National Center for Cybersecurity Technologies (C4C), King Abdulaziz City for Science and Technology (KACST), Riyadh 11442, Saudi Arabia.
Department of Computer Science and Engineering, Institute of Engineering and Technology, JK Lakshmipat University, Near Mahindra SEZ, Ajmer Road, Jaipur 302026, India.
Comput Intell Neurosci. 2022 Apr 21;2022:3767912. doi: 10.1155/2022/3767912. eCollection 2022.
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of the load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the contrary, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, military, and healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance, medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and enhanced key aggregate cryptosystem is a protected data protection method that provides highly effective security in the healthcare industry. When parties interested in a dispute disagree on the outflow of sensitive information, this technique manages the disputes and ensures the data security deployment of a cloud-based intelligent health monitoring system for the parties involved. The encrypted data structure of medical and healthcare prescriptions is recorded as they move through the hands of patients and healthcare facilities, according to the technique recommended. The double encryption approach is used in order to raise the overall degree of security. An encryption class is created by referring to the Ciphertext ID during the encryption procedure. The keyholder is a master secret key that facilitates in the recovery of the secret keys of various monsters and creatures by acting as a conduit between them. It is transferred and stored as a single aggregate for the benefit of the patient or customer in order to make decryption more convenient and efficient. A safe connection between cloud-based intelligent health monitoring systems and healthcare organizations and their patients may be established via the use of a key aggregation cryptosystem and a double encryption approach, according to the researchers. Because of this, when compared to earlier techniques, the findings reveal that the research methodology provides high levels of security in terms of confidentiality and integrity, in addition to excellent scalability.
云计算是一种旨在根据客户需求提供必要物质的商业策略。个人和云业务都已经接受了云存储服务,它已经成为使用最广泛的服务。各行业将数据外包给云存储空间,以减轻处理冗余数据内容的负担。这必须加以保护,以防止个人财物被盗,并且隐私也必须加以改善。不同的研究项目已经被建议以确保数据内容的安全管理。相反,当前研究项目的安全性仍有待提高。因此,建议采用这种方法来解决与云计算相关的安全问题。本研究工作的主要目标是为云用户提供安全的环境,同时通过管理和安全地向云用户提供数据内容,提高云资源提供商的利润。包括商业、金融、军事和医疗保健行业在内的大部分行业都不会将数据存储在基于云的存储系统中。这种技术被用来吸引这类客户。由于它允许医疗研究人员将他们的研究材料存储在一个集中的位置,并以更灵活的方式分发和访问,因此越来越多的公众接受了云计算。他们是从当时正在接受医疗评估的众多个人中收集的。可扩展和增强的聚合密钥密码系统是一种受保护的数据保护方法,它在医疗保健行业提供了高度有效的安全性。当对敏感信息的流出有争议的各方不同意时,该技术会管理争议并确保涉及各方的基于云的智能健康监测系统的数据安全部署。根据所推荐的技术,记录了医疗和医疗处方的加密数据结构,因为它们在患者和医疗机构的手中移动。使用双重加密方法来提高整体安全性。在加密过程中,通过引用密文 ID 创建加密类。密钥持有者是一个主密钥,通过充当它们之间的媒介,促进各种怪物和生物的秘密密钥的恢复。它被转移并存储为单个聚合,以方便患者或客户进行解密。通过使用密钥聚合密码系统和双重加密方法,可以在基于云的智能健康监测系统与医疗保健组织及其患者之间建立安全连接,研究人员表示。因此,与早期技术相比,研究结果表明,该研究方法在保密性和完整性方面提供了高水平的安全性,并且具有出色的可扩展性。