Medical data encryption in private cloud based on MAR

Document Type : Research Paper

Authors

1 College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq

2 College of Dentistry, University of Al-Ameed, Karbala PO Box 198, Iraq

3 Department of Computer Engineering and Information Technology, Faculty of Engineering, Razi University, Kermanshah, Iran

Abstract

It’s easy to exchange files, folders, and emails in a private network with the aid of a private cloud (PriCld). However, the most common attack with this sort of system is the guessing of the password. The unencrypted connection makes it potential for a man-in-the-middle attack (MaMiAtk) to occur at times. Scanners used to discover vulnerabilities in the system and exploiting them are also a major issue. Therefore, a system that can withstand assaults such as MaMiAtk, Denial of Service Attack (DoS attack), and password guessing is required. In the presented study, a log-based analysis approach has been recommended to guard the system against assaults such as DoS attack, password guessing, and automated scanners. We also use encrypted channels to prevent attacks such as MaMiAtk.

Keywords

[1] A.S. Abdulbaqi, A.A. Abdulhameed and A.J. Obaid, Cardiopathy symptoms diagnosis based on a secure real-time
ECG signal transmission, Int. J. Nonlinear Anal. and Appl. 12(2) (2021) 1353–1370.
[2] A.S. Abdulbaqi and R.H. Mahdi, Biometrics detection and recognition based-on geometrical features extraction,
In 2018 Int. Conf. Adv. Sustainable Engin. Appl. IEEE, (2018) 59–63.
[3] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for
medical image encryption, J. Discrete Math. Sci. Crypt. (2021) 1–11.
[4] J.M. Beaver, C.T. Symons, R.E. Gillen, A learning system for discriminating variants of malicious network traffic,
8th Annual Cyber Security and Information Intelligence Research Workshop, (2012) pp. 1–4.
[5] D.S.A. Elminaam, H.M.K. Abdual and M.M. Hadhoud, Evaluating the performance of symmetric encryption
algorithms, Int. J. Network Secur. 10(3) (2010) 216–222.
[6] N. Gura, A. Patel, A. Wander, H. Eberle and S.C. Shantz, Comparing elliptic curve cryptography and RSA on
8-bit CPUs, M. Joye and J.J. Quisquater (eds), Cryptographic Hardware and Embedded Systems - CHES 2004,
3156 (2004) 119–132.
[7] A. Khalique, K. Singh and S. Sood, A password-authenticated key agreement scheme based on ECC using smart
cards, Int. J. Comput. Appl. 2(3) (2010) 26–30.
[8] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud Based IoT Smart Healthcare System for Remote Patient Monitoring, EAI Endorsed Transactions on Pervasive Health and Technology, 2021.
[9] P. Mell and T. Grance, The NIST Definition of Cloud Computing, Computer Security Division, Inf. Tech. Lab.
Nat. Inst. Stand. Tech. 800(145) (2011).
[10] J. Owens and J. Matthews, A study of passwords and methods used in brute-force SSH attacks, USENIX Workshop
on Large Scale Exploits and Emergent Threats (LEET), 2008.
[11] R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems,
Commun. ACM Magazine 21(2) (1978) 120–126.
[12] S.P. Singh and R. Maini, Comparison of data encryption algorithms, Int. J. Comput. Sci. Commun. 2(1) (2011)
125–127.
[13] M. Strebe, Network Security Foundations: Technology Fundamentals for IT Success, Wiley, 2004.
Volume 13, Issue 1
March 2022
Pages 765-771
  • Receive Date: 12 August 2021
  • Revise Date: 16 September 2021
  • Accept Date: 28 September 2021