| Literature DB >> 33425644 |
Arindam Sarkar1, Moirangthem Marjit Singh2, Jyotsna Kumar Mandal3.
Abstract
This paper deals with one of the key problems of e-healthcare which is the security. Patients are worried about the confidentiality of their electronic medical record (EMR) which could be used to expose their identities. It is high time to revisit the confidentiality and security issues of the existing telehealth system. Intruders can perform sniffing, spoofing, or phishing operations effortlessly during the online exchange of the EMR using a digital platform. The EMR must be transmitted anonymously with a high degree of hardness of encryption by protecting the authentication, confidentiality, and integrity criteria of the patient. These requirements recommend the security of the current system to be improved. In this paper, a neural synchronization-guided concatenation of header and secret shares with the ability to transmit the EMR with an end-to-end security protocol has been proposed. This proposed methodology breaks down the EMR into the n number of secret shares and transmits to the n number of recipients. The original EMR can be reconstructed after the amalgamation of a minimum k (threshold) number of secret shares. The novelty of the technique is that one share should come from a specific recipient to whom a special privilege is given to recreate the EMR among such a predefined number of shares. In the absence of this privileged share, the original EMR cannot be reconstructed. This proposed technique has passed various parametric tests. The results are compared with existing benchmark techniques. The results of the proposed technique have shown robust and effective potential. © King Fahd University of Petroleum & Minerals 2021.Entities:
Keywords: Artificial neural networks (ANNs); COVID-19; Electronic medical record (EMR); Secret share; Security; Telehealth
Year: 2021 PMID: 33425644 PMCID: PMC7776308 DOI: 10.1007/s13369-020-05136-8
Source DB: PubMed Journal: Arab J Sci Eng ISSN: 2191-4281 Impact factor: 2.334
Fig. 1Histogram of frequency distribution spectrum of input source stream characters
Fig. 2Histogram of the frequency distribution continuum of encoded stream characters using the proposed technique
Fig. 3Original signal’s floating frequency
Fig. 4Using the proposed method, the floating frequency of the encrypted signal
Fig. 5Autocorrelation of the original signal
Fig. 6Autocorrelation of the encrypted signal using proposed technique
Quality metrices estimation
| Clinical signals | MSE | PSNR (dB) | SSIM |
|---|---|---|---|
| ECG [ | 10714.21 | 7.925 | 0.0429 |
| EEG [ | 10124.16 | 8.213 | |
| BP [ | 11316.81 | 7.965 | 0.0721 |
PRD in received clinical signal with noise %
| Signal | PRD (0% noise) | PRD (5% noise) | PRD (10% noise) | PRD (15% noise) | PRD (100% noise) |
|---|---|---|---|---|---|
| BP [ | 82.16 | 137.89 | 307.34 | 805.72 | |
| ECG [ | 19829.81 | 24470.56 | 48215.93 | 112137.04 | |
| EEG [ | 397.09 | 510.73 | 854.25 | 3187.45 |
NIST statistical test
| NIST test | Status | |
|---|---|---|
| Frequency | 0.557287 | Success |
| Frequency within a block | 0.580167 | Success |
| Runs | 0.517563 | Success |
| Longest run of ones in a block | 0.088907 | Success |
| Binary matrix rank | 0.680278 | Success |
| Discrete Fourier transform | 0.511908 | Success |
| Non-overlapping template matching | 0.459784 | Success |
| Overlapping (periodic) template matching | 0.221587 | Success |
| Maurer’s “universal statistical” | 0.787421 | Success |
| Linear complexity | 0.668904 | Success |
| Serial | 0.543298 | Success |
| Approximate entropy | 0.290176 | Success |
| Cumulative sums | 0.696389 | Success |
| Random excursions | 0.350933 | Success |
| Random excursions variants | 0.234908 | Success |
Comparisons of encryption/decryption time of the proposed technique with benchmark AES and TDES encryption techniques
| Source file size (in bytes) | Proposed technique (in milliseconds) | AES technique [ | TDES technique [ | |||
|---|---|---|---|---|---|---|
| Enc. | Dec. | Enc. | Dec. | Enc. | Dec. | |
| 1,925,185 | 120 | 142 | 197 | 219 | 393 | 501 |
| 2,498,560 | 178 | 184 | 242 | 297 | 532 | 518 |
| 3,790,336 | 240 | 251 | 298 | 332 | 897 | 923 |
| 4,883,456 | 319 | 322 | 405 | 467 | 964 | 1051 |
| 5,456,704 | 337 | 350 | 487 | 517 | 1172 | 1168 |
Comparison of the technique proposed with recent techniques noted in the literature
| Sl. no. | Comparative parameters | Proposed technique | Ref. [ | Ref. [ | Ref [ | Ref. [ | Ref. [ |
|---|---|---|---|---|---|---|---|
| 1 | ECG clinical signal | Yes | Yes | Yes | No | No | No |
| 2 | EEG clinical signal | Yes | Yes | No | No | No | No |
| 3 | BP clinical signal | No | Yes | No | No | No | No |
| 4 | UCD clinical signal | Yes | No | No | No | No | No |
| 5 | Signal database | Physio Bank ATM | Physio Bank ATM | MIT-BIH | UCI KDD | NTOU | Bonn University |
| 6 | Telehealth system | Yes | No | No | No | No | No |
| 7 | Live sensing signals | No | No | No | No | No | No |
| 8 | Data encryption | Yes | Yes | Yes | Yes | Yes | Yes |
| 9 | Data compression | No | No | Yes | No | No | No |
| 10 | Secret key space analysis | Yes | Yes | No | No | No | No |
| 11 | Histogram | Yes | Yes | No | No | No | No |
| 12 | Correlation | No | Yes | No | Yes | No | Yes |
| 13 | Autocorrelation | Yes | Yes | No | No | No | Yes |
| 14 | Plain signal sensitivity | Yes | Yes | No | No | Yes | No |
| 15 | Secret key sensitivity | Yes | Yes | No | No | No | No |
| 16 | Entropy analysis | Yes | Yes | No | No | No | No |
| 17 | Floating frequency | Yes | Yes | No | No | No | No |
| 18 | Chosen plain text attack | Yes | Yes | No | No | No | No |
| 19 | Differential attacks | Yes | No | No | No | No | No |
| 20 | Mean square error MSE | Yes | Yes | No | Yes | No | No |
| 21 | Pick signal-to-noise ratio PSNR | Yes | Yes | No | No | No | No |
| 22 | Signal-to-noise ratio SNR | No | No | Yes | No | No | No |
| 23 | Structural similarity index SSIM | Yes | Yes | No | No | No | No |
| 24 | Power spectral density | No | No | No | No | No | Yes |
| 25 | Encryption time analysis | Yes | Yes | No | No | Yes | No |
| 26 | Pseudorandomness analysis | Yes | Yes | No | No | No | No |
| 27 | AVAL effect | Yes | No | No | No | No | No |
| 28 | Strict avalanche effect | Yes | No | No | No | No | No |
| 29 | Bit independence test | Yes | No | No | No | No | No |
| 30 | Comparative study | Yes | Yes | No | No | No | No |
Average values of avalanche, strict avalanche and bit independence comparisons
| Technique | Avg. value of avalanche | Avg. value of strict avalanche | Avg. value of bit independence |
|---|---|---|---|
| Proposed | 0.97189467 | 0.9687704 | 0.7569857 |
| AES [ | 0.9999469 | 0.9996540 | 0.7211989 |
| TDES [ | 0.9999142 | 0.9996324 | 0.7147735 |