Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way. Health services data must therefore be kept as safe and secure as possible because the release of this data could have serious consequences for patients. A framework for security and privacy must be employed to store and manage extremely sensitive data. Patients' confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue. The medical system has been designed as a standard, access of records, and effective use by medical practitioners as required. In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography. The comparison of the proposed and existing techniques has been carried out in terms of time taken for encryption and decryption, energy, and power. Decryption time has been decreased up to 50% with the proposed method of cryptography. As it will take less time for decryption, less power is consumed for doing the cryptography operations.


Introduction
Today, the field of health care in India is facing major challenges because the technology growth in this field is minimum, and it is essential to provide a complete history of the patient to the doctor. e doctor required the complete details of the patient for proper diagnosis, but it is difficult to maintain the record of each patient and their previous treatment details. Many people undergo treatment for different diseases from different fields of doctors, so the details of the treatments are scattered among the offices, and it is critical to inform treatment details to individual doctors.
ere are chances of repeating the tests without proper consulting, which is a waste of time and money. Sometimes various combinations of medicines lead to serious health issues. So, accurate record keeping is necessary in the field of health care. e information transferred among the health care doctors through the papers or personal communication in the current methodology made the chances of producing death. E-health care provides the chance to keep all the medical records and the records can be accessed by the doctors during the patient visit with the permission of the patient. e service is utilized for effective maintenance of the health record. e system is also utilized to provide real time information. Electronic health record (EHR) is also known by the name of Electronic Medical Record (EMR) and the records utilize cloud servers for high quality infrastructure with cost benefit. Electronic storage system reduces the chances of utilizing hard copies of records and the format of softcopy can be shared among the surgeons, insurance companies, and third-party administrators. Maintaining the confidentiality and privacy of the patients are the important security issues of electronic health record (EHR) maintenance [1]. Cloud service providers are maintaining and managing the cloud servers, so the environment is a trusty one. As one of the chief objectives of cloud computing providers, cloud security is among their main priorities. Should data kept in cloud resources be stolen or rendered inaccessible for long time as a result of deteriorating network connection, a significant loss of commercial revenue for the user is occurring. However, the company's presence is put in jeopardy because of the unexpected lack of IT services. Research on cloud computing safety hazards, possible mitigation measures, and the best cloud security systems are critical to developing trust in technology and increasing security. It is necessary to store sensitive information related to the patient's medical history a secure way. An accessible resource is offered on the Internet vigorously. e process of encryption becomes an effective and promising technique for protecting information before outsourcing. Also, the EHR owner selects the encryption technique and allows the users to access a file. ey have the right to let or cancel the access, and in turn, an authorized user can access the record for any individual or proficient determinations. is helps to classify the public and private users separately. Here, the family members and friends come under the category of personal users, whereas other persons such as nurses, insurance agents, etc., come under the category of public users. More specifically, the paper focuses on the following research questions: (1) To propose a Role Based Proxy Decryption for energy efficiency in Mobile Cloud Computing (2) To compare energy consumption of proposed algorithm with existing algorithms

