Abstract
In the realm of information and communication sciences, the Internet of Things (IoT) is a new technology with sensors in the healthcare sector. Sensors are critical IoT devices that receive and send crucial bodily characteristics like blood pressure, temperature, heart rate, and breathing rate to and from cloud repositories for healthcare specialists. As a result of technical advancements, the usage of these devices, referred to as smart sensors, is becoming acceptable in smart healthcare for illness diagnosis and treatment. Data generated from these devices is huge and intrinsically tied to every sphere of daily life including healthcare domain. This information must be safeguarded and processed in a safe location. The term “cloud computing” refers to the type of innovation that is employed to safe keep such tremendous volume of information. As a result, it has become critical to protect healthcare data from hackers in order to maintain its protection, privacy, confidentiality, integrity, and its processing mode. This research suggested a New Lightweight Speck Cryptographic Algorithm to Improve High - Performance Computing Security for Healthcare Data. In contrasted to the cryptographic methods commonly employed in cloud computing, the investigational results of the proposed methodology showed a high level of security and an evident improvement in terms of the time it takes to encrypt data and the security obtainable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Awotunde, J.B., Adeniyi, A.E., Ogundokun, R.O., Ajamu, G.J., Adebayo, P.O.: MIoT-based big data analytics architecture, opportunities and challenges for enhanced telemedicine systems. Stud. Fuzziness Soft Comput. 2021(410), 199–220 (2021)
Maskeliūnas, R., Damaševičius, R., Segal, S.: A review of internet of things technologies for ambient assisted living environments. Future Internet 11(12), 259 (2019)
Abiodun, M.K., Awotunde, J.B., Ogundokun, R.O., Adeniyi, E.A., Arowolo, M.O.: Security and information assurance for IoT-based big data. Stud. Computat. Intell. 2021(972), 189–211 (2021)
Azeez, N.A., Van der Vyver, C.: Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt. Inf. J. 20(2), 97–108 (2019)
Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimedia Tools Appl. 79(31–32), 23483–23506 (2020)
Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 1–23 (2021)
Tabrizchi, H., Rafsanjani, M.K.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020). https://doi.org/10.1007/s11227-020-03213-1
Awotunde, J.B., Chakraborty, C., Adeniyi, E.A., Abiodun, K.M.: Intrusion detection in industrial internet of things network based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. 2021, 1–17 (2021)
Thabit, F., Alhomdy, S., Jagtap, S.: A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int. J. Intell. Netw. 2, 18–33 (2021)
Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D.: An efficient lightweight cryptographic algorithm for IoT security. Commun. Comput. Inf. Sci. 2021(1350), 444–456 (2021)
Mohammed, K.M.A.K.: Confidentiality of data in public cloud storage using hybrid encryption algorithms. Doctoral Dissertation, Sudan University of Science and Technology
Singh, P., Acharya, B., Chaurasiya, R.K.: Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In: Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 153–185. Academic Press
Makarenko, I., Semushin, S., Suhai, S., Kazmi, S.A., Oracevic, A., Hussain, R.: A comparative analysis of cryptographic algorithms in the internet of things. In: 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), pp. 1–8. IEEE, Oct 2020
Nayancy, Dutta, S., Chakraborty, S.: A survey on implementation of lightweight block ciphers for resource constraints devices. J. Discrete Math. Sci. Cryptogr. 1–22 (2020)
Saddam, M.J., Ibrahim, A.A., Mohammed, A.H.: A lightweight image encryption and blowfish decryption for the secure internet of things. In: 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–5. IEEE, Oct 2020
Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Großschädl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 9(3), 283–302 (2019)
Turan, M.S., McKay, K.A., Çalik, Ç., Chang, D., Bassham, L.: Status report on the first round of the NIST lightweight cryptography standardization process. National Institute of Standards and Technology, Gaithersburg, MD, NIST Interagency/Internal Rep. (NISTIR) (2019)
Kraft, J.S., Washington, L.C.: An Introduction to Number Theory with Cryptography. Chapman and Hall/CRC (2018)
Das, A.K., Wazid, M., Yannam, A.R., Rodrigues, J.J., Park, Y.: Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7, 55382–55397 (2019)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Fischer, M., Scheerhorn, A., Tönjes, R.: Using attribute-based encryption on IoT devices with instant key revocation. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 126–131. IEEE, Mar 2019
Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE, Aug 2016
Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight enhanced collaborative key management scheme for smart home application. In: 2017 International Conference on High Performance Computing Simulation (HPCS), pp. 777–784. IEEE, July 2017
Syal, R.: A comparative analysis of lightweight cryptographic protocols for smart home. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications. AISC, vol. 882, pp. 663–669. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5953-8_54
Awotunde, J.B., Jimoh, R.G., Folorunso, S.O., Adeniyi, E.A., Abiodun, K.M., Banjo, O.O.: Privacy and security concerns in IoT-based healthcare systems. Internet Things, 105–134 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
AbdulRaheem, M. et al. (2021). An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare. In: Florez, H., Pollo-Cattaneo, M.F. (eds) Applied Informatics. ICAI 2021. Communications in Computer and Information Science, vol 1455. Springer, Cham. https://doi.org/10.1007/978-3-030-89654-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-89654-6_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89653-9
Online ISBN: 978-3-030-89654-6
eBook Packages: Computer ScienceComputer Science (R0)