Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques


Authors: Sapna Kumari C., Asha C. N., Rajashekhar U., K. Viswanath

Abstract: At present, due to the various hacking approaches, the protection for any data transmitted through any channel or mode is one of the important issues. Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers. Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including AES use a larger size of key simultaneously and there exists security problems due to hacking approaches. To illustrate the protection level and hacking problems, a new ECC is presented as well as by employing scalar duplication, the synchronous key is generated and consists of point doubling and point addition. The created focuses are encrypted before transmission by using ECC-Elgamal-Holomorphic (ECCEH) and transferred through a distant channel and encipher data is failed at the receiver using ECCEH which includes the reverse process. The unique standards of cryptography context have been generated by MATLAB; the defined framework has endeavored to the extent that speed, delay as well as control, and many others are accepted in MATLAB 2017a. The user of the sender, the original information is transformed into integer value by employing Holomorphic and encodes it by utilizing the Elgamal ECC algorithm which employs point doubling and point addition. The encoded information is uploaded into the cloud for storage, here www.thingspeak.com is utilized for storage. When the user presents at the receiver request the cloud to access from it, initially the cloud server authenticates the access control strategies of the requester, and then access is provided by the cloud server. If the user authenticates the strategies, then encoded data can download and the original data is decoded by synchronous key employing ECC- Elgamal algorithm. Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods and found to be 12%, 31%, 24%, and 8% progress concerned with packet delivery ratio, latency, outturn and execution time.

Pages: 46-63

DOI: 10.46300/91011.2022.16.7

International Journal of Biology and Biomedical Engineering, E-ISSN: 1998-4510, Volume 16, 2022, Art. #7

PDF DOI XML

Certification