Journal of Cybersecurity and Information Management
  JCIM
  2690-6775
  2769-7851
  
   10.54216/JCIM
   https://www.americaspg.com/journals/show/696
  
 
 
  
   2019
  
  
   2019
  
 
 
  
   Parasitic overview on different key management schemes for protection of Patients Health Records
  
  
   Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore 641114, India.
   
    Shibin
    Shibin
   
   Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore 641114, India
   
    K. Martin
    Sagayam
   
   Faculty of Computers and Artificial Intelligence, Beni-Suef University, Beni Suef City, 62511, Egypt
   
    Ahmed A.
    Elngar
   
  
  
   The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.
  
  
   2021
  
  
   2021
  
  
   96
   100
  
  
   10.54216/JCIM.060202
   https://www.americaspg.com/articleinfo/2/show/696