| Home

Overview


Original Research

SECURITY ENABLED CLOUD-BASED ARCHITECTURE FOR HEALTH-INFORMATION SYSTEM

AGNIVESH KUMAR AGNIHOTRI 1, SHASHIKANT GUPTA 2, and BASANT TIWARI 3.

Vol 17, No 09 ( 2022 )   |  DOI: 10.5281/zenodo.7080841   |   Author Affiliation: Dept. of Computer Science & Applications, ITM University, Gwalior, India 1,3; Dept. of Computer Science, Hawassa University, Hawassa, Ethiopia 2.   |   Licensing: CC 4.0   |   Pg no: 634-648   |   To cite: AGNIVESH KUMAR AGNIHOTRI, et al., (2022). SECURITY ENABLED CLOUD-BASED ARCHITECTURE FOR HEALTH-INFORMATION SYSTEM. 17(09), 634–648. https://doi.org/10.5281/zenodo.7080841   |   Published on: 13-09-2022

Abstract

Electronic healthcare (E-healthcare) is a combination of hardware, software, process, infrastructure, people, and protocol that is developed for the management of healthcare data including collection, storage, analysis, decision making, and transmission. It supports functional management of a hospital as well as provides an infrastructure that supports policy decisions over healthcare data. E-healthcare has grown decade by decade starting from 1960 to the present era and is divided into four-generation versions namely V.1.0 to V.4.0. E-healthcare in generation V.4.0 is dedicated to smart medical technology with cloud and fog-based computing systems including disease-oriented sensing systems, IoT, artificial intelligence, high-speed internet, and advanced internet protocols. This paper proposed a security protocol over a cloud-based system using an integrated version of ECC called ECIES that provides security and privacy protections to pervasive healthcare with ensuring integrity and confidentiality. The proposed methodology is simulated using Network Simulator-2 and analyzed using different performance metrics like routing load (Overhead), packet delivery ratio, end-to-end delay, and throughput under the scenarios of cloud-only and secured cloud scenarios. Further, the Proposed work is analyzed against various security attacks like MiTM (Man in the Middle), Security against Selected Cipher Text Attacks, Unforgeability and Non-repudiation, etc. Obtained findings indicate that the proposed method has a greater security level and reduced response delay with higher throughput. Finally, the paper concludes the proposed work and highlights the recommendation and future works.


Keywords

HIS, IoT, cloud computing, healthcare, medical sensors, ECIES