ChapterPDF Available

Cryptography in the Healthcare Sector With Modernized Cyber Security

Authors:

Abstract and Figures

Cryptography is an indispensable tool used to protect information in any organization; providing secure transmission over the Internet. The major challenge faced by health-sector is data security, and to overcome this several advancements in medicine and biomedical research have proven to increase computer processing in data security. The study focuses on cryptography, the most emerging field in computer industries. Both artificial intelligence and quantum technology are both transforming the health sector in regard to cybersecurity. In this study, the AES algorithm is a cryptographic cipher used. One such application is implemented and is responsible for handling a large amount of the information in the health sector. An application with a double Hashing algorithm is accomplished to can maintain the data in a secure fashion.
Content may be subject to copyright.
Copyright © 2020, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 8
163
DOI: 10.4018/978-1-7998-2253-0.ch008
ABSTRACT
Cryptography is an indispensable tool used to protect information in any organization;
providing secure transmission over the Internet. The major challenge faced by health-
sector is data security, and to overcome this several advancements in medicine and
biomedical research have proven to increase computer processing in data security.
The study focuses on cryptography, the most emerging field in computer industries.
Both artificial intelligence and quantum technology are both transforming the health
sector in regard to cybersecurity. In this study, the AES algorithm is a cryptographic
cipher used. One such application is implemented and is responsible for handling a
large amount of the information in the health sector. An application with a double
Hashing algorithm is accomplished to can maintain the data in a secure fashion.
Cryptography in the
Healthcare Sector With
Modernized Cyber Security
Prisilla Jayanthi
https://orcid.org/0000-0002-4961-9010
K. G. Reddy College of Engineering and Technology, Hyderabad, India
Muralikrishna Iyyanki
Defence Research and Development Organisation, India
164
Cryptography in the Healthcare Sector With Modernized Cyber Security
INTRODUCTION
Grand View Research Inc. in a statement announced by that “the global healthcare
biometric market is expected to reach USD 14.5 billion by 2025.” In this regard,
an insistent for Electronic Health Records (EHR) was raised by health system and
hospitals. Hence the need to computerize the health databases drives an insistent
for healthcare biometrics over the prognosis term of the patient. The concern is over
protecting the data from intruders and reduces fraud for providers and financiers by
payment collection through automated process, and increases patient contentment.
The science of shielding confidential information from unauthorized access,
by making sure about data integrity and authentication is cryptography. The
technique of hashing makes it more indispensable for ensuring that the transmitted
messages will not be tampered. The concept of fingerprints, facial recognition and
iris recognition are techniques derived from Artificial Intelligence. In this chapter
Advanced Encryption Standard (AES) algorithm and blockchain (BC) are discussed
to understand the need to safeguard and protect the electronic health data in more
secure manner.
The protection of data is required at every phase; the three phases of data shown
in figure 1 are: 1. data in action; 2. data in use; and 3. data at rest. The data in action
is the one which moves across the various networks, from system to system placed
at various locations. The data in use is frequently updated and altered on usage.
Figure 1. Data in three phases
165
Cryptography in the Healthcare Sector With Modernized Cyber Security
The data at rest is the huge one with volume increasing day-to-day and becomes a
concern to businesses, government agencies and any other organization. The data
is kept unused and inactive for longer time. Most of theft takes place on the data
stored as backup. Hence, encrypting the data in every phase is essential.
NECESSITY OF CRYPTOGRAPHY IN HEALTHCARE
For any database which contains digital data, the need for data security is very
essential for protecting data from any unauthorized users. Data stored on disk for
longer period of time must be protected using disk encryption method known as on-
the-fly encryption. Implementing hardware device security to such long-time data
storage prevent malicious users or a data breach. One such application of hardware
security is biometric technique which prevents malicious users from logging in,
logging out and/ or tampering the privileges and is implemented in this chapter.
Authentication is verifying the user’s identity. It has two phases - identification
and actual authentication. In identification phase, any individual’s identity is
provided in the scheme of a user ID to the security system. The security system
examines all the abstract objects and maps the actual user, and grants permission.
This is carried out when the user provides indication to prove the specification to
the system. The authentication phase involves claiming of user identity by checking
user-provided evidence.
Encryption is the technique of encoding a message or information in which only
approved parties can access it. The algorithm generates pseudo-random encryption key.
The two encryptions used are symmetric and asymmetric encryption. In symmetric,
the encryption and decryption keys are the same. Communicating groups use the
same key for secure communication. In asymmetric, the encryption key is published
for anyone (publicly) and receiving team has the access to read the messages using
the decryption key known as private key.
The encryption of data at rest uses AES or RSA (Rivest–Shamir–Adleman)
algorithms. Cryptography will be implemented on the database housing the data
on the physical storage. In this case study, AES is implemented on the Electronic
Health Record databases.
