Open Access iconOpen Access

ARTICLE

crossmark

Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*

1 Computer Science and Information Technology, Jazan University, Jazan, Saudi Arabia
2 CSE, Eudoxia Research University, New Castle, USA
3 Department of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia
4 National Center of Excellence in Software, Sangmyung University, Seoul, Korea
5 Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India

* Corresponding Authors: SeongKi Kim. Email: email; Salil Bharany. Email: email

Computers, Materials & Continua 2024, 79(2), 3397-3416. https://doi.org/10.32604/cmc.2024.046265

Abstract

A new era of data access and management has begun with the use of cloud computing in the healthcare industry. Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a major concern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentiality and integrity of healthcare data in the cloud. The computational overhead of encryption technologies could lead to delays in data access and processing rates. To address these challenges, we introduced the Enhanced Parallel Multi-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the secure storage of critical patient records in the cloud. The data was gathered from two categories Authorization for Hospital Admission (AIH) and Authorization for High Complexity Operations. We use Z-score normalization for preprocessing. The primary goal of implementing encryption techniques is to secure and store massive amounts of data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become more widely available if security issues can be successfully fixed. As a result of our analysis using specific parameters including Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energy consumption (53%), the system demonstrated favorable performance when compared to the traditional method. This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloud storage solutions for safeguarding healthcare data.

Keywords


Cite This Article

APA Style
Basha, U.S., Gupta, S.K., Alawad, W., Kim, S., Bharany, S. (2024). Fortifying healthcare data security in the cloud: A comprehensive examination of the EPM-KEA encryption protocol. Computers, Materials & Continua, 79(2), 3397-3416. https://doi.org/10.32604/cmc.2024.046265
Vancouver Style
Basha US, Gupta SK, Alawad W, Kim S, Bharany S. Fortifying healthcare data security in the cloud: A comprehensive examination of the EPM-KEA encryption protocol. Comput Mater Contin. 2024;79(2):3397-3416 https://doi.org/10.32604/cmc.2024.046265
IEEE Style
U.S. Basha, S.K. Gupta, W. Alawad, S. Kim, and S. Bharany, “Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol,” Comput. Mater. Contin., vol. 79, no. 2, pp. 3397-3416, 2024. https://doi.org/10.32604/cmc.2024.046265



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 572

    View

  • 215

    Download

  • 0

    Like

Share Link