INTEGRATED ENCRYPTION SCHEME IN FOG COMPUTING FOR E-HEALTHCARE APPLICATION

Authors

  • Priyanka Rajan Kumar Research Scholar, Department of Computer Science Punjabi University, Patiala,(147001) Punjab, India.
  • Sonia Goel Department of Electronics and Communication Engineering, Punjabi University, Patiala (147001) Punjab, India.

Keywords:

Fog Computing, Internet of Things (IoT), Rivest, Adi Shamir, and Leonard Adleman (RSA), Advanced Encryption Standard (AES) Transport Layer Security (TLS), BLOWFISH.

Abstract

E-Health is a system of providing health services by making use of electronic technologies. They provide improved, flexible, and affordable health services to a large population, especially in situations like a pandemic. The IoT is helping them to connect, generate and share a huge amount of data. This system of online sharing of health records and advice is generating data at rapid growth. This large data is to be managed in terms of storage, processing, transmission, privacy, and security. The cloud came up as a source of big data management but when it came to latency and bandwidth consumption, a system of processing near the edge came as a Fog Computing with distributed processing, reduced delay, and less bandwidth. The Fog is near the generation of data that provides benefits like location awareness, heterogeneity, real-time access, wireless access, and scalability. Here the security of sensitive data is a prime factor. Security can be achieved with cryptography. The paper implemented RSA, BLOWFISH, AES, and Integrated Encryption Scheme of (RSA+BLOWFISH) and (RSA+AES) combination security algorithms in the Fog-enabled E-Healthcare system. The comparison of performance is done on the basis of key size, encryption-decryption time, and throughput. It is found that BLOWFISH has the least encryption-decryption time and more throughput in a single encryption scheme. In the Integrated Encryption Scheme, the (RSA+AES) combination has improved performance among the two combinations. So, to achieve the security of the E-Health system in the Fog computing environment it is more efficient to use Integrated Encryption Scheme.

Downloads

Published

2023-12-30

How to Cite

INTEGRATED ENCRYPTION SCHEME IN FOG COMPUTING FOR E-HEALTHCARE APPLICATION. (2023). JOURNAL PUNJAB ACADEMY OF SCIENCES, 23, 16-32. https://jpas.in/index.php/home/article/view/49