Literature Survey
Researchers in the field of E-health cloud computing have done studies based on previous research papers and literature. Some of them are as follows. Clients can convey information from far away regions to other distant or fixed areas using versatile information correspondence, which has become a fundamental and fast progressing innovation. is turns out to be the solution to the most pressing issue facing financial professionals today: mobility. In this era of wireless communication, however, mobile devices are limited by their processing power, storage, and, most importantly, battery life [2,3]. e most often utilized applications on mobile devices or other portable devices are chatting and sending texts. However, because the Internet is an open and vulnerable network, some people are concerned about sending sensitive information over it. Encryption-Decryption is the process of making data secure for transmission. Encryption, on the other hand, is computationally costly and consumes energy and computational resources in wireless devices, both of which are restricted. Wireless transmission and larger key sizes impact the power consumption of mobile devices the most [4][5][6][7]. Cloud based medical care registering has changed the substance of medical care in numerous ways [8].
e critical advantages of distributed computing in medical care are the versatility of the administrations and the works to upscale or decrease the information storage and intrigue Artificial Intelligence (AI) and AI. Reference [9] proposed a blockchain-based IoT design to give improved security of medical care information by utilizing Identity-Based Encryption (IBE) calculation. e effective sharing of Electronic Health Record (EHR) can further develop the treatment cycle, finding exactness, security, and protection. In [10], cloud computing security and privacy were discussed in detail by the authors. Using cryptography techniques, they have made cloud computing more secure. But some of the limitations consist in a cloud environment for that they offered the homomorphic encryption techniques are used to perform a high level of security, scalable and efficient security in these solutions. en it required lengthy computations. Attribute-based data sharing approaches for mobile resource users in clouds have been proposed in [11]. It was also possible to verify the correctness of cypher texts before decrypting them online and offline. e security model with the DBDH assumption was selected by the selection, and the attributes set and security model were demonstrated to be secure, even if adding the public parameters lowered the task's offline computing time. In [12], the authors proposed methods of profile matching and safe data sharing in the MHSN cloud computing. Healthcare had, however, altered social networks and cloud computing to allow real-phase data exchange in a cost-effective manner.
ere were a variety of security problems associated with the increased use of mobile healthcare social networks (MHSN). As a result, patients had access to IBBE (Identity-based broadcast encryption)-encrypted health records from which they can securely communicate with a team of surgeons. e attribute-based reencryption provided in advance allowed clinicians to meet established conditions in ciphertext to be permitted in the cloud environment to transform the data into new, identity-based encryption structures. e MHSN matching process was based on identity encryption and the test of equality as well, which was provided by them as well. It helped the patients to find the networks in the privacy conserving mode and its flexible approval to encrypt the health records with the keywords of guessing attacks. en the results protected the data in privacy and security with MHSN. In [13], the authors have developed ontologies for controlling, governing, and protecting cloud applications.
ey have created classifications of threats that cloud operators may encounter and have included them in security models. Cloud security rules and compliance providers were formulated and found through the use of technology by cloud consumers, as an example. Cloud providers' security measures were being defied by users' high levels of security, 2 Computational Intelligence and Neuroscience which were chosen automatically. As a result, the ontology for describing security threats, controls, providers' data, and cloud security rules was semantically built. ey pushed for consumers who wanted to move their data to the cloud and secure their worries in order to make cloud security standards more user-friendly. e ontology rules were designed as a reason for a better match between compliant providers and ontology rules. In order to increase cloud security, [14] claimed that the basic methodology and flexibility were necessary. e customer then permits the classification and representation of security requirements. Cloud secSLAs have so far been used to access and evaluate the security level of these advanced techniques as state-of-the-art security. SecSLAs have specified standardization and state-of-the-art works since their inception. Acquire the cloud security alliance's proven techniques based on real-world data from service providers. ey emphasized security in pattern as the primary factor in decision-making, and they put into practice strategies for visibly matching the results of CSPbased secSLAs with consumers. However, the technique used to solve this work is going to be recommended as advanced secSLA's and notations such as end-to-end process, uncertainty, and dependencies in secSLA's are involved for better assessment to increase the security assurance in the future. An identity-based encryption framework had been proposed in [15] for secure correspondence between objects remembered for the Internet of ings (IoT). As IoT has been growing quickly with the utilization of new advances today. As well as offering new applications that make our lives simpler, it likewise uncovers genuine security and protection issues. Many sensors around us or the applications we use can impart our private information to different items without our insight. Encryption frameworks can be utilized to forestall this arising security issue. Notwithstanding, it is hard to decide the fitting encryption framework because of restricted power assets and computational abilities. In [16], the authors proposed an effective personality based appropriated unscrambling plan for the PHR framework that does not need to recreate the decoding key. Also, through proposed conspire, it is advantageous to impart their information to numerous gatherings. In [17], to address the symmetrical aspects of cloud security, they conducted a literature review of currently available approaches. In order for cloud professionals to demonstrate to their clients and measure the security of cloud-based client services, they conducted a security assessment. As a result, they advocated the construction of a cloud security software framework and the use of fuzzy system principles to address many of the cloud's security concerns at a higher framework level. In [18], they used geo-distributed clouds to provide the E-health monitoring system with privacy preservation and minimal service delay. Consequently, the system was able to disperse the cloud servers and it was allocated a set of servers to request that the user load-balance the workload. Delays occurred when there were few people using the service. e traffic shaping algorithm was also mentioned. It has the capacity to assess traffic attacks and mitigate them by converting user health data collisions to nonhealth data collisions. e author presented an original totally secure AMRIBE scheme in [19], which is an exquisite scheme that accomplishes the IND-MID-CCA and ANON-MID-CCA security in the standard model with tight reduction. When compared to other existing systems, multireciever identitybased encryption has a cheap cost of encryption. Many applications, such as pay-per-view television, video conferencing, and remote learning require encryption. Authors in [20] stated that the Improved Identity Based Encryption method provides low power consumption, good encryption stability, and high authentication potential, making it ideal for implementation in wireless sensor networks with high security needs. In [21], creators joined the ideas of keyprotected encryption (KIE) and personality based encryption with the uniformity test (IBE-ET) to acquire characterbased key-protected encryption with correspondence test (IB-KIEET) that acquired the benefits of personality based encryption (IBE), which improves on the declaration the executives for public key encryption. Besides, the key-protected component was added to lessen the chance of key openness. Presented and formalized in [22], a characterbased encryption change (IBET) model via flawlessly incorporating two encryption instruments, to be specific IBE and personality-based transmission encryption (IBBE). In IBET, information clients are distinguished and approved for information access in light of their unmistakable characters, which keeps away from muddled testament the board in normal, secure appropriated frameworks. In [23,24], the authors had discussed and defined about Role based encryption, Role based proxy reencryption, and Role based proxy decryption level-I. Result analysis and performance also had been done for the same on the basis of tome and cost. Now, further work has been extended to define the Role based proxy decryption level-II. In this work, performance analysis of consumed energy in terms of time also has been analyzed for existing methods and proposed methods.

