
embedding the cipher text inside seemingly innocent
documents or images, thereby rendering it harder for
attackers to find or alter the information. The algorithm
offers a thorough approach to safeguarding E-Health
data in cloud environments, tackling the intricate
security issues that arise with healthcare data
governance.
In Future, checking the scalability of the proposed
model using different kinds of biomedical images with
other modalities. Introducing the various threats like
image rotation, resizing, tampering, etc., and evaluating
the performance analysis.
References
[1] Gadde, S., Amutharaj, J., & Usha, S., “A security
model to protect the isolation of medical data in the
cloud using hybrid cryptography”, Journal of
Information Security and Applications, Vol.73,
March 2023.
[2] Padma Vijetha Dev, B., & Venkata Prasad, K., “An
Adaptive Lightweight Hybrid Encryption Scheme
for Securing the Healthcare Data in Cloud-Assisted
Internet of Things”, Wireless Personal
Communications, Vol.130.Issue.4, pp:2959-2980,
June 2023.
[3] Sneha Chaturya, A, “Enhancing Data Security
through Innovations in AES-FBC Encryption and
DWT Steganography”. International Journal of
Engineering Science and Advanced Technology,
Vol.24.Issue.1, pp: 43-53, Oct.2017.
[4] Sasikumar, K., & Nagarajan, S., “Comprehensive
Review and Analysis of Cryptography Techniques
in Cloud Computing”, IEEE Access, pp:1-29,
Jan.2024
[5] Awadh, W. A., Hashim, M. S., & Alasady, A. S.,
“Implementing the Triple-Data Encryption
Standard for Secure and Efficient Healthcare Data
Storage in Cloud Computing Environments”,
Informatic, Vol.48Issue.6, April 2024.
[6] Kumar, K. P., Prathap, B. R., Thiruthuvanathan, M.
M., Murthy, H., & Pillai, V. J., “Secure approach to
sharing digitized medical data in a cloud
environment”, Data Science and Management,
Vol.7,Issue.2, pp:108-118,Dec2023.
[7] Abiodun, M. K., Imoize, A. L., Awotunde, J. B.,
Lee, C. C., Adeniyi, A. E., Chioma, U., & Li, C. T.,
“Analysis of a Double-stage Encryption Scheme
Using Hybrid Cryptography to Enhance Data
Security in Cloud Computing Systems”, Journal of
Library & Information Studies, Vol.21, Issue.2,
pp:1-26, Dec.2023 .
[8] Awadh, W. A., Alasady, A. S., & Hashim, M. S., “A
multilayer model to enhance data security in cloud
computing”. Indonesian Journal of Electrical
Engineering and Computer Science, Vol.32,
Issue.2, pp: 1105-1114, Nov.2023.
[9] Nahar, M., Kamal, A. H. M., & Hossain, G.,
“Protecting health data in the cloud through
steganography: A table-driven, blind method using
neural networks and bit-shuffling
algorithm”, Journal of Network and Computer
Applications, Vol.217, July.2023.
[10] Ali, S., & Anwer, F., “Secure IoT framework for
authentication and confidentiality using hybrid
cryptographic schemes”, International Journal of
Information Technology, pp: 1-15,Feb.2024.
[11] Selvaraj, J., Lai, W. C., Kavin, B. P., & Seng, G.
H., “Cryptographic encryption and optimization for
internet of things based medical image security”,
Electronics, Vol.12, Issue.7, Mar.2023.
[12] Madhu, D., & Vasuhi, S., “Lightweight Encryption
Assisted Man-in-The-Middle Attack-Resilient
Steganography Model for Secure Satellite Imagery
Services: LEMARS”, Journal of Intelligent &
Fuzzy Systems, pp: 1-23, May.2023.
[13] Nadhan, A. S., & Jacob, I. J., “Enhancing
healthcare security in the digital era: Safeguarding
medical images with lightweight cryptographic
techniques in IoT healthcare applications”,
Biomedical Signal Processing and Control, Vol.88,
Feb.2024.
[14] El-Shafai, W., Khallaf, F., El-Rabaie, E. S. M., &
El-Samie, F. E. A., “Proposed 3D chaos-based
medical image cryptosystem for secure cloud-
IoMT eHealth communication services” Journal of
Ambient Intelligence and Humanized Computing,
Vol.15, Issue.1, pp:1-28, July.2022.
[15] Goswami, C., Tamil Selvi, P., Sreenivas, V.,
Seetha, J., Kiran, A., Talasila, V., & Maithili, K.,
“Securing healthcare big data in industry 4.0:
cryptography encryption with hybrid optimization
algorithm for IoT applications”, Optical and
Quantum Electonics, Vol.56, Issue.3, Dec.2023.
[16] Goyal, A., Gupta, A., Chaurasia, K., & Bansal, A.,
“Assured Unlock: A Mobile App for Dual-Layer
Encryption to Enhance Data Security”, 14th
International Conference on Cloud Computing,
Data Science & Engineering (Confluence), IEEE,
pp. 514-519, Jan.2024.
[17] Reddy, M. I., Reddy, M. P., Reddy, R. O., &
Praveen, A., “Improved elliptical curve
cryptography and chaotic mapping with fruitfly
Engineering World
DOI:10.37394/232025.2024.6.13
Nagamany Abirami, M. S. Anbarasi