| Literature DB >> 35510050 |
Shikha Mittal1, Ankit Bansal1, Deepali Gupta1, Sapna Juneja2, Hamza Turabieh3, Mahmoud M Elarabawy4,5, Ashish Sharma6, Zelalem Kiros Bitsue7.
Abstract
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way. Health services data must therefore be kept as safe and secure as possible because the release of this data could have serious consequences for patients. A framework for security and privacy must be employed to store and manage extremely sensitive data. Patients' confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue. The medical system has been designed as a standard, access of records, and effective use by medical practitioners as required. In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography. The comparison of the proposed and existing techniques has been carried out in terms of time taken for encryption and decryption, energy, and power. Decryption time has been decreased up to 50% with the proposed method of cryptography. As it will take less time for decryption, less power is consumed for doing the cryptography operations.Entities:
Mesh:
Year: 2022 PMID: 35510050 PMCID: PMC9061039 DOI: 10.1155/2022/7016554
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1Flow of role-based proxy decryption level II.
Performance analysis of decryption time Level-II 10 ∧5.
| Data (in GB) | GA07B | LZD | WCW | IBPRE | Proposed |
|---|---|---|---|---|---|
| 1 | 0.01 | 0.01 | 0.01 | 0.01 | 0.005 |
| 100 | 0.01 | 0.1 | 0.01 | 0.1 | 0.005 |
| 500 | 0.2 | 0.1 | 0.2 | 0.2 | 0.1 |
| 1000 | 0.5 | 0.2 | 0.5 | 0.4 | 0.2 |
Figure 2Performance analysis of decryption time Level-II.
Performance analysis of consumed energy 10 ∧5.
| Data in GB | GA07B | LZD | WCW | IBPRE | Proposed |
|---|---|---|---|---|---|
| 1 | 0.01 | 0.01 | 0.01 | 0.01 | 0.008 |
| 100 | 0.02 | 0.05 | 0.03 | 0.02 | 0.01 |
| 500 | 0.1 | 0.25 | 0.2 | 0.1 | 0.09 |
|
| 0.15 | 0.48 | 0.4 | 0.2 | 0.13 |
Figure 3Performance analysis of consumed energy 10 ∧5.