Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach | Multimedia Tools and Applications Skip to main content

Advertisement

Log in

Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an inaccurate diagnosis, which could result in severe medical issues and death. The transition from paper to electronic health records (EHRs) has considerably improved patient care quality and efficiency. However, for many healthcare service providers, it has extended the attack surface. Because of the value of a patient’s medical information, this has posed a threat to both patients and healthcare providers. When security is not taken into account in healthcare systems, patients’ privacy is jeopardized. The intended solution to this challenge is to create a modified AES algorithm to secure patient medical information. Although, the AES algorithm is secure, however, there is always a need for improvement on any cryptographic algorithms in terms of computational cost. This study implements AES and modified the last round of the AES and their performance has been measured by scrambling input datasets of various contents and volumes. The experimental results show that modified AES outperforms AES algorithms in terms of Encryption time while AES outperform modified AES in terms of decryption time. Also, the Avalanche effect results revealed that modified AES has a higher avalanche effect for small-size files while a smaller avalanche effect for larger file sizes. This signifies that modified AES security is stronger for a small size file while conventional AES has higher security for larger file sizes. The average encryption time of the AES algorithm for text files is 1513.3ms while the modified AES average encryption time gives 1293.837ms. The average decryption time for conventional AES is 1289.627ms while the average decryption time for modified AES give 1400.136ms. Modified AES uses lesser time complexity during the encryption of all categories of data files while conventional AES uses lesser time complexity during the decryption of all categories of data files.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Algorithm 1.1:
Algorithm 1.2:
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Data sharing does not apply to this article. The study did not consult any database or repository to obtain data.

References

  1. Adeniyi EA, Falola PB, Maashi MS, Aljebreen M, Bharany S (2022) Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions. Information 13(10):442

    Article  Google Scholar 

  2. Adeniyi AE, Misra S, Daniel E, Bokolo A Jr (2022) Computational complexity of modified blowfish cryptographic algorithm on video data. Algorithms 15(10):373

    Article  Google Scholar 

  3. Akande NO, Abikoye CO, Adebiyi MO, Kayode AA, Adegun AA, Ogundokun RO (2019) Electronic medical information encryption using the modified blowfish algorithm. In: International conference on computational science and its applications . Springer, Cham, pp 166–179

  4. Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: a new robust lightweight scheme for mutual user authentication in healthcare applications. Security and Communication Networks, 2019

  5. Algarni A (2019) A survey and classification of security and privacy research in smart healthcare systems. IEEE Access

  6. Alzakholi O, Shukur H, Zebari R, Abas S, Sadeeq M (2020) Comparison among cloud technologies and cloud performance. J Appl Sci Technol Trends 1(2):40–47

    Article  Google Scholar 

  7. Anshari M (2019) Redefining electronic health records (EHR) and electronic medical records (EMR) to promote patient empowerment. IJID (International Journal on Informatics for Development) 8(1):35–39

    Article  Google Scholar 

  8. Bessani A, Correia M, Quaresma B, André F, Sousa P (2013) DepSky: dependable and secure storage in a cloud of clouds. Acm Trans storage (tos) 9(4):1–33

    Article  Google Scholar 

  9. Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Society 39:499–507

    Article  Google Scholar 

  10. Cobb MD, Macoubrie J (2020) Public perceptions about nanotechnology: risks, benefits, and trust. In: Emerging technologies: ethics, law, and governance. Routledge, pp 197–207

  11. Devi A, Ramya BS (2017) Two fish algorithm implementation for the lab to provide data security with predictive analysis. Int Res J Eng Technol 4(5):3033–3036

    Google Scholar 

  12. Emmanuel AA, Okeyinka AE, Adebiyi MO, Asani EO (2021) A note on time and space complexity of rSA and ElGamal cryptographic algorithms. Int J Adv Comput Sci Appl 12(7)

  13. Ilayaraja M, Shankar K, Devika G (2017) A modified symmetric key cryptography method for secure data transmission. Int J Pure Appl Math 116(10):301–308

    Google Scholar 

  14. James M, Kumar DS (2016) Implementation of modified lightweight advanced encryption standard in FPGA. Procedia Technol 25:582–589

    Article  Google Scholar 

  15. Joel MR, Ebenezer V, Navaneethakrishnan M, Karthik N (2020) Encrypting and decrypting different files over different algorithms on cloud platform. Int J Emerg Trends Eng Res 8(10.30534)

  16. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8(4):1–35

    Article  Google Scholar 

  17. Le DN, Seth B, Dalal S (2018) A hybrid approach of secret sharing with fragmentation and encryption in a cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Secur Mobil 7(4):379–408

    Article  Google Scholar 

  18. Legárd I (2020) Building an effective information security awareness program. Cent East Eur eDem eGov Days 338, 189–200

  19. Li H, Friggstad Z (2005) An efficient architecture for the AES mix columns operation. In: 2005 IEEE international symposium on circuits and systems. IEEE, pp 4637–4640

  20. McGhin T, Choo KKR, Liu CZ, He D (2019) Blockchain in healthcare applications: research challenges and opportunities. J Netw Comput Appl 135:62–75

    Article  Google Scholar 

  21. Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of internet of things based on cryptographic algorithms: a survey. Wirel Netw 27(2):1515–1555

    Article  Google Scholar 

  22. Pimpale P, Rayarikar R, Upadhyay S (2011) Modifications to aes algorithm for complex encryption. IJCSNS Int J Comput Sci Netw Secur 11(10):183

    Google Scholar 

  23. Purnama B, Rohayani AH (2015) A new modified caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Procedia Comput Sci 59:195–204

    Article  Google Scholar 

  24. Quilala TFG, Quilala RL (2021) Modified Blowfish algorithm analysis using derivation cases. Bull Electr Eng Inf 10(4):2192–2200

    Google Scholar 

  25. Rothman DJ (2017) Strangers at the bedside: a history of how law and bioethics transformed medical decision making. Routledge

  26. Samonas S, Coss D (2014) The CIA strikes back: redefining confidentiality, integrity, and availability in security. J Inform Syst Secur 10(3)

  27. Schmidt M, Schmidt SAJ, Adelborg K, Sundbøll J, Laugesen K, Ehrenstein V, Sørensen HT (2019) The danish health care system and epidemiological research: from health care contacts to database records. Clin Epidemiol 11:563

    Article  Google Scholar 

  28. Smirnoff P, Turner DM (2019) Symmetric key encryption-why, where, and how it’s used in banking. Retrieved November 20, 2019

  29. Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In: IOP conference series: materials science and engineering, vol 518, No 5. IOP Publishing, pp 052003

  30. Usman M, Qamar U (2020) Secure electronic medical records storage and sharing using blockchain technology. Procedia Comput Sci 174:321–327

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. E. Adeniyi.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Adeniyi, A.E., Abiodun, K.M., Awotunde, J.B. et al. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimed Tools Appl 82, 20537–20551 (2023). https://doi.org/10.1007/s11042-023-14338-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14338-9

Keywords

Navigation