Applied and Computational Engineering

- The Open Access Proceedings Series for Conferences


Proceedings of the 4th International Conference on Computing and Data Science (CONF-CDS 2022)

Series Vol. 2 , 22 March 2023


Open Access | Article

Secure Electronic Medical Records Using Lattice Cryptography and Fog Computing Techniques

Fatokun Yemi Tunrayo 1 , Arome Junior Gabriel * 2 , Alowolodu Olufunso Dayo 3
1 Osun State University Osogbo, Nigeria yemi.fatokun@uniosun.edu.ng
2 Department of Cyber Security, Federal University of Technology, Akure, Nigeria ajgabriel@futa.edu.ng
3 Department of Cyber Security, Federal University of Technology, Akure, Nigeria ajgabriel@futa.edu.ng

* Author to whom correspondence should be addressed.

Applied and Computational Engineering, Vol. 2, 111-118
Published 22 March 2023. © 2023 The Author(s). Published by EWA Publishing
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citation Fatokun Yemi Tunrayo, Arome Junior Gabriel, Alowolodu Olufunso Dayo. Secure Electronic Medical Records Using Lattice Cryptography and Fog Computing Techniques. ACE (2023) Vol. 2: 111-118. DOI: 10.54254/2755-2721/2/20220609.

Abstract

The usage of Information Technologies (IT), as well as data has increased over the years to improve businesses and human life generally thereby increasing productivity. In the health sector, Electronic Health Records (EHR) has helped in collecting demographic medical data which helps healthcare practitioners to provide quality health care. The EHR generates lots of medical data and are analyzed and processed to form big health data and sent to Agencies, Government to influence decisions in improving quality of life and to predict or prevent premature deaths and disease development. In this research work, we propose a model using lattice-based cryptography to encrypt health big data and deploy a decoy model which will be coined in fog computing facility to serve as honeypot or trap machine to attract attackers.

Keywords

Medical Health Records, Cloud Computing, Fog Computing, Information Security, Post Quantum Cryptography

References

1. Gabriel A. J., BK Alese, AO Adetunmbi, OS Adewale, (2015). “Post-quantum crystography based security framework for cloud computing”, Journal of Internet Technology and Se-cured Transactions (JITST), Pages 351-357.

2. Quek Kia Fatt and Amutha Ramadas (2018) “The Usefulness and Challenges of Big Data in Healthcare”, Journal of Healthcare Communications, ISSN 2472-1654 Vol.3 No.2:21

3. Ajala F., Awokola J., and Emuoyibofarhe O.(2015) Development Of An Electronic Medical Rec-ord (EMR) System For A Typical Nigerian Hospital. Journal of Multidisciplinary Engineer-ing Science and Technology (JMEST) ISSN: 3159- 0040 Vol. 2 Issue 6.

4. Abouelmehdi Karim, Beni-Hessane Abderrahim, Khaloufi Hayat (2018), “Big Healthcare data: preserving security and privacy”, Journal of Big Data, https://doi.org/10.1186/s40537-017-0110-7.

5. Asonganyi Jeffrey Nkwetta Matricule No: CT14A019 Degree for which submitted: B.Tech De-partment: Computer Engineering Project Title: Honey-System: Design, Implementation and Attack Analysis Project Supervisor: Dr. Sone Ekonde Michael Date: July, 2018.

6. Wang X. (2010) Application of Cloud Computing in the Health Information System, International Conference on Computer Application and System Modeling (ICCASM).

7. Akinyele J., Pagano M, Green M, Rubin A, Lehmann C , Peterson Z, (2011) Securing electronic medical records using attribute-based encryption on mobile devices DOI: 10.1145/2046614.2046628.

8. Boyinbode O. and Toriola G. (2015) CloudeMR: A Cloud Based Electronic Medical Record Sys-tem. International Journal of Hybrid Information Technology Vol.8, No.4 (2015), pp. 201-212.

9. Tsai K., Leu F., Tien-Han W., Chiou S., Liu Y., and Liu.H (2014) Secure ECC based Electronic Medical Record System. Journal of Internet Services and Information Security (JISIS), vol-ume: 4, number: 1, pp. 47-57.

10. Premarathne U., Abuadbba A., Alabdulatif A., Khalil I., Tari Z., Zomaya A., and Buyya, R. (2015) Hybrid Cryptographic Access Control for Cloud-Based EHR Systems. IEEE Cloud Computing, 3(4), 58–64. doi:10.1109/mcc.2016.76.

11. Kwangsoo et al. (2018) Privacy-preserving Attribute-based Access Control Model for XML-based Electronic Health Record System. IEEE Access PP (99):1-1 DOI: 10.1109/ACCESS.2018.2800288.