Biometric in Industries
Biometric is a part of security in any industries as it gives the measurement and
numerical analysis of person’s unique physical and behavioral characteristics. For
identifying any individual, biometric can be used for proof of identity and right of
control, the one under surveillance. One can find it difficult for breaking into a system
166
Cryptography in the Healthcare Sector With Modernized Cyber Security
with biometrics. The device measures unique features of a person, such as voice
pattern, the iris, or fingerprint patterns. The biometric is broadly classified into two
categories such as physiological and behavioral where face recognition, fingerprints,
hand / palm, iris identification, DNA falls into the physiological categories. The
keystroke, signature, and voice pattern fall under behavioral categories shown in
figure 2.
Voice Print
As the growing population needs a secure means for settling the disbursement, in
and around the workplace, people found more comfortable with biometrics. One
such biometric is voice authentication, which discovers wider expansion across
trading activity, including healthcare, financing companies, and educational system.
Voice recognition systems monitor the rhythm and accent, in addition indicates the
structure of the larynx, nostril passage, and person’s vocal tract, to identify and
validate an individual.
(Chinnaswamy, 2018) discusses about the voice recognition system capturing the
voices by sound tracking the name, age, address, and a set of secret sound notes and
analyzes the speech and breathing patterns and stores it. Further the voice print is
encrypted and stored in the Active Directory in user’s authentication data, along with
Figure 2. Types of biometric for human identification
167
Cryptography in the Healthcare Sector With Modernized Cyber Security
added authentication credentials. When a person signs up for voice authentication
calls, the voice is coordinated with the voice print stored in the Active Directory,
ensuing in speedy and unified verification. This voiceprint recognition system is
referred as a Speaker Recognition System (SRS).
In a case study on voice prints suggested that each individual’s voice will be
different because the structure of the vocal cords, vocal cavity, oral and nostril
cavities is unique to every individual. Later the comparison of two recorded speeches
is carried out by spectrogram or the voice prints for the identification purpose are
called as voice fingerprinting. The person’s voice changes over time of the individual
aging; at time due to stress, illness and alcoholism. The person’s accent may also
vary as they move from one region to another. The best saying “garbage in, garbage
out” - garbage may come from various background similar to the sounds such as
trouble-some voices, music, or any machine noise that adds to the internal voice
while recording. If data received are unclear, analyzer produces conclusions that
are incorrect as described (Parmar & Udhayabanu, 2012).
Fingerprints and Facial Recognition
The biometric inputs for fingerprints and face identity results proved their results
accurately on the image quality received. Figure 3 represents how the fingerprints
are scanned for the biometric and later stored in the form of matrix of 1’s and 0’s.
This matrix is stored for further use of the security need which is implemented on
regular source. The data captured is encrypted using Advanced Encryption Standard
algorithm in figure 4 and then stored in the database.
Face recognition is a three-step process. Initiating with the subject picture and
making an effort to identify a person in the given image. The system locates the
individual’s head and eyes. A face signature is developed in matrix form centered
on the individual’s face characteristics. Comparing this matrix with the database in
figure 5 and generating a similar score for each comparison in figure 6.
The biometric system works on two types of comparisons namely verification
and identification. The automated facial image quality evaluation software (AFQES)
module captures real-time facial image and automated fingerprint identification
Figure 3. The representation of fingerprints in form of 1’s and 0’s
168
Cryptography in the Healthcare Sector With Modernized Cyber Security
systems (AFIS) module for obtaining fingerprints as discussed (Ko & Krishnan,
2003). The database of the faces of a person is collected in different angles with
different moods in figure 5. In this study as only one pose of photo was given, the
photos in different angles are shown in the database. The database will consist of
doctors, surgeons, and clinicians and other staff of health care center.
(Ablayev et al., 2016) introduced the quantum fingerprinting computational aspects
and clarifies the properties of cryptographically quantum hashing, and thereby the
possible use of quantum hashing for quantum hash-based message authentication
codes is done. (Buhrman et al., 2001) describes about quantum fingerprints in a
case study where the entire group analyzed fingerprints using without shared key
and shared key. In without shared key requires fingerprints of Θ (√n) are sufficient
whereas for shared key requires a fingerprints of length (n). Next, the scheme with
a shared quantum key of O(log n) that requires fingerprints of length O(log n) bits.
The condition was relaxed to the error probability of O (1= nc) (where c is constant)
with classical keys and fingerprints of length O(log n).
(ElDahshan et al., 2017) proposed a quantum face authentication method. This
method is for face boundaries detection, image resizing, and removal of any noise,
feature extraction, matching and decision. Also the method used QFWT (Quantum
Fast Wavelet Transform) and QFT (Quantum Fourier Transform) in extraction phase.
In this study, the doctor’s photos were taken for face recognition and are
authenticated for accessing the electronic health records. The faces and eyes in the
photos are identified by the square block using the software python code on Spyder,
a cross-platform shown in figure 7 and figure 8.
