HSMRSA-Optimized 3D-AES Cryptosystem for Healthcare Data Security | IJCSE Volume 9 ā Issue 6 | IJCSE-V9I6P45
Table of Contents
ToggleInternational Journal of Computer Science Engineering Techniques
ISSN: 2455-135X
Volume 9, Issue 6
|
Published:
Author
Prasanna Guduru, K.Vijaya Lakshmi
Abstract
The increasing volume of medical health data has created a need for security solutions that can identify and fix errors, as well as prevent abuses of current encryption methods, especially in key generation and access provisioning on an as-needed basis. Using the three-dimensional version of dynamic key optimization, this research advances a new framework: the Advanced Encryption Standard (3D-AES) block cipher, and the Hybrid Slime Mould Reptile Search Algorithm (HSMRSA), which is used to bind the two. The HSMRSA framework further strengthens the efficiency of the search process and has been refined to operate in conjunction with the complementary method. When integrated, the two approaches enable the generation of secure keys through established cryptographic procedures. The 3D-AES cipher, like the original AES, is extended through a three-dimensional transformation model and spatial permutation, thereby improving diffusion and overall data security. A Self-Destructive Data Object (SDO) is used for access control, and a distributed hash table (DHT) is applied to split cipher text to provide a realistic time-based security model. To ensure confidentiality, integrity, and authentication of health data, we propose an enhanced architecture.
Keywords
optimization, security, healthcare data, cryptography, HSMRSA, 3D-AES,key generation, access control, distributed hash able, self-destructive data objectConclusion
In ensuring the security of the health data processing, this paper suggests a combination of the cloud approach. It directly tackles some of the key flaws of the prevailing system which include ineffective key generation, ineffective dynamic governance and disconnected security system. This solution represents a centralized architecture that has numerous central features. The Hybrid Slime Mould Reptile Search Algorithm (HSMRSA) will be constructed and implemented in such a way that efficient extraction of strong cryptographic keys is achieved. The other breakthrough will be a new and improved 3D-AES block cipher by adding a new three-dimensional data structure and a new spatial permutation to facilitate the most difficult confusion and diffusion of structured data, such as medical records. They will then be enhanced with a Distributed Hash Table (DHT) based storage model and Self-Destructing Data Objects to come up with a data governance model that is resilient and time-sensitive. These elements together provide us with a complete security solution and can be able to match the finest quality of secrecy of medical infrastructure with the sensitive workload demands of health care.
References
[1] V. Choudary Nuvvula, āCloud Technologies Revolutionizing Healthcare: Scalable Transaction Systems for Patient Data and Real-Time Diagnostics,ā Int. J. Res. Comput. Appl. Inf. Technol., vol. 7, no. 2, pp. 2197ā2208, 2024.
[2] A. Haleem, M. Javaid, R. P. Singh, and R. Suman, āTelemedicine for healthcare: Capabilities, features, barriers, and applications,ā Sensors International, vol. 2, p. 100117, Jul. 2021.
[3] M. Al-Hawawreh and E. Sitnikova, āLeveraging deep learning models for ransomware detection in the industrial Internet of Things environment,ā in Proc. Military Communications and Information Systems Conf. (MilCIS), Canberra, Australia, Dec. 2019, pp. 1ā7
[4] R. Sivan and Z. A. Zukarnain, āSecurity and privacy in cloud-based e-health system,ā Symmetry, vol. 13, no. 5, p. 742, Apr. 2021.
[5] D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, āA survey on secure data analytics in edge computing,ā IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4946ā4967, Jun. 2019.
[6] G. Xu, F. Wang, M. Zhang, and J. Peng, āEfficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks,ā IEEE Access, vol. 8, pp. 47282ā47296, Mar. 2020.
[7] M. Rana, Q. Mamun, and R. Islam, āEnhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers,ā Sensors, vol. 23, no.18, Art. 7678, Sep. 2023
[8] A. Alabdulatif, I. Khalil, and M. S. Rahman, āSecurity of blockchain and AI-empowered smart healthcare: Application- based analysis,ā Applied Sciences, vol. 12, no. 21, p. 11039, Oct. 2022,
[9] G. Xu, F. Wang, M. Zhang, and J. Peng, āEfficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks,ā IEEE Access, vol. 8, pp. 47282ā47296, Mar. 2020
[10] Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for cloud computing based on genetic techniques and logical-mathematical functions.Ā International Journal of Intelligent Networks, 2, 18-33.
[11] Nguyen, G. N., Viet, N. H. L., Joshi, G. P., & Shrestha, B. (2020). Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things.Ā Computers, Materials & Continua, 65(2), 1141-1153.
[12] Khalifa, M. S., & Al-Masri, A. N. (2021). An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security.Ā Journal of Cybersecurity and Information Management (JCIM), 7(2), 77-84.
[13] Li, M., Yu, S., Ren, K., & Lou, W. (2020). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings.Ā IEEE Transactions on Dependable and Secure Computing, 17(1), 78-91.
[14] Sharma, P., Jindal, R., & Borah, M. D. (2021). Blockchain-based decentralized architecture for Cloud Storage System.Ā Journal of Information Security and Applications, 62, 102970.
[15] Aldabbagh, G., Alghazzawi, D. M., Hasan, S. H., Alhaddad, M., Malibari, A., & Cheng, L. (2021). Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mould-Based Hybrid Optimal Elliptic Curve Cryptography.Ā Applied Sciences, 11(12), 5316.
[16] Reddy, T. V., & Reddy, A. R. (2022). ECC Image Encryption Scheme using Whale Optimization Technique.Ā International Journal of Multidisciplinary Engineering in Current Research, 7(5), 1-6.
[17] Goyal, S., Sharma, B. B., & Mauriya, R. (2024). Metaheuristic approaches in cryptography: A systematic review and future directions.Ā Journal of Information Security and Applications, 80, 103679.
[18] National Institute of Standards and Technology (NIST). (2023). Advanced Encryption Standard (AES). FIPS PUB 197.
[19] Kanna, G. P., Sriram, V. S., & Kumar, S. S. (2023). A chaos-based medical image encryption scheme using the butterfly optimization algorithm for cloud security.Ā Journal of Real-Time Image Processing, 20(1), 3.
[20] Zhang, J., & Li, X. (2021). A lightweight encryption scheme for real-time data in IoT-based healthcare.Ā IEEE Internet of Things Journal, 9(2), 1429-1441.



