Cite Article

Secure e-Health Record System Using Identity-based Encryption with Embedded Key

Choose citation format

BibTeX

@article{IJASEIT8278,
   author = {Dian Neipa Purnamasari and Amang Sudarsono and Prima Kristalina},
   title = {Secure e-Health Record System Using Identity-based Encryption  with Embedded Key},
   journal = {International Journal on Advanced Science, Engineering and Information Technology},
   volume = {9},
   number = {5},
   year = {2019},
   pages = {1496--1504},
   keywords = {electronic health record; IBE; ECC; ECIES; embedded key.},
   abstract = {The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks.},
   issn = {2088-5334},
   publisher = {INSIGHT - Indonesian Society for Knowledge and Human Development},
   url = {http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=8278},
   doi = {10.18517/ijaseit.9.5.8278}
}

EndNote

%A Purnamasari, Dian Neipa
%A Sudarsono, Amang
%A Kristalina, Prima
%D 2019
%T Secure e-Health Record System Using Identity-based Encryption  with Embedded Key
%B 2019
%9 electronic health record; IBE; ECC; ECIES; embedded key.
%! Secure e-Health Record System Using Identity-based Encryption  with Embedded Key
%K electronic health record; IBE; ECC; ECIES; embedded key.
%X The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks.
%U http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=8278
%R doi:10.18517/ijaseit.9.5.8278
%J International Journal on Advanced Science, Engineering and Information Technology
%V 9
%N 5
%@ 2088-5334

IEEE

Dian Neipa Purnamasari,Amang Sudarsono and Prima Kristalina,"Secure e-Health Record System Using Identity-based Encryption  with Embedded Key," International Journal on Advanced Science, Engineering and Information Technology, vol. 9, no. 5, pp. 1496-1504, 2019. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.9.5.8278.

RefMan/ProCite (RIS)

TY  - JOUR
AU  - Purnamasari, Dian Neipa
AU  - Sudarsono, Amang
AU  - Kristalina, Prima
PY  - 2019
TI  - Secure e-Health Record System Using Identity-based Encryption  with Embedded Key
JF  - International Journal on Advanced Science, Engineering and Information Technology; Vol. 9 (2019) No. 5
Y2  - 2019
SP  - 1496
EP  - 1504
SN  - 2088-5334
PB  - INSIGHT - Indonesian Society for Knowledge and Human Development
KW  - electronic health record; IBE; ECC; ECIES; embedded key.
N2  - The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks.
UR  - http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=8278
DO  - 10.18517/ijaseit.9.5.8278

RefWorks

RT Journal Article
ID 8278
A1 Purnamasari, Dian Neipa
A1 Sudarsono, Amang
A1 Kristalina, Prima
T1 Secure e-Health Record System Using Identity-based Encryption  with Embedded Key
JF International Journal on Advanced Science, Engineering and Information Technology
VO 9
IS 5
YR 2019
SP 1496
OP 1504
SN 2088-5334
PB INSIGHT - Indonesian Society for Knowledge and Human Development
K1 electronic health record; IBE; ECC; ECIES; embedded key.
AB The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks.
LK http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=8278
DO  - 10.18517/ijaseit.9.5.8278