Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption
Annotation
The primary idea of this paper is the implementation of the Optimal Key-Tuned Rivest Shamir Adelman technique, a dual authentication approach for effective data sharing in the cloud within hospital data management. The system begins with user registration with the Trusted Center where user details are provided. An authentication scheme utilizing the Caesar cipher and the Secure Hashing Algorithm 512 ensures integrity. The encryption process employs the Optimal Key-Tuned Rivest Shamir Adelman scheme for secure file transmission. To enhance key creation procedures in the Rivest Shamir Adelman model, the Improved Butterfly Optimization Algorithm technique is utilized to maximize throughput. Finally, dual authentication is conducted on the receiver side for file access and downloads from the cloud server. This additional layer of authentication fortifies the system resilience against unauthorized access, ensuring that only legitimate users can interact with the healthcare data stored in the cloud. The results indicate that the system outperforms other state-of-the-art systems enabling secure sharing and downloading of health data in cloud environments.
Keywords
Постоянный URL
Articles in current issue
- Optical properties of the interface between indium tin oxides thin films and laser-deposited single-walled carbon nanotubes
- The xanthene fluorescent dyes usage for the microplastics in soil detection and for phytotests
- Investigation of the effect of the applied voltage to the control electrodes of a lithium niobate phase modulator on the intensity distribution at the ends of channel waveguides and on parasitic amplitude modulation
- Assessment of the quantitative composition of hydrate formation inhibitors by their infrared spectra
- Magneto optical properties of atmospheric air molecules
- Femtosecond laser modification of the ZnO:Ag sol-gel films within dichroism emergence
- Insights from Keldysh theory to plasma electron density in liquid water under excitation wavelength scaling
- Luminescent and colorimetric properties of silica-coated spherical cadmium telluride nanocrystals in an external electric field
- The sliding-mode observer for PMSM field-oriented sensorless control with adaptive filter and PLL
- Improving the algorithm for processing data from multisensor system in tasks of determining quality parameters in vegetable oils
- Lithium tetraborate co-doping with transition and alkali metals
- Analysis of chemical interactions during filling a cesium vapor cell for a quantum magnetometer
- Polymer-salt synthesis and study on structure of vanadium-doped yttrium-aluminum garnet
- Elimination of distortions of weak images of astronomical objects on the example of Saturn, Jupiter and their satellites
- Method for generating information sequence segments using the quality functional of processing models
- Smartphone video motion deblur order model
- An approach to detecting L0-optimized attacks on image processing neural networks via means of mathematical statistics
- On the influence of a concentrated inclusion on the spectrum of natural vibrations of a string and Bernoulli-Euler beam
- Restoration of unsteady heat flow from a thermal energy accumulator by solving the inverse heat conduction problem
- Management of space surveillance radar temporal resource on fuzzy set theory
- Quantification and modeling of ankle biomechanical characteristics