E-wasteIn response to rising cybersecurity challenges, this research proposes the deployment of an e-healthcare system that maintains confidentiality of the patient\'s medical records. Integration of modern cryptographic DNA with complex encryption methods forms a strong two-tiered security system. This system acts as a robust shield for medical data by preventing unauthorized access to and subsequent breaches of sensitive patient information. With data privacy, confidentiality, and integrity at the forefront, healthcare systems are assured that patients\' sensitive information is kept confidential. Such a reliable solution rests in robust security approaches of KED and DNA cryptography, which eradicate access to Patients Health Information (PHI) in a secure e-healthcare System.
Introduction
The health sector’s technological revolution brings challenges in protecting private patient data. Traditional paper records and basic computer systems are outdated and vulnerable to cyberattacks, while even modern electronic health records suffer security weaknesses that allow unauthorized access.
To address this, the authors developed a secure e-health system using advanced cryptographic techniques, including DNA cryptography and dynamic encryption methods based on modulo arithmetic. These innovations enable efficient and secure storage and transfer of sensitive patient information while ensuring privacy and preventing unauthorized access.
The literature review highlights the progression from traditional symmetric/asymmetric encryption to hybrid approaches combining modulo arithmetic, AES encryption, and DNA cryptography for enhanced security and performance. Notably, the KED algorithm with modulo 92 arithmetic improves protection and processing efficiency in e-health data encryption.
The proposed system uses KED with modulo 92 to encrypt patient health information, balancing strong security with high processing speed suitable for resource-limited healthcare environments. The methodology involves collecting patient data, preprocessing it, encrypting it with KED modulo 92, securely transmitting it between medical servers and authorized users, decrypting using shared keys, and validating data integrity to prevent tampering.
Screenshots demonstrate the system interface for patient and doctor login, file uploads, key entry for KED and DNA cryptography, and encrypted data storage in an SQLite database.
Conclusion
The proposed e-healthcare system seeks to mitigate the challenge of protecting Patient Health Information (PHI) by combining the KED, DNA cryptosystem, alongside the arithmetic of modulo 92. Information Technology is able to minimize risks such as unlawful access and breaches of cyber security, while still maintaining the security, integrity, and authenticity of the data. The system integrates an SQLite database, which permits real-time interaction and decision-making between patients and medical practitioners. It also facilitates smooth seamless interaction between patients and medical practitioners. The system improves user experience and overall effectiveness by minimizing human error and maintains confidentiality. Furthermore, the system will be improved by expanding multi-factor authentication, enhancing scalability, and optimizing the performance of encryption. Its highly adaptable architecture offers strong security and compliance which is suitable for different healthcare environments ranging from small clinics to large institutions.
References
[1] J. Warjri and E. George Dharma Prakash Raj, \"KED-A Symmetric Key Algorithm forSecured Information Exchange Using Modulo 69,\" I.J. Computer Network and Information Security, Vol. 10, pp. 37-43, 2013.
[2] Q. Zhang and A. Qunding, \"Digital Image Encryption Based on Advanced Encryption Standard (AES) Algorithm,\" 5th Int. Conf. Instrum. Meas. Comput. Commun. Control, pp.1218–1221, 2015.
[3] Edwin R. Arboleda, Carla Eunice R. Fenomeno, and Joshua Z. Jimenez, \"KEDAES Algorithm: Combined Key Encryption Decryption and Advanced Encryption Standard Algorithm,\" IJAAS, Vol. 8, No. 1, March 2019.
[4] Jie Cui, Liusheng Huang, and Chinchen Chang, \"An Improved AES S-box and its Performance Analysis,\" International Journal of Innovative Computing, Information and Control,May,2011.
[5] G. Jaswanth Varma et al., \"Data Security Based on DNA Cryptography Using SBox Encryption,\" International Journal of Pure and Applied Mathematics, Vol. 115, No. 7, 2017, pp. 429-434.
[6] O. A. Dawood, A. M. S. Rahma, and A. M. J. Abdul Hossen, \"New Symmetric Cipher Fast Algorithm of Reversible Operations’ Queen (FAROQ) Cipher,\" International Journal of Computer Networks and Information Security (IJCNIS), Vol. 9, No. 4, pp. 29–36, 2017.
[7] S.Oukili and S. Bri, \"High Throughput FPGA Implementation of Data Encryption Standard with Time-Variable Subkeys,\" International Journal of Electrical and Computer Engineering (IJECE), Vol. 6, No. 1, p. 298, 2016.