VFHE-DWOA: A Cloud-Based Secure Medical Data Storage and Transmission Model

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 5
Year of Publication : 2025
Authors : T. Anandhi, A. SivaSangari
pdf
How to Cite?

T. Anandhi, A. SivaSangari, "VFHE-DWOA: A Cloud-Based Secure Medical Data Storage and Transmission Model," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 5, pp. 310-326, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I5P127

Abstract:

As the need for Cloud Computing (CC) increases, security becomes more crucial for people as well as organizations, particularly in the medical sector. The secure storage and distribution of healthcare data have emerged as a significant concern due to their escalating use in the treatment and diagnosis of multiple diseases. Medical images include patients’ personal data, and any unauthorized access to or alteration of these images might result in significant consequences. This research proposes a cloud-based security model using the Verifiable Fully Homomorphic Encryption (VFHE) with the Differential Whale Optimization Algorithm (DWOA) technique for secure medical image storage and transmission. The VFHE technique is applied to encrypt the medical images before storing them in the cloud. The DWOA algorithm is utilized to optimize the key generation process for improved efficiency and security. The encrypted images are uploaded to the cloud database, where the cloud storage enables remote access for legal users with security. The legal users are allowed to have access to the cloud storage through an internet portal. When a legal user requests access, the encrypted images are retrieved from the cloud. Using the VFHE-DWOA method, the encrypted image is decrypted back to its original form for further use. The results show that the VFHE-DWOA model achieves efficient encryption, decryption, and key generation time. The image quality assessment highlights superior performance, with the model achieving the lowest Mean Squared Error (MSE) of 0.214, the highest Peak Signal-to-Noise Ratio (PSNR) of 64.35 dB, and Structural Similarity Index Measure (SSIM) of 99.91% and Correlation Coefficient (CC) of 99.93%, ensuring minimal distortion and high image fidelity post-decryption. The VFHE-DWOA model outperformed the current models and demonstrated itself as a secure cloud-based medical image storage and transmission model.

Keywords:

Cloud computing, Cloud security, DWOA, Homomorphic encryption, Medical image, VFHE.

References:

