Built-in Encrypted Health Cloud Environment for Sharing COVID-19 Data

Mohammed Y. Shakor, Nigar M. Shafiq Surameery
{"title":"Built-in Encrypted Health Cloud Environment for Sharing COVID-19 Data","authors":"Mohammed Y. Shakor, Nigar M. Shafiq Surameery","doi":"10.1109/ICCCI51764.2021.9486774","DOIUrl":null,"url":null,"abstract":"During the COVID-19 pandemic, the increasing amount of personal and sensitive data collected in the healthcare inistiutions, make it necessary to use the cloud not only to store the data, but also to process it in the cloud. Obviously, most people would like to get a secure information related to their health. Therefore, with the recent growth of cloud computing privacy and data protection requirements have been evolving toto protect individuals from surveillance and data leakage. However, due to security concerns about frequent data breaches and recently upgraded legal data protection requirements (such as the EU's General Data Protection Regulation), it is recommended not to outsourcing unprotected sensitive data to public clouds. Cloud computing offers on-demand services including platforms, infrastructure and software that have been developed. To ensure confidentiality, the encryption algorithm is the most commonly used technique. However, Using a single algorithm is not effective for the high-level security of data in cloud computing. To fix this issue, we have introduced a new security mechanism using a built-in encrypted cloud storage system, which makes the proposed system strong against vulnerabilities. Various symmetric and asymmetric encryption techniques have been used to protect data from external threats. These techniques can help restrict the access to the stored data in order to be available for authorized users only. Combining Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC), the sensitive files are stored in client side and uploaded to the server. The results show that the impact of this built-in approach is more important than the other secure algorithms. In addition, it also showed that in the built-in algorithm, adding additional layers of security did not cause an increase in the download and upload time from and to the cloud.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI51764.2021.9486774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

During the COVID-19 pandemic, the increasing amount of personal and sensitive data collected in the healthcare inistiutions, make it necessary to use the cloud not only to store the data, but also to process it in the cloud. Obviously, most people would like to get a secure information related to their health. Therefore, with the recent growth of cloud computing privacy and data protection requirements have been evolving toto protect individuals from surveillance and data leakage. However, due to security concerns about frequent data breaches and recently upgraded legal data protection requirements (such as the EU's General Data Protection Regulation), it is recommended not to outsourcing unprotected sensitive data to public clouds. Cloud computing offers on-demand services including platforms, infrastructure and software that have been developed. To ensure confidentiality, the encryption algorithm is the most commonly used technique. However, Using a single algorithm is not effective for the high-level security of data in cloud computing. To fix this issue, we have introduced a new security mechanism using a built-in encrypted cloud storage system, which makes the proposed system strong against vulnerabilities. Various symmetric and asymmetric encryption techniques have been used to protect data from external threats. These techniques can help restrict the access to the stored data in order to be available for authorized users only. Combining Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC), the sensitive files are stored in client side and uploaded to the server. The results show that the impact of this built-in approach is more important than the other secure algorithms. In addition, it also showed that in the built-in algorithm, adding additional layers of security did not cause an increase in the download and upload time from and to the cloud.
内置加密健康云环境,用于共享COVID-19数据
在2019冠状病毒病大流行期间,医疗机构收集的个人和敏感数据越来越多,因此不仅需要使用云存储数据,还需要在云中处理数据。显然,大多数人都希望获得与他们的健康有关的安全信息。因此,随着近年来云计算的发展,隐私和数据保护的要求已经演变到保护个人免受监控和数据泄露。但是,由于对频繁数据泄露的安全担忧以及最近升级的法律数据保护要求(例如欧盟的《通用数据保护条例》),建议不要将未受保护的敏感数据外包给公共云。云计算提供按需服务,包括已开发的平台、基础设施和软件。为了保证机密性,加密算法是最常用的技术。然而,在云计算中,使用单一的算法并不能保证数据的高安全性。为了解决这个问题,我们引入了一种新的安全机制,使用内置的加密云存储系统,这使得所提议的系统具有很强的抗漏洞能力。各种对称和非对称加密技术已被用于保护数据免受外部威胁。这些技术可以帮助限制对存储数据的访问,以便仅供授权用户使用。结合AES (Advanced Encryption Standard)和ECC (Cryptographic Curve Cryptography),将敏感文件存储在客户端,然后上传到服务器。结果表明,这种内置方法的影响比其他安全算法更重要。此外,它还表明,在内置算法中,增加额外的安全层并不会增加从云端下载和上传的时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信