ENCRYPTION TECHNIQUES AND ACCESS CONTROL TO ACHIEVE SECURE TRANSMISSION OF PHI IN THE CLOUD

Authors

  • Prakash Somasundaram Lead Software Engineer, Alteryx, Inc, Alteryx, Inc Author

Keywords:

Cloud Security, Cloud Computing, Encryption Techniques, Access Control, Healthcare, Compliance, HIPAA

Abstract

This research paper addresses the challenges of securing Personal Health Information (PHI) in cloud-based systems within the healthcare sector. It examines the effectiveness of encryption techniques and access control lists in ensuring data privacy and compliance with HIPAA regulations. The study explores various encryption methods, such as Hybrid Data Encryption Algorithms and Attribute-Based Encryption (ABE), and assesses their strengths and limitations in protecting PHI. Additionally, it reviews different access control models, including decentralized systems with blockchain technology and hybrid approaches that merge role-based and attribute-based controls. The findings highlight the importance of a hybrid approach that combines multiple security measures tailored to specific organizational needs. This study underlines the necessity for ongoing research and policy updates to adapt to evolving technological advancements and emerging security challenges in healthcare data management.

References

R. Sivan and Z. A. Zukarnain, Security and privacy in cloud-based E-Health System, Symmetry, vol. 13, no. 5, 742, 2021. https://doi.org/10.3390/sym13050742

B. Pushpa, Hybrid data encryption algorithm for secure medical data transmission in cloud environment, Proc. Fourth International Conference on Computing Methodologies and Communication (ICCMC), 2020. https://doi.org/10.1109/iccmc48092.2020.iccmc-00062.

F. Zhang, Y. Chen, W. Meng, and Q. Wu, Hybrid encryption algorithms for Medical Data Storage Security in Cloud Database, International Journal of Database Management Systems, vol. 11, no. 01, pp. 57-73, 2019. https://doi.org/10.5121/ijdms.2019.

S. Wang, X. Wang, and Y. Zhang, A secure cloud storage framework with access control based on Blockchain, IEEE Access, vol. 7, pp. 112713-112725, 2019. https://doi.org/10.1109/access.2019.2929205.

R. K. Gupta, K. K. Almuzaini, R. K. Pateriya, K. Shah, P. K. Shukla, and R. Akwafo, An improved secure key generation using enhanced identity-based encryption for cloud computing in large-scale 5G, Wireless Communications and Mobile Computing, vol. 2022, pp. 1-14, 2022. https://doi.org/10.1155/2022/7291250.

M. Bhatele and A. Chourasia, Attribute-Based Encryption (ABE) to Administer Patient Health Record Management (PHRM) in Cloud, International Journal of Modern Engineering & Management Research, 2018.

S. Alayda, N. A. Almowaysher, M. Humayun, and N. Z. Jhanjhi, A novel hybrid approach for access control in cloud computing, International Journal of Engineering Research and Technology, vol. 13, no. 11, pp. 3404-3414, 2020. https://doi.org/10.37624/ijert/13.11.2020.3404-3414.

N. A. Azeez and C. V. der Vyver, Security and privacy issues in e-health cloud-based system: A comprehensive content analysis, Egyptian Informatics Journal, vol. 20, no. 2, pp. 97-108, 2019. https://doi.org/10.1016/j.eij.2018.12.001.

P. Panwar, S. Dhall, and S. Gupta, A multilevel secure information communication model for Healthcare Systems, Multimedia Tools and Applications, vol. 80, no. 5, pp. 8039-8062, 2020. https://doi.org/10.1007/s11042-020-10083-5.

Downloads

Published

2023-12-17

How to Cite

Prakash Somasundaram. (2023). ENCRYPTION TECHNIQUES AND ACCESS CONTROL TO ACHIEVE SECURE TRANSMISSION OF PHI IN THE CLOUD. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS (IJITMIS), 14(2), 31-38. https://lib-index.com/index.php/IJITMIS/article/view/IJITMIS_14_02_005