Figure 4. Implementation of AES algorithm for fingerprints
169
Cryptography in the Healthcare Sector With Modernized Cyber Security
Figure 5. Sample set of facial database
Figure 6. Cipher facial recognition database
170
Cryptography in the Healthcare Sector With Modernized Cyber Security
CRYPTOGRAPHY: QUANTUM TECHNOLOGY- QUANTUM KEY
Cryptography is a technique for secure communication with the third party. The aim of
cryptography is that the sender and receiver will communicate with the unintelligible
with third parties. This gives an authentication of messages to demonstrate that the
data were not altered while in transit. Both the sender and receiver share the secret
key which is a random sequence number, a valuable strength for both. Quantum
communications makes the secret key distribution possible. The key distribution
process is accomplished by quantum cryptography and encrypted message is not
transmitted. This is known as quantum key distribution, proposed by (Hughes et
al., 1995). The emerging field of physics and engineering is termed as quantum
technology, which creates practical applications - such as quantum computing,
quantum sensors, quantum cryptography, and quantum simulation. The quantum
technology is paving its way in keeping data secure.
Health Sector is the largest source of repository as it consists of all the patients
complete information and this huge data is stored on electronic device. This data can be
easily attacked by any active attacker, lost, stolen or data breaches. The health records
have family name, addresses, state and ZIP code, social security number / Aadhaar card
number/ pan card number, email addresses, phone numbers and insurance policy ID
numbers, among the general information provided by the patients shown in figure 9.
Figure 7. Authenticated doctors after face recognition
Figure 8. Iris detection
171
Cryptography in the Healthcare Sector With Modernized Cyber Security
The figure 10 shows the encrypted data of the health record at healthcare center.
This healthcare data is a precious and is prey for the ransomware, spear phishing
attacks or any other attacks.
BLOCKCHAIN – INDUSTRIES – HEALTHCARE
An increasing list of records, named as blocks are interconnected using cryptography
is known as blockchain (BC). Every individual block comprises of the following:
a cryptographic hash of the preceding block, a timestamp, and transaction data. As
the number of applications of BC technology is increasing rapidly, the knowledge in
realization of the technology and its potentials is accordingly extreme. The potential
for dramatic change in the society with the developments and implementation of BC
includes improvements in the healthcare information exchange. BC characteristics
are its nature of de-centralization, openness and lesser privilege for permission that
Figure 9. Electronic health record for patient entries
Figure 10. Health Records in encrypted form
172
Cryptography in the Healthcare Sector With Modernized Cyber Security
offer a unique solution for any industry but here in this context it is healthcare. The
development of cryptocurrencies drives current usage by reaching global greater
than 20 million users; in the other areas, the use of BC is growing was discussed
(Prokofieva & Miah, 2019).
Several BC facilities in integrating and encrypting digital assets comprising
of health records or dispensation claims on a ledger. The ledger ensures patient
confidentiality and protection of relevant data thereby ensuring regulatory compliance,
e.g. HIPAA - Health Insurance Portability and Accountability Act. Medical chain is
operational engaged with EHR Blockchain Company, in enabling several healthcare
agents, such as doctors, hospitals, testing laboratories, pharmacists, and insurers,
for requesting permission to access and interact with patients’ medical records.
(Dimitrov, 2019) discusses the personal health records (PHR) service trajectory
has an appreciated data source for BC service providers and BCs are good alignment
with General Data Protection Regulation (GDPR). As stated earlier, BC have the
potentiality for enabling decentralized management; for applications where healthcare
stakeholders (e.g., hospitals, patients, and payers) cooperating with one another
without the need of an intermediary central management. They provide immutable
audit trails; that are suitable for recording unvarying databases for insurance claim.
They enable data source and manage patient digital resources. Only the owner has
the rights to change. They provide robustness and data availability; preservation and
continuous EHR availability. Finally, they enhance the data security and privacy;
data is encrypted in BCs and can be decrypted with the patient’s private key. Thou
the network are infiltrated by a malicious party, there is no concrete way to access
the patient data.
The applications of healthcare are redefining data modeling in BC technology.
The adaptability and abilities to segment secure and share medical data and services.
Many developing industries with BC technology are at the center of healthcare. The
blockchain-based healthcare system is organized into four layers that include data
sources, BC technology, healthcare applications, and stakeholders.
Figure 11. Block chain healthcare data management
173
Cryptography in the Healthcare Sector With Modernized Cyber Security
In figure 11, initially the data is generated between the patient and their concerned
doctors. The health data comprises of medical history, existing issue/ problem and
other related biological information. This medical information is gathered from nursing
care, medical imaging, and medication history and pathological investigation to be
mentioned in EHR. The patient who has the ownership of EHR, and customized
access control is given the ownership. Parties who would like to access any valuable
information must seek permission which is advanced to the EHR owner, and the
owner will decide to whom access should be granted. The whole healthcare process
includes database, BC, and cloud storage shown in the steps 4, 5 and 6.
(Khezr et al., 2019) used database and cloud storage for storing the records in
a distributed fashion and BC provides privacy for ensuring customized authentic
user access. Healthcare providers such as ad-hoc clinic, community care center,
hospitals are the end user who gets access for a safe and sound care delivery which
will be authorized by the owner.
