Skip to main content
Top

2021 | OriginalPaper | Chapter

An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare

Authors : Muyideen AbdulRaheem, Ghaniyyat Bolanle Balogun, Moses Kazeem Abiodun, Fatimoh Abidemi Taofeek-Ibrahim, Adekola Rasheed Tomori, Idowu Dauda Oladipo, Joseph Bamidele Awotunde

Published in: Applied Informatics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the realm of information and communication sciences, the Internet of Things (IoT) is a new technology with sensors in the healthcare sector. Sensors are critical IoT devices that receive and send crucial bodily characteristics like blood pressure, temperature, heart rate, and breathing rate to and from cloud repositories for healthcare specialists. As a result of technical advancements, the usage of these devices, referred to as smart sensors, is becoming acceptable in smart healthcare for illness diagnosis and treatment. Data generated from these devices is huge and intrinsically tied to every sphere of daily life including healthcare domain. This information must be safeguarded and processed in a safe location. The term “cloud computing” refers to the type of innovation that is employed to safe keep such tremendous volume of information. As a result, it has become critical to protect healthcare data from hackers in order to maintain its protection, privacy, confidentiality, integrity, and its processing mode. This research suggested a New Lightweight Speck Cryptographic Algorithm to Improve High - Performance Computing Security for Healthcare Data. In contrasted to the cryptographic methods commonly employed in cloud computing, the investigational results of the proposed methodology showed a high level of security and an evident improvement in terms of the time it takes to encrypt data and the security obtainable.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Awotunde, J.B., Adeniyi, A.E., Ogundokun, R.O., Ajamu, G.J., Adebayo, P.O.: MIoT-based big data analytics architecture, opportunities and challenges for enhanced telemedicine systems. Stud. Fuzziness Soft Comput. 2021(410), 199–220 (2021)CrossRef Awotunde, J.B., Adeniyi, A.E., Ogundokun, R.O., Ajamu, G.J., Adebayo, P.O.: MIoT-based big data analytics architecture, opportunities and challenges for enhanced telemedicine systems. Stud. Fuzziness Soft Comput. 2021(410), 199–220 (2021)CrossRef
2.
go back to reference Maskeliūnas, R., Damaševičius, R., Segal, S.: A review of internet of things technologies for ambient assisted living environments. Future Internet 11(12), 259 (2019)CrossRef Maskeliūnas, R., Damaševičius, R., Segal, S.: A review of internet of things technologies for ambient assisted living environments. Future Internet 11(12), 259 (2019)CrossRef
3.
go back to reference Abiodun, M.K., Awotunde, J.B., Ogundokun, R.O., Adeniyi, E.A., Arowolo, M.O.: Security and information assurance for IoT-based big data. Stud. Computat. Intell. 2021(972), 189–211 (2021) Abiodun, M.K., Awotunde, J.B., Ogundokun, R.O., Adeniyi, E.A., Arowolo, M.O.: Security and information assurance for IoT-based big data. Stud. Computat. Intell. 2021(972), 189–211 (2021)
4.
go back to reference Azeez, N.A., Van der Vyver, C.: Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt. Inf. J. 20(2), 97–108 (2019) Azeez, N.A., Van der Vyver, C.: Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt. Inf. J. 20(2), 97–108 (2019)
5.
go back to reference Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimedia Tools Appl. 79(31–32), 23483–23506 (2020) Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimedia Tools Appl. 79(31–32), 23483–23506 (2020)
6.
go back to reference Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 1–23 (2021) Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 1–23 (2021)
8.
go back to reference Awotunde, J.B., Chakraborty, C., Adeniyi, E.A., Abiodun, K.M.: Intrusion detection in industrial internet of things network based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. 2021, 1–17 (2021)CrossRef Awotunde, J.B., Chakraborty, C., Adeniyi, E.A., Abiodun, K.M.: Intrusion detection in industrial internet of things network based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. 2021, 1–17 (2021)CrossRef
9.
go back to reference Thabit, F., Alhomdy, S., Jagtap, S.: A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int. J. Intell. Netw. 2, 18–33 (2021) Thabit, F., Alhomdy, S., Jagtap, S.: A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int. J. Intell. Netw. 2, 18–33 (2021)
10.
go back to reference Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D.: An efficient lightweight cryptographic algorithm for IoT security. Commun. Comput. Inf. Sci. 2021(1350), 444–456 (2021) Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D.: An efficient lightweight cryptographic algorithm for IoT security. Commun. Comput. Inf. Sci. 2021(1350), 444–456 (2021)
11.
go back to reference Mohammed, K.M.A.K.: Confidentiality of data in public cloud storage using hybrid encryption algorithms. Doctoral Dissertation, Sudan University of Science and Technology Mohammed, K.M.A.K.: Confidentiality of data in public cloud storage using hybrid encryption algorithms. Doctoral Dissertation, Sudan University of Science and Technology
12.
