Open Access iconOpen Access

ARTICLE

crossmark

Optimal Confidential Mechanisms in Smart City Healthcare

by R. Gopi1,*, P. Muthusamy2, P. Suresh3, C. G. Gabriel Santhosh Kumar4, Irina V. Pustokhina5, Denis A. Pustokhin6, K. Shankar7

1 Department of Computing Science and Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, 621212, India
2 School of Computing Science and Engineering, Galgotias University, NCR, Delhi, 203201, India
3 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, Coimbatore, 641407, India
4 Department of Electrical and Electronics Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, 621112, India
5 Department of Entrepreneurship and Logistics, Plekhanov Russian University of Economics, Moscow, 117997, Russia
6 Department of Logistics, State University of Management, Moscow, 109542, Russia
7 Department of Computer Applications, Alagappa University, Karaikudi, 630001, India

* Corresponding Author: R. Gopi. Email: email

Computers, Materials & Continua 2022, 70(3), 4883-4896. https://doi.org/10.32604/cmc.2022.019442

Abstract

Smart City Healthcare (SHC2) system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner. The system also concedes the freedom of a patient. IoT is a part of this system and it helps in providing care to the patients. IoT-based healthcare devices are trustworthy since it almost certainly recognizes the potential intensifications at very early stage and alerts the patients and medical experts to such an extent that they are provided with immediate care. Existing methodologies exhibit few shortcomings in terms of computational complexity, cost and data security. Hence, the current research article examines SHC2 security through Light Weight Cipher (LWC) with Optimal S-Box model in PRESENT cipher. This procedure aims at changing the sub bytes in which a single function is connected with several bytes’ information to upgrade the security level through Swam optimization. The key contribution of this research article is the development of a secure healthcare model for smart city using SHC2 security via LWC and Optimal S-Box models. The study used a nonlinear layer and single 4-bit S box for round configuration after verifying SHC2 information, constrained by Mutual Authentication (MA). The security challenges, in healthcare information systems, emphasize the need for a methodology that immovably concretes the establishments. The methodology should act practically, be an effective healthcare framework that depends on solidarity and adapts to the developing threats. Healthcare service providers integrated the IoT applications and medical services to offer individuals, a seamless technology-supported healthcare service. The proposed SHC2 was implemented to demonstrate its security levels in terms of time and access policies. The model was tested under different parameters such as encryption time, decryption time, access time and response time in minimum range. Then, the level of the model and throughput were analyzed by maximum value i.e., 50 Mbps/sec and 95.56% for PRESENT-Authorization cipher to achieve smart city security. The proposed model achieved better results than the existing methodologies.

Keywords


Cite This Article

APA Style
Gopi, R., Muthusamy, P., Suresh, P., Gabriel Santhosh Kumar, C.G., Pustokhina, I.V. et al. (2022). Optimal confidential mechanisms in smart city healthcare. Computers, Materials & Continua, 70(3), 4883-4896. https://doi.org/10.32604/cmc.2022.019442
Vancouver Style
Gopi R, Muthusamy P, Suresh P, Gabriel Santhosh Kumar CG, Pustokhina IV, Pustokhin DA, et al. Optimal confidential mechanisms in smart city healthcare. Comput Mater Contin. 2022;70(3):4883-4896 https://doi.org/10.32604/cmc.2022.019442
IEEE Style
R. Gopi et al., “Optimal Confidential Mechanisms in Smart City Healthcare,” Comput. Mater. Contin., vol. 70, no. 3, pp. 4883-4896, 2022. https://doi.org/10.32604/cmc.2022.019442

Citations




cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2137

    View

  • 1471

    Download

  • 0

    Like

Share Link