Risk monitoring strategy for confidentiality of healthcare information

https://doi.org/10.1016/j.compeleceng.2022.107833Get rights and content

Highlights

  • Propose an approach for securing healthcare data confidentiality.

  • Provide mathematical modelling for the entire working of Modular Encryption Standard.

  • Enhance the decision-making strategy of Modular Encryption Standard using fuzzy logic.

Abstract

Concrete privacy endeavours to give Confidentiality, Integrity, and Availability (CIA) measures to secure traffic streams in sensitive healthcare applications are a necessity. When talking about the access of sensitive healthcare data or the confidentiality of highly esteemed data, the first thing that comes to mind is that it should be secured. Sensitive healthcare data needs to be protected to restrict illegal access, exposure, and/or manipulation. As there is no such protection by which we can make our systems fully secure, the most acceptable methodology is to perform layered modelling of safety measures. This paper intends to provide a mathematical description of the Modular Encryption Standard (MES) and the augmentation of condition-centric risk monitoring of confidential information to provide a layered model for securing healthcare data confidentiality. Decision-making regarding the risk monitoring strategy of MES is augmented using a machine learning approach based on a Fuzzy Inference System amalgamated with Neural Networks. Result analysis shows that MES has less than a 0.005 error-rate and a 97% precision-rate, which elucidates its desideratum towards increasing security risks.

Introduction

With the extensive technological advancements in Industry 4.0 applications, sensitive healthcare information is increasingly defenceless to be accessed, copied, and/or manipulated by unauthorized users [1], [2]. Digital reports and documents can be accessed by numerous intruders, as it becomes fairly simple to disperse and duplicate them. Hugeness, exactness, and affectability of data (in the cloud) is a significant security and protection issue, making it critical to guarantee data confidentiality [3], [4], [5]. There are immense benefits of utilizing data storage of critical cloud infrastructure:

  • 1.

    universal access: anywhere, in any case, whenever anyone wants access to information

  • 2.

    extraordinarily reliable provision of services

  • 3.

    versatility

  • 4.

    adaptability

  • 5.

    cost-effectiveness

Distributed computing models are ordinarily known as cloud computing and incorporate different resources and services (being part of industrial applications). For example, Infrastructure as a Service (IaaS), where a client utilizes supplier’s processing, storage, or system’s infrastructure administration; Platform as a Service (PaaS), where a client uses the supplier’s assets to run custom applications; lastly Software as a Service (SaaS), where clients use the programming that runs on the supplier’s infrastructure. Secrecy and protection have turned into a pressing concern. Security can be regarded as an “affirmation of being safe or protected from hazards”. With technological advancements, threats against network security are a significant concern these days in Industry 4.0 applications, and transmission media need to be secured [6]. Previous works have been proposed against the assurance of data confidentiality [7]. The CIA triad is made up of Confidentiality, Integrity, and Availability [8], which needs to be ensured. These three terms are considered as the key constructs for security measures. These constraints are shown in Fig. 1 for data preservation.

Confidentiality is all about access restriction. Integrity guarantees data accuracy and trustworthiness, and availability is the assurance of access restriction by authentic users, and it is the similitude of privacy. Distinct security approaches are proposed to prevent sensitive data from illegitimate users but with the assurance of access for legitimate users. Confidentiality maintenance failure results in illegal access to data either intentionally or unintentionally. These kinds of failures are regarded as security breaches. Moreover, if your data is publicized, you can never keep it secret. For example, if the records of a bank are somehow disclosed, then everyone will have information about your bank balance and account number. Enciphering data is a usual way to ensure confidentiality. It constitutes that data should be accurate, consistent, and trustworthy and the guaranteed authenticity of its origin. For example, when someone runs an e-commerce website and a hacker hacks the website and spitefully manipulates the price of products. Therefore, this integrity failure will result in price changes. Availability leads us to the concept that data should be approached and only available to the authentic user.

The central issue around healthcare information protection is data security from unapproved access [9]. In any situation, some of the issues are unacceptable, i.e., the danger of healthcare information being revealed, lost, corrupted, or stolen. Despite its favourable circumstances, distributed storage brings many security issues. Data confidentiality is the most significant problem for clients of a distributed storage framework [10]. Customers’ healthcare information is overseen out of their control as data is outsourced to third parties, so the most significant threat is that the sensitive data may become compromised. The outsourced data may incur threats from insiders as well as outsiders. Despite all these benefits, security issues that should be considered serious include

  • 1.

    unapproved access

  • 2.

    sensitive healthcare information exposure

  • 3.

    Intellectual Property Rights (IPR)

  • 4.

    risks in exchanging healthcare information

  • 5.

    healthcare information trustworthiness.