go back to reference Singh, P., Acharya, B., Chaurasiya, R.K.: Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In: Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 153–185. Academic Press Singh, P., Acharya, B., Chaurasiya, R.K.: Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In: Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 153–185. Academic Press
13.
go back to reference Makarenko, I., Semushin, S., Suhai, S., Kazmi, S.A., Oracevic, A., Hussain, R.: A comparative analysis of cryptographic algorithms in the internet of things. In: 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), pp. 1–8. IEEE, Oct 2020 Makarenko, I., Semushin, S., Suhai, S., Kazmi, S.A., Oracevic, A., Hussain, R.: A comparative analysis of cryptographic algorithms in the internet of things. In: 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), pp. 1–8. IEEE, Oct 2020
14.
go back to reference Nayancy, Dutta, S., Chakraborty, S.: A survey on implementation of lightweight block ciphers for resource constraints devices. J. Discrete Math. Sci. Cryptogr. 1–22 (2020) Nayancy, Dutta, S., Chakraborty, S.: A survey on implementation of lightweight block ciphers for resource constraints devices. J. Discrete Math. Sci. Cryptogr. 1–22 (2020)
15.
go back to reference Saddam, M.J., Ibrahim, A.A., Mohammed, A.H.: A lightweight image encryption and blowfish decryption for the secure internet of things. In: 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–5. IEEE, Oct 2020 Saddam, M.J., Ibrahim, A.A., Mohammed, A.H.: A lightweight image encryption and blowfish decryption for the secure internet of things. In: 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–5. IEEE, Oct 2020
16.
go back to reference Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Großschädl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 9(3), 283–302 (2019)CrossRef Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Großschädl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 9(3), 283–302 (2019)CrossRef
17.
go back to reference Turan, M.S., McKay, K.A., Çalik, Ç., Chang, D., Bassham, L.: Status report on the first round of the NIST lightweight cryptography standardization process. National Institute of Standards and Technology, Gaithersburg, MD, NIST Interagency/Internal Rep. (NISTIR) (2019) Turan, M.S., McKay, K.A., Çalik, Ç., Chang, D., Bassham, L.: Status report on the first round of the NIST lightweight cryptography standardization process. National Institute of Standards and Technology, Gaithersburg, MD, NIST Interagency/Internal Rep. (NISTIR) (2019)
18.
go back to reference Kraft, J.S., Washington, L.C.: An Introduction to Number Theory with Cryptography. Chapman and Hall/CRC (2018) Kraft, J.S., Washington, L.C.: An Introduction to Number Theory with Cryptography. Chapman and Hall/CRC (2018)
19.
go back to reference Das, A.K., Wazid, M., Yannam, A.R., Rodrigues, J.J., Park, Y.: Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7, 55382–55397 (2019)CrossRef Das, A.K., Wazid, M., Yannam, A.R., Rodrigues, J.J., Park, Y.: Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7, 55382–55397 (2019)CrossRef
21.
go back to reference Fischer, M., Scheerhorn, A., Tönjes, R.: Using attribute-based encryption on IoT devices with instant key revocation. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 126–131. IEEE, Mar 2019 Fischer, M., Scheerhorn, A., Tönjes, R.: Using attribute-based encryption on IoT devices with instant key revocation. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 126–131. IEEE, Mar 2019
22.
go back to reference Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE, Aug 2016 Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE, Aug 2016
23.
go back to reference Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight enhanced collaborative key management scheme for smart home application. In: 2017 International Conference on High Performance Computing Simulation (HPCS), pp. 777–784. IEEE, July 2017 Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight enhanced collaborative key management scheme for smart home application. In: 2017 International Conference on High Performance Computing Simulation (HPCS), pp. 777–784. IEEE, July 2017
24.
go back to reference Syal, R.: A comparative analysis of lightweight cryptographic protocols for smart home. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications. AISC, vol. 882, pp. 663–669. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5953-8_54CrossRef Syal, R.: A comparative analysis of lightweight cryptographic protocols for smart home. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications. AISC, vol. 882, pp. 663–669. Springer, Singapore (2019). https://​doi.​org/​10.​1007/​978-981-13-5953-8_​54CrossRef
25.
go back to reference Awotunde, J.B., Jimoh, R.G., Folorunso, S.O., Adeniyi, E.A., Abiodun, K.M., Banjo, O.O.: Privacy and security concerns in IoT-based healthcare systems. Internet Things, 105–134 (2021) Awotunde, J.B., Jimoh, R.G., Folorunso, S.O., Adeniyi, E.A., Abiodun, K.M., Banjo, O.O.: Privacy and security concerns in IoT-based healthcare systems. Internet Things, 105–134 (2021)
Metadata
Title
An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare
Authors
Muyideen AbdulRaheem
Ghaniyyat Bolanle Balogun
Moses Kazeem Abiodun
Fatimoh Abidemi Taofeek-Ibrahim
Adekola Rasheed Tomori
Idowu Dauda Oladipo
Joseph Bamidele Awotunde
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-89654-6_26

Premium Partner