HSMRSA-Optimized 3D-AES Cryptosystem for Healthcare Data Security | IJCSE Volume 9 – Issue 6 | IJCSE-V9I6P45

IJCSE International Journal of Computer Science Engineering Logo

International Journal of Computer Science Engineering Techniques

ISSN: 2455-135X
Volume 9, Issue 6  |  Published:
Author

Abstract

The increasing volume of medical health data has created a need for security solutions that can identify and fix errors, as well as prevent abuses of current encryption methods, especially in key generation and access provisioning on an as-needed basis. Using the three-dimensional version of dynamic key optimization, this research advances a new framework: the Advanced Encryption Standard (3D-AES) block cipher, and the Hybrid Slime Mould Reptile Search Algorithm (HSMRSA), which is used to bind the two. The HSMRSA framework further strengthens the efficiency of the search process and has been refined to operate in conjunction with the complementary method. When integrated, the two approaches enable the generation of secure keys through established cryptographic procedures. The 3D-AES cipher, like the original AES, is extended through a three-dimensional transformation model and spatial permutation, thereby improving diffusion and overall data security. A Self-Destructive Data Object (SDO) is used for access control, and a distributed hash table (DHT) is applied to split cipher text to provide a realistic time-based security model. To ensure confidentiality, integrity, and authentication of health data, we propose an enhanced architecture.

Keywords

optimization, security, healthcare data, cryptography, HSMRSA, 3D-AES,key generation, access control, distributed hash able, self-destructive data object

Conclusion

In ensuring the security of the health data processing, this paper suggests a combination of the cloud approach. It directly tackles some of the key flaws of the prevailing system which include ineffective key generation, ineffective dynamic governance and disconnected security system. This solution represents a centralized architecture that has numerous central features. The Hybrid Slime Mould Reptile Search Algorithm (HSMRSA) will be constructed and implemented in such a way that efficient extraction of strong cryptographic keys is achieved. The other breakthrough will be a new and improved 3D-AES block cipher by adding a new three-dimensional data structure and a new spatial permutation to facilitate the most difficult confusion and diffusion of structured data, such as medical records. They will then be enhanced with a Distributed Hash Table (DHT) based storage model and Self-Destructing Data Objects to come up with a data governance model that is resilient and time-sensitive. These elements together provide us with a complete security solution and can be able to match the finest quality of secrecy of medical infrastructure with the sensitive workload demands of health care.

References

[1] V. Choudary Nuvvula, ā€œCloud Technologies Revolutionizing Healthcare: Scalable Transaction Systems for Patient Data and Real-Time Diagnostics,ā€ Int. J. Res. Comput. Appl. Inf. Technol., vol. 7, no. 2, pp. 2197–2208, 2024. [2] A. Haleem, M. Javaid, R. P. Singh, and R. Suman, ā€œTelemedicine for healthcare: Capabilities, features, barriers, and applications,ā€ Sensors International, vol. 2, p. 100117, Jul. 2021. [3] M. Al-Hawawreh and E. Sitnikova, ā€œLeveraging deep learning models for ransomware detection in the industrial Internet of Things environment,ā€ in Proc. Military Communications and Information Systems Conf. (MilCIS), Canberra, Australia, Dec. 2019, pp. 1–7 [4] R. Sivan and Z. A. Zukarnain, ā€œSecurity and privacy in cloud-based e-health system,ā€ Symmetry, vol. 13, no. 5, p. 742, Apr. 2021. [5] D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, ā€œA survey on secure data analytics in edge computing,ā€ IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4946–4967, Jun. 2019. [6] G. Xu, F. Wang, M. Zhang, and J. Peng, ā€œEfficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks,ā€ IEEE Access, vol. 8, pp. 47282–47296, Mar. 2020. [7] M. Rana, Q. Mamun, and R. Islam, ā€œEnhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers,ā€ Sensors, vol. 23, no.18, Art. 7678, Sep. 2023 [8] A. Alabdulatif, I. Khalil, and M. S. Rahman, ā€œSecurity of blockchain and AI-empowered smart healthcare: Application- based analysis,ā€ Applied Sciences, vol. 12, no. 21, p. 11039, Oct. 2022, [9] G. Xu, F. Wang, M. Zhang, and J. Peng, ā€œEfficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks,ā€ IEEE Access, vol. 8, pp. 47282–47296, Mar. 2020 [10] Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for cloud computing based on genetic techniques and logical-mathematical functions.Ā International Journal of Intelligent Networks, 2, 18-33. [11] Nguyen, G. N., Viet, N. H. L., Joshi, G. P., & Shrestha, B. (2020). Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things.Ā Computers, Materials & Continua, 65(2), 1141-1153. [12] Khalifa, M. S., & Al-Masri, A. N. (2021). An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security.Ā Journal of Cybersecurity and Information Management (JCIM), 7(2), 77-84. [13] Li, M., Yu, S., Ren, K., & Lou, W. (2020). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings.Ā IEEE Transactions on Dependable and Secure Computing, 17(1), 78-91. [14] Sharma, P., Jindal, R., & Borah, M. D. (2021). Blockchain-based decentralized architecture for Cloud Storage System.Ā Journal of Information Security and Applications, 62, 102970. [15] Aldabbagh, G., Alghazzawi, D. M., Hasan, S. H., Alhaddad, M., Malibari, A., & Cheng, L. (2021). Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mould-Based Hybrid Optimal Elliptic Curve Cryptography.Ā Applied Sciences, 11(12), 5316. [16] Reddy, T. V., & Reddy, A. R. (2022). ECC Image Encryption Scheme using Whale Optimization Technique.Ā International Journal of Multidisciplinary Engineering in Current Research, 7(5), 1-6. [17] Goyal, S., Sharma, B. B., & Mauriya, R. (2024). Metaheuristic approaches in cryptography: A systematic review and future directions.Ā Journal of Information Security and Applications, 80, 103679. [18] National Institute of Standards and Technology (NIST). (2023). Advanced Encryption Standard (AES). FIPS PUB 197. [19] Kanna, G. P., Sriram, V. S., & Kumar, S. S. (2023). A chaos-based medical image encryption scheme using the butterfly optimization algorithm for cloud security.Ā Journal of Real-Time Image Processing, 20(1), 3. [20] Zhang, J., & Li, X. (2021). A lightweight encryption scheme for real-time data in IoT-based healthcare.Ā IEEE Internet of Things Journal, 9(2), 1429-1441.
Ā© 2025 International Journal of Computer Science Engineering Techniques (IJCSE).