Your browser doesn't support javascript.
Privacy Preserving Based Personal Health Records Sharing Using Rail Fence Data Encryption (RFDE) for Secure Cloud Environment
1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022 ; : 729-734, 2022.
Article in English | Scopus | ID: covidwho-2252085
ABSTRACT
The development of cloud technology is a fundamental idea for offering unfettered access to many different sources in the planning of the networking, memory, infrastructure, and software. Computers are becoming more and more widespread across a wide range of industries due to their numerous advantages, notably in the healthcare industry. Typically, it is essential to the interchange of health information. In light of the ongoing issues with password security, sending private medical information via the internet still raises serious privacy concerns. Whether or whether they have complete permission, patients are not forced to divulge any of their private or personal information. This article examines several noteworthy recent studies that address the problems of password security and data privacy for cloud-based health services. These compare the benefits and drawbacks of different physical access preservation techniques. The paper also proposes a combined authentication procedure based on RFDE models. Cloud security is usually greatly hampered by the necessity for information privacy in an effort to protect sensitive and non-sensitive data for decision-making and to solve the problem of information leakage. One of the most challenging parts of the transfer of personal health records (PHRs) to the cloud is the reuse and exchange of accurate, complete medical evidence. When PHRs are outsourced to third-party businesses, such as cloud services, they are often used as patient-centered, private ways of exchanging health information. Data about a particular PHR doctor is coded for protection before being sent to the cloud. However, there are still substantial barriers due to issues with security, things that can be improved, lawful consumer privacy portfolio management, efficiency, and regulation over sensitive and non-sensitive data kept in the cloud. The PHR file may be encrypted using the Rail Fence Data Encryption (RFDE) technique to provide strong confidentiality rules and enable PHR and modular connectivity control to perform at their very best. Unauthorized users are managed to stop from accessing information with the aid of the transposition cypher, also used by RFDE and known as 'zigzag encryption.' The recommended technique generates the secret key while encrypting the PHR information. The recipient decrypts the PHR data using the private key. The algorithm works brilliantly in comparison to the prior strategy. © 2022 IEEE.
Keywords

Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: 1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022 Year: 2022 Document Type: Article

Similar

MEDLINE

...
LILACS

LIS


Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: 1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022 Year: 2022 Document Type: Article