| Literature DB >> 35035271 |
Rabeeha Fazal1, Munam Ali Shah1, Hasan Ali Khattak2, Hafiz Tayyab Rauf3, Fadi Al-Turjman4.
Abstract
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) are used to gather that records. The researchers access the patient's data through DSS and perform predictions on the severity and effect of the Covid-19 disease; in contrast, unauthorized users can also access the data for malicious purposes. For that reason, it is a challenging task to protect Covid-19 patient data. In this paper, we proposed a new technique for protecting Covid-19 patients' data. The proposed model consists of two folds. Firstly, Blowfish encryption uses to encrypt the identity attributes. Secondly, it uses Pseudonymization to mask identity and quasi-attributes, then all the data links with one another, such as the encrypted, masked, sensitive, and non-sensitive attributes. In this way, the data becomes more secure from unauthorized access.Entities:
Keywords: Blowfish; Data masking; Data privacy; Encryption; Identity data; Non-sensitive data; Sensitive data
Year: 2022 PMID: 35035271 PMCID: PMC8743442 DOI: 10.1007/s10586-021-03514-x
Source DB: PubMed Journal: Cluster Comput ISSN: 1386-7857 Impact factor: 2.303
Fig. 1Existing technologies used to achieve data privacy
Fig. 2Overview of existing technologies used for data privacy
An analysis of different encryption algorithms
| Algorithm | Attack | Structure | Effect |
|---|---|---|---|
| IDEAS [ | Narrow Bicliques | Feistel | Optional Algorithm in openpgp |
| Blowfish [ | Dictionary | Feistel | Ideal for both domestic and exportable use |
| AES [ | Side Channel 1 | Substitution, Permutation | Secured by TLS or SSH |
| 3DES [ | Brute force, Known Plaintext | Feistel | Insecure for modern application |
| DES [ | Brute Force | Feistel | Insecure for modern application |
| RC6 [ | Brute Force, Analytical | Substitution,Permutation | Essential for data dependent decisions |
| RSA [ | Factoring the Public Key | Factorization | The exchange key establishes a secure connection. |
IDEA
RC6
A features comparison between different encryption algorithms
| Features | Blowfish [ | AES [ | DES [ | 3DES [ | IDEAS[ | RC6 [ | RSA [ |
|---|---|---|---|---|---|---|---|
| Block size | 64 | 128 | 64 | 64 | 64 | 128 | 1024-4096 |
| Round | 16 | 10,12,14 | 16 | 48 | 8.5 | 20 | 1 |
| Confidentiality | Highest | High | Low | Low | Low | Low | High for key |
| Key-size (bits) | 32-448 | 128,192,256 | 56 | 112,168 | 128 | 128-2040 | 1024-4096 |
| Execution time | Shortest | Short | Highest | Highest | Highest | Highest | Highest |
| Power consumption | Less | Less | Highest | Highest | Highest | Highest | Highest |
| Memory usage | Low | >Blowfish | >AES | >DES | Highest | Highest | Highest |
IDEA
RC6
A comparison of auditing and monitoring technologies
| Abilities | UTM [ | SIEM [ | IDS [ | IPS [ | NGFW [ |
|---|---|---|---|---|---|
| Junk Mail Filtering | ✗ | ✗ | ✗ | ||
| Review | |||||
| Take Action | ✗ | ||||
| Unresponsively Monitor | ✗ | ✗ | |||
| Alert on Unusual Activity | ✗ | ✗ | ✗ | ||
| Integrate(firewall,IDS/IPS,AV) | ✗ | ✗ | |||
| Firewall,AppControl,Web APPs | ✗ | ✗ | ✗ | ||
| Control filtering | ✗ | ✗ | ✗ |
Fig. 3The Hybrid model used to achieve data privacy
Fig. 4Depicted how attributes are linked with each other to achieve data privacy
Fig. 5The execution time of all encryption algorithm
Fig. 6The execution time for AES encryption and decryption
Fig. 7The DES and 3DES execution time with different modes
Fig. 8The RC6 and IDEA execution time of encryption and decryption
Fig. 9The Blowfish execution time for encryption and decryption with different modes
Fig. 10RSA encryption and decryption execution time
Fig. 11The IC of the IDEA encryption algorithms
Fig. 12IC of the RSA encryption algorithms
Fig. 13IC of different encryption algorithms