Research Article

Secure Medical Data Model Using Integrated Transformed Paillier and KLEIN Algorithm Encryption Technique with Elephant Herd Optimization for Healthcare Applications

Table 1

A comparative table of proposed and existing methods with their advantages and disadvantages.

AuthorMethodAdvantagesDisadvantages

Ali et al., [15]Zero-watermarking algorithmIncrease the encryption and decryption process’s security levelBecause some areas in this approach are more important in the diagnostic process, slight changes in them might modify the diagnosis

Kamran and Farooq [16]Information-preserving watermarking schemeExcellent performance and on-time deliveryThe investigation discovered, however, that the present recommended approaches still had application-specific security issues

Vasanthanayaki [17]SMCPSThe suggested approach has a fast computational speedThe photos of the patients, on the other hand, are not encrypted

Anand et al., [18]Compression-then-encryption-based dual watermarkingThe suggested technique has demonstrated good encryption and decryption performance, as well as minimal complexityThe investigation discovered, however, that the present recommended approaches still had application-specific security issues

Ding et al., [20]DeepEDNThe suggested approach is simple to implementThe memory, CPU, and energy budgets are all limited

Hasan et al., [21]Lightweight encryption algorithmThe suggested system’s encrypted entropy and encryption speed are high, protecting patients’ privacy and boosting the security of medical photos on the cloudThe use of security analytics has the potential to drastically reduce vulnerability concerns.

Yang et al., [22]RDHIn terms of storage, search, and update difficulty, the approaches are superiorSearching encrypted medical data without decryption, on the other hand, is challenging

Li et al., [23]SEDSSEIt delivers optimal and lossless picture encryption and decryption, as well as the ability to safeguard medical photos flexibly and reliablyAt the low embedding rate, the image contrast does not appear to be boosted

Zhou et al., [24]A lossless medical image encryption schemeReduce the computational load significantlyHowever, being vulnerable to data manipulation and forgery is a disadvantage

Yang et al., [25], zheng et al., [26], tao and ling [30]ABEIt protects against known-plaintext/background and linkability attacks while maintaining privacyHowever, sharing paper-based medical data between two or more medical institutions was cumbersome and time-consuming

Abdelfattah et al., [27]Search scheme over encrypted dataIncrease the encryption and decryption process’s security level Smart terminals, on the other hand, are typically restricted in computer capacity, and users’ privacy concerns persist

Chen et al., [28]NTRUExcellent performance and on-time deliveryUsers’ sensitive information is involved, and communication energy is used

Liu et al., [29]Singular value decompositionIt necessitated little overheadsThis technique, however, has a substantial computing cost since it compares individual keywords in the trapdoor to all of the keywords

Guo et al., [32]Homomorphic encryptionIt features a low computation/communication overhead and a quick search timeHowever, numerous problems remain in the creation of an online medical prediagnosis system, including medical information leakage and misuse

Niu et al., [31]Searchable attribute-based encryptionLow computation and transmission overheads are requiredHowever, this results in erroneous search results and the downloading of unnecessary material, which may lead to doctor misdiagnosis