(Vora et al., 2018) used the framework based on BC for providing efficient
storage and maintenance of EHRs. This provides secure and efficient access of
medical data to patients, providers, and third parties, while preserving the patient
confidential information. The aim of this study was to analyze how the proposed
framework fulfills the patients’ needs between the providers and third parties, and
thereby understand the framework maintenance regarding the privacy and security
concerns in the healthcare 4.0.
In figure 12, a block consists of all the related information of patient is gathered
in database as in figure 13 and the transactions are addition, updating and deletion
that take place in every patient health record are shown in table 1. This information
is further hashed and maintained in the block and again the information is hashed
to get a unique and unobtainable number shown in table 2. Such a hashing value
cannot be easily broken by any intruders.
The patients details are entered as shown in table 1, and table 2 represents the
outcome of the hashing python code. The hashing value will be different for each
record entered. And when hashing is carried out the second time, a new random
number is generated as shown in table 2. The figure 13 is generated, when the first
Figure 12. The structure of block chain
174
Cryptography in the Healthcare Sector With Modernized Cyber Security
hash is executed. The hashing value will not be the same, each time the code is
executed. A new random number is generated, hence this random number cannot
be broken that easily by intruders. By using this method, one can save the database
of the patient’s details in very secure manner and confidential.
Each time a patient record gets added or updated. Then, the record is said to
have a transaction when it is finalized. The chaining of blocks is achieved through
a cryptographic way that involves the use of hash functions. A hash function takes
a message of arbitrary length and crunches it into a hash output of a fixed length,
known as a message digest or a digital fingerprint shown in annexure 1 and table 2.
(Knezevic, 2018) stated for any financial transaction, the records will be tracked
by BC and can serve to keep confidential information issued and controlled by
government agencies. The digital ID through BC is much safer in any technology.
The BC- ID permits any person to verify their personal identity, helps in connecting
to their families, and exchange money without the need for intermediary banks. While
a person’s fingerprint is taken with all the related information is linked through BC
with other information about the individual (name, gender, nationality). If in case
of any verification of the person’s identity, the fingerprint unlocks the BC-ID.
Nowadays, in several organizations, Quantum Key Distribution is making a
big wave and making it possible. Any two-level quantum system would be used to
implement Quantum Cryptography (QC), which is also called quantum encryption.
It relates to the quantum mechanics to encrypt messages in a way it is read by
anyone outside of the intended recipient. The Shor’s algorithm is used in QC and the
algorithm is a quantum computer algorithm for integer factorization. If an integer is
given the prime factors are found. The algorithm’s efficiency is due to the efficiency
of the quantum Fourier transform (Nam, 2011 & Fang).
In this approach, a quantum circuit is used for quantum computation which has
a sequence of quantum gates, which does reversible transformations on a quantum
mechanical analog of an n-bit register referred to as an n-qubit register (Beauregard,
2003; Wikipedia, n.d.). Shor’s algorithm has basically two parts namely classical and
Figure 13. Patient details in a database while hashing
175
Cryptography in the Healthcare Sector With Modernized Cyber Security
quantum period finding part. The implementation of Shor’s algorithm and quantum
circuit is carried out to show the secret key generated. This quantum period finding’
results are based on the quantum circuit and are shown in figures 14, 15, 16 and 17.
The figure 15 shows the quantum circuit generated and the corresponding
GridQubit is shown in figure 14. The circuit can be generated based on the requirement
of the length, be it 4, 6, 8 or more. Different combinations are generated and result
is produced using a python code shown in figure 15.
