Strengthening Security and Confidentiality in E-Health Systems through Quantum Encryption of Healthcare
DOI:
https://doi.org/10.58564/IJSER.2.3.2023.83Keywords:
5D chaotic map, patient confidentiality, GNEQR ,healthcare images, and quantum encryptionAbstract
This study presents a pioneering quantum encryption technique, the Generalized Novel Enhancement Quantum Representation (GNEQR), to ensure enhanced security for color medical images in E-health systems. The proposed method is seamlessly integrated into an ASP.NET Web API and Blazor Web Assembly environment. During the encryption process, the GNEQR algorithm utilizes advanced bit-plane scrambling to obscure the original color medical image. A 5D chaotic map is employed to generate an image key, which is then used to create a scrambled version of the key image. Applying an XOR operation between the scrambled image and the key image produces a highly secure quantum-encrypted color image. In the decryption process, the inverse of the encryption steps is implemented, leveraging the 5D chaotic map-generated key to accurately reconstruct the original color medical image. This research aims to significantly enhance E-health security by protecting patient data, including medical images and histories, through quantum encryption. The incorporation of GNEQR within an ASP.NET Web API and Blazor Web Assembly framework facilitates seamless deployment and underscores the potential of this method to revolutionize healthcare data privacy and integrity.
References
X. Man and Y. Song, “Encryption of Color Images with an Evolutionary Framework Controlled by Chaotic Systems,” Entropy, vol. 25, no. 4, 2023, doi: 10.3390/e25040631.
Y. Wu, J. Zeng, W. Dong, X. Li, D. Qin, and Q. Ding, “A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network,” Entropy, vol. 24, no. 10, 2022, doi: 10.3390/e24101474.
R. I. Abdelfatah and H. M. Saqr, “An efficient medical image encryption scheme for ( WBAN ) based on adaptive DNA and modern multi chaotic map Content courtesy of Springer Nature , terms of use apply . Rights reserved . Content courtesy of Springer Nature , terms of use apply . Rights res,” pp. 22213–22227, 2023.
A. Singh, K. Chatterjee, A. K. Singh, and N. Kumar, “Secure Smart Healthcare Framework using Lightweight DNA Sequence and Chaos for Mobile Edge Computing,” IEEE Internet Things J., vol. 10, no. 6, pp. 4883–4890, 2022, doi: 10.1109/JIOT.2022.3219113.
C. O. Alenoghena et al., “eHealth: A Survey of Architectures, Developments in mHealth, Security Concerns and Solutions,” Int. J. Environ. Res. Public Health, vol. 19, no. 20, 2022, doi: 10.3390/ijerph192013071.
S. R. Oh, Y. D. Seo, E. Lee, and Y. G. Kim, “A comprehensive survey on security and privacy for electronic health data,” Int. J. Environ. Res. Public Health, vol. 18, no. 18, 2021, doi: 10.3390/ijerph18189668.
R. Alanazi, “Analysis of Privacy and Security Challenges in e-Health Clouds,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 9, pp. 484–489, 2022, doi: 10.14569/IJACSA.2022.0130955.
I. Keshta and A. Odeh, “Security and privacy of electronic health records: Concerns and challenges,” Egypt. Informatics J., vol. 22, no. 2, pp. 177–183, 2021, doi: 10.1016/j.eij.2020.07.003.
T. Sahama, L. Simpson, and B. Lane, “Security and Privacy in eHealth: Is it possible?,” 2013 IEEE 15th Int. Conf. e-Health Networking, Appl. Serv. Heal. 2013, no. February 2015, pp. 249–253, 2013, doi: 10.1109/HealthCom.2013.6720676.
