Abstract
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an inaccurate diagnosis, which could result in severe medical issues and death. The transition from paper to electronic health records (EHRs) has considerably improved patient care quality and efficiency. However, for many healthcare service providers, it has extended the attack surface. Because of the value of a patient’s medical information, this has posed a threat to both patients and healthcare providers. When security is not taken into account in healthcare systems, patients’ privacy is jeopardized. The intended solution to this challenge is to create a modified AES algorithm to secure patient medical information. Although, the AES algorithm is secure, however, there is always a need for improvement on any cryptographic algorithms in terms of computational cost. This study implements AES and modified the last round of the AES and their performance has been measured by scrambling input datasets of various contents and volumes. The experimental results show that modified AES outperforms AES algorithms in terms of Encryption time while AES outperform modified AES in terms of decryption time. Also, the Avalanche effect results revealed that modified AES has a higher avalanche effect for small-size files while a smaller avalanche effect for larger file sizes. This signifies that modified AES security is stronger for a small size file while conventional AES has higher security for larger file sizes. The average encryption time of the AES algorithm for text files is 1513.3ms while the modified AES average encryption time gives 1293.837ms. The average decryption time for conventional AES is 1289.627ms while the average decryption time for modified AES give 1400.136ms. Modified AES uses lesser time complexity during the encryption of all categories of data files while conventional AES uses lesser time complexity during the decryption of all categories of data files.
Similar content being viewed by others
Data availability
Data sharing does not apply to this article. The study did not consult any database or repository to obtain data.
References
Adeniyi EA, Falola PB, Maashi MS, Aljebreen M, Bharany S (2022) Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions. Information 13(10):442
Adeniyi AE, Misra S, Daniel E, Bokolo A Jr (2022) Computational complexity of modified blowfish cryptographic algorithm on video data. Algorithms 15(10):373
Akande NO, Abikoye CO, Adebiyi MO, Kayode AA, Adegun AA, Ogundokun RO (2019) Electronic medical information encryption using the modified blowfish algorithm. In: International conference on computational science and its applications . Springer, Cham, pp 166–179
Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: a new robust lightweight scheme for mutual user authentication in healthcare applications. Security and Communication Networks, 2019
Algarni A (2019) A survey and classification of security and privacy research in smart healthcare systems. IEEE Access
Alzakholi O, Shukur H, Zebari R, Abas S, Sadeeq M (2020) Comparison among cloud technologies and cloud performance. J Appl Sci Technol Trends 1(2):40–47
Anshari M (2019) Redefining electronic health records (EHR) and electronic medical records (EMR) to promote patient empowerment. IJID (International Journal on Informatics for Development) 8(1):35–39
Bessani A, Correia M, Quaresma B, André F, Sousa P (2013) DepSky: dependable and secure storage in a cloud of clouds. Acm Trans storage (tos) 9(4):1–33
Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Society 39:499–507
Cobb MD, Macoubrie J (2020) Public perceptions about nanotechnology: risks, benefits, and trust. In: Emerging technologies: ethics, law, and governance. Routledge, pp 197–207
Devi A, Ramya BS (2017) Two fish algorithm implementation for the lab to provide data security with predictive analysis. Int Res J Eng Technol 4(5):3033–3036
Emmanuel AA, Okeyinka AE, Adebiyi MO, Asani EO (2021) A note on time and space complexity of rSA and ElGamal cryptographic algorithms. Int J Adv Comput Sci Appl 12(7)
Ilayaraja M, Shankar K, Devika G (2017) A modified symmetric key cryptography method for secure data transmission. Int J Pure Appl Math 116(10):301–308
James M, Kumar DS (2016) Implementation of modified lightweight advanced encryption standard in FPGA. Procedia Technol 25:582–589
Joel MR, Ebenezer V, Navaneethakrishnan M, Karthik N (2020) Encrypting and decrypting different files over different algorithms on cloud platform. Int J Emerg Trends Eng Res 8(10.30534)
Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8(4):1–35
Le DN, Seth B, Dalal S (2018) A hybrid approach of secret sharing with fragmentation and encryption in a cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Secur Mobil 7(4):379–408
Legárd I (2020) Building an effective information security awareness program. Cent East Eur eDem eGov Days 338, 189–200
Li H, Friggstad Z (2005) An efficient architecture for the AES mix columns operation. In: 2005 IEEE international symposium on circuits and systems. IEEE, pp 4637–4640
McGhin T, Choo KKR, Liu CZ, He D (2019) Blockchain in healthcare applications: research challenges and opportunities. J Netw Comput Appl 135:62–75
Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of internet of things based on cryptographic algorithms: a survey. Wirel Netw 27(2):1515–1555
Pimpale P, Rayarikar R, Upadhyay S (2011) Modifications to aes algorithm for complex encryption. IJCSNS Int J Comput Sci Netw Secur 11(10):183
Purnama B, Rohayani AH (2015) A new modified caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Procedia Comput Sci 59:195–204
Quilala TFG, Quilala RL (2021) Modified Blowfish algorithm analysis using derivation cases. Bull Electr Eng Inf 10(4):2192–2200
Rothman DJ (2017) Strangers at the bedside: a history of how law and bioethics transformed medical decision making. Routledge
Samonas S, Coss D (2014) The CIA strikes back: redefining confidentiality, integrity, and availability in security. J Inform Syst Secur 10(3)
Schmidt M, Schmidt SAJ, Adelborg K, Sundbøll J, Laugesen K, Ehrenstein V, Sørensen HT (2019) The danish health care system and epidemiological research: from health care contacts to database records. Clin Epidemiol 11:563
Smirnoff P, Turner DM (2019) Symmetric key encryption-why, where, and how it’s used in banking. Retrieved November 20, 2019
Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In: IOP conference series: materials science and engineering, vol 518, No 5. IOP Publishing, pp 052003
Usman M, Qamar U (2020) Secure electronic medical records storage and sharing using blockchain technology. Procedia Comput Sci 174:321–327
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding this manuscript.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Adeniyi, A.E., Abiodun, K.M., Awotunde, J.B. et al. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimed Tools Appl 82, 20537–20551 (2023). https://doi.org/10.1007/s11042-023-14338-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14338-9