A Secure Cloud Storage System for Iot Assisted Healthcare Environment by Employing Blockchain with Asymmetric Encryption

Authors

  • Aadhinarayanan. N.V Research Scholar, Department of Computer Science, Government Arts and Science College (Modakurichi), Affiliated to Bharathiar University, Coimbatore, Tamil Nadu(St), India
  • P.Vijayakumar Assistant Professor, Department of Computer Science, Bharathiar University ,Coimbatore, Tamil Nadu(St), India

Keywords:

Internet of things, Access Control, Secure Data Encryption, Cloud Computing, Blockchain technology.

Abstract

The emergence of new technologies like the Internet of Things (IoT) is accompanied by explosive growth in the healthcare sector. The main idea behind using IoT in healthcare facilities is to make it remotely accessible, facilitating easier communication between physicians and patients and the ability to diagnose any illness remotely in an emergency. However, when it comes to data sharing and outsourcing in the cloud, the confidentiality and integrity of medical records become crucial concerns. Hackers can breach health data without users’ consent, exposing private patient information. Therefore, this article suggests using blockchain-enabled ciphertext policy-attribute-absorption (ECP-ABE) to store and access IoT healthcare data securely. Using ECP-ABE, the patient’s data is encrypted before being safely transmitted to the cloud. Here, the Sine chaotic map with a Wedding dance coefficient-based Whale Optimization
Algorithm (SWWOA) creates the access structure in the best possible way. The encrypted data is then securely stored in the cloud via a blockchain. Tests indicate that the strategy—which merges blockchain with encryption—can guarantee both the high throughput of medical information access and the safe storage and integrity of that data.

Downloads

Published

2024-09-15

How to Cite

Aadhinarayanan. N.V, & P.Vijayakumar. (2024). A Secure Cloud Storage System for Iot Assisted Healthcare Environment by Employing Blockchain with Asymmetric Encryption. Journal of Computational Analysis and Applications (JoCAAA), 33(07), 102–109. Retrieved from http://eudoxuspress.com/index.php/pub/article/view/1006

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.