Table 1. Patients details
Name: Jyotsna
Age: 40
Weight: 80
Address: Kurnool
Disease: Thyroid Cancer
Enter more data? (y/n): y
Name: Bringanzo
Age: 42
Weight: 87
Address: Hyderabad
Disease: Stomach Ulcer
Enter more data? (y/n): y
Name: Sudheer Kumar
Age: 52
Weight: 67
Address: Secunderabad
Disease: Throat Cancer
Enter more data? (y/n): y
Name: Susheela
Age: 45
Weight: 88
Address: Medak
Disease: Heart Disease
Enter more data? (y/n): y
Name: Sweety
Age: 77
Weight: 80
Address: Bangalore
Disease: Brain Tumor
Enter more data? (y/n): y
Name: Helen
Age: 20
Weight: 70
Address: Karimnagar
Disease: Shoulder Cancer
176
Cryptography in the Healthcare Sector With Modernized Cyber Security
Table 2. Patient details with hash values
Name: Jyotsna
Age: 40
Weight: 80
Address: Kurnool
Disease: Thyroid Cancer
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values -8177344308388891750
patient values {FH} → 7017358820209295784
{SH} -> 99829792568213931
Name: Bringanzo
Age: 43
Weight: 87
Address: Hyderabad
Disease: Stomach Ulcer
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values -8177344308388891750
patient values {FH} → -7684213949946050628
{SH}-> -766684922304968775
Name: Sudheer Kumar
Age: 52
Weight: 78
Address: Secunderabad
Disease: Throat Cancer
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values -8177344308388891750
patient values {FH} → -8942438013081472235
{SH} → -2024908985440390382
Name: Sheela Marimam
Age: 45
Weight: 88
Address: Medak
Disease: Heart Disease
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values 8177344308388891750
patient values { FH } → 2487048830996786795
{SH} →2349367120759344459
Name: Sweety
Age: 78
Weight: 80
Address: Bangalore
Disease: Brain Tumor
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values 8177344308388891750
patient values {FH}→ 6140692638140212949
{SH} → 1529006619712825047
Name: Ellen Sushma
Age: 20
Weight: 55
Address: Karimnagar
Disease: Shoulder Cancer
dict_keys([‘name’, ‘age’, ‘weight’, ‘address’, ‘disease’])
Keys hash values 8177344308388891750
patient values {FH}→ 5230373201553129828
{SH} →618687183125741926
All_ dict_keys([]) {HV} 133156838395276
All_values:{HV} 8754152354750935598
*{FH} indicates first hash and {SH} is 2nd hash value, {HV} represents hash value
177
Cryptography in the Healthcare Sector With Modernized Cyber Security
Figure 16 is the key length generated on executing python code. The figure 16
shows the randomly generated key of length equal to 40 for different input values
(4, 8) and (8, 10). Figure 17 displays the factors of the Shor’s algorithm when N =
4, the factors are 1.0 and 1.0 and for N = 6, the factors are 3.0 and 1.0. The results
show that quantum technology is advancing with qubits values. Thereby the quantum
cryptography or quantum communication system signifies that they offer virtually
unbreakable encryption.
CONCLUSION
In the world of networks, the cryptography plays a significant part for all the data
transmitted over the wireless network and how it is stored on any electronic device.
In this study the complete implementation of the Advanced Encryption Standard
algorithm and hashing technique are used to carry out for handling the security of
the electronic health database. But the safety measures should be emphasised for
storing and preserving the data for the employees of any industries, as the data can
be stolen through malicious programs. To avoid such cases, the implementation of
Artificial Intelligence techniques are used. Facial recognition and eye detection are
deep learning techniques of AI that helps to verify the authentication of right person
Figure 14. Defining Qubit values of length = 8
Figure 15. Quantum circuit
178
Cryptography in the Healthcare Sector With Modernized Cyber Security
Figure 17a. Shor’s algorithm results for N=4 and N=6
Figure 16a. Outputs of circuit with 40 length key for different input values
Figure 16b. Outputs of circuit with 40 length key for different input values
179
Cryptography in the Healthcare Sector With Modernized Cyber Security
to access the database, in this case study doctors of the healthcare sector can only
access the data. Hence, the health database is secured with cryptographic cipher, a
concept of quantum cryptography is used from being tampered or stolen.
ACKNOWLEDGMENT
The authors would like to thank all the doctors for sharing their photos for the face
recognition work to be carried out in this study.
1. Dr. Veena Acharya is a senior Gynecologist at Jaipur Hospital and is associated
with NARCHI.
2. Dr. Priya Yenebere is Nephrologist at Chicago.
3. Dr. Sadhana Agrawal is Cancer Immunologist at AIIMS, New Delhi.
4. Dr. Chandana Gandam is Physiotherapist at New Jersey.
Figure 17b. Shor’s algorithm results for N=4 and N=6
180
Cryptography in the Healthcare Sector With Modernized Cyber Security
REFERENCES
Ablayev, F., Ablayev, M., Vasiliev, A., & Ziatdinov, M. (2016). Quantum
Fingerprinting and Quantum Hashing Computational and Cryptographical Aspects.
Baltic J. Modern Computing., 4(4), 860–875.
Beauregard, S. (2003). Circuit for Shor’s algorithm using 2n+3 qubits. Quantum
Information & Computation, 3(2), 175–185.
Buhrman, H. Cleve, R. Watrous, J. & Wolf, R. (2001), Quantum Fingerprinting.
doi:10.1103/PhysRevLett.87.167902
Chinnaswamy, S. (2018). The Future is Calling: Using Voice Recognition for
Authentication. TCS. Retrieved from https://www.tcs.com/blogs/using-voice-
recognition-for-authentication
Wikipedia. (n.d.a). Cirq Documentation. Retrieved from https://en.wikipedia.org
Dimitrov, D. V. (2019). Blockchain Applications for Healthcare Data Management.
Healthcare Informatics Research, 25(1), 51–56.
ElDahshan, K. A., Elsayed, E. K., Aboshoha, A., & Ebeid, A. E. (2017). Applying
Quantum Algorithms for Enhancing Face Authentication. Al Azhar Bulletin of
Science, 9, 83–93.
Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L., & Schauer, M.
(1995). Quantum cryptography. Contemporary Physics, 36(3), 149–163.
Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019). Blockchain
Technology in Healthcare: A Comprehensive Review and Directions for Future
Research. Applied Sciences, 9(9), 1736. doi:10.3390/app9091736
Knezevic, D. (2018). Impact of Blockchain Technology Platform in Changing the
Financial Sector and Other Industries. Montenegrin Journal of Economics, 14(1),
109–120. doi:10.14254/1800-5845/2018.14-1.8
Ko, T., & Krishnan, R. (2003). Fingerprint and Face Identification for Large User
Population. Systemic. Cybernetics and Informatics, 1(3), 87–92.
Korolov, M., & Doug, D. (2019). What is quantum cryptography? It’s no silver bullet,
but could improve security. CSO Online. Retrieved from https://www.csoonline.
com/article/3235970/what-is-quantum-cryptography-it-s-no-silver-bullet-but-could-
improve-security.html
181
Cryptography in the Healthcare Sector With Modernized Cyber Security
Lin, F. X. (2014). Shor’s Algorithm and the Quantum Fourier Transform. McGill
University. Retrieved from www.math.mcgill.ca/darmon/courses/12-13/nt/projects/
Fangxi-Lin.pdf
Nam, Y.S. (2012). Running Shor’s Algorithm on a complete, gate-by-gate
implementation of a virtual, universal quantum computer. Retrieved from http://
citeseerx.ist.psu.edu
Parmar, P., & Udhayabanu, R. (2012), Voice Fingerprinting: A Very Important Tool
against Crime. J. Indian Acad. Forensic Med., 34(1).
Prokofieva, M., & Miah, S. J. (2019). Blockchain in healthcare. AJIS. Australasian
Journal of Information Systems, vol, 23.
Vora, J., Nayyar, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues,
J. J. (2018, December). BHEEM: A Blockchain-Based Framework for Securing
Electronic Health Records. In Proceedings of the 2018 IEEE Globecom Workshops
(GC Wkshps) (pp. 1-6). IEEE.
Wikipedia. (n.d.b). Shor’s algorithm. Retrieved from https://en.wikipedia.org
182
Cryptography in the Healthcare Sector With Modernized Cyber Security
APPENDIX 1
The transactions in blocks are chained to form a block chain as figure 18.
APPENDIX 2
1. Face and IRIS Recognition Partial Source Code
Step 1: Import the Libraries
import numpy as np
import cv2
Step 2: read the face
face_cascade = cv2.CascadeClassifier(‘haarcascade_frontalface_
default.xml’)
eye_cascade = cv2.CascadeClassifier(‘haarcascade_eye.xml’)
img = cv2.imread(‘1303786.jpg’)
for (x,y,w,h) in faces:
img = cv2.rectangle(img,(x,y),(x+w,y+h),(255,0,0),2)
roi_gray = gray[y:y+h, x:x+w]
roi_color = img[y:y+h, x:x+w]
eyes = eye_cascade.detectMultiScale(roi_gray)
for (ex,ey,ew,eh) in eyes:
cv2.rectangle(roi_color,(ex,ey),(ex+ew,ey+
eh),(0,255,0),2)
Figure 18.
183
Cryptography in the Healthcare Sector With Modernized Cyber Security
Step 3: Print the Image
cv2.imshow(‘imgc’,img)
Step 4: Close all windows
cv2.waitKey(0)
cv2.destroyAllWindows()
2. Hashing Algorithm
Step 1: Read the required inputs, in this case study- patient name, age, weight,
address and disease and so on.
Step 2: Write / Store the details in a database.
Step 3: Apply hash ()
Step 4: Repeat Step 3 i.e. Hash function is applied twice. And store the details in
database.
3. Advanced Standard Encryption Algorithm
Step 1: Read the patient details
Step 2: Encrypt the details and store them
Step 3: Decrypt the details from the database and print the details
Step 4: The Algorithm is implemented for addition, updating and deletion of the
patient record.
... For hardware device security, we use biometric technology applications to prevent rogue users from logging in, logging out, and changing their rights. 3 Biometric is regarded as a promising authentication method in the IoT era due to its superiority over traditional authentication methods. However, serious concerns arise regarding the security and privacy of stored biometric templates. ...
Article
The smart healthcare system (SHS), a significant medical domain underpinning the Internet of Things (IoT), which collects and analyzes health data from many sources to provide better medical treatment. The smart healthcare system is a combination of hardware and software used in the medical care field, providing remote diagnosis and treatment via a patient‐based health data‐sharing system. To increase security, a large variety of authenticated techniques have been developed over the past several decades, most of which are based on conventional number‐theoretic assumptions such as discrete logarithms and integer factorization problems. However, Shor's method is capable of solving number‐theory‐based problems. As a result, Shor's technique might be used to resolve challenging number theory problems on a quantum computer effectively. Therefore, this article presents blockchain‐based healthcare record solutions with lattice RLWE‐based key exchange protocol using a smart card. Blockchain applications may correctly detect errors, including those that are risky, in the medical industry. It can also improve the efficiency, security, and transparency of transferring medical data throughout the healthcare protocol. The formal security of this protocol is shown under the ROM (random oracle model), and the informal security is also given in this article against well‐known attacks. The presented protocol outperforms related earlier mechanisms in terms of communication and computational cost overheads, according to the performance study.
