Skip to main content

2020 | OriginalPaper | Buchkapitel

A Novel Method to Safeguard Patients Details in IoT Healthcare Sector Using Encryption Techniques

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet has become a part of our daily life. Most of the communications or the transfer of the data across the globe is happening over the internet. With Internet of Things [IoT], the devices can transmit data with each other over the internet. As the internet play a crucial role, the security of the data also becomes important. Confidentiality is important in the healthcare sector where encryption plays an important role. There are many effective encryption algorithms available, but through this work we are proposing a novel method that aims at adding the randomness to the encryption algorithm. The random number generation technique used in this paper is Web Scraping, here the data is scraped from the web page where the data gets constantly updated which adds to the randomness. The random number generation module is added to the existing encryption algorithm and the encryption algorithm is tested on different file sizes to test the level of encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jha, D., Shahi, B.: A proposed methodology for end to end encryption for communicating embedded systems. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore (2017) Jha, D., Shahi, B.: A proposed methodology for end to end encryption for communicating embedded systems. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore (2017)
2.
Zurück zum Zitat Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai (2017) Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai (2017)
3.
Zurück zum Zitat Majumder, P., Sinha, K.: A novel key generation algorithm from twitter data stream for secure communication in IoT (2017) Majumder, P., Sinha, K.: A novel key generation algorithm from twitter data stream for secure communication in IoT (2017)
4.
Zurück zum Zitat Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6, 410–420 (2018)CrossRef Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6, 410–420 (2018)CrossRef
5.
Zurück zum Zitat Philip, M.A., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam (2017) Philip, M.A., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam (2017)
6.
Zurück zum Zitat Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., Singh, S.: Lightweight data security model for IoT applications: a dynamic key approach. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Chengdu (2016) Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., Singh, S.: Lightweight data security model for IoT applications: a dynamic key approach. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Chengdu (2016)
7.
Zurück zum Zitat Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: International Conference on IoT and Application (ICIOT), Nagapattinam (2017) Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: International Conference on IoT and Application (ICIOT), Nagapattinam (2017)
8.
Zurück zum Zitat Rakesh, N.: Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International Conference on InventiveComputationTechnologies (ICICT), Coimbatore, pp. 1–5 (2016) Rakesh, N.: Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International Conference on InventiveComputationTechnologies (ICICT), Coimbatore, pp. 1–5 (2016)
9.
Zurück zum Zitat Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IOT. In: International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1–5 (2017) Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IOT. In: International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1–5 (2017)
10.
Zurück zum Zitat Reddy, B.D., Kumari, V.V., Raju, K.: A new symmetric probabilistic encryption scheme based on random numbers. In: First International Conference on Networks Soft Computing (ICNSC 2014), Guntur, pp. 267–272 (2014) Reddy, B.D., Kumari, V.V., Raju, K.: A new symmetric probabilistic encryption scheme based on random numbers. In: First International Conference on Networks Soft Computing (ICNSC 2014), Guntur, pp. 267–272 (2014)
11.
Zurück zum Zitat Sathya, K., Premalatha, J., Rajasekar, V.: Random number generation based on sensor with decimation method. In: IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), Kanpur, pp. 1–5 (2015) Sathya, K., Premalatha, J., Rajasekar, V.: Random number generation based on sensor with decimation method. In: IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), Kanpur, pp. 1–5 (2015)
12.
Zurück zum Zitat Mulaosmanovic, H., Mikolajick, T., Slesazeck, S.: Random number generation based on ferroelectric switching. IEEE Electron Device Lett. 39(1), 135–138 (2018)CrossRef Mulaosmanovic, H., Mikolajick, T., Slesazeck, S.: Random number generation based on ferroelectric switching. IEEE Electron Device Lett. 39(1), 135–138 (2018)CrossRef
Metadaten
Titel
A Novel Method to Safeguard Patients Details in IoT Healthcare Sector Using Encryption Techniques
verfasst von
R. Venkat Tejas
N. Rakesh
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_30