12. Afshar M., Samet S., and Hu T. (2018) an Attribute Based Access Control Framework for Healthcare System IOP Conf. Series: Journal of Physics: Conf. Series 933 (2018) 012020 doi :10.1088/1742-6596/933/1/012020.

13. Bandar S Alhaqbani. (2010) Privacy and Trust Management for Electronic Health Records. Queensland University of Technology, Brisbane, Australia.

14. Saghar B. and Stephen M. (2017) Trust-based framework for Information Sharing in Health care. University of Ontario Institute of Technology.

15. Suraj Shukla, Detailed Review of Different Security Techniques for Data Protection in Cloud Computing (April 20, 2020). Available at https://ssrn.com/abstract=3580863 or http://dx.doi.org/10.2139/ssrn.3580863.

16. Gabriel, A., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2013).” Post-Quantum Crystography: A combination of Post- Quantum Cryptography and Steganography”, 8th In-ternational Conference for Internet Technology and Secured Transactions (ICITST 2013) doi:10.1109/icitst.2013.6750240.

17. Alowolodu O.D., Alese B.K., Adetunmbi A.O., Ogundele O.S. (2013). “Elliptic Curve Cryp-tography for Securing Cloud Computing Applications”, International Journal of Computer Applications, Volume 66 Issue 23.

18. Gabriel, A. J. (2021). Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography. Journal of Information technology and Se-cure Transactions (JITST), 9(1):735-740. Infornomics Society. DOI: 10.20533/jitst.2046.3723.2021.0090.

19. Thompson, A., Abayomi, A., Gabriel, A.J. (2022). Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies. In: Misra, S., Kumar Tyagi, A. (eds) Blockchain Applications in the Smart Era. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-89546-4_14.

20. Bowen B. M., Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo (2009) “Baiting Inside Attackers using Decoy Documents”, Department of Computer Science Columbia University New York, NY 10027.

21. Hamid, H. Rahman, S M., Hossain, M. S., Ahmad A., Alamri, A. (2017). A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2757844.

22. Alowolodu, Olufunso Dayo, Gabriel Kayode Adelaja, Boniface Kayode Alese, Olufunke Cath-erine Olayemi (2018) “Medical Image Security Using Quantum Cryptography”, Issues in Informing Science & Information Technology, Informing Science Institute, Pages 57-68.

23. Spitzner, Lance (2003). Honeypots: Sticking it to hackers. 18. 48-51.

24. David R.Matos, Migue lL.Pardal, PedroAd˜ao Ant´onio RitoSilva, Miguel Correia (2018) Se-curing Electronic Health Records in the Cloud INESCID, Instituto Superior T´ecnico, Uni-versidade de Lisboa, Portugal 2 Instituto de Telecomunica¸c˜oes, Lisboa, Portugal.

25. Sriram M., Vaibhav Patel, Harishma D., Nachammai Lakshmanan, (2014), “A Hybrid Protocol to Secure the Cloud from Insider Threats”, DOI: 10.1109/CCEM.2014.7015476.

26. Wang, Lidong & Alexander, Cheryl. (2013). “Medical Applications and Healthcare Based on Cloud Computing”, International Journal of Cloud Computing and Services Science (IJ-CLOSER). 2. 10.11591/closer.v2i4.3452.

27. Thavamani S., M.Rajakumar (2019) Privacy Preserving Healthcare Data using Cloud Compu-ting International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-10S.

28. Hey T. (1999) Quantum computing: An introduction. Computing & Control Engineering Jour-nal, 10(3):105–112.

29. Kraemer Frank Alexander, Anders Eivind Bråten, Lindner, R., & Peikert, C. (2011). Better Key Sizes (and Attacks) for LWE-Based Encryption. IACR Cryptol. ePrint Arch., 2010, 592.

30. Yuan Y.et. al. (2016) Portable implementation of lattice-based cryptography using javascript. InCANDAR.

Data Availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this series agree to the following terms:

1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.

2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.

3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).

Volume Title
Proceedings of the 4th International Conference on Computing and Data Science (CONF-CDS 2022)
ISBN (Print)
978-1-915371-19-5
ISBN (Online)
978-1-915371-20-1
Published Date
22 March 2023
Series
Applied and Computational Engineering
ISSN (Print)
2755-2721
ISSN (Online)
2755-273X
DOI
10.54254/2755-2721/2/20220609
Copyright
22 March 2023
Open Access
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Copyright © 2023 EWA Publishing. Unless Otherwise Stated