... Cryptography is a commonly used technique in the healthcare industry [14] to ensure privacy and secure communication. It primarily concerns authentication, non-repudiation, secrecy, and integrity. ...
Preprint
Full-text available
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases and sharing among chains of hospitals to make the patient’s data available which may cause delay and threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves all the problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being identified and manipulated the proposed method uses a hybrid image encryption technique to hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit Algorithm using Arithmetic Division Operation along with Canny edge detection algorithm to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially using XOR operation to improve reliability by preventing intrusion. The encrypted image is further converted into DNA sequence using DNA encoding rule and compressed using Bz2 algorithm.
Article
Securing the information from the attackers is a crucial aspect of modern digital life. Numerous cryptographic algorithms are employed to provide security for data transmission. Among these, the International Data Encryption Algorithm (IDEA) stands out as a widely utilized algorithm for enhancing security. However, the IDEA algorithm has a notable drawback due to its relatively large number of weak keys. This susceptibility stems from the fixed 25-bit circular left shift during each key generation round. It is made weakens the regular key generation process of the IDEA algorithm. To address these concerns, this research work introduces a Modified International Data Encryption Algorithm (MIDEA) using a key size of 1024 bits. The method suggests a novel approach for the circular left shift by employing different bits that effectively overcome the limitations of fixed bits of the circular left shift. Additionally, this work presented innovative encryption and decryption techniques using a key size of 1024 bits. A comprehensive comparison is conducted between the IDEA and the MIDEA algorithm based on time complexity and security. Furthermore, this work provides a novel phishing attack detection framework using the suggested MIDEA technique. This framework is used for securely sharing patient data in the healthcare sector. The results of the proposed work indicate that encryption time varied from 20.08930 to 494.18258 seconds across file sizes from 0.97 to 40.8 megabytes. The experimental results demonstrate that the MIDEA algorithm exhibits significant performance enhancements with encryption speed improved by 60.67 percent and decryption robustness by 63.24 percent.
Article
Full-text available
In an era of burgeoning digital healthcare, ensuring the confidentiality and integrity of patient data is paramount. The adoption of health monitoring systems, leveraging Internet of Things (IoT) devices in CPS, presents challenges in safeguarding sensitive medical information. This work presents a unique way to encrypt data using chaotic mapping and ASCON algorithm which is a lightweight approach. The given method provides a P-value of 0.6066 for monobit test and an average entropy of 0.994 which ensures data integrity, high randomization and an average execution time of 0.502 microsec, this solution guarantees both unpredictability and security for patient data, making it a viable option for modern healthcare systems.
Article
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves the security problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being manipulated the proposed method uses a hybrid image encryption technique to hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit (LSB) Algorithm using Arithmetic Division Operation along with Canny edge detection to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially to increase the integrity and robustness of the system. Finally, an encrypted image is converted into DNA sequence using DNA encoding rule to improve reliability. The experimentation is done on the Chest XRay image, Knee Magnetic Resonance Imaging (MRI) image, Neck MRI image, Lungs Computed Tomography (CT) Scan image datasets and patient medical data with 500 characters, 1000 characters and 1500 characters. And, it is evaluated based on time coefficient of encryption and decryption, histogram, entropy, similarity score (Mean Square Error), quality score (peak signal-to-noise ratio), motion activity index (number of changing pixel rate), unified average changing intensity, image similarity score (structure similarity index measurement) between original and encrypted images. Also, the proposed technique is compared with other recent state of arts methods for 500 characters embedding and performed better than those techniques. The proposed method is more stable and embeds comparatively more data than other recent works with lower Mean Square Error value of 4748.12 which is the main factor used to determine how well the data is hidden and cannot be interpreted easily. Also, it achieved a Peak Signal-Noise Ratio (PSNR) value of 71.34 dB, which is superior than other recent works, verifying that the image quality remains uncompromising even after being encrypted.
Article
Full-text available
Blockchain is treated as a ledger system that manages data and their transactions using time-stamped blocks through cryptography and works in a decentralised manner over the computing network. Although blockchain is originally used as a backbone for the cryptocurrency, Bitcoin, its capabilities and applications have yet to be extended far beyond cryptocurrencies. In this paper, through conducting a latest systematic literature review aiming to produce new source of evidence, we identify potential applications of the blockchain technologies in healthcare. The comprehensive review looks at the professional and academic open-sourced journals published between 2008 to 2019 to recognise the potential of blockchain based approaches in the purpose of healthcare information disseminations, as well as to segregate issues for the implementation and development of blockchain applications. We identify several major application domains that present research opportunities and challenges for the future advancements and directions for the benefits of IS researchers and professionals.
