Skip to main content

2020 | OriginalPaper | Buchkapitel

A New Framework for Secure Outsourcing of Medical Data

verfasst von : J. Hyma, Moulica Sudamalla, Dharma Teja Vanaparthi, Koushik Vinnakota, Vamsi Krishna Choppavarapu

Erschienen in: Intelligent Manufacturing and Energy Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays security has become one of the challenging problems in almost all fields like IT, Banking, Medical, MNC companies, and many more. Cryptography and steganography are some of the few techniques used to provide the security for the text, images and many other multimedia data which is to be transferred over the network. Although the researchers are coming up with more and more enhancements in these fields, still there is a demand for new security challenges for the present-day digital data expansion. The limitation of the Cryptography is after encryption the ciphertext looks meaningless and it is vulnerable to the attacker and thus it raises a transmission interruption. On the other hand, the limitation of steganography is once the hidden information is revealed message is disclosed. The digital users regularly transfer a lot of files from one system to other system either within the range or far range by using the internet or intranet and simultaneously they also look for more security. In this work, a merged technique is proposed to improve the security in which first the message is encrypted using primitive cryptography algorithm—BlowFish and the obtained ciphertext is embedded into an image file using Least Significant Bit (LSB) technique. Here the medical image file is also considered as sensitive data and it is encrypted using a double embedding process with another cover image. This client-side encryption framework helps in providing secure outsourcing of medical data to a third party environment like any cloud service.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nawaz, S., Adib, M., Nawaz, M., Kamran, R.: Identifying and analyzing security threats to virtualized cloud computing infrastructures. In: Proceedings of IEEE International Conference on Cloud Computing Technologies, Applications and Managements, pp. 151–155 (2012) Nawaz, S., Adib, M., Nawaz, M., Kamran, R.: Identifying and analyzing security threats to virtualized cloud computing infrastructures. In: Proceedings of IEEE International Conference on Cloud Computing Technologies, Applications and Managements, pp. 151–155 (2012)
2.
Zurück zum Zitat Karthikeyan, B., Deepak, A., Subalakshmi, K.S., Anishin Raj, M.M., Vaithiyanathan, V.: A combined approach of steganography with LSB encoding technique and DES algorithm. In: Proceedings of 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bioinformatics (2017) Karthikeyan, B., Deepak, A., Subalakshmi, K.S., Anishin Raj, M.M., Vaithiyanathan, V.: A combined approach of steganography with LSB encoding technique and DES algorithm. In: Proceedings of 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bioinformatics (2017)
3.
Zurück zum Zitat Ranjan, A., Bhonsle, M.: Advanced technics to shared protect cloud data using multilayer steganography and cryptography. In: Proceedings of IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (2016) Ranjan, A., Bhonsle, M.: Advanced technics to shared protect cloud data using multilayer steganography and cryptography. In: Proceedings of IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (2016)
4.
Zurück zum Zitat Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB color images. In: Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4 (2015) Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB color images. In: Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4 (2015)
5.
Zurück zum Zitat Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press) Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press)
6.
Zurück zum Zitat Zhang, Y., Xu, C., Liang, X., Li, H.: Cryptographic public verification of data integrity for cloud storage system. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef Zhang, Y., Xu, C., Liang, X., Li, H.: Cryptographic public verification of data integrity for cloud storage system. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef
7.
Zurück zum Zitat Prakash, G.L., Prateak, M., Singh, I.: Efficient data security method to control data in cloud storage system using cryptographic techniques. In: Proceedings of IEEE International Conference on Recent Advances and Innovations in Engineering, pp. 1–6 (2014) Prakash, G.L., Prateak, M., Singh, I.: Efficient data security method to control data in cloud storage system using cryptographic techniques. In: Proceedings of IEEE International Conference on Recent Advances and Innovations in Engineering, pp. 1–6 (2014)
8.
Zurück zum Zitat Mainberger, M., Schmaltz, C., Berg, M., Weickert, J., Backes, M.: Diffusion-based image compression in steganography. Proceedings of LNCS, vol. 7432(II), pp. 219–228 (2012) Mainberger, M., Schmaltz, C., Berg, M., Weickert, J., Backes, M.: Diffusion-based image compression in steganography. Proceedings of LNCS, vol. 7432(II), pp. 219–228 (2012)
9.
Zurück zum Zitat Gomathymeenakshi, M., Sruti, S., Karthikeyan, B., Nayana, M.: An efficient arithmetic coding data compression with steganography. In: Proceedings of IEEE International Conference on Emerging Trends in Computing and Nanotechnology, pp. 342–345 (2013) Gomathymeenakshi, M., Sruti, S., Karthikeyan, B., Nayana, M.: An efficient arithmetic coding data compression with steganography. In: Proceedings of IEEE International Conference on Emerging Trends in Computing and Nanotechnology, pp. 342–345 (2013)
10.
Zurück zum Zitat Sarkar, M.K., Chatterjee, T.: Enhancing data storage security in cloud computing through steganography. In: Proceedings of ACEEE International Conference on Network Security, vol. 5, no. 1 (2014) Sarkar, M.K., Chatterjee, T.: Enhancing data storage security in cloud computing through steganography. In: Proceedings of ACEEE International Conference on Network Security, vol. 5, no. 1 (2014)
11.
Zurück zum Zitat Chauhan, S., Kumar, J.J., Doegar, A.: Multiple layer text security using variable block size cryptography and image steganography. In: Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology (2017) Chauhan, S., Kumar, J.J., Doegar, A.: Multiple layer text security using variable block size cryptography and image steganography. In: Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology (2017)
12.
Zurück zum Zitat Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of Financial Cryptography and Data Security Workshops, pp. 136–149 (2010) Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of Financial Cryptography and Data Security Workshops, pp. 136–149 (2010)
Metadaten
Titel
A New Framework for Secure Outsourcing of Medical Data
verfasst von
J. Hyma
Moulica Sudamalla
Dharma Teja Vanaparthi
Koushik Vinnakota
Vamsi Krishna Choppavarapu
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-1616-0_74

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.