Open Access   Article Go Back

Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease

Joydeep Dey1 , Sunil Karforma2 , Arindam Sarkar3 , Anirban Bhowmik4

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 179-183, Jan-2019

Online published on Jan 20, 2019

Copyright © Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik, “Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.179-183, 2019.

MLA Style Citation: Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik "Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease." International Journal of Computer Sciences and Engineering 07.01 (2019): 179-183.

APA Style Citation: Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik, (2019). Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease. International Journal of Computer Sciences and Engineering, 07(01), 179-183.

BibTex Style Citation:
@article{Dey_2019,
author = {Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik},
title = {Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {179-183},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=615},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=615
TI - Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease
T2 - International Journal of Computer Sciences and Engineering
AU - Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 179-183
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

This paper presents a novel and secured approach of transmission using the Cuckoo search metaheuristic algorithm. Dental disease is mostly caused by the colonization of the bacteria inside the oral cavity. Colonization of bacteria affects our teeth, gums, nerves, etc. Such patients are very common and to be cured appropriately. If left untreated, it may lead to severe damages inside the oral cavity. Cardiovascular and metabolic activities are also affected due to dental diseases. To transmit such information of any patient, here an encryption technique has been proposed preceded by generation of suitable key. Fittest session key has been generated by implementing the Cuckoo search metaheuristic algorithm. A mask matrix has been created for the proposed ciphering technique. Patient’s E-prescription proposed by the dentist would be fragmented into multiple fragments. In this paper, serial test has been used for testing the robustness of key and test results obtained reflects the good randomness in nature.

Key-Words / Index Term

Cuckoo Search, Fragments, Encryption

References

[1]. Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K.,
Designing and Performance Analysis of a Proposed Symmetric
Cryptography Algorithm, In the Proceedings of the International
Conference on Communication Systems and Network Technologies
(CSNT 2013), April 6-8 2013, Gwalior, India, pp. 453-461.
[2]. Christian Blum, Ant Colony Optimization: Introduction and recent
trends,Physics of Life Review, Elsevier, Vol. 2, Issue 4, December
2005, pp. 353-373
[3]. Ping Duan, Yong AI, Research on an Improved Ant Colony
Optimization Algorithm and its application, International Journal of
Hybrid Information Technology Vol.9, No.4 (2016), pp. 223-234.
[4]. Clark, J.A., Nature-Inspired Cryptography: Past, Present and
Future, In Proceedings of Conference on Evolutionary Computation,
December 8-12, 2003, Canberra, Australia.
[5]. M. Mareli, B. Twala, An adaptive cuckoo search algorithm for
optimisation, Applied Computing and Informatics, Volume 14, Issue 2, pp. 107-115, July. 2018.
[6]. Prabir Kr. Naskar, Hari Narayan Khan, Atal Chaudhuri, A Key Based
Secure Threshold Cryptography for Secret Image, International
Journal of Network Security, Vol.18, No.1, PP.68-81, Jan. 2016
[7]. Preeti Singh et al, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing,
Vol.3 Issue.12, December- 2014, pg. 410-415.
[8]. H. F. Hua ng and C.C. Chang “A novel efficient (t, n) threshold
proxy signature scheme”, Information Sciences 176(10): 1338-1349, 2006.
[9]. Bozkurt, Kaya, Selcuk, Guloglu ,“Threshold Cryptography Based
On Blakely Secret Sharing”, Information Sciences 177(19):4148–
4160, 2008.
[10]. Stallings William, “Cryptography and Network Security”, Pearson India Education Service Pvt. Ltd., pp.111-155, 2015