Article
Full-text available
One of the most important discoveries and creative developments that is playing a vital role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far they are. In the last couple of years, the upsurge in blockchain technology has obliged scholars and specialists to scrutinize new ways to apply blockchain technology with a wide range of domains. The dramatic increase in blockchain technology has provided many new application opportunities, including healthcare applications. This survey provides a comprehensive review of emerging blockchain-based healthcare technologies and related applications. In this inquiry, we call attention to the open research matters in this fast-growing field, explaining them in some details. We also show the potential of blockchain technology in revolutionizing healthcare industry.
Conference Paper
Full-text available
In the present era of smart cities and homes, the private information of the patients such as their names, address, and disease is being breached on a regular basis, which indirectly related to the security of electronic health records (EHRs). The existing state-of-the-art schemes handling the security of EHRs have resulted in data being generally inaccessible to patients. These schemes struggle in providing the efficient balance between the data privacy, need for patients , and providers to regularly interact with data. Blockchain technology resolves the aforementioned issues because it shares the data in a decentralized and transactional fashion. This can be leveraged in the healthcare sector to maintain the balance between privacy and accessibility of EHRs. In this paper, we propose a Blockchain-based framework for efficient storage and maintenance of EHRs. This further provides the secure and efficient access to medical data by patients, providers, and third parties, while preserving the patient private information. The goals of this paper are to analyze how our proposed framework fulfills the needs of patients, providers, and third parties, and to understand how the framework maintains the privacy and security concerns in the healthcare 4.0.
Article
Full-text available
Objectives This pilot study aimed to provide an overview of the potential for blockchain technology in the healthcare system. The review covers technological topics from storing medical records in blockchains through patient personal data ownership and mobile apps for patient outreach. Methods We performed a preliminary survey to fill the gap that exists between purely technically focused manuscripts about blockchains, on the one hand, and the literature that is mostly concerned with marketing discussions about their expected economic impact on the other hand. Results The findings show that new digital platforms based on blockchains are emerging to enabling fast, simple, and seamless interaction between data providers, including patients themselves. Conclusions We provide a conceptual understanding of the technical foundations of the potential for blockchain technology in healthcare, which is necessary to understand specific blockchain applications, evaluate business cases such as blockchain startups, or follow the discussion about its expected economic impacts.
Article
Full-text available
The aim of the paper is to conduct a research on an impact of blockchain technology platform on the financial sector through cryptocurrency, and an impact on other industries.. The subject of research is not only this technology but also its commercial exploitation. In order to understand the platform, the starting point of this research is an analysis of how the technology functions, after that the advantages for business and economic transaction are identified, and finally the paper deals with an impact of new technology on business, above all on financial operations. The basic hypothesis is that blockchain has achieved a great impact on financial sector, also it has the potential to radically change only the financial sector but also the way we buy and sell, our interaction with the authorities as a way of verifying the ownership from the authorship and the organic food production. Using the available data and synthesis of knowledge from the fields of technology, economics, finance, and politics, 4 scenarios were set up for the future of underlying technology. The scenario approach combined with trend analysis in order to prove the starting hypothesis with high reliability. The research results show that the technology being investigated already has a profound impact on the financial sector, that it is in the initial phase of changing many industries, with the likelihood that they will change them significantly in the next five to ten years. Businesses increasingly discover the power of this technology to exploit the benefits of the Fourth Technological Revolution.
Conference Paper
Full-text available
Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we give a brief overview of the field of biometrics specially face authentication. Also, we propose a quantum face authentication method. The proposed method phases are detection face boundaries, image resizing, remove noisy, feature extraction, matching and decision. In addition, the proposed method uses QFWT (Quantum Fast Wavelet Transform) and QFT (Quantum Fourier Transform) in extraction phase.
Article
Full-text available
The main objective of this paper is to present the state-of-the-art of the current biometric (fingerprint and face) technology, lessons learned during the investigative analysis performed to ascertain the benefits of using combined fingerprint and facial technologies, and recommendations for the use of current available fingerprint and face identification technologies for optimum identification performance for applications using large user population. Prior fingerprint and face identification test study results have shown that their identification accuracies are strongly dependent on the image quality of the biometric inputs. Recommended methodologies for ensuring the capture of acceptable quality fingerprint and facial images of subjects are also presented in this paper.
Article
In the recent world of technology, there are many methods to determine the individuality of a person. One of them is the voice - unique individual characteristic. Each person's voice is different because the anatomy of the vocal cords, vocal cavity, oral and nasal cavities is specific to the individual. Comparison of two recorded speech by means of spectrogram or voice prints for the purpose of identification is called as Voice fingerprinting. Forensic voice analysis has been used in a wide range of criminal cases such as murder, rape, drug dealing, bomb threats and terrorism. Investigator has two complementary ways of making identification through voice analysis. First, he or she will listen to the evidence sample and the sample taken from the suspect, comparing accent, speech habits, breath patterns and inflections. Then a comparison of the corresponding voiceprints is made. In this paper we discussed about the history of sound spectrogram, basic method of recording the voice & comparison, its utility in the solution of crime & admissibility in the court of law.