Abstract
When compared to old paper record systems, privacy concerns are likely the most significant impediment to the adoption of electronic health record (EHR) systems, which are regarded as more efficient, less error-prone, and more available. Patients will not accept the EHR system unless the security of the healthcare information system (HIS) is ensured, and the exposure of sensitive data, which is difficult to achieve without the patients’ consent, is damaging to patient care. This study proposes AESRSA cryptography key for EHR data security, and the proposed cryptography technique is based on two efficient existing cryptography keys Advance Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) which are private and public cryptography keys respectively. The new system was implemented alongside the existing techniques (AES and RSA) using XAMPP, Apache Web server, MySQL database, PHP programming language, Hypertext markup language (HTML), and Javascript for EHR data. The three cryptography keys were evaluated using computing time, computing memory, processor consumption, and power consumption. The results show that hybridizing cryptography keys (public and private cryptography keys) is possible and improves the security of EHR data. Although the results of both encryption and decryption of the proposed cryptography key were slightly increased than the two existing cryptography keys but guaranteed improved security of EHR on the system prototype that was implemented, which was transmitted securely between the local server and the web server This was discovered to be a safe healthcare record system on the web that addressed user concerns about security and ensured the confidentiality, security, and privacy of patients’ health records.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D.: An efficient lightweight cryptographic algorithm for IoT security. In: ICTA 2020. CCIS, vol. 1350, pp. 444–456. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69143-1_34
AbdulRaheem, M., et al.: An enhanced lightweight speck system for cloud-based smart healthcare. In: Florez, H., Pollo-Cattaneo, M.F. (eds.) ICAI 2021. CCIS, vol. 1455, pp. 363–376. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89654-6_26
Agarwal, A., Saraswat, R.: A survey of group signature technique, its applications and attacks. Int. J. Eng. Innovative Technol. (IJEIT) 2(10), 28–35 (2013)
Ajagbe, S., Adesina, A., Odule, T., Aiyeniko, O.: Evaluation of computing resources consumption of selected symmetric-key algorithms. J. Comput. Sci. Appl. 26(2), 64–76 (2019)
Ajagbe, S.A., Adesina, A.O.: Design and development of an access control based electronic medical record (EMR). Centrepoint J. 2020008, 26108 (2020)
Ajagbe, S.A., Adesina, A., Oladosu, J.: Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (emr) on web application. Int. J. Scientific Eng. Res. (IJSER) 10(5), 848–871 (2019)
Akinyele, J.A., Pagano, M.W., Green, M.D., Lehmann, C.U., Peterson, Z.N., Rubin, A.D.: Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–86 (2011)
Awotunde, J., Ameen, A., Oladipo, I., Tomori, A., Abdulraheem, M.: Evaluation of four encryption algorithms for viability, reliability and performance estimation. Niger. J. Technol. Dev. 13(2), 74–82 (2016)
Awotunde, J.B., et al.: An improved machine learnings diagnosis technique for COVID-19 pandemic using chest x-ray images. In: Florez, H., Pollo-Cattaneo, M.F. (eds.) ICAI 2021. CCIS, vol. 1455, pp. 319–330. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89654-6_23
Fitri, N.A., Al Rasyid, M.U.H., Sudarsono, A.: Medical health record protection using ciphertext-policy attribute-based encryption and elliptic curve digital signature algorithm. EMITTER Int. J. Eng. Technol. 7(1), 151–175 (2019)
Fonseca-Herrera, O.A., Rojas, A.E., Florez, H.: A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci 48(2), 213–222 (2021)
Hernandez, J., Daza, K., Florez, H., Misra, S.: Dynamic interface and access model by dead token for IoT systems. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 485–498. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32475-9_35
Higgins, D., Madai, V.I.: From bit to bedside: a practical framework for artificial intelligence product development in healthcare. Adv. Intell. Syst. 2(10), 2000052 (2020)
Naser, S.: Cryptography: from the ancient history to now, it’s applications and a new complete numerical model. Int. J. Math. Stat. Stud. 9(3), 11–30 (2021)
Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 80(21), 31705–31727 (2021)
Ogunseye, E.O., Adenusi, C.A., Nwanakwaugwu, A.C., Ajagbe, S.A., Akinola, S.O.: Predictive analysis of mental health conditions using AdaBoost algorithm. ParadigmPlus 3(2), 11–26 (2022)
Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H.: A secured private-cloud computing system. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 373–384. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32475-9_27
Omotosho, A., Emuoyibofarhe, J., Meinel, C.: Ensuring patients’ privacy in a cryptographic-based-electronic health records using bio-cryptography. Int. J. Electron. Healthc. 9(4), 227–254 (2017)
Onwutalobi, A.C.: Overview of cryptography. SSRN Electron. J. 1–9 (2011). https://doi.org/10.2139/ssrn.2741776
Parmar, N.J., Verma, P.K.: A comparative evaluation of algorithms in the implementation of an ultra-secure router-to-router key exchange system. Secur. Commun. Netw. 2017, 1–14 (2017). https://doi.org/10.1155/2017/1467614
Rabelo, L., Ballestas, A., Valdez, J., Ibrahim, B.: Using delphi and system dynamics to study the cybersecurity of the IoT-based smart grids. ParadigmPlus 3(1), 19–36 (2022)
Sinha, S., Singh, A., Gupta, R., Singh, S.: Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput. Sci. 132, 557–562 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ajagbe, S.A., Florez, H., Awotunde, J.B. (2022). AESRSA: A New Cryptography Key for Electronic Health Record Security. In: Florez, H., Gomez, H. (eds) Applied Informatics. ICAI 2022. Communications in Computer and Information Science, vol 1643. Springer, Cham. https://doi.org/10.1007/978-3-031-19647-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-19647-8_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-19646-1
Online ISBN: 978-3-031-19647-8
eBook Packages: Computer ScienceComputer Science (R0)