M-ECDH Cryptographic Framework for Secure Cloud Based Healthcare Monitoring

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 12
Year of Publication : 2025
Authors : Tamilselvan Kaliyaperumal, Poonguzhali Ramaiyan
pdf
How to Cite?

Tamilselvan Kaliyaperumal, Poonguzhali Ramaiyan, "M-ECDH Cryptographic Framework for Secure Cloud Based Healthcare Monitoring," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 12, pp. 218-229, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I12P118

Abstract:

The uncontrolled rate of expansion of healthcare data and storing it in the clouds requires the hardy measures of safety to maintain the privacy of patients and their data security. This paper introduces a safe healthcare monitoring system, which utilizes the Modified Elliptic Curve Diffie-Hellman (M-ECDH) cryptosystem. M-ECDH amplifies the conventional ECC by streamlining the key exchange, encryption, and decryption mechanisms, and this minimizes the computational complexity. It is an architecture that serves cloud-integrated healthcare apps, which allows the secure transfer of patient data gathered by devices enabled with IoT. According to the findings of the experiments, it was shown that the encryption, decryption, and key generation durations could be improved by 10-20% as compared to the use of traditional cryptographic approaches. Moreover, it uses integration of blockchain technology to provide data that cannot be changed and access to data that is under control. The suggested solution can be successfully deployed in any contemporary healthcare facility to secure real-time healthcare data without affecting its performance, which is scalable and efficient.

Keywords:

Blockchain, Cloud security, Healthcare monitoring, IoT, M-ECDH.

References:

[1] Global Strategy on Digital Health 2020-2025, pp. 1-50, World Health Organization, 2021.
[Google Scholar] [Publisher Link]
[2] “Accenture Digital Health Technology Vision 2022,” Research Report, pp. 1-54, 2022.
[Google Scholar] [Publisher Link]
[3] “Cost of a Data Breach Report 2021,” IBM Security, 2021.
[Google Scholar] [Publisher Link]
[4] Musab A. Aldali, Hesham Saleh Almssmari, and Mustafa M. Salama, “Comparative Analysis of the RSA and AES Algorithms as Data Cryptosystems,” International Science and Technology Journal, vol. 34, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Sana Fatima et al., “Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing,” Engineering Proceedings, vol. 20, no. 1, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Zehao Tuo, “A Comparative Analysis of AES and RSA Algorithms and their Integrated Application,” Theoretical and Natural Science, vol. 25, no. 1, pp. 28-35, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Darrel Hankerson, Scott Vanstone, and Alfred Menezes, Elliptic Curve Cryptography, Guide to Elliptic Curve Cryptography, Springer, pp. 75-152, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Don Johnson, Alfred Menezes, and Scott Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1, pp. 36-63, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Zhe Liu et al., “Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, pp. 1385-1397, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Julio López, and Ricardo Dahab, “Fast Multiplication on Elliptic Curves Over GF(2m) without Precomputation,” Proceedings of First International Workshop Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, vol. 1717, pp. 316-327, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Elli Androulaki et al., “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” Proceedings of the Thirteenth EuroSys Conference, Porto Portugal, pp. 1-15, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Farhana Akter Sunny et al., “A Systematic Review of Blockchain Applications,” IEEE Access, vol. 10, pp. 59155-59177, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Jigna J. Hathaliya, and Sudeep Tanwar, “An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0,” Computer Communications, vol. 153, pp. 311-335, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ata Ullah et al., “Secure Healthcare Data Aggregation and Transmission in IoT-A Survey,” IEEE Access, vol. 9, pp. 16849-16865, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Rajendra Kumar Dwivedi et al., “Secure Healthcare Monitoring Sensor Cloud with Attribute-Based Elliptical Curve Cryptography,” International Journal of Cloud Applications and Computing, vol. 11, no. 3, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hemant B. Mahajan, and Aparna A. Junnarkar, “Smart Healthcare System using Integrated and Lightweight ECC with Private Blockchain for Multimedia Medical Data Processing,” Multimedia Tools and Applications, vol. 82, pp. 44335-44358, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] O. Sri Nagesh, and S. Naresh Vankamamidi, “Comparative Analysis of MOD-ECDH Algorithm and Various Algorithms,” International Journal of Industrial Engineering & Production Research, vol. 31, no. 2, pp. 301-308, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Guipeng Zhang, Zhenguo Yang, and Wenyin Liu, “Blockchain-based Privacy Preserving E-health System for Healthcare Data in Cloud,” Computer Networks, vol. 203, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] N. Madhusudhana Reddy et al., “Enhanced Elliptic Curve- Diffie Hellman Technique with Bigdata Analytics for Satellite Image Security Enhancement in Internet of Things Systems,” Earth Science Informatics, vol. 17, pp. 711-723, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Wafaa A.N.A. Al-Nbhany, Ammar T. Zahary, and Asma A. Al-Shargabi, “Blockchain-IoT Healthcare Applications and Trends: A Review,” IEEE Access, vol. 12, pp. 4178-4212, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Vinayak Tanksale, “Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices,” Electronics, vol. 13, no. 18, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Shay Gueron, and Vlad Krasnov, “Fast Prime Field Elliptic-Curve Cryptography with 256-Bit Primes,” Journal of Cryptographic Engineering, vol. 5, pp. 141-151, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Peter L. Montgomery, “Speeding the Pollard and Elliptic Curve Methods of Factorization,” Mathematics of Computation, vol. 48, no. 177, pp. 243-264, 1987.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Johann Großschädl et al., “Energy-Efficient Software Implementation of Long Integer Modular Arithmetic,” Proceedings of 7th International Workshop Cryptographic Hardware and Embedded Systems, Edinburgh, UK, vol. 3897, pp. 75-90, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ibrar Yaqoob et al., “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges,” IEEE Wireless Communications, vol. 24, no. 3, pp. 10-16, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Alistair Johnson et al., “MIMIC-IV Clinical Database Demo,” PhysioNet, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] A. Goldberger Ary et al., “PhysioBank, PhysioToolkit, and PhysioNet Components of a New Research Resource for Complex Physiologic Signals,” Circulation, vol. 101, no. 23, pp. e215-e220, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Daniel J. Bernstein, and Tanja Lange, “eBACS: ECRYPT Benchmarking of Cryptographic Systems,” pp. 1-14, 2024.
[Google Scholar] [Publisher Link]
[29] Daniel J. Bernstein et al., “High-Speed High-Security Signatures,” Journal of Cryptographic Engineering, vol. 2, pp. 77-89, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Sajjad Dadkhah et al., “CICIoMT2024: A Benchmark Dataset for Multi-protocol Security Assessment in IoMT,” Internet of Things, vol. 28, pp. 1-22, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] CIC IoMT Dataset 2024, Canadian Institute for Cybersecurity, University of New Brunswick, 2024. [Online]. Available: https://www.unb.ca/cic/datasets/iomt-dataset-2024.html
[32] Hwajeong Seo, and Reza Azarderakhsh, “Curve448 on 32-Bit ARM Cortex-M4,” Proceedings of Progress in 23rd International Conference Cryptology, Seoul, South Korea, vol. 12593, pp. 125-139, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Safa Hussein Oleiwi et al., “Advancing Security and Efficiency in IoT Healthcare Applications with Challenges Benefits and Latency Reduction Techniques,” Journal of Information Systems Engineering and Management, vol. 10, no. 8s, pp. 404-420, 2025.
[CrossRef] [Publisher Link]
[34] Krittibas Parai, and SK Hafizul Islam, “IoT-RRHM: Provably Secure IoT-Based Real-Time Remote Healthcare Monitoring Framework,” Journal of Systems Architecture, vol. 138, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Muhammad Umar Diginsa et al., “Securing IOT Healthcare Applications and Blockchain: Addressing Security Attacks,” International Journal of Software Engineering and Computer Systems, vol. 9, no. 2, pp. 119-128, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Lynne Coventry, and Dawn Branley, “Cybersecurity in Healthcare: A Narrative Review of Trends, Threats and Ways Forward,” Maturitas, vol. 113, pp. 48-52, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Shekha Chenthara et al., “Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing,” IEEE Access, vol. 7, pp. 74361-74382, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Ali Shahzad et al., “A Robust Algorithm for Authenticated Health Data Access via Blockchain and Cloud Computing,” PLoS One, vol. 19, no. 9, pp. 1-25, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Hasan Ali Khattak et al., “Utilization and Load Balancing in Fog Servers for Health Applications,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, pp. 1-12, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[40] P. Blessed Prince, and S.P. Jeno Lovesum, “Privacy Enforced Access Control Model for Secured Data Handling in Cloud-Based Pervasive Health Care System,” SN Computer Science, vol. 1, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Kedir Mamo Besher, Zareen Subah, and Mohammed Zamshed Ali, “IoT Sensor Initiated Healthcare Data Security,” IEEE Sensors Journal, vol. 21, no. 10, pp. 11977-11982, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Dimitra Georgiou, and Costas Lambrinoudakis, Security and Privacy Issues for Intelligent Cloud-Based Health Systems, Advanced Computational Intelligence in Healthcare-7, Springer, Berlin, Heidelberg, pp. 139-161, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Remya Sivan, and Zuriati Ahmad Zukarnain, “Security and Privacy in Cloud-Based E-Health System,” Symmetry, vol. 13, no. 5, pp. 1 14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Nureni Ayofe Azeez, and Charles Van der Vyver, “Security and Privacy Issues in e-health Cloud-based System: A Comprehensive Content Analysis,” Egyptian Informatics Journal, vol. 20, no. 2, pp. 97-108, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Clemens Scott Kruse et al., “Cybersecurity in Healthcare: A Systematic Review of Modern Threats and Trends,” Technology and Health Care, vol. 25, no. 1, pp. 1-10, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Neal Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
[CrossRef] [Google Scholar[Publisher Link]
[47] Victor S. Millers, “Use of Elliptic Curves in Cryptography,” Proceedings of Advances in Cryptology-CRYPTO '85, vol. 218, pp. 417-426, 1986.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Health Information Privacy, U.S. Department of Health and Human Services, 2003. [Online]. Available: https://www.hhs.gov/hipaa/for professionals/security/index.html