Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security

Document Type : Research Paper


Department of Computer Science, VISTAS, Chennai, India.


Nowadays, several security architectures in cloud computing were employed in several applications, but they failed to secure the cloud data entirely. The current approaches use the ensemble algorithm for the decryption and encryption purpose to enhance the security technique. The input medical dataset is usually raw and might contain redundant packets and missing values. Initially, the data is preprocessed by means of the normalization technique. By using Enhanced Principal Component Analysis (EPCA) method, various attributes of the data can be obtained. After the extraction process, the classification mechanism is carried out for recognizing the attacks. The attack is predicted and is classified by means of the Adaptive AlexNet CNN classifier algorithm. A hybrid cryptographic technique in a cloud environment for improving the security rate and providing privacy preservation of the medical data in the cloud environment is presented. The proposed work mainly concentrates mostly on implementing hybrid cryptographic schemes which include AES algorithm, enhanced honeypot algorithm, SHA3 hashing and OTP in the cloud environment. It enhances the security of the data to a great extent. Thus, the presented technique is secured effectively that makes the intruders difficult to access the system as they need to attain control over servers.


[1] M. H. R. Al-Shaikhly, H. M. El-Bakry and A. A. Saleh, Cloud security using Markov chain and genetic algorithm,
Int. J. Elect. Inf. Engin. 8(2) (2018) 96–106.[2] A. Aldweesh, A. Derhab and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection
systems: A survey, taxonomy, and open issues, Knowledge-Based Syst. 189(105124) (2020).
[3] SH. Aljawarneh, M. B. Yassein and W. A. Talafha, A resource-efficient encryption algorithm for multimedia big
data, Mult. Tools Appl. 76(21) (2017) 22703–22724.
[4] CH. Beyene and P. Kamat, Survey on Prediction and Analysis the Occurrence of Heart Disease Using Data
Mining Techniques, Int. J. Pure Appl. Math. 118(8) (2018) 165–174.
[5] N. Deepa and P. Pandiaraja, E health care data privacy preserving efficient file retrieval from the cloud service
provider using attribute based file encryption, J. Ambient Intel. Human. Comput. 12(5) (2020) 1–11.
[6] R. Devi and J. M. Shyla, Analysis of various data mining techniques to predict diabetes mellitus, Int. J. Appl.
Engin. Res. 11(1) (2016) 727–730.
[7] M. Durairaj and G. Kalaiselvi, Prediction of diabetes using soft computing techniques-A survey, Int. J. Sci. Tech.
Res. 4(3) (2015).
[8] R. Gupta, P. Kanungo and N. Dagdee, HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based
Encryption for Enabling Open Access to Shared Organizational Data, In: G. S. Tomar, N. S. Chaudhari, J. L. V.
Barbosa and M. K. Aghwariya (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, 2020.
[9] V. S. V. Hema and R. Kesavan, ECC based secure sharing of healthcare data in the health cloud environment,
Wireless Personal Commun. 108(2) (2019) 1021–1035.
[10] F. Huang, J. Huang and Y. Shi, New framework for reversible data hiding in encrypted domain, IEEE Trans. Inf.
Forensics Sec. 11(12) (2016) 2777–2789.
[11] P. Kumar and SH. B. Rana, Development of modified AES algorithm for data security, Optik-Int. J. Light Elect.
Opt. 127(4) (2016) 2341–2345.
[12] S. S. Kumar, SH. Prasad, M. Parimala and DR. G. M. Someswar, Scalable and secure sharing of personal health
records in cloud computing using attribute based encryption, Int. J. Adv. Comput. Tech. 5(6) (2016).
[13] S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu and N. Kumar, A secure authentication scheme based on
elliptic curve cryptography for IoT and cloud servers, J. Supercom. 74(12) (2018) 6428–6453.
[14] P. Nagar, H. K. Menaria and M. Tiwari, Novel Approach of Intrusion Detection Classification Deeplearning Using
SVM, In: A. K. Luhach, J. A. Kosa, R. CH. Poonia, X. Gao and D. Singh (eds) First International Conference on
Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019, Springer Nature, 2020.
[15] P. Preethi and R. Asokan, A high secure medical image storing and sharing in cloud environment using hex code
cryptography method—secure genius, J. Med. Imag. Health Inf. 9(7) (2019) 1337–1345.
[16] A. Priya, Dr. S. Saradha, A detailed survey of the security issues and defensive tactic in cloud background, J.
Adv. Res. Dyn. Cont. Syst. 11(11) (2019) 606–611.
[17] A. Priya, Dr. S. Saradha, An efficient prediction and privacy preservation using enhanced blowfish cryptographic
scheme for cloud security, HTL J. 26(11) (2020) 1–9.
[18] A. Priya, Dr. S. Saradha, An overview on cloud computing frameworks and review on cloud security schemes, J.
Crit. Rev. 7(17) (2020) 3303–3308.
[19] M. Rasori, P. Perazzo and G. Dini, A lightweight and scalable attribute-based encryption system for smart cities,
Comput. Commun. 149(2020) (2020) 78–89.
[20] M. Sakthivanitha and S. Saradha, Survey based on security aware caching scheme for IoT based information
centric networking, EAI Endorsed Trans. Energy Web 8(32) (2020) e2.
[21] F. Sammy and S. M. C. Vigila, An Efficient Multiauthority Attribute-Based Encryption Technique for Storing
Personal Health Record by Compressing the Attributes, In: J. Jayakumari, G. K. Karagiannidis, M. Ma and S.
A. Hossain (eds) Advances in Communication Systems and Networks. Lecture Notes in Electrical Engineering,
Springer, Singapore, 2020.
[22] H. Wang, SH. Wu, M. Chen and W. Wang, Security protection between users and the mobile media cloud, IEEE
Commun. Mag. 52(3) (2014) 73–79.
[23] H. Xiong, H. Zhang and J. Sun, Attribute-based privacy-preserving data sharing for dynamic groups in cloud
computing, IEEE Syst. J. 13(3) (2018) 2739–2750.
[24] F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, A. Anjum, M. I. Khan, N. Javed, M. Alam and F. Jamil, A
survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Comput. Sec.
65(2017) (2017) 29–49.
Volume 12, Issue 2
November 2021
Pages 1785-1800
  • Receive Date: 25 January 2021
  • Revise Date: 12 May 2021
  • Accept Date: 13 June 2021