Dual authentication-based encryption with a delegation system to protect medical data in cloud computing

15Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute- based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A verified and authenticated decryption process for the cloud environment is the imperative feature of our proposed architecture. The data owner encrypts their data and sends it to the cloud. The cloud server performs partial decryption and the final decrypted data are shared for users as per their privileges. Thus, the data owner reduces complexity of productivity by delegating the decryption process to the cloud server. Analysis of the experimental results confirms that data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights scheme. Our performance evaluation results show that the proposed model condensed the communication overhead and made Digital Imaging and Communications in Medicine (DICOM) more secure.

References Powered by Scopus

Attribute-based encryption for fine-grained access control of encrypted data

4410Citations
N/AReaders
Get full text

Fuzzy identity-based encryption

3783Citations
N/AReaders
Get full text

Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

705Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

67Citations
N/AReaders
Get full text

Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications

34Citations
N/AReaders
Get full text

A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations

16Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Badr, A. M., Zhang, Y., & Umar, H. G. A. (2019). Dual authentication-based encryption with a delegation system to protect medical data in cloud computing. Electronics (Switzerland), 8(2). https://doi.org/10.3390/electronics8020171

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

70%

Professor / Associate Prof. 1

10%

Lecturer / Post doc 1

10%

Researcher 1

10%

Readers' Discipline

Tooltip

Computer Science 6

55%

Engineering 3

27%

Nursing and Health Professions 1

9%

Social Sciences 1

9%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free