Downloads: 1 | Views: 289 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project | Information Technology | India | Volume 11 Issue 10, October 2022 | Popularity: 5 / 10
Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Abstract: Security is the most critical issue amid the transmission of medical images because it contains sensitive information about patients. Medical data security is an essential method for securing sensitive data when computerized images and their relevant patient data are transmitted across public networks. It is vital to frame an actual model to assure the safety and trustworthiness of the patients? symptomatic data that were transmitted and received. There are many ways to carry out his. Internet of Things (IoT) is predicted to change the health care industry and could lead to the rise of the Internet of Medical Things. The proposed method provides cryptographic data security for patients? data stored in hospitals using the RSA algorithm and Visual Cryptography. RSA contains both private and public keys that are randomly generated. The private key is used for the encryption of medical data whereas the public key is used during the decryption process. This public key, which was randomly generated, is converted into an image or a text file using Visual Cryptography, that is, it is hidden. The key that is used to encrypt the RSA public key using VC is sent to the patient?s mail with which the public key is extracted and the medical data restored. Using a combination of the RSA algorithm and Visual Cryptography we can provide dual data security for patients? data. This method can also be applied when the patient switches hospitals. Also, transmission security is of utmost importance than storage security since many infrastructures rely on secure transmission protocols to prevent a catastrophic breach of security and to prevent attacks such as ARP spoofing and general data loss.
Keywords: Security, RSA, Visual cryptography, IoT, Encryption, Decryption
Edition: Volume 11 Issue 10, October 2022
Pages: 959 - 963
DOI: https://www.doi.org/10.21275/SR221018170206
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Informative Article, Information Technology, India, Volume 11 Issue 2, February 2022
Pages: 1344 - 1347The Journey to 5G: An IOT Application Perspective
Goutham Sabbani
Downloads: 0
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2495 - 2503Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms
Kishore Gade
Downloads: 0
Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021
Pages: 1309 - 1318Performance Analysis of Data Exchange Protocols in Cloud Environments
Sai Kumar Reddy Thumburu
Downloads: 0
Research Paper, Information Technology, India, Volume 8 Issue 11, November 2019
Pages: 2068 - 2077Role of IoT in Remote Patient Monitoring Systems
Venkat Raviteja Boppana
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 1, January 2022
Pages: 1695 - 1703The Shift Towards Distributed Data Architectures in Cloud Environments
Guruprasad Nookala