Cargando…
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm
A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wide assortment of medical care applications such as...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698591/ https://www.ncbi.nlm.nih.gov/pubmed/36433217 http://dx.doi.org/10.3390/s22228620 |
_version_ | 1784838858519609344 |
---|---|
author | Kumar, Pradeep Banerjee, Kakoli Singhal, Niraj Kumar, Ajay Rani, Sita Kumar, Raman Lavinia, Cioca Adriana |
author_facet | Kumar, Pradeep Banerjee, Kakoli Singhal, Niraj Kumar, Ajay Rani, Sita Kumar, Raman Lavinia, Cioca Adriana |
author_sort | Kumar, Pradeep |
collection | PubMed |
description | A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wide assortment of medical care applications such as the medical information of a patient, the recovery of clinical information, the incorporation of information pertaining to their wellbeing, dynamic help, telemedicine, obtaining clinical data, patient administration, and so on. The accompanying security issues have grown in tandem with the complexity and improvements in mobile agent technologies. As mobile agents work in an insecure environment, their security is a top priority when communicating and exchanging data and information. Data integrity, data confidentiality and authentication, on-repudiation, denial of service, and access control, are all key security concerns with mobile agent migration. This paper proposes a Verifiable, Secure Mobile Agent Migration model, based on two polynomials (t, n), and an edge secret imparting plan with Blowfish encryption, to enable secure information transmission in clinical medical care. |
format | Online Article Text |
id | pubmed-9698591 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96985912022-11-26 Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm Kumar, Pradeep Banerjee, Kakoli Singhal, Niraj Kumar, Ajay Rani, Sita Kumar, Raman Lavinia, Cioca Adriana Sensors (Basel) Article A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wide assortment of medical care applications such as the medical information of a patient, the recovery of clinical information, the incorporation of information pertaining to their wellbeing, dynamic help, telemedicine, obtaining clinical data, patient administration, and so on. The accompanying security issues have grown in tandem with the complexity and improvements in mobile agent technologies. As mobile agents work in an insecure environment, their security is a top priority when communicating and exchanging data and information. Data integrity, data confidentiality and authentication, on-repudiation, denial of service, and access control, are all key security concerns with mobile agent migration. This paper proposes a Verifiable, Secure Mobile Agent Migration model, based on two polynomials (t, n), and an edge secret imparting plan with Blowfish encryption, to enable secure information transmission in clinical medical care. MDPI 2022-11-08 /pmc/articles/PMC9698591/ /pubmed/36433217 http://dx.doi.org/10.3390/s22228620 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kumar, Pradeep Banerjee, Kakoli Singhal, Niraj Kumar, Ajay Rani, Sita Kumar, Raman Lavinia, Cioca Adriana Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title | Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title_full | Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title_fullStr | Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title_full_unstemmed | Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title_short | Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm |
title_sort | verifiable, secure mobile agent migration in healthcare systems using a polynomial-based threshold secret sharing scheme with a blowfish algorithm |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698591/ https://www.ncbi.nlm.nih.gov/pubmed/36433217 http://dx.doi.org/10.3390/s22228620 |
work_keys_str_mv | AT kumarpradeep verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT banerjeekakoli verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT singhalniraj verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT kumarajay verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT ranisita verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT kumarraman verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm AT laviniaciocaadriana verifiablesecuremobileagentmigrationinhealthcaresystemsusingapolynomialbasedthresholdsecretsharingschemewithablowfishalgorithm |