Page 102 - IJEEE-2023-Vol19-ISSUE-1
P. 102

98 |                                                                                             Baban & Hameed

                                   TABLE III

                             COMPARISON BETWEEN THE RELATED MENTIONED WORKS.

 Ref.    Algorithm Used            Description                    Processing Memory  Encryption     Message
  [2]                                                                                            Authentication
  [3]                                                             Time  Usage
  [4]
  [5]    Developed the AES         A hybrid encryption
  [6]
         algorithm named by (P- algorithm can provide
  [7]
         AES)                      security protection
  [8]
         Data Encryption Standard Symmetric key cipher
  [9]
 [10]    (DES)                     of Encryption
 The
current  International Data        Symmetric key cipher
 work
         Encryption Algorithm      of Encryption and

         (IDEA)                    Decryption

                                   Symmetric block

         AES cipher with a block
                                  length of 128 bits.

         AES                       Symmetric key cipher
                                    with length 256bits

             AES                   AES algorithm gives
         RSA+ IDEA                 more security with a
                                   little encryption time
                                   used to encrypt using

                                        128-bit key.

                                    Added Security by
                                    use of 2 encryption

                                         algorithms

                   Hashing         MD5(Message-Digest
                                          Algorithm
         Data Encryption Standard
                    (DES)          Security is guaranteed
                                     by the use of two-
                AES +HMAC            phase encryption.

                                   Symmetric key cipher
                                    with three different

                                   key lengths: 128, 192,
                                         or 256 bits.

                        XII. CONCLUSIONS                                                 CONFLICT OF INTEREST

         In this paper, we successfully ensured the privacy and        The authors have no conflict of relevant interest to this
integrity of healthcare data by implementing secured model that   article.
included AES and HMAC-SHA-256 algorithms and
demonstrated the addition of an extra layer of security for data                                REFERENCES
authentication and integrity using an intrusion detection system
to prevent the misuse by intruders who may bypass the common      [1] A. Jayawardena, "The electronic hospital information
access control mechanisms and have direct access to the            system implemented at the district general hospital
database. Finally, in the case of changing AES key size, it can    trincomalee-an experience of business process re-engineering"
be observed that the longer the key size used the more memory      J Community Med Health Educ S, Vol. 2, 2014.
and time is needed. For 2bit data, it can be noticed that when    [2] Y. Chen, and L. Wan, "Towards Designing Personal Health
changing the AES key length from 128-bit to 256-bit (100%          Information Management System Based on Java", Mobile
key size increase), the memory usage will be affected the least    Information Systems, 2021.
by an increase of only 13%, while the CPU utilization is          [3] F. Zhang, et al., "Hybrid encryption algorithms for medical
increment by 90%, However a dramatic increase in time is           data storage security in cloud database", International Journal
observed by about 1366%, which indicates the mathematical          of Database Management Systems (IJDMS), Vol. 11, 2019.
complexity of the AES algorithm. Therefore, if the system         [4] K. Deshmukh and P.M. Chawan, "Data Integrity and
needs to operate in hard real-time manner, then the 128 bits       Privacy in Healthcare Management System: A Survey",
AES key is recommended.                                            International Research Journal of Engineering and Technology
                                                                   (IRJET), Vol. 7, No. 11, 2020.
   97   98   99   100   101   102   103   104   105   106   107