Cryptography in the Healthcare Sector With Modernized Cyber Security

Cryptography in the Healthcare Sector With Modernized Cyber Security

Prisilla Jayanthi (K. G. Reddy College of Engineering and Technology, Hyderabad, India) and Muralikrishna Iyyanki (Defence Research and Development Organisation, India)
Copyright: © 2020 |Pages: 21
DOI: 10.4018/978-1-7998-2253-0.ch008

Abstract

Cryptography is an indispensable tool used to protect information in any organization; providing secure transmission over the Internet. The major challenge faced by health-sector is data security, and to overcome this several advancements in medicine and biomedical research have proven to increase computer processing in data security. The study focuses on cryptography, the most emerging field in computer industries. Both artificial intelligence and quantum technology are both transforming the health sector in regard to cybersecurity. In this study, the AES algorithm is a cryptographic cipher used. One such application is implemented and is responsible for handling a large amount of the information in the health sector. An application with a double Hashing algorithm is accomplished to can maintain the data in a secure fashion.
Chapter Preview
Top

Introduction

Grand View Research Inc. in a statement announced by that “the global healthcare biometric market is expected to reach USD 14.5 billion by 2025.” In this regard, an insistent for Electronic Health Records (EHR) was raised by health system and hospitals. Hence the need to computerize the health databases drives an insistent for healthcare biometrics over the prognosis term of the patient. The concern is over protecting the data from intruders and reduces fraud for providers and financiers by payment collection through automated process, and increases patient contentment.

The science of shielding confidential information from unauthorized access, by making sure about data integrity and authentication is cryptography. The technique of hashing makes it more indispensable for ensuring that the transmitted messages will not be tampered. The concept of fingerprints, facial recognition and iris recognition are techniques derived from Artificial Intelligence. In this chapter Advanced Encryption Standard (AES) algorithm and blockchain (BC) are discussed to understand the need to safeguard and protect the electronic health data in more secure manner.

Figure 1.

Data in three phases

978-1-7998-2253-0.ch008.f01

The protection of data is required at every phase; the three phases of data shown in figure 1 are: 1. data in action; 2. data in use; and 3. data at rest. The data in action is the one which moves across the various networks, from system to system placed at various locations. The data in use is frequently updated and altered on usage. The data at rest is the huge one with volume increasing day-to-day and becomes a concern to businesses, government agencies and any other organization. The data is kept unused and inactive for longer time. Most of theft takes place on the data stored as backup. Hence, encrypting the data in every phase is essential.

Top

Necessity Of Cryptography In Healthcare

For any database which contains digital data, the need for data security is very essential for protecting data from any unauthorized users. Data stored on disk for longer period of time must be protected using disk encryption method known as on-the-fly encryption. Implementing hardware device security to such long-time data storage prevent malicious users or a data breach. One such application of hardware security is biometric technique which prevents malicious users from logging in, logging out and/ or tampering the privileges and is implemented in this chapter.

Authentication is verifying the user’s identity. It has two phases - identification and actual authentication. In identification phase, any individual’s identity is provided in the scheme of a user ID to the security system. The security system examines all the abstract objects and maps the actual user, and grants permission. This is carried out when the user provides indication to prove the specification to the system. The authentication phase involves claiming of user identity by checking user-provided evidence.

Encryption is the technique of encoding a message or information in which only approved parties can access it. The algorithm generates pseudo-random encryption key. The two encryptions used are symmetric and asymmetric encryption. In symmetric, the encryption and decryption keys are the same. Communicating groups use the same key for secure communication. In asymmetric, the encryption key is published for anyone (publicly) and receiving team has the access to read the messages using the decryption key known as private key.

The encryption of data at rest uses AES or RSA (Rivest–Shamir–Adleman) algorithms. Cryptography will be implemented on the database housing the data on the physical storage. In this case study, AES is implemented on the Electronic Health Record databases.

Complete Chapter List

Search this Book:
Reset