ENHANCING DATA SECURITY IN E- HEALTH CLOUD USING ATTRIBUTE- BASED ENCRYPTION, AES & STEGANOGRAPHY
DOI:
https://doi.org/10.61841/0zfa4z96Keywords:
E-health, security, AES, ABE, SteganographyAbstract
In recent years, the growth in cloud computing has resulted in its application in multiple fields; one of them is E-Health Cloud. E-Health Cloud is the storage of the patient records in the cloud. The cost of services in health care is skyrocketing and professionals are to find, so the organizations have started adopting IT systems which helps them automate and streamline the process in a very cost-effective method. As the utilization diversifies, the amount of the data stored in the E cloud rapidly increases. Since the type of data in E-Health Cloud is sensitive, the privacy of data becomes a critical concern. This study explores the application of modern encryption techniques (AES and ABE) with steganography to study the storage, sharing and administration of medical data. Further, this paper will be used as a foundation to study techniques such as 3DES to compare with other encryptions and understand the advantages and limitations of each.
Downloads
References
1. Information Security In Healthcare Center Using Cryptography and Steganography, BABATUNDE, TAIWO, DADA
2. Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record, HUAQUN WANG
3. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, Xiaodong Lin
4. An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E LSB Encoding Technique Mohammad Obaidur Rahman†, Muhammad Kamal Hossen†*, Md. Golam Morsad†, Animesh Chandra Roy†, and Md. Shahnur Azad Chowdhury††.
5. A Performance Comparison of Data Encryption Algorithms. Aamer Nadeem, Dr. M. Younus Javed.
6. Cloud-Based E-Health Systems: Security and Privacy Challenges and Solutions, Mohanad Dawoud, D.Turgay Altilar
7. Cloud computing-enabled healthcare opportunities, issues, and applications: T A systematic review, Omar Alia, Anup Shresthaa, Jeffrey Soara, Samuel Fosso Wambab
8. Design and Implementation of Security in Healthcare Cloud Computing Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala, and Joseph Chuma
9. Time-Lapse Cryptography, Michael O. Rabin, Christopher Thorpe
10. Data Security and Authentication Using Steganography. Ravi Kumar, Murti
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.