Description
ABSTRACT
Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. |
One of the best ways to which medical image could be kept secured is through the use of quantum cryptography |
Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legit imate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. |
This paper can make it possible for the healthcare and medical professions to construct crypto graphic communication systems to keep patients’ transferred data safe and secured. |
This work has been able to provide away for two authorized users who are in different locations to securely establish a secret network key and to detect if leaves dropping (a fraudulent or disruption in the network) has occurred.
TABLE OF CONTENTS Cover page/Title page Certification page Executive summary CHAPTER ONE 1.0 Introduction 1.1 Background of the Study 1.2 Aim and Objectives 1.3 significance of the Study 1.4 Internet of Medical Things (IoMT) CHAPTER TWO 2.0 Literature Review 2.1 Review of related studies 2.2 Impact of internet of medical things (IoMT) 2.3 Challenges of IoMT Adoption 2.4 Importance of IoMT Adoption CHAPTER THREE 3.1 Methodology 3.2 Quantumnshor’s factorizing algorithm 3.3 System flow chart 3.4 Conclusion Reference
|
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Medical images have become an essential part of medical diagnoses and treatments. Often, many diseases are better diagnosed through medical imaging. Occasionally, there are needs to refer patients for further diagnosis and treatment without physically moving their medical records to the referred location, and these are usually transferred through network communication infrastructure such as the internet. Usually, medical images are classified information that should be treated with utmost confi- dentiality. Now to ensure the integrity and confidentiality of a medical image, medical professionals mustproperlysecurethesedatawiththenetworkcommunicationinfrastructureinorderforthepatientreferredlocationtoreceivetheexacttransferredmedicalimage.
Alowolodu,Alese,andAdetunmbi(2016)positthat,despitetheinternetprovidingabettersolution to various kinds ofscalability, flexibility, and availability, some people are still skeptical to relinquish their personal data or information over the internet.
PictureArchivingandCommunicationsSystems(PACS)havebeendescribedasareliablemeansof transferringanddistributingimagedata.CommunicationofimagesinaPACSenvironmentisusually overthelocalareanetworkthatisprotectedbyafirewallfromoutsideintruders(Samaan,2016).
Nowadays,thetransmissionofimagesisadailyroutine,anditisnecessarytofindanefficientwayto transmitthemoverthenetworks.Withthenumberofinternetusersontheincreaseeveryday,every- thingdoneonlineisunderthethreatofmaliciousintruders(Kapur et al.,2013).Thetransmissionofimagesovertheinternetischallengingbecauseofthehighriskofeavesdroppersandinternetcommunicationhackers.Inthismanner,oneofthesecuredmeansoftransmittingtheimage over the internet is cryptography.
Cryptographyisasecuritytoolthatprovidessecurityintheciphersofamessage.Itisalsotheartof encodinganddecodingmessagesandhasexistedaslongaspeoplehavedistrustedeachotherand soughtformsofsecurecommunication.Cryptographicalgorithmsuseencryptionkeys,whichare theelementsthatturnageneralencryptionalgorithmintoaspecificmethodofencryption.Cryptographyplaysacentralroleinmobilephonecommunication,e-commerce,Pay-TV,sendingprivatee- mails,andtransmittingfinancialinformation,andittouchesonmanyaspectsofdailylives.Thereare variouscryptographicschemesavailable,oneofwhichistheQuantumCryptography.Quantum Cryptography,orQuantumKeyDistribution(QKD),appliesfundamentallawsofquantumphysics toguaranteesecurecommunication.Itenablestwolegitimateuserstoproduceasharedsecretrandombitstring,whichcanbeusedasakeyincryptographic applications,such as message encryption (for instance,theone-time pad) and authentication(VanDerWalt,2016).Unlike conventional cryptography, whose security often relies on unproven computational assumptions,QKD guarantees security based on the fundamental laws of quantum mechanics. Quantum cryptography solves the problems of secret-key cryptography by providing away for two authorized users who are in different locations to securely establish a net work secret key.
The necessity of fast and secured diagnosis is vital in the medical world to save the life of world creatures. Nowadays,the transmission of images is a daily routine, and it is necessary to find an efficient way to transmit the mover networks (Lo-Varco, Puech,& Dumas, 2003;Norcen,Podesser,Pommer, Schmidt, &Uhl, 2003).For image transmission, two different approaches of technologies have been developed.Thefirstapproachisbasedoncontentprotectionthroughencryption(Berlekempetal., 2018;McEliece2018).In this approach,properdecryptionofdatarequiresakey.Thesecondapproachbasedtheprotectionondigitalwatermarkingordatahidingandaimedatsecretlyembedding a message into the data. In the current era,thetransmissionofimagesovertheinternetischallengingbecauseofthehighriskofeavesdroppersand unsecure communication to internet communication hackers.In this manner,the better way to transmit the image over internet is encryption.
The development of quantum crypto graphy was motivated by the short-comings of classical crypto- graphic methods,which can be classified as either“public-key”or“secret-key”methods.