Cloud information security is a prominent issue of cloud computing [11], [12]. Before enterprises and agencies outsource their healthcare information to cloud-Service-Providers (CSPs), data must be encrypted to secure it from even internal service providers. The core idea of a secure storage scheme is the encryption of healthcare information before sending it outside of trustworthy distributed storage. Various encryption algorithms at the edge have been used to secure data [13]. In this work, an adaptive neuro-fuzzy inference system (ANFIS) is utilized with MES that decides the proper security measures based on the degree of sensitivity of the confidential data.

Various machine learning (ML) algorithms have been used to achieve an appropriate level of security [14]. However, utilizing an ML approach is crucial for any autonomous decision-making approach for requirement-centric security provisions (according to data sensitivity level). Accordingly, the decision-making approach of MES is made more robust and autonomous using ML algorithms.

This paper is intended to enhance the risk monitoring approach of MES using an ML approach. The increasing demand for distributed computing raises numerous issues of data threats in cloud computing. The major contributions of this research are as follows:

  • Perform the amalgamation of ML and cryptography encryption algorithms to attain a more robust outcome using a context-aware threat sensing approach.

  • Provide mathematical modelling for the entire working of MES.

  • Enhance the decision-making strategy of MES using fuzzy logic (against the degree of sensitivity of the data and the respective provision of security by MES). Using fuzzy logic, the decision-making of MES is made extensively robust (i.e.based on the degree of truthiness).

The rest of the paper is arranged as follows. Section 2 presents the literature review of previous commonly used symmetric encryption algorithms used for Industry 4.0 applications. Section 3 discusses the utilized algorithm. Section 4 presents the mathematical description of MES. Section 5 elucidates the experiments performed and discusses the experimental results. Finally, Section 6 concludes the paper and expounds the future work as well.

Section snippets

Literature review

Advances in network technology administration and expanding the resource’s computing power requirement have incited numerous enterprises and organizations to outsource their computing. Numerous algorithms have been proposed for security purposes, categorized as symmetric and asymmetric. As this research is based on symmetric cryptography, we will discuss symmetric enciphering algorithms. Variety of symmetric algorithms like Data Encryption Standard (DES), Advanced Encryption Standard (AES). MES

Presented work

MES is a modular encryption protocol utilized for data storage and applied before outsourcing the confidential data to a cloud environment (i.e., third party). Due to its modular and multi-cloud storage, entire data is not handed over to any third party in actual form. This encryption standard provides both parties security (i.e., data confidentiality) (i.e., against insider and outsider threats). The safe storage policy utilizes an enciphering approach to secure healthcare information from

Encryption

  • Do = Resulting Actual Data to be transmitted

  • D = Data after extension

  • E = Expansion bits

  • n = 9

  • Pi = Permutation (i=1,2,,n)

  • Si = Substitution (i=1,2,,n)

  • K0 = Key for Key whitening

  • KLi = Key left 64-bit chunk (i=1,2,,n)

  • KRi = Key right 64-bit chunk (i=1,2,,n)

Extension

This step performs an extension procedure on 56-bit actual data and extends it to the 64-bit data block.

Whitening

The extended data will pass on to the Key whitening process. This step constitutes three sub-steps, i.e., Expansion, Key Addition, and

Experimental results and analysis

MES in the cloud guaranteeing data-confidentiality and monitoring the risk level was simulated utilizing the following specifications. This section shows the outcomes obtained from the performance analysis of our proposed scheme. Table 1 shows the environmental setup for the proposed scheme’s performance analysis.

To analyse the confidentiality assurance level of MES in the cloud, simulation for the risk monitoring is performed utilizing ANFIS. ANFIS takes favourable features of Artificial

Conclusion

Data confidentiality has become one of the fascinating facts in information security systems of Industry 4.0 applications. Many symmetric algorithms have been introduced to maintain data confidentiality. MES aims to provide security against insider and outsider attacks as it provides five different types of keys (with no extra bit utilization) and key encryption. This paper aims to provide an augmented ANFIS based MES risk monitoring strategy for industrial applications. The simulation results

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Muhammad Rizwan received the M.Sc. degree from PUCIT, Lahore, Pakistan, in 2006, the MS degree from CIIT, Lahore, Pakistan, and the Ph.D. degree from HUST, Wuhan, China. He joined the Department of Computer Science, Kinnaird College for Woman, Lahore, Pakistan, as an Assistant Professor. His research interests include Information Security, IoT, Artificial Intelligence, Medical Image Processing & WSNs.

References (22)

  • BentajerA. et al.

    CS-IBE: a data confidentiality system in public cloud storage system

    Procedia Comput Sci

    (2018)
  • HussainS.A. et al.

