Abstract
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extensive potential application, but at the same time there is a threat of hacking the data. Here we implement the concept for sharing of electronic health record on cloud that permits multiple members of the group to easily share the group data. With the increase in size of healthcare data the time and space complexity increases. The main challenge here is data security. This research article emphasis on a secured method for sharing the data on cloud and generation of the key that is safe from unauthorized user. In this Research article, we implement the soft computing approach for key agreement protocol using Block based design to support several users that can adapt it-self to upsurge the number of users in the cloud which depends on the assembly of the block design. This protocol generates a common conference key for all members. On comparing our results with some prevailing techniques, we accomplish that the results of our research have a better computational complexity.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Not applicable.
Code availability
Not applicable.
References
Agarwal P (2021) A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation. Turk J Comput Math Educ 12(3):5164–5175. https://doi.org/10.17762/turcomat.v12i3.2144
Alenoghena CO, Onumanyi AJ, Ohize HO, Adejo AO, Oligbi M, Ali SI, Okoh SA (2022) eHealth: a survey of architectures, developments in mHealth, security concerns and solutions. Int J Environ Res Public Health 19:13071. https://doi.org/10.3390/ijerph192013071
Alzahrani AGM, Alenezi A, Mershed A, Atlam H, Mousa F, Wills G (2020) A framework for data sharing between healthcare providers using blockchain. https://doi.org/10.5220/0009413403490358
Awad Abdellatif A, Al-Marridi AZ, Mohamed A, Erbad A, Fabiana Chiasserini C, Refaey A (2020) SSHealth: toward secure, blockchain-enabled healthcare systems. arXiv e-prints, arXiv:2006. https://doi.org/10.1109/MNET.011.1900553.
Choudhury B, Jha R (2016) Soft computing techniques. Soft computing in electromagnetics: methods and applications. Cambridge University Press, Cambridge, pp 9–44
Chung I, Bae Y (2004) The design of an efficient load balancing algorithm employing block design. J Appl Math Comput 14(1):343–351. https://doi.org/10.1007/BF02936119
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654. https://doi.org/10.1109/TIT.1976.1055638
Fang L, Yin C, Zhu J, Ge C, Tanveer M, Jolfaei A, Cao Z (2020) Privacy protection for medical data sharing in smart healthcare. ACM Trans Multimed Comput Commun Appl (TOMM) 16:1–18. https://doi.org/10.1145/3408322
Golle P et al (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pp 85–90. https://doi.org/10.1145/1655008.1655020
Karimian N, Guo Z, Tehranipoor M, Forte D (2016) Highly reliable key generation from electrocardiogram (ECG). IEEE Trans Biomed Eng 64(6):1400–1411. https://doi.org/10.1109/TBME.2016.2607020
kumar C, Srilatha D (2018) Cloudlet-based privacy preserving for securing medical data In Cloud by using homomorpic encryption technics. Int Sci Eng Res 9(12) ISSN 2229-5518
Lee O, Yoo S, Park B, Chung I (2006) The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. Inf Sci 176(15):2148–2160. https://doi.org/10.1016/j.ins.2005.09.004
Liu X et al (2015) A secure and efficient data sharing framework with delegated capabilities in hybrid cloud. IEEE Trans Inf Forens Sec 10(11):2381–2395. https://doi.org/10.1109/SocialSec2015.13
Liu X, Xia Y, Xiang Y, Hassan MM, Alelaiwi A (2015) A secure and efficient data sharing framework with delegated capabilities in hybrid cloud. In 2015 International symposium on security and privacy in social networks and big data (SocialSec), IEEE, pp 7–14. https://doi.org/10.1109/SocialSec2015.13
Luo W, Ma W (2019) Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage. Electronics 8(5):590. https://doi.org/10.3390/electronics8050590
Mahmoud AS, Mahmood NM (2021) A secure biomedical data sharing framework based on mCloud. Int J Nonlinear Anal Appl 12(2):1659–1671. https://doi.org/10.22075/IJNAA.2021.5295
Maruthi Kumar D, Sai Akhila N, Sarala P, Pavan Kumar A, Vijay Kumar B, Department of ECE SRI, Anantapur A (2021) Secure medical data transmission model for healthcare systems. Adv Trends Comput Sci Inf Technol 51
Miao Y, Liu X, Choo KKR, Deng RH, Wu H, Li H (2019) Fair and dynamic data sharing framework in cloud-assisted internet of everything. IEEE Internet Things J 6(4):7201–7212. https://doi.org/10.1109/JIOT.2019.2915123
Rajput AR, Li Q, Ahvanooey MT (2021) A blockchain-based secret-data sharing framework for personal health records in emergency condition. Healthcare. Multidisciplinary Digital Publishing Institute, p 206
Rampal Singh SK, Agrahari SK (2012) Ensuring data storage security in cloud computing. IOSR J Eng 2(12):17–21. https://doi.org/10.1109/IWQoS.2009.5201385
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on computer and communications security, pp 199–212. https://doi.org/10.1145/1653662.1653687
Satar SDM, Hussin M, Hanapi ZM, Mohamed MA (2021) Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme. Int J Adv Comput Sci Appl 12:393–399. https://doi.org/10.34218/IJARET.11.12.2020.106
Sendhil R, Amuthan A (2021) Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications. Int J Inf Technol 13(4):1545–1553. https://doi.org/10.1007/s41870-021-00704-z
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Sec Comput 16(6):996–1010. https://doi.org/10.1109/TDSC.2017.2725953
Shen B, Guo J, Yang Y (2019a) MedChain: efficient healthcare data sharing via blockchain. Appl Sci 9(6):1207. https://doi.org/10.3390/app9061207
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2019b) Block design-based key agreement for group data sharing in cloud computing. IEEE Transon Depend Secure Comput 16(6):996–1010. https://doi.org/10.1109/TDSC.2017.2725953
Thabit F, Alhomdy S, Jagtap S (2021) A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw 2:18–33
Yi X (2004) Identity-based fault-tolerant conference key agreement. IEEE Trans Depend Sec Comput 1(3):170–178. https://doi.org/10.1109/TDSC.2004.31
Yuliana M, Wirawan, Suwadi (2019) A simple secret key generation by using a combination of pre-processing method with a multilevel quantization. Entropy 21(2):192. https://doi.org/10.3390/e21020192
Zyskind G, Nathan O, Pentland A (2015) Enigma: decentralized computation platform with guaranteed privacy. p 114, arXiv:1506.03471 [cs], https://doi.org/10.48550/arXiv.1506.03471
Funding
No fund received for this project.
Author information
Authors and Affiliations
Contributions
All authors are approved for this work.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval and human participation
No ethics approval is required.
Consent to participate
Not applicable.
Consent for publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hombal, U., Rangapura Basavaraju, D. & Shinde, A.S. Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud. Soft Comput 28, 13701–13713 (2024). https://doi.org/10.1007/s00500-024-09749-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-024-09749-1