Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health
The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of sensitive aspects might jeopardize this data generation. Exposure to Healthcare Information made available via the internet with the intention of benefiting h...
Saved in:
| Published in | SN computer science Vol. 5; no. 2; p. 203 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Singapore
Springer Nature Singapore
01.02.2024
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2661-8907 2662-995X 2661-8907 |
| DOI | 10.1007/s42979-023-02541-2 |
Cover
| Summary: | The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of sensitive aspects might jeopardize this data generation. Exposure to Healthcare Information made available via the internet with the intention of benefiting healthcare professionals presents a challenge for researchers in terms of privacy and security concerns. This access is intended to benefit the medical community. With growing technology, medical data on the cloud are subject to unanticipated dangers, and the threat landscape appears resilient with sensitive qualities. Organizations fail to keep their reputations and are unable to maintain public trust in our modern day. The severity of advanced security threats compromises patient data privacy and healthcare unit security. Many studies and practitioners’ fruitful approaches gave up healing resolutions, but the requirement for a perfect solution remains unsatisfactory. In this research, we provide a solution for dealing with security challenges in healthcare administration. We present a hybrid system that combines sensitive attribute access primitives with enhanced attribute-based encryption and anonymity methods. The proposed approach electronic health records design model is closely linked with the proposed approach and system scenario, forming a comprehensive blueprint for our healthcare technology solution. In terms of completion time when user instance is upto 500, the practical flexible ABE instances method outperforms the other approaches such as real-time operational data base extraction–transformation–loading, and long short-term memory to recurrent neural network by a significant margin. This method offers the quick encryption (7.5 s), decryption (5.4 s), and reduced memory usage (5361 s). A cloud sim simulator is used to evaluate the proposed mechanism’s performance, encryption, decryption, and memory usage. The latest model with better hardware and software optimization of cloud sim this method expected to perform noticeably better. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2661-8907 2662-995X 2661-8907 |
| DOI: | 10.1007/s42979-023-02541-2 |