Journal of Cybersecurity and Information Management
JCIM
2690-6775
2769-7851
10.54216/JCIM
https://www.americaspg.com/journals/show/696
2019
2019
Parasitic overview on different key management schemes for protection of Patients Health Records
Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore 641114, India.
Shibin
Shibin
Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore 641114, India
K. Martin
Sagayam
Faculty of Computers and Artificial Intelligence, Beni-Suef University, Beni Suef City, 62511, Egypt
Ahmed A.
Elngar
The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.
2021
2021
96
100
10.54216/JCIM.060202
https://www.americaspg.com/articleinfo/2/show/696