Open Access   Article Go Back

Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission

Shraddha M. Dudhani1 , Santosh S. Lomte2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 363-366, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.363366

Online published on Feb 28, 2019

Copyright © Shraddha M. Dudhani, Santosh S. Lomte . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shraddha M. Dudhani, Santosh S. Lomte, “Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.363-366, 2019.

MLA Style Citation: Shraddha M. Dudhani, Santosh S. Lomte "Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission." International Journal of Computer Sciences and Engineering 7.2 (2019): 363-366.

APA Style Citation: Shraddha M. Dudhani, Santosh S. Lomte, (2019). Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission. International Journal of Computer Sciences and Engineering, 7(2), 363-366.

BibTex Style Citation:
@article{Dudhani_2019,
author = {Shraddha M. Dudhani, Santosh S. Lomte},
title = {Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {363-366},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3669},
doi = {https://doi.org/10.26438/ijcse/v7i2.363366}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.363366}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3669
TI - Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - Shraddha M. Dudhani, Santosh S. Lomte
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 363-366
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
575 332 downloads 157 downloads
  
  
           

Abstract

Hypothetical Data security is the most troublesome issue on the planet and the diverse security risks in the computerized security must be avoided and to give more prominent protection to the customers additionally, to engage high dependability and openness of the data. For the equivalent the assurance of the proper data encryption estimation depends consistently on its key length, data size and its execution criteria. In this paper, we separated the distinctive data encryption figuring for instance, DES, AES, blowfish, MD5 estimations on the reason of the diverse parameters and made a comparison of these counts for secure trade of EHR.

Key-Words / Index Term

EHR, Performance Analysis, Algorithm

References

[1]. Dac-Nhuong Le, Bijeta Seth “A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach”, Journal of Cyber Security and Mobility, Vol. 7 4, pp.379–408, October 2018.
[2]. Pradeep Deshmukh “Design of cloud security in the EHR for Indian healthcare services Journal of King Saud University Computer and Information Sciences” Production and hosting by Elsevier B.V. This is an open access article 2017.
[3]. RizwanaShaikh ,Jagrutee Banda , Pragna Bandi “Securing E-healthcare records on Cloud Using Relevant data classification and Encryption”, International Journal Of Engineering And Computer Science, Volume 6 Issue ‘ISSN: 2319-7242, 2017.
[4]. Pooja Sagathia, Saylee Salgaonkar, Akshata Sawant, Hammad Shaikh “Secure Data Sharing in Cloud”, International Journal of Scientific & Engineering Research’, Volume 8, Issue 2, February 2017
[5]. Gupta, P, Koushal, V, Narayan, C., and Anand,’A. “Building Genetic Database at Medical Institutes”, Implement Patient Cost Audit and Improve Biomedical Research. Annals of neurosciences, 24(1), pp.3–4, 2017.
[6]. Jain, A., and Soni, B. K., “Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data”, International Journal of Advanced Networking and Applications, Vol 8(6), pp 3283, 2017.
[7]. Amandeeep Kaur, Er. Anupama Kaur, “Asymmetric Key Cryptography Based Technique to Detect and Isolate a zombie Attack in Cloud Architecture”, International Journal of Advanced Research in Computer Science and Software Engineering’ Volume 6, Issue 3, March 2016. ISSN: 2277 128X
[8]. Van, V. N., Long, N. Q., Nguyen, G. N., and Le, D. N “A performance analysis of open stack open-source solution for IAAS cloud computing”, Proceedings of the Second International Conference on Computer and Communication Technologies, pp. 141–150 2016.
[9]. D. AsirAntontony Gnana Singh , R.Priyadharshini, “Performance Analysis of Data Encryption Algorithms for Secure Data Transmission”, International Journal for Science and Advance Research in Technology, Volume 2 Issue 12–ISSN [ONLINE]: 2395-1052, December 2016.
[10]. Sareen, S., Sood, S. K., and Gupta, S. K. “Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme”, Information Security Journal: A Global Perspective, Vol 25(1–3), pp.39–53, 2016.
[11]. Niraj Bachhav, Swapnil Biradar, Mayank Mishra, Priti Purbey, Monali P. Deshmukh, “A Construction for Secret Sharing Scheme with General Access Structure”, International Journal of Innovative Research in Science, Engineering and Technology’, Vol. 5, Issue 5, May 2016
[12]. Vijaya Pinjarkar, Neeraj Raja, Krunal Jha, AnkeetDalvi, “Single Cloud Security Enhancement using key Sharing Algorithm”, Recent and Innovation Trends in Computing and Communication, 2016.
[13]. Pundkar, S. N. and Shekokar, N, “Cloud computing security in multi-clouds using Shamir’s secret sharing scheme”, International Conference on Electrical, Electronics, and Optimization Techniques’(ICEEOT), pp. 392–395, 2016
[14]. Hossain, M. A., Hossain, M. B., Uddin, M. S., and Imtiaz, S. M, “Performance Analysis of Different Cryptography Algorithms”, International Journal of Advanced Research, Computer Science and Software Engineering, 2016.