[1] Hadeel Amjed Saeed et al., “Survey on Secured Scientific Workflows Scheduling in Cloud Environment,” Future Internet, vol. 17, no. 2, pp. 1-29, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Giuseppe Agapito, and Mario Cannataro, “An Overview on the Challenge and Limitation using Cloud Computing in Healthcare Corporation,” Big Data and Cognitive Computing, vol. 7, no. 2, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Remya Sivan, and Zuriati Ahmad Zukarnain, “Security and Privacy in Cloud-Based E-Health Systems,” Symmetry, vol. 13, no. 5, pp. 1-14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Smita Sharma, and Sanjay Tyagi, “Security and Privacy Preservations of Electronics Health Record in Cloud,” International Journal of Fuzzy Logics and Intelligent System, vol. 24, no. 4, pp. 428-439, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] K. Sasikumar, and S. Nagarajan, “Comprehensive Reviews and Analysis of Cryptography Technique in Cloud Computing,” IEEE Access, vol. 12, pp. 52325-52351, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Yazan Al-Issa, Mohammad Ashraf Ottom, and Ahmed Tamrawi, “eHealth Cloud Security Challenge: A Survey,” Journal of Healthcare Engineering, vol. 2019, no. 1, pp. 1-15, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Priyanka, and Amit Kumar Singh “A Survey of Image Encryptions for Healthcare Application,” Evolutionary Intelligences, vol. 16, pp. 801-818, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] K. Munjal, and R. Bhatia, “A Systematic Review of Homomorphic Encryption and its Contributions in Healthcare Industry,” Complex & Intelligent System, vol. 9, pp. 3759-3786, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mandeep Kaur, Surender Singh, and Manjit Kaur, “Computational Images Encryption Technique: A Comprehensive Review,” Mathematical Problem in Engineering, vol. 2021, no. 1, pp. 1-17, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Hamed Taherdoost, Tuan-Vinh Le, and Khadija Slimani, “Cryptographic Technique in Artificial Intelligences Security: A Bibliometric Review,” Cryptography, vol. 9, no. 1, pp. 1-16, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Yousef Alghamdi, and Arslan Munir, “Image Encryptions Algorithm: A Survey of Designs and Evaluation Metric,” Journal of Cybersecurity and Privacy, vol. 4, no. 1, pp. 126-152, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Fei Yan et al., “Insight into Security and Privacy Issue in Smart Healthcare System based on Medical Image,” Journal of Information Security and Application, vol. 78, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Saja Theab Ahmed et al., “Medical Images Encryptions: A Comprehensive Review,” Computers, vol. 12, no. 8, pp. 1-45, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Manish Kumar, and Prateek Gupta, “A New Medical Image Encryption Algorithm based on the 1D Logistic Map Associated with Pseudo-Random Numbers,” Multimedia Tool and Application, vol. 80, pp. 18941-18967, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Fursan Thabit et al., “A Novel Effective Lightweight Homomorphic Cryptographic Algorithms for Data Security in Cloud Computing,” International Journal of Intelligent Network, vol. 3, pp. 16-30, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Mohammad Ayoub Khan et al., “A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data,” IEEE Access, vol. 8, pp. 52018-52027, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Fahad Alblehai et al., “Cascading Quantum Walk with Chebyshev Maps for Designing a Robust Medical Images Encryption Algorithms,” Scientific Report, vol. 15, pp. 1-24, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[18] A. Mondal and P. S. Chatterjee, “CloudSec: A Lightweight and Agile Approach to Secure Medical Images Transmissions in the Cloud Computing Environments,” SN Computer Science, vol. 5, no. 237, pp. 1-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Jeeva Selvaraj et al., “Cryptographic Encryptions and Optimizations for Internet of Things based Medical Images Security,” Electronics, vol. 12, no. 7, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] B. Rahul, and K. Kuppusamy, “Efficiency Analysis of Cryptographic Algorithm for Image Data Security in Cloud Environments,” IETE Journal of Research, vol. 69, no. 9, pp. 6053-6064, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] P. Suhasini, and S. Kanchana, “Enhanced Fractional Orders Lorenz Systems for Medical Images Encryptions in Cloud-Based Healthcare Administrations,” International Journal of Computer Network and Application, vol. 9, no. 4, pp. 424-437, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] R. Denis, and P. Madubala, “Hybrid Data Encryption Model Integrating Multi-Objective Adaptive Genetic Algorithm for Secure Medical Data Communication Over Cloud-Based Healthcare Systems,” Multimedia Tool and Application, vol. 80, pp. 21165-21202, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] M. Kaur et al., “Lightweights Biomedical Images Encryptions Approach,” IEEE Access, vol. 11, pp. 74048-74057, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] B.T. Geetha et al., “Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System,” Computational Intelligences and Neurosciences, vol. 2022, no. 1, pp. 1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Arun Amaithi Rajan, and Vetriselvi Vetrian, “QMedShield: A Novel Quantum Chaos-Based Images Encryptions Scheme for Secured Medical Images Storages in the Cloud,” Journal of Modern Optics, vol. 71, no. 13-15, pp. 524-542, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Walid El-Shafai et al., “Robust Medical Image Encryption based on DNA-Chaos Cryptosystem for Secure Telemedicine and Healthcare Applications,” Journal of Ambient Intelligences and Humanized Computing, vol. 12, pp. 9007-9035, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Arun Amaithi Rajan, Vetriselvi Vetrian, and Aruna Gladys, “Secure Image Encryptions Models for Cloud-Based Health Care Storages using Hyper Chaos and DNA Encoding,” International Conferences on Computational Intelligences in Data Sciences, pp. 89-103, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Hemant B. Mahajan, and Aparna A. Junnarkar, “Smart Health Care Systems using Integrated and Lightweights ECC with Private Blockchains for Multimedia Medical Data Processing,” Multimedia Tool and Application, vol. 82, no. 28, pp. 44335-44358, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Obuli Sai Naren, Multi Cancer Dataset, Kaggle, 2022. [Online]. Avaliable: https://www.kaggle.com/datasets/obulisainaren/multi-cancer
[30] Xiaolong Pei et al., “Robustness of Machines Learning to Colors, Size Changes, Normalizations, and Images Enhancements on Micrograph Dataset with Large Samples Difference,” Material & Designs, vol. 232, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Tao Zheng et al., “Differential Whale Optimizations Algorithms,” 2021 IEEE International Conferences on Networking, Sensing and Controls (ICNSC), Xiamen, China, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Alexander Viand, Christian Knabenhans, and Anwar Hithnawi, “Verifiable Fully Homomorphic Encryptions,” arXiv Preprint, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Ruwei Huang, Zhikun Li, and Jianan Zhao, “A Verifiable Fully Homomorphic Encryptions Schemes,” Security, Privacy, and Anonymity in Computations, Communications, and Storages, SpaCCS 2019, Lecture Notes in Computer Sciences, Atlanta, GA, USA, vol. 11611, pp. 412-426, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Ahmed El-Yahyaoui, and Mohamed Dafir Ech-Cherif El Kettani, “A Verifiable Fully Homomorphic Encryptions Schemes for Cloud Computing Security,” Technologies, vol. 7, no. 1, pp. 1-7, 2019.
[CrossRef] [Google Scholar] [Publisher Link]