Abstract

Electronic health records contain the patient’s sensitive information. If these data are acquired by a malicious user, it will not only cause the pilferage of the patient’s personal data but also affect the diagnosis and treatment. One of the most challenging tasks in cloud-based healthcare systems is to provide security and privacy to electronic health records. Various probabilistic data structures and watermarking techniques were used in the cloud-based healthcare systems to secure patient’s data. Most of the existing studies focus on cuckoo and bloom filters, without considering their throughputs. In this research, a novel cloud security mechanism is introduced, which supersedes the shortcomings of existing approaches. The proposed solution enhances security with methods such as fragile watermark, least significant bit replacement watermarking, class reliability factor, and Morton filters included in the formation of the security mechanism. A Morton filter is an approximate set membership data structure (ASMDS) that proves many improvements to other data structures, such as cuckoo, bloom, semi-sorting cuckoo, and rank and select quotient filters. The Morton filter improves security; it supports insertions, deletions, and lookups operations and improves their respective throughputs by 0.9× to 15.5×, 1.3× to 1.6×, and 1.3× to 2.5×, when compared to cuckoo filters. We used Hadoop version 0.20.3, and the platform was Red Hat Enterprise Linux 6; we executed five experiments, and the average of the results has been taken. The results of the simulation work show that our proposed security mechanism provides an effective solution for secure data storage in cloud-based healthcare systems, with a load factor of 0.9. Furthermore, to aid cloud security in healthcare systems, we presented the motivation, objectives, related works, major research gaps, and materials and methods; we, thus, presented and implemented a cloud security mechanism, in the form of an algorithm and a set of results and conclusions.

Highlights

  • The availability of medical records, in the digital form, has played a significant role during the first wave of COVID-19

  • Researchers and scientists criticized the cloud ecosystem [1] and services, due to the lack of digital forensic tools and technologies applied in the cloud computing environment

  • The present article focuses on the development of a mechanism, which is designed to point out the location of modified or altered artifacts, while moving from the cloud infrastructure to the forensic investigation team

Read more

Summary

Introduction

The availability of medical records, in the digital form, has played a significant role during the first wave of COVID-19. There is a possibility that digital artifacts may be tampered or modified while transferring from cloud infrastructure to the cloud forensic investigation team. The present article focuses on the development of a mechanism, which is designed to point out the location of modified or altered artifacts, while moving from the cloud infrastructure to the forensic investigation team. We represent a space-efficient scheme, which is designed to find out the position of modified digital artifacts. The principal advantage of this mechanism is that it can be comfortably integrated into various available forensic transmission schemes This designed mechanism is used to locate the position of tampered data in a hierarchical block. When the modified digital artifact is detected, the proposed algorithm can promptly locate it and reveal its position in the hierarchical block

Objectives
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call