Medical Data Privacy Using Dynamic Rank-Based Ellipsoidal Curve Cryptosystem

Arshad Amir*
Arshad Amir, University of Sulaimani, Iraq.
Periodicity:April - June'2021
DOI : https://doi.org/10.26634/jse.15.4.18431

Abstract

Hierarchical and Dynamic Elliptic Curve Cryptosystem (HiDE) is a self-certified public key method used in the security of medical data. HiDE offers a hierarchical cluster-based system consisting of a Backbone Cluster and numerous Area Clusters to support a high number of sensors. A Secure Access Point (SAP) in an Area Cluster receives medical data from Secure Sensors (SSs) in the sensor network and sends it to a Root SAP in the Backbone Cluster. As a result, the Root SAP may service a large number of SSs without having to create separate secure connections with each one. HiDE provides the Elliptic Curve Cryptosystem based Self-certified Public key scheme (ESP) for creating secure sessions between each pair of Cluster Head (CH) and Cluster Member (CM) to enable dynamic secure sessions for mobile SSs joining SAP (CM). Without knowing the CM's secret key, the CH may issue a public key to a CM and calculate a Shared Session Key (SSK) with that CM in ESP. This approach meets the Zero Knowledge Proof, allowing CHs to construct secure sessions with CMs without having to manage the CM's secret keys. According to our research in realistic implementations and network simulations, ESP requires fewer computational and network resources than the Rivest-Shamir-Adleman (RSA) based public key method. Furthermore, security research reveals that the keys in ESP are properly safeguarded. HiDE can therefore maintain sufficient network performance for wireless sensor networks while protecting the confidentiality of critical medical data with minimum processing cost.

Keywords

HiDE, RSA, ECC, SAP, Cryptosystem, ESP.

How to Cite this Article?

Amir, A. (2021). Medical Data Privacy Using Dynamic Rank-Based Ellipsoidal Curve Cryptosystem. i-manager's Journal on Software Engineering, 15(4), 33-42. https://doi.org/10.26634/jse.15.4.18431

References

[1]. Bouassida, M. S., Chrisment, I., & Festor, O. (2008). Group Key Management in MANETs. International Journal of. Network Security, 6(1), 67-79.
[6]. Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. International Journal of Network Security, 12(2), 75-83.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.