    Multilevel classification of security concerns in cloud computing

    Appl Comput Inform

    (2017)
  • ZhangQ. et al.

    A hierarchical group key agreement protocol using orientable attributes for cloud computing

    Inform Sci

    (2019)
  • WangT. et al.

    A privacy-enhanced retrieval technology for the cloud-assisted internet of things

    IEEE Trans Ind Inform

    (2021)
  • JavedA.R. et al.

    A collaborative healthcare framework for shared healthcare plan with ambient intelligence

    Hum-Cent Comput Inform Sci

    (2020)
  • AhmadW. et al.

    Cyber security in IoT-based cloud computing: A comprehensive survey

    Electronics

    (2022)
  • GhayvatH. et al.

    CP-BDHCA: Blockchain-based confidentiality-privacy preserving big data scheme for healthcare clouds and applications

    IEEE J Biomed Health Inform

    (2021)
  • ZhangY. et al.

    A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT

    IEEE Trans Ind Inform

    (2019)
  • MohiyuddinA. et al.

    Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system

    Int J Fuzzy Syst

    (2021)
  • SangaiahA.K. et al.

    Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics

    IEEE Trans Ind Inform

    (2019)
  • CoppersmithD.

    The data encryption standard (DES) and its strength against attacks

    IBM J Res Dev

    (1998)
  • Cited by (26)

    • A discrete time-varying greywolf IoT botnet detection system

      2022, Computer Communications
      Citation Excerpt :

      Through testing, it has showed that the DNN model outperforms other machine learning methods by increasing accuracy by 15% and decreasing time complexity by 32%. Rizwan [48] described the Modular Encryption Standard (MES) mathematically and enhanced the condition-centric risk monitoring of confidential information to provide a layered model for securing healthcare data confidentiality. Decision-making regarding the risk monitoring strategy of MES was improved by a Fuzzy Inference System and Neural Networks.

    • Advancing Data Privacy: A Novel K-Anonymity Algorithm with Dissimilarity Tree-Based Clustering and Minimal Information Loss

      2023, International Journal on Recent and Innovation Trends in Computing and Communication
    View all citing articles on Scopus

    Muhammad Rizwan received the M.Sc. degree from PUCIT, Lahore, Pakistan, in 2006, the MS degree from CIIT, Lahore, Pakistan, and the Ph.D. degree from HUST, Wuhan, China. He joined the Department of Computer Science, Kinnaird College for Woman, Lahore, Pakistan, as an Assistant Professor. His research interests include Information Security, IoT, Artificial Intelligence, Medical Image Processing & WSNs.

    Aysha Shabbir received her MS degree from the Department of Computer Science, Kinnaird College for Woman, Lahore, Pakistan, 2021. Her research interests include Machine Learning, Medical Image Processing, the Internet of Things, Fuzzy Logic, Quantum Computing, and Mathematical Modelling.

    Abdul Rehman Javed is a lecturer at the Department of Cyber Security, Air University, Islamabad, Pakistan. He has worked with National Cybercrimes and Forensics Laboratory, Air University, Islamabad, Pakistan. His current research interests include mobile and ubiquitous computing, natural language processing, smart homes, and their applications in human activity analysis, human motion analysis, and e-health.

    Gautam Srivastava (Senior Member, IEEE) received the B.Sc. degree from Briar Cliff University, USA, in 2004, and the M.Sc. and Ph.D. degrees from the University of Victoria, Canada, in 2006 and 2012, respectively. He is currently working as Associate Professor at Brandon University, Canada. His area of interest is privacy, cryptography, data mining, big data, and security.

    Thippa Reddy Gadekallu (Senior Member IEEE) is currently working as Associate Professor in the School of Information Technology and Engineering, VIT, Vellore, Tamil Nadu, India. He has more than 14 years of experience in teaching. He has published more than 100 international/national publications. His research areas include Machine Learning, the Internet of Things, Deep Neural Networks, Blockchain, and Computer Vision.

    Maryam Shabbir received her MS degree from the Department of Computer Science, Kinnaird College for Woman, Lahore, Pakistan, in 2021. Her research interests include Machine Learning, Deep Learning, Edge Computing, Information Security, Wireless Sensor Networks, Quantum Computing, and Security Issues in Cloud Computing.

    Muhammad Abul Hassan is a lecturer at the Department of Computer Science, Federal Government Girls Degree College Nowshera Cantt. He has worked on different government IT projects. His research interest includes machine learning, deep learning, artificial intelligence, flying ad-hoc networks, vehicular Adhoc networks, cyber security, not limited to these only.

    This paper is for special section VSI-aihc. Reviews were processed by Guest Editor Dr. Deepak Gupta and recommended for publication.

    View full text