咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Fortifying Healthcare Data Sec... 收藏

Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol

作     者:Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany 

作者机构:Computer Science and Information TechnologyJazan UniversityJazanSaudi Arabia CSEEudoxia Research UniversityNew CastleUSA Department of Information TechnologyCollege of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in SoftwareSangmyung UniversitySeoulKorea Department of Computer Science and EngineeringLovely Professional UniversityPhagwaraPunjabIndia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2024年第79卷第5期

页      面:3397-3416页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA) 

摘      要:A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分