Skip to main content

AESRSA: A New Cryptography Key for Electronic Health Record Security

  • Conference paper
  • First Online:
Applied Informatics (ICAI 2022)

Abstract

When compared to old paper record systems, privacy concerns are likely the most significant impediment to the adoption of electronic health record (EHR) systems, which are regarded as more efficient, less error-prone, and more available. Patients will not accept the EHR system unless the security of the healthcare information system (HIS) is ensured, and the exposure of sensitive data, which is difficult to achieve without the patients’ consent, is damaging to patient care. This study proposes AESRSA cryptography key for EHR data security, and the proposed cryptography technique is based on two efficient existing cryptography keys Advance Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) which are private and public cryptography keys respectively. The new system was implemented alongside the existing techniques (AES and RSA) using XAMPP, Apache Web server, MySQL database, PHP programming language, Hypertext markup language (HTML), and Javascript for EHR data. The three cryptography keys were evaluated using computing time, computing memory, processor consumption, and power consumption. The results show that hybridizing cryptography keys (public and private cryptography keys) is possible and improves the security of EHR data. Although the results of both encryption and decryption of the proposed cryptography key were slightly increased than the two existing cryptography keys but guaranteed improved security of EHR on the system prototype that was implemented, which was transmitted securely between the local server and the web server This was discovered to be a safe healthcare record system on the web that addressed user concerns about security and ensured the confidentiality, security, and privacy of patients’ health records.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D.: An efficient lightweight cryptographic algorithm for IoT security. In: ICTA 2020. CCIS, vol. 1350, pp. 444–456. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69143-1_34

    Chapter  Google Scholar 

  2. AbdulRaheem, M., et al.: An enhanced lightweight speck system for cloud-based smart healthcare. In: Florez, H., Pollo-Cattaneo, M.F. (eds.) ICAI 2021. CCIS, vol. 1455, pp. 363–376. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89654-6_26

    Chapter  Google Scholar 

  3. Agarwal, A., Saraswat, R.: A survey of group signature technique, its applications and attacks. Int. J. Eng. Innovative Technol. (IJEIT) 2(10), 28–35 (2013)

    Google Scholar 

  4. Ajagbe, S., Adesina, A., Odule, T., Aiyeniko, O.: Evaluation of computing resources consumption of selected symmetric-key algorithms. J. Comput. Sci. Appl. 26(2), 64–76 (2019)

    Google Scholar 

  5. Ajagbe, S.A., Adesina, A.O.: Design and development of an access control based electronic medical record (EMR). Centrepoint J. 2020008, 26108 (2020)

    Google Scholar 

  6. Ajagbe, S.A., Adesina, A., Oladosu, J.: Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (emr) on web application. Int. J. Scientific Eng. Res. (IJSER) 10(5), 848–871 (2019)

    Google Scholar 

  7. Akinyele, J.A., Pagano, M.W., Green, M.D., Lehmann, C.U., Peterson, Z.N., Rubin, A.D.: Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–86 (2011)

    Google Scholar 

  8. Awotunde, J., Ameen, A., Oladipo, I., Tomori, A., Abdulraheem, M.: Evaluation of four encryption algorithms for viability, reliability and performance estimation. Niger. J. Technol. Dev. 13(2), 74–82 (2016)

    Article  Google Scholar 

  9. Awotunde, J.B., et al.: An improved machine learnings diagnosis technique for COVID-19 pandemic using chest x-ray images. In: Florez, H., Pollo-Cattaneo, M.F. (eds.) ICAI 2021. CCIS, vol. 1455, pp. 319–330. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89654-6_23

    Chapter  Google Scholar 

  10. Fitri, N.A., Al Rasyid, M.U.H., Sudarsono, A.: Medical health record protection using ciphertext-policy attribute-based encryption and elliptic curve digital signature algorithm. EMITTER Int. J. Eng. Technol. 7(1), 151–175 (2019)

    Google Scholar 

  11. Fonseca-Herrera, O.A., Rojas, A.E., Florez, H.: A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci 48(2), 213–222 (2021)

    Google Scholar 

  12. Hernandez, J., Daza, K., Florez, H., Misra, S.: Dynamic interface and access model by dead token for IoT systems. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 485–498. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32475-9_35

    Chapter  Google Scholar 

  13. Higgins, D., Madai, V.I.: From bit to bedside: a practical framework for artificial intelligence product development in healthcare. Adv. Intell. Syst. 2(10), 2000052 (2020)

    Article  Google Scholar 

  14. Naser, S.: Cryptography: from the ancient history to now, it’s applications and a new complete numerical model. Int. J. Math. Stat. Stud. 9(3), 11–30 (2021)

    MathSciNet  Google Scholar 

  15. Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 80(21), 31705–31727 (2021)

    Article  Google Scholar 

  16. Ogunseye, E.O., Adenusi, C.A., Nwanakwaugwu, A.C., Ajagbe, S.A., Akinola, S.O.: Predictive analysis of mental health conditions using AdaBoost algorithm. ParadigmPlus 3(2), 11–26 (2022)

    Article  Google Scholar 

  17. Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H.: A secured private-cloud computing system. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 373–384. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32475-9_27

    Chapter  Google Scholar 

  18. Omotosho, A., Emuoyibofarhe, J., Meinel, C.: Ensuring patients’ privacy in a cryptographic-based-electronic health records using bio-cryptography. Int. J. Electron. Healthc. 9(4), 227–254 (2017)

    Article  Google Scholar 

  19. Onwutalobi, A.C.: Overview of cryptography. SSRN Electron. J. 1–9 (2011). https://doi.org/10.2139/ssrn.2741776

  20. Parmar, N.J., Verma, P.K.: A comparative evaluation of algorithms in the implementation of an ultra-secure router-to-router key exchange system. Secur. Commun. Netw. 2017, 1–14 (2017). https://doi.org/10.1155/2017/1467614

    Article  Google Scholar 

  21. Rabelo, L., Ballestas, A., Valdez, J., Ibrahim, B.: Using delphi and system dynamics to study the cybersecurity of the IoT-based smart grids. ParadigmPlus 3(1), 19–36 (2022)

    Article  Google Scholar 

  22. Sinha, S., Singh, A., Gupta, R., Singh, S.: Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput. Sci. 132, 557–562 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunday Adeola Ajagbe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ajagbe, S.A., Florez, H., Awotunde, J.B. (2022). AESRSA: A New Cryptography Key for Electronic Health Record Security. In: Florez, H., Gomez, H. (eds) Applied Informatics. ICAI 2022. Communications in Computer and Information Science, vol 1643. Springer, Cham. https://doi.org/10.1007/978-3-031-19647-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19647-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19646-1

  • Online ISBN: 978-3-031-19647-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics