End-to-End Security and Privacy Protection for Healthcare Data Using AES-256 and Dynamic Authentication
| International Journal of Electronics and Communication Engineering |
| © 2025 by SSRG - IJECE Journal |
| Volume 12 Issue 12 |
| Year of Publication : 2025 |
| Authors : T. Rathi Devi, S. Nallusamy, D. Sobya, P. Divya, P. S. Chakraborty |
How to Cite?
T. Rathi Devi, S. Nallusamy, D. Sobya, P. Divya, P. S. Chakraborty, "End-to-End Security and Privacy Protection for Healthcare Data Using AES-256 and Dynamic Authentication," SSRG International Journal of Electronics and Communication Engineering, vol. 12, no. 12, pp. 241-257, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I12P120
Abstract:
Security and Confidentiality of patient information are important in the modern healthcare system. Patient information is often stored on digital platforms through digital health records, telemedicine, and remote monitoring. The proposed work presents a cryptographic authentication framework for healthcare monitoring that uses AES-256 and Virtual Password Authentication(VPF) to protect sensitive data. The Virtual Password Function (VPF) is a little trick that combines a secret function with a code booking technique. This technique prevents unauthorized users from compromising security. It mitigates password-based attacks. Patient data is stored in a completely encrypted way to meet healthcare privacy mandates. The proposed system was developed in Java for encryption and matching authentication of processes. The implementation uses AES-256 encryption to safeguard patient data. It includes custom authentication logic for managing virtual passwords. The cloud uses encrypted end-to-end patient information and stores it in MySQL. The scalable and maintainable front-end web interface and backend control logic are developed using Java JSP Servlet. The framework provides secure, adequate protection of sensitive healthcare data in digital health ecosystems by leveraging strong encryption and adaptive authentication. As shown by experimental results and security analysis, the proposed model is effective for healthcare applications requiring high-level security. It offers relatively low execution, processing, key generation, and encryption/decryption times, alongside enhanced security.
Keywords:
Patient information, Cryptographic Authentication, AES-256 Encryption, MySQL, Java JSP Servlet.
References:
[1] Yi Sun et al., “PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare,” IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1981-1990, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Rui Zhang, Rui Xue, and Ling Liu, “Security and Privacy for Healthcare Blockchains,” IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3668-3686, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Guangjun Wu et al., “Privacy-Preserved Electronic Medical Record Exchanging and Sharing: A Blockchain-based Smart Healthcare System,” IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1917-1927, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Jusak Jusak et al., “A New Approach for Secure Cloud-Based Electronic Health Record and its Experimental Testbed,” IEEE Access, vol. 10, pp. 1082-1095, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Maryam Shabbir et al., “Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing,” IEEE Access, vol. 9, pp. 8820-8834, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Fengqi Li et al., “EHRChain: A Blockchain-Based EHR System using Attribute-based and Homomorphic Cryptosystem,” IEEE Transactions on Services Computing, vol. 15, no. 5, pp. 2755-2765, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mohammad Kamrul Hasan et al., “Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications,” IEEE Access, vol. 9, pp. 47731-47742, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sangjukta Das, and Suyel Namasudra, “A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 21, no. 4, pp. 1106-1116, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mehedi Masud et al., “Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2649-2656, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Leonardo Da Costa et al., “Sec-Health: A Blockchain-Based Protocol for Securing Health Records,” IEEE Access, vol. 11, pp. 16605 16620, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Linlin Xue, “DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System,” IEEE Access, vol. 10, pp. 30779-30791, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Asep Saepulrohman, and Agus Ismangil, “Data Integrity and Security of Digital Signatures on Electronic Systems using the Digital Signature Algorithm (DSA),” International Journal of Electronics and Communications System, vol. 1, no. 1, pp. 11-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Osama Fouad Abdel Wahab et al., “Hiding Data Using Efficient Combination of RSA Cryptography and Compression Steganography Techniques,” IEEE Access, vol. 9, pp. 31805-31815, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Pahrul Irfan et al., “Application of the Blowfish Algorithm in Securing Patient Data in the Database,” Matrix: Journal of Technology and Informatics Management, vol. 12, no. 2, pp. 102-108, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Hailong Yao et al., “ECC-based Lightweight Authentication and Access Control Scheme for IoT E-Healthcare,” Soft Computing, vol. 26, no. 9, pp. 4441-4461, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Seval Capraz, and Adnan Ozsoy, “A Secure Medical Data Sharing Framework for Fight against Pandemics like COVID-19 by using Public Blockchain,” IEEE Access, vol. 12, pp. 39593-93605, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] G. Moheshkumar et al., Security-Driven Data Analytics for Secure Patient Monitoring in Healthcare Application using Secure Hash Algorithm (256), Challenges in Information, Communication and Computing Technology, CRC Press, pp. 167-172, 2025.
[Google Scholar] [Publisher Link]
[18] Bilas Haldar, Partha Kumar Mukherjee, and Himadri Nath Saha, “An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in The Healthcare Sector,” International Journal of Mathematical, Engineering and Management Sciences, vol. 9, no. 6, pp. 1453-1482, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Abdulmohsen Almalawi et al., “Managing Security of Healthcare Data for a Modern Healthcare System,” Sensors, vol. 23, no. 7, pp. 1 18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Parag Rastogi, Devendra Singh, and Sarabjeet Singh Bedi, “An Improved Blockchain Framework for ORAP Verification and Data Security in Healthcare,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, pp. 2853-2868, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Vijaykumar Mamidala, “A Diffie–Hellman Key Exchange Algorithm: Improving Cloud Data Security,” International Journal of Advanced Research in Information Technology and Management Science, vol. 1, no. 1, pp. 88-99, 2024.
[Google Scholar] [Publisher Link]
[22] M. Natarajan et al., “Quantum Secure Patient Login Credential System using Blockchain for Electronic Health Record Sharing Framework,” Scientific Reports, vol. 15, pp. 1-29, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

10.14445/23488549/IJECE-V12I12P120