Public-keyencryptionisbasedontheideaofasafewithtwokeys:apublickeytolockthesafeanda private key to open it (Ekert,2015)Using this method, anyone can send a message since the public key is used to encrypt messages,but only someone with the private key can decrypt the messages.
Since the encrypting and decrypting keys are different, it is not necessary to securely distribute a key. The security of public-key encryption depends on the assumed difficulty of certain mathematical operations, such as factoring extremely large prime numbers.
1.2 Aim and objectives of the study
This seminar is aimed at discussing the application quantum cryptography for the security of internet of medical things. The objectives are:
- To study a means of securing internet of medical things
- To provide a remarkable new dimension in secured network communication infrastructure.
- To ensure proper security of medical infrastructure.
1.3 Significance of the study
This seminar will make it possible for the healthcare and medical professions to constructcryptographiccommunicationsystemstokeeppatients’transferred data safe and secured. |
It will also serve as a means of providing away for two authorized users who are in differentlocationstosecurelyestablishasecretnetworkkeyandtodetectif eavesdropping(a fraudulent or disruption in the network)has occurred |
1.4 Internet of Medical Things (IoMT)
The Internet of Medical Things (IoMT) refers to the interconnected network of medical devices, wearables, and other technology that can collect, transfer, and analyze health data. This technology is transforming the healthcare industry by enabling real-time patient monitoring, improved patient outcomes, and reduced costs.
The Internet of Medical Things (IoMT) works by collecting data from medical devices and wearables and transferring it to healthcare providers, such as doctors and hospitals. This data can be used to monitor patients in real-time and provide early warning signs of potential health problems. The data can also be analyzed to identify patterns and trends, which can lead to improved patient outcomes and reduced costs
CONCLUSION
This work has been able to point out that attaching a computer to a network increases the security risks to data that is being exchanged over the internet, the need to determine what must be protected (text and images), and how they must be protected in order to avoid eaves dropping, data hijacking, anddataespionageinamedicalenvironment.ModifiedShor’sAlgorithmalongwithDataEncryptionStandard(DES) that makes use of a symmetric key(secret key cryptography)in producing an encrypted version of different medial text and images were employed. The encrypted result cannot be decrypted without the encryption key, which would have been encrypted into the result of encryption processes. Also,the work has been able to point out that quantum cryptography with the application of Shor’s Algorithm is a technique for limiting, if not putting an end to,eaves droppersunauthorizedaccesstofilesinamedicalenvironment.Foraneffective,secured,anduncompromising securitysystem,thisworkshouldbeadopted.Itisrecommendedthatfutureresearchersshouldemploytheuseofotherencryptionalgorithmstodevelopencryptingsoftwareandoverallcompareall todeterminethebestoutofallthetechniquesregardingspeed&functionality.Theimplementationofthis work would bring about the following: Security, Reliability, Maintainability, Portability, Extensibility, Reusability, Application Affinity/Compatibility and Resource Utilization.
In conclusion,itcanbeseenfromthepaperthatquantumcryptographywiththeuseofShor’sAlgorithmisthebestapproachthatcanbeemployedinsecuringfiles(text and images)in a medical environment,whichendsuppromotingintegrityoftheprofessionandputssomeassuranceofno eavesdropping in the future with the patient.
CONCLUSION
This work has been able to point out that attaching a computer to a network increases the security risks to data that is being exchanged over the internet, the need to determine what must be protected (text and images),and how they must be protected in order to avoid eaves dropping, data hijacking, anddataespionageinamedicalenvironment.ModifiedShor’sAlgorithmalongwithDataEncryptionStandard(DES)thatmakesuseofasymmetrickey(secretkeycryptography)inproducingan encryptedversionofdifferentmedialtextandimageswereemployed.Theencryptedresultcannot bedecryptedwithouttheencryptionkey,whichwouldhavebeenencryptedintotheresultofencryptionprocesses.Also,theworkhasbeenabletopointoutthatquantumcryptographywiththeapplicationofShor’sAlgorithmisatechniqueforlimiting,ifnotputtinganendto,eavesdroppersunauthorizedaccesstofilesinamedicalenvironment.Foraneffective,secured,and uncompromising security system,thisworkshouldbeadopted.Itisrecommendedthatfutureresearchersshouldemploytheuseofotherencryptionalgorithmstodevelopencryptingsoftwareandoverallcompareall to determine the best out of all the techniques regarding speed & functionality. The implementation of this work would bring about the following: Security, Reliability, Maintainability, Portability, Extensibility, Re usability, Application Affinity/Compatibility and Resource Utilization.
In conclusion,itcanbeseenfromthepaperthatquantumcryptographywiththeuseofShor’sAlgorithmisthebestapproachthatcanbeemployedinsecuringfiles(text and images)in a medical environment,whichendsuppromotingintegrityoftheprofessionandputssomeassuranceofno eavesdropping in the future with the patient.