D. Liveri, A. Sarri, and C. Skouloudi, Security and Resilience in eHealth. 2015. [Online]. Available: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/ehealth_sec/security-and-resilience-in-ehealth-infrastructures-and-services
Microsoft, “ASP.NET Core Blazor WebAssembly additional security scenarios.” https://learn.microsoft.com/en-us/aspnet/core/blazor/security/webassembly/additional-scenarios?view=aspnetcore-7.0
C. Payette, “How to Integrate Blazor WebAssembly into an Existing ASP.NET Core Web Application”, [Online]. Available: https://www.telerik.com/blogs/integrate-blazor-webassembly-existing-aspnet-core-web-application
“HttpClient in Blazor Webassembly”, [Online]. Available: https://www.pragimtech.com/blog/blazor-webAssembly/httpclient-in-blazor-webassembly/
A. A. Abd El-Latif, B. Abd-El-Atty, and M. Talha, “Robust Encryption of Quantum Medical Images,” IEEE Access, vol. 6, pp. 1073–1081, 2017, doi: 10.1109/ACCESS.2017.2777869.
H. S. Li, X. Chen, S. Song, Z. Liao, and J. Fang, “A block-based quantum image scrambling for gneqr,” IEEE Access, vol. 7, pp. 138233–138243, 2019, doi: 10.1109/ACCESS.2019.2942986.
J. Su, X. Guo, C. Liu, and L. Li, “A New Trend of Quantum Image Representations,” IEEE Access, vol. 8, pp. 214520–214537, 2020, doi: 10.1109/ACCESS.2020.3039996.
X. Li, J. Zeng, Q. Ding, and C. Fan, “A Novel Color Image Encryption Algorithm Based on 5-D Hyperchaotic System and DNA Sequence,” Entropy, vol. 24, no. 9, 2022, doi: 10.3390/e24091270.
C. Li and X. Yang, “An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos,” Optik (Stuttg)., vol. 260, no. December 2021, p. 169042, 2022, doi: 10.1016/j.ijleo.2022.169042.
H. S. Li, X. Chen, H. Xia, Y. Liang, and Z. Zhou, “A Quantum Image Representation Based on Bitplanes,” IEEE Access, vol. 6, no. c, pp. 62396–62404, 2018, doi: 10.1109/ACCESS.2018.2871691.
P. Scrambling, “and Pixel-Level Scrambling,” pp. 1–16, 2023.
F. Yu et al., “Chaos-Based Application of a Novel Multistable 5D Memristive Hyperchaotic System with Coexisting Multiple Attractors,” Complexity, vol. 2020, 2020, doi: 10.1155/2020/8034196.
N. Bhati, M. Hambir, S. Linganwar, and P. N. Patil, “Securing Medical Images using Quantum Cryptography,” vol. 7, no. 2, pp. 2184–2189, 2019.
T. Janani and M. Brindha, “A secure medical image transmission scheme aided by quantum representation,” J. Inf. Secur. Appl., vol. 59, no. April, p. 102832, 2021, doi: 10.1016/j.jisa.2021.102832.
J. Hu and F. Han, “A pixel-based scrambling scheme for digital medical images protection,” J. Netw. Comput. Appl., vol. 32, no. 4, pp. 788–794, 2009, doi: 10.1016/j.jnca.2009.02.009.
M. Y. M. Parvees and T. Vijayakumar, “Medical image cryptosystem using improved Quadratic Congruential Generator and logistic map,” Meas. Sensors, vol. 24, no. September, p. 100502, 2022, doi: 10.1016/j.measen.2022.100502.
S. Madhu and M. Ali Hussain, “Securing Medical Images by Image Encryption using Key Image,” Int. J. Comput. Appl., vol. 104, no. 3, pp. 30–34, 2014, doi: 10.5120/18184-9079.
Y. Q. Zhang and X. Y. Wang, “A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice,” Inf. Sci. (Ny)., vol. 273, pp. 329–351, 2014, doi: 10.1016/j.ins.2014.02.156.
A. B. Abugharsa, A. Samad, B. Hasan, and H. Almangush, “A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm,” Int. J. Comput. Sci. Issues, vol. 9, no. 4, pp. 41–47, 2012.
J. Xu, B. Zhao, and Z. Wu, “Research on Color Image Encryption Algorithm Based on Bit‐Plane and Chen Chaotic System,” Entropy, vol. 24, no. 2, 2022, doi: 10.3390/e24020186.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ahmed J. Kadhim, Tayseer S. Atia
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.