COAS
Center for Open Access in Science (COAS)
OPEN JOURNAL FOR INFORMATION TECHNOLOGY (OJIT)

ISSN (Online) 2620-0627 * ojit@centerprode.com

OJIT Home

2024 - Volume 7 - Number 1


Data Protection in Healthcare Information Systems Using Cryptographic Algorithm with Base64 512 bits

Agnes K. Muthaura * ORCID: 0009-0000-9011-3436
Kenyatta University, School of Applied Sciences, Nairobi, KENYA

John Kandiri
Kenyatta University, School of Applied Sciences, Nairobi, KENYA

Open Journal for Information Technology, 2024, 7(1), 11-22 * https://doi.org/10.32591/coas.ojit.0701.02011m
Received: 20 March 2024 ▪ Revised: 28 April 2024 ▪ Accepted: 10 May 2024

LICENCE: Creative Commons Attribution 4.0 International License.

ARTICLE (Full Text - PDF)


ABSTRACT:
Recent advancement in technology in Healthcare Information Systems has led to a rise in cyber-attacks and data leakages at the data level. Existing data-level protection techniques that are developed to ensure data-level protection in Healthcare Information Systems lack integration of key security models such as Mandatory Access Controls, Role Based Access Controls and database security approaches in the design and development of data protection methods. In this study, science research methodology was used to design and develop a cryptographic algorithm with Base64 512 bits to enhance data protection at the data level. The algorithm was tested in a healthcare information system through experiments and simulations. The performance of the algorithm was tested to evaluate encryption and decryption process, strength on brute force attack and plain text vulnerability. The results of the observations showed that the developed algorithm with Base64, AES with fixed length of 512 bits, achieved optimal performance.

KEY WORDS: mandatory access controls, role based access controls, discretionary access controls, label based access controls, advanced encryption standard, electronic medical records.

CORRESPONDING AUTHOR:
Agnes K. Muthaura, Kenyatta University School of Applied Sciences, Nairobi, KENYA.


REFERENCES:

Ahmed, A., Abdulsalam, Y. S., & Olaniyi, O. M. (2018). Enhanced tiny encryption algorithm for secure electronic health authentication system. International Journal of Information Privacy, Security and Integrity, 3(3), 230. https://doi.org/10.1504/ijipsi.2018.10013222

Babatunde, A. O., Taiwo, A. J., & Dada, E. G. (n.d.). Information security in health care centre using cryptography and steganography.

Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, J. F., Jürjens, J., Pavlidis, M., Bonutto, D., Sanz, A. C., Mouratidis, H., Robles, J. G., & Tozzi, A. E. (2017a). Privacy data management and awareness for public administrations: A case study from the healthcare domain. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10518 LNCS, 192-209. https://doi.org/10.1007/978-3-319-67280-9_11

Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, J. F., Jürjens, J., Pavlidis, M., Bonutto, D., Sanz, A. C., Mouratidis, H., Robles, J. G., & Tozzi, A. E. (2017b). Privacy data management and awareness for public administrations: A case study from the healthcare domain. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10518 LNCS, 192-209. https://doi.org/10.1007/978-3-319-67280-9_11

George, J., & Bhila, T. (2019). Security, confidentiality and privacy in health of healthcare data. International Journal of Trend in Scientific Research and Development, 3(4), 373-377. https://doi.org/10.31142/ijtsrd23780

Harman, L. B., Flite, C. A., & Bond, K. (2012). State of the art and science electronic health records: Privacy, confidentiality, and security. American Medical Association Journal of Ethics (Vol. 14). www.virtualmentor.org712.

Health Data in the Information Age (1994). In Health Data in the Information Age. National Academies Press. https://doi.org/10.17226/2312

Lucca, A. V., Silva, L. A., Luchtenberg, R., Garcez, L., Mao, X., Ovejero, R. G., Pires, I. M., Barbosa, J. L. V., & Leithardt, V. R. Q. (2020). A case study on the development of a data privacy management solution based on patient information. Sensors (Switzerland), 20(21), 1-24. https://doi.org/10.3390/s20216030

Paragas, J. R. (2020, October 3). An enhanced cryptographic algorithm in securing healthcare medical records. Proceeding – 2020 3rd International Conference on Vocational Education and Electrical Engineering: Strengthening the Framework of Society 5.0 through Innovations in Education, Electrical, Engineering and Informatics Engineering, ICVEE 2020. https://doi.org/10.1109/ICVEE50212.2020.9243228

Paragas, J. R., Sison, A. M., & Medina, R. P. (2019). Hill Cipher modification: A simplified approach. 2019 IEEE 11th International Conference on Communication Software and Networks, ICCSN 2019 (pp. 821-825). https://doi.org/10.1109/ICCSN.2019.8905360

Rjaibi, W., & Bird, P. (2004). A multi-purpose implementation of mandatory access control in relational database management systems. In Very Large Data Bases. https://doi.org/10.1016/B978-012088469-8.50088-7

© Center for Open Access in Science