Cargando…

Secure Medical Data Model Using Integrated Transformed Paillier and KLEIN Algorithm Encryption Technique with Elephant Herd Optimization for Healthcare Applications

In the healthcare industry, where concerns are frequently and appropriately focused on saving someone's life, access to interfaces and computer systems storing sensitive data, such as medical records, is crucial to take into account. Medical information has to be secretive and protected by the...

Descripción completa

Detalles Bibliográficos
Autor principal: Alluhaidan, Ala Saleh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9626223/
https://www.ncbi.nlm.nih.gov/pubmed/36330360
http://dx.doi.org/10.1155/2022/3991295
Descripción
Sumario:In the healthcare industry, where concerns are frequently and appropriately focused on saving someone's life, access to interfaces and computer systems storing sensitive data, such as medical records, is crucial to take into account. Medical information has to be secretive and protected by the laws of privacy with restrictions on its access. E-health security is a holistic notion that encompasses available medical data's integrities and confidentiality which ensures that data are not accessed by unauthorized people and allow doctors to offer proper treatment. The patients' data need to be secured on servers holding medical data. This work adds new features for ensuring storage and access safety through ITPKLEIN-EHO (integrated transformed Paillier and KLEIN algorithms) that use EHOs (elephant herd optimizations) to provide lightweight features. The key space affects lightweight encryption techniques in general. The EHOs (elephant herd optimizations) optimize key spaces by adjusting iteration rounds. The main goal is to encrypt EEGs (electroencephalographic signals) in healthcare and send it to end users using the proposed ITPKLEIN-EHO approach. This suggested technique utilizes MATLAB for its tests on various EEG data sets for implementation. The simulations of the proposed IRPKLEIN-EHO technique are evaluated with other existing techniques in terms of MSEs, PSNRs, SSIMs, PRDs, and encryption/decryption times.