," SSRG International Journal of Engineering Trends and Technology, vol. 70, no. 4, pp. 59-81, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I4P206
[26] Shakil KA, Zareen FJ, Alam M, Jabin S, “BAM Health Cloud: A Biometric Authentication and Data Management System for Healthcare Data in the Cloud,” Journal of King Saud University-Computer and Information Sciences.
[27] Naseema Shaik, Noha Abdullah ayedalshahrani, Afnan saadalali, Amjad mohammedsaad Alqahtani, Salhasaeedhedan, "Making Digital Artifacts on the Web Verifiable and Reliable by using Cryptographic Hash Key," SSRG International Journal of Computer Trends and Technology, vol. 67, no. 11, pp. 38-41, 2019. Crossref, https://doi.org/10.14445/22312803/IJCTT-V67I11P106
[28] M. Park, “An SGX-Based Key Management Framework for Data-Centric Networking,” IEEE Access, vol. 8, pp. 45198–45210, 2020. Doi: 10.1109/ACCESS.2020.2978346.