Enhancing Medical Data Security in Private Cloud: An MAR-Based Encryption Approach

Article Preview

Abstract:

This study addresses common vulnerabilities in file, folder, and email exchanges within private cloud (PriCld) environments, focusing on threats like password guessing, man-in-the-middle attacks (MaMiAtk), and exploitation by automated scanners. To counter these issues, we propose a log-based analysis approach to enhance resilience against attacks such as MaMiAtk, Denial of Service (DoS), and unauