Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data
Heliyon,
Journal Year:
2024,
Volume and Issue:
10(10), P. e31406 - e31406
Published: May 1, 2024
As
healthcare
systems
transition
into
an
era
dominated
by
quantum
technologies,
the
need
to
fortify
cybersecurity
measures
protect
sensitive
medical
data
becomes
increasingly
imperative.
This
paper
navigates
intricate
landscape
of
post-quantum
cryptographic
approaches
and
emerging
threats
specific
sector.
Delving
encryption
protocols
such
as
lattice-based,
code-based,
hash-based,
multivariate
polynomial
cryptography,
addresses
challenges
in
adoption
compatibility
within
systems.
The
exploration
potential
posed
attacks
vulnerabilities
existing
standards
underscores
urgency
a
change
basic
assumptions
security.
provides
detailed
roadmap
for
implementing
solutions,
considering
unique
faced
organizations,
including
integration
issues,
budget
constraints,
specialized
training.
Finally,
abstract
concludes
with
emphasis
on
importance
timely
strategies
ensure
resilience
face
evolving
threats.
not
only
offers
practical
insights
securing
but
also
serves
guide
future
directions
dynamic
cybersecurity.
Language: Английский
A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security
B. Ranganatha Rao,
No information about this author
B. Sujatha
No information about this author
Measurement Sensors,
Journal Year:
2023,
Volume and Issue:
29, P. 100870 - 100870
Published: July 17, 2023
Cloud
computing
provides
the
users
a
centralized
place
for
data
storage
and
other
commercial
applications.
To
guarantee
everything
is
secure,
cloud
security
has
to
handle
all
devices,
apps,
connected
cloud.
Because
of
cloud's
robust
security,
applications
may
be
accessed
by
relevant
people.
The
usage
public
ensures
that
customers
always
have
trustworthy
method
accessing
apps
data,
which
in
turn
enables
service
providers
resolve
any
potential
problems
as
soon
they
arise.
This
paper
presents
technique
using
Hybrid
Elliptic
Curve
Cryptography
(HECC).
proposed
approach
makes
keys
lightweight
Edwards
curve.
user's
Identity
Based
Encryption
used
change
generated
private
keys.
key
reduction
make
even
shorter,
speeds
up
Advanced
standard
(AES)
encryption
process.
are
exchanged
Diffie
Hellman
exchange.
Throughput
generation,
encryption,
decryption
times
evaluate
how
well
suggested
model
performs.
fared
better
than
current
models
every
way.
method's
creation
process
takes
0.000025
seconds,
while
resulting
0.00349
seconds.
achieved
throughput
693.10
KB/sec..
Language: Английский
PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud
John Kwao Dawson,
No information about this author
Frimpong Twum,
No information about this author
James Benjamin Hayfron Acquah
No information about this author
et al.
Security and Communication Networks,
Journal Year:
2023,
Volume and Issue:
2023, P. 1 - 17
Published: July 3, 2023
Industries
have
embraced
cloud
computing
for
their
daily
operations
due
to
the
volume
of
data
they
create.
As
generation
and
consumption
increased,
challenges
opportunities
also
increased.
Researchers
proposed
various
cryptographic
schemes
secure
on
cloud.
Regardless
multiple
proposed,
security
remains
an
obstacle
computing’s
widespread
adoption.
Also,
these
schemes’
run
times
are
proportional
sizes,
motivating
excessive
CPU
engagement
during
execution
huge
data,
which
has
consequences
need
high
bandwidth
transfer
This
systematic
review
tries
uncover
most
often
used
time
trends
attain
confidentiality
privacy
data.
The
study
considered
published
articles
from
well-known
databases
such
as
Taylor
&
Francis,
Scopus,
Research
Gate,
Web
Science,
IEEE
Xplore,
Science
Direct,
Hindawi,
Google
Scholar,
Sage,
Emerald,
Wiley
Online
Library,
ACM
2016
2022.
Preferred
Reporting
Items
Systematic
Reviews
Meta-Analyses
(PRISMA)
guidelines
were
select
73
works
this
using
keyword
searching.
Data
that
received
greatest
attention
in
with
encryption
techniques
common
solution.
From
study,
90%
produced
linear
times.
investigation
discovered
nonlinear
symmetric
stream
cipher
methods
infrequently
employed
protect
secrecy
Language: Английский
IABHE: Identity and Attribute-based Honey Encryption Algorithm and Deep Learning-based Key Generation for Securing Big Data in Hadoop Framework
Research Square (Research Square),
Journal Year:
2024,
Volume and Issue:
unknown
Published: March 29, 2024
Abstract
Nowadays,
Hadoop
is
considered
promising
to
store
and
reliably
process
big
data
in
the
cloud
computing
platform,
it
also
provides
low-cost
flexible
services
for
large
amounts
of
data.
However,
possibility
malicious
attacks
on
stored
or
processed
has
increased
due
absence
inherent
security
mechanisms
Hadoop.
In
this
approach,
an
Identity
Attribute-Based
Honey
Encryption
Algorithm
(IABHE)
developed
encryption
offer
framework.
Here,
system
model
initially.
Then,
acquired
input
applied
MapReduce
framework,
where
performed
by
IABHE,
which
incorporates
identity
attribute-based
with
honey
encryption.
Moreover,
a
deep
learning
model,
PyramidNet
utilized
generation
secret
keys
used
encrypted
obtained
mapper
phase
aggregated
performing
polynomial
interpolation
reducer
phase.
Finally,
securely
saved
cloud.
efficiency
IABHE
evaluated
utilizing
various
performance
metrics
attained
better
values
time
at
17.756sec,
decryption
8.767sec,
key
complexity
0.368.
Language: Английский
Blockchain Enabled Hadoop Distributed File System Framework for Secure and Reliable Traceability
ADCAIJ ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL,
Journal Year:
2023,
Volume and Issue:
12, P. e31478 - e31478
Published: Dec. 29, 2023
Hadoop
Distributed
File
System
(HDFS)
is
a
distributed
file
system
that
allows
large
amounts
of
data
to
be
stored
and
processed
across
multiple
servers
in
cluster.
HDFS
also
provides
high
throughput
for
access.
enables
the
management
vast
using
commodity
hardware.
However,
security
vulnerabilities
can
manipulated
malicious
purposes.
This
emphasizes
significance
establishing
strong
measures
facilitate
sharing
within
implementing
reliable
mechanism
verifying
legitimacy
shared
files.
The
objective
this
paper
enhance
by
utilizing
blockchain-based
technique.
proposed
model
uses
Hyperledger
Fabric
platform
at
enterprise
level
leverage
metadata
files,
thereby
dependable
traceability
HDFS.
analysis
results
indicates
incurs
slightly
higher
overhead
compared
requires
more
storage
space.
considered
an
acceptable
trade-off
improved
security.
Language: Английский
Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security
Shadan Mohammed Jihad Abdalwahid,
No information about this author
Wassan Adnan Hashim,
No information about this author
Mohammed Ganim Saeed
No information about this author
et al.
Published: April 22, 2024
Watermarking
and
Steganography
are
methods
of
embedding
digital
information
within
images
or
other
media,
such
as
text
audio,
for
the
purpose
Copyright
Protection
covert
communication.
This
field
study
is
not
recent
has
been
ongoing
several
years,
culminating
in
its
current
advanced
stage.
The
utilization
Artificial
Intelligence
algorithms
played
a
pivotal
role
revolutionizing
various
aspects,
including
security
concerns
precision
outcomes,
compared
to
traditional
methods.
paper
focuses
on
doing
an
in-depth
analysis
cutting-edge
research,
techniques,
methodologies
employed
domain
Steganography,
specifically
conjunction
with
Intelligence.
By
thoroughly
examining
evaluating
collection
studies
this
domain,
we
have
scrutinized
outcomes
each
respect
research
goal,
acquired
results,
algorithm,
research's
robustness
terms
susceptibility
forms
attacks
technique
data
embedding.
Our
findings
indicate
that
use
substantial
influence
enhancing
result
precision,
system
resilience,
establishing
ownership.
Deep
Neural
Networks
(DNN)
essential
due
their
robustness,
effectiveness,
accuracy.
Novel
systems
improve
security,
incorporation
rates,
detection,
speed
convergence.
learning
being
investigated
techniques
concealment,
hiding,
steganography
security.
Language: Английский