
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,028 |
تعداد مشاهده مقاله | 67,082,919 |
تعداد دریافت فایل اصل مقاله | 7,656,375 |
Medical data encryption in private cloud based on MAR | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 62، دوره 13، شماره 1، خرداد 2022، صفحه 765-771 اصل مقاله (757.8 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.5583 | ||
نویسندگان | ||
Ahmed Dheyaa Radhi* 1؛ Baqer A Hakim2؛ Fuqdan AL-Ibraheemi3 | ||
1College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq | ||
2College of Dentistry, University of Al-Ameed, Karbala PO Box 198, Iraq | ||
3Department of Computer Engineering and Information Technology, Faculty of Engineering, Razi University, Kermanshah, Iran | ||
تاریخ دریافت: 21 مرداد 1400، تاریخ بازنگری: 25 شهریور 1400، تاریخ پذیرش: 06 مهر 1400 | ||
چکیده | ||
It’s easy to exchange files, folders, and emails in a private network with the aid of a private cloud (PriCld). However, the most common attack with this sort of system is the guessing of the password. The unencrypted connection makes it potential for a man-in-the-middle attack (MaMiAtk) to occur at times. Scanners used to discover vulnerabilities in the system and exploiting them are also a major issue. Therefore, a system that can withstand assaults such as MaMiAtk, Denial of Service Attack (DoS attack), and password guessing is required. In the presented study, a log-based analysis approach has been recommended to guard the system against assaults such as DoS attack, password guessing, and automated scanners. We also use encrypted channels to prevent attacks such as MaMiAtk. | ||
کلیدواژهها | ||
Denial of service (DoS attack)؛ Medical Record Analysis (MAR)؛ Private Cloud (PriCld)؛ man-in-the-middle (MaMiAtk) | ||
مراجع | ||
[1] A.S. Abdulbaqi, A.A. Abdulhameed and A.J. Obaid, Cardiopathy symptoms diagnosis based on a secure real-time ECG signal transmission, Int. J. Nonlinear Anal. and Appl. 12(2) (2021) 1353–1370. [2] A.S. Abdulbaqi and R.H. Mahdi, Biometrics detection and recognition based on geometrical features extraction, In 2018 Int. Conf. Adv. Sustainable Engin. Appl. IEEE, (2018) 59–63. [3] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for medical image encryption, J. Discrete Math. Sci. Crypt. (2021) 1–11. [4] J.M. Beaver, C.T. Symons, R.E. Gillen, A learning system for discriminating variants of malicious network traffic, 8th Annual Cyber Security and Information Intelligence Research Workshop, (2012) pp. 1–4. [5] D.S.A. Elminaam, H.M.K. Abdual and M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Network Secur. 10(3) (2010) 216–222. [6] N. Gura, A. Patel, A. Wander, H. Eberle and S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, M. Joye and J.J. Quisquater (eds), Cryptographic Hardware and Embedded Systems - CHES 2004, 3156 (2004) 119–132. [8] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud Based IoT Smart Healthcare System for Remote Patient Monitoring, EAI Endorsed Transactions on Pervasive Health and Technology, 2021. [9] P. Mell and T. Grance, The NIST Definition of Cloud Computing, Computer Security Division, Inf. Tech. Lab. Nat. Inst. Stand. Tech. 800(145) (2011). [10] J. Owens and J. Matthews, A study of passwords and methods used in brute-force SSH attacks, USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET), 2008. [11] R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM Magazine 21(2) (1978) 120–126. [12] S.P. Singh and R. Maini, Comparison of data encryption algorithms, Int. J. Comput. Sci. Commun. 2(1) (2011) 125–127. [13] M. Strebe, Network Security Foundations: Technology Fundamentals for IT Success, Wiley, 2004. | ||
آمار تعداد مشاهده مقاله: 15,943 تعداد دریافت فایل اصل مقاله: 390 |