skip to main content
10.1145/3379310.3381043acmotherconferencesArticle/Chapter ViewAbstractPublication PagesapitConference Proceedingsconference-collections
research-article

Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5

Published: 29 March 2020 Publication History

Abstract

Patient data archiving in a medical institution is a relatively critical asset. If the data are managed by irresponsible parties, it will be risky both for the patients and the institutions. Therefore, data securing of patients are required to prevent negative impacts. The method in this study uses a prototype cycle, in making patient registration applications online. The technique used in this study is a combination of MD5 and SHA256 to be optimized for the data sent from database to the users, so that the encryption results in concise filing and timing.

References

[1]
M. R. Joshi and R. Avinash Karkade, "Network Security with Cryptography," International Journal of Computer Science and Mobile Computing, vol. 4, no. 1, pp. 201--204, 2015.
[2]
G. Susilo, "KEAMANAN BASIS DATA PADA SISTEM INFORMASI DI ERA GLOBAL," Jurnal TRANSFORMASI, vol. 12, no. 2, pp. 78--87, 2016.
[3]
B. R. Cyril, D. S. Britto, and R. Kumar, "Cloud Computing Data Security Issues, Challenges, Architecture and Methods-A Survey," International Research Journal of Engineering and Technology, 2015.
[4]
Selular.id, "Ini Hasil Pertemuan Facebook Global dan Kominfo," Selular.id, 2018. [Online]. Available: https://selular.id/2018/05/ini-hasil-pertemuan-facebook-global-dan-kominfo/. [Accessed: 10-Aug-2019].
[5]
Imamah, "ENKRIPSI DATA MENGGUNAKAN STEGANOGRAFI UNTUK KEAMANAN DATA PADA CLOUD," Jurnal Ilmiah NERO, vol. 1, no. 3, pp. 204--2010, 2015.
[6]
M. Rofiq, "Perancangan dan Implementasi Algoritma Elgamal untuk Keamanan Data pada Video Streaming," Jurnal JITIKA, vol. 6, no. 2, pp. 36--45, 2012.
[7]
H. B. Pethe and S. R. Pande, "An Overview of Cryptographic Hash Functions MD-5 and SHA," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 2278--0661, pp. 37--42, 2016.
[8]
P. Bhatia and R. Sumbaly, "Framework for Wireless Network Security Using Quantum Cryptography," International journal of Computer Networks & Communications, vol. 6, no. 6, pp. 45--61, 2014.
[9]
I. Nurhaida, D. Ramayanti, and R. Riesaputra, "Digital Signature & Encryption Implementation for Increasing Authentication, Integrity, Security and Data Non-Repudiation," International Research Journal of Computer Science (IRJCS), vol. 4, no. 11, pp. 4--14, 2016.
[10]
D. Jatikusumo, H. H. Hikmayanti, F. Feriadi, and W. Usino, "Securing Official Account Twitter Using Social Media Management System," International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015.
[11]
D. Rachmawati, J. T. Tarigan, and A. B. C. Ginting, "A comparative study of Message Digest 5(MD5) and SHA256 algorithm," in Journal of Physics: Conference Series, 2018, vol. 978, no. 1.
[12]
E. v. Maliberan, A. M. Sison, and R. P. Medina, "Securing a client-server communication through login authentication using modified MD5," Proceedings of 2018 the 8th International Workshop on Computer Science and Engineering, WCSE 2018, pp. 597--604, 2018.
[13]
R. Pressman and B. Maxim, Software Engineering?: A Practitioner's Approach 8th ed. 2014.
[14]
P. M. Ogedebe and B. P. Jacob, "Software Prototyping: A Strategy to Use When User Lacks Data Processing Experience," ARPN Journal of Systems and Software, vol. 2, no. 6, pp. 219--224, 2012.
[15]
H. Pasaribu, D. Sitanggang, R. R. Damanik, and A. C. Rudianto Sitompul, "Combination of advanced encryption standard 256 bits with md5 to secure documents on android smartphone," Journal of Physics: Conference Series, vol. 1007, no. 1, 2018.
[16]
D. David, "A lazy man's introduction to Multi-Party encryption and decryption," Medium.com, 2018. [Online]. Available: https://medium.com/@daser/a-lazy-mans-introduction-to-multi-party-encryption-and-decryption-59f62b8616d8. [Accessed: 09-Aug-2018].
[17]
I. McConell, "How to Use Prototypes to Inspire the Right Feedback," uxpin.com, 2014. [Online]. Available: https://www.uxpin.com/studio/blog/use-prototypes-get-feedback. [Accessed: 08-Aug-2018].

Index Terms

  1. Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    APIT '20: Proceedings of the 2020 2nd Asia Pacific Information Technology Conference
    January 2020
    185 pages
    ISBN:9781450376853
    DOI:10.1145/3379310
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. MD5
    2. SHA256
    3. optimization

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    APIT 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 201
      Total Downloads
    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media