Materials and Methods
Cryptography is based on complex mathematical operations like prime number factorization and it is a captivating technique to transfer the data progressively without disturbing the quality originality of the secured message. us, cryptography is concerned with the mathematical techniques which can propose secure communications in the occurrence of malicious hackers. Only the sender and receiver know the plain text by the simple cryptosystem. Cryptography is required to securely store the patient's data in cloud, and cryptography requires some mathematical calculations which affects the power consumption of the battery. Decryption to extract the original data is done at two levels, that is, Level-I and Level-II, because the encrypted data had been stored on cloud by applying the Proxy reencryption technique in earlier work, as mentioned in literature survey. In our work, Identity Based Encryption Technique is utilized for uploading data into the cloud. e identity of the user is extracted initially to generate the public key. e public key is generated by utilizing a phone number and e-mail ID.
e obtained results depicted that the Computational Intelligence and Neuroscience 3 proposed approach offers better performance than the existing methods. e existing techniques with which the proposed scheme has been compared are GA07B [25], LZD [26], WCW [27], and IBPRE [28].

Role-Based Proxy Decryption Level-II Process.
Using a decryption technique, encrypted data may be recovered from the original data, and decryption is used for security [29,30]. e decryption contains the key to regaining access to the encrypted data. Data transmission handles the decryption procedure entirely. e data cannot be decrypted if the key does not match.

Key Generation.
Key creation is required for decryption. Cryptographic tools are employed during the process of establishing a key that incorporates the alphanumeric sequence [31]. Key generation is the primary focus of software privacy. Unless the key is generated during encryption, no data can be decrypted because it is not generated during decryption. Before selecting any two attributes, data and user attributes are first extracted. In order to choose attributes, the AND operation is used. AND returns the value that is the local key. e private key is formed by performing an exclusive OR (XOR) operation on the local key [32]. Hashing is used to transform the private key into a secret key. Data retrieval requests from users are sent through third-party providers to the data owner. As soon as they had the secret key, users could decrypt whatever ciphertext [33] they had obtained from the cloud and get it back as their own personal plaintext.

Key Authentication.
Access to cryptographic key material should be given to the identified communication authority, and it is the communication entry between two parties. e two parties can be unilateral or mutual [34].

Key Conformation.
Communication agents should prove the control of authenticated keying material after providing key confirmation by the protocol [35].

Key Freshness.
Creating the unique and new independent generated keys among the different communication agents that grow the security and the process is done by key freshness. Generally, decryption algorithm robustness is considered according to the subsequent concerns, Compression friendliness, Security, Format compliance, and Time efficiency [36,37]. Scalability in key management, privacy exposure risk, flexible access, and user revocation were some of the shortcomings of the technology used in electronic health records [38]. e protection of sensitive data is the primary concern when handling it. Because of this, a new algorithm is presented to explain it.

Work Flow.
e workflow of our proposed algorithm for role-based proxy decryption at level II is depicted in Figure 1. In the workflow, first of all, the third-party user will give a request to access the data that is the record of patients [39]. Request from the physical group or third party to access the user is given as the input for the decryption algorithm. en the authentication process is carried out by checking the identity of the third party. After the successful authentication, encrypted file is forwarded to the user dependent.
In the role-specific model, the request received is from the nurse, lab technicians, or physician. A public key is generated as per the user's request and forwarded to the physician group. ird parties or physician group can access the data by utilizing the decryption key. Proxy decryption is introduced to extract the data, and again the decryption process is handled to extract the original data by using a public key so the medical data related to the patient can be securely retrieved by this mechanism.

Role-Based Proxy Decryption Level-II Proposed Algorithm.
In our proposed methodology, an identity-based encryption technique is utilized for uploading data into the clouds. e identity of the user is extracted initially to generate the public key. e public key is generated by utilizing a phone number and e-mail ID. Finally, the encrypted data is uploaded to the clouds. e decryption of data is explained through a given novel proposed algorithm. Following are the symbols used in the algorithm for various parameters:  (i) Personal sensitive data is mentioned as α (ii) Medical data is mentioned as β (iii) Clinical reports are mentioned as c (iv) Detail of insurance policy is mentioned as δ (vi) P G is the physician group who are also registered with the cloud to get access to the users registered. ere are three roles played in P G : (vii) ird-party community service group (TP G ) is the insurance personnel who provide funding to the patients if required. (viii) Pr X is the private key of the user, either the physician group user or the third party user.

Results and Discussion
e cloud storage for health care systems is used to implement our suggested EHR storage model, where each transaction is kept on a cloud and the energy usage for each transaction is computed [23]. In order to conduct the experiment, Java and Wamp server are used. e setup is done on an Intel(R) i3 CPU 2.50 GHz with 4 GB of RAM and 1 TB of local storage running Windows x64. In this work, simulation results of the existing and proposed algorithm are evaluated and compared on the basis of decryption time and energy consumed. ird parties, such as insurance agents, doctors, nurses, and others, can extract data relevant to them using an encryption key provided by the patient in the patient's health record system, which is used for encryption. is section provides the performance evaluation of our proposed approach in terms of level-2 decryption. e time of decryption could also be reduced in this proposed approach which makes the system a much more efficient one. If the user id and passwords are mismatched, then the user cannot open their page.
is is required for the authentication of the user who is requesting data.
e login window will be opened by registered doctors. It includes the user Id, password, and profession. Here the doctor enters all details and then uses the login button to open the pages. Similarly, other registered users like nurses or lab technicians can log in to access the data of patients. ere will be an option to select the available patients and it includes different options like sending a request to Cloud Service Provider (CSP), getting a key, decrypting data, and extracting original data. Initially, the doctor sends the request to Cloud Service Provider (CSP). So, the doctors select the user and send a request to Cloud Service Provider (CSP). e cloud receives the request, and then it will show the details like request from id.dcr1, patient id.ptn1, and the profession of the person who has requested the data. e doctor sends the request to Cloud Service Provider (CSP) and gets the key from the sever.

Performance Analysis of Decryption Time Level-II.
e performance analysis of decryption level-II time for different data sizes is discussed and presented. Table 1 shows the performance analysis of checking decryption time for different data size of the proposed scheme with existing schemes. Table 1 shows the performance analysis of decryption checking time level-I for different data sizes such as 1 GB, 100 GB, 500 GB, and 1000 GB. For validating and comparing simulation results to our suggested technique, four current methods are used: GA07B, LZD, WCW, and IBPRE. Aside from that, data with a size ranging from 1 GB to 1000 GB are employed to evaluate the performance of our proposed method. For 1 GB data size, the existing GA07B along with LZD, WCW, and IBPRE has taken time 0.01 ms to process the 1 GB data, whereas our proposed approach takes 0.009 ms only. For 100 GB data size, the existing GA07B takes much more time than the LZD, WCW, and IBPRE, whereas our proposed approach takes 0.009 ms only. For 500 GB data size, the existing LZD takes much more time than the three ones, whereas our proposed approach takes less time, 0.09 ms. Similarly, for 1000 GB data size, the existing LZD takes much more time than the GA07B WCW, Input: Request to access a user Output: Key and encrypted file Procedure: Step 1: let X be the request from the physician group users or the third-party group users and s is set as the patient id.
Step 2: if (requestor ← authenticated) Step 3: then encrypted file is forwarded to the group user based on the role specific model Step 4: based on the group user model, the public key for decryption is generated and forwarded to the Physician group user as GP Pk Step 5: Step 6: also, for the ird-party user, generate the public key for decryption and forward to the third party user as GP Pk Step 7: finally decrypt the data using, Dec S � if (P G �� TP G ), Then decrypt (δ, Pr X ) Where Pr X is the private key of the user either the physician group user or the third party user.
Computational Intelligence and Neuroscience IBPRE, whereas our proposed approach takes very less time, 0.01 ms only. From the obtained results, it is observed that the proposed method achieves better performance than the existing methods. e graphical representation of this performance evaluation of decryption level-II time for different data sizes is depicted in Figure 2. Table 2 shows the performance analysis of checking energy consumption with respect to time for different data sizes. Energy consumed is directly related to time. For validating and comparing the results, GA07B, LZD, WCW, and IBPRE are used. In addition, data of a size ranging from 1 to 1000 GB is used to evaluate the suggested approach's performance. e graphical representation of this evaluation is shown in Figure 3. e results depicted that the proposed approach offers better performance than the existing techniques. As it gives results in less time as compared to other methods and corresponding it will also consume less energy.

Conclusion
e main goal of this proposed work is to secure the intimate patient information by the deployment of the Electronic Health Record and to provide the better security in the EHRs using Encryption, Proxy based Reencryption, Level-I decryption, Level-II decryption. In this paper, cryptography methods are utilized for privacy, security, and reliability with E-health cloud systems through cloud storage systems. Several methods of E-health, decryption framework and personal health records are analyzed in a detailed way. Here, we proposed a scheme as a role-based proxy decryption approach that supported the delegate of decryption rights to user's revocation.
is paper provides the performance evaluation of our proposed approach in level-II decryption by using role-based proxy decryption to extract the data and again, the decryption process is controlled to extract the original data with the help of a public key. e energy consumption in decryption for each transaction could be reduced in our proposed system, which makes the system a more efficient one. e ultimate aim of this paper is to secure the intimate patient information so that the medical data about the patient could be safely and securely retrieved using electronic health records. e study of various energy efficient cryptographic algorithms provides a large scope in the future of Mobile Cloud Computing. ere are many ways to extend this work. In future work, the researcher plans to explore a strategy for developing more efficient attributebased signcryption schemes for mobile cloud computing devices that fulfils both the elements of digital signature and public key encryption at the same time.
Data Availability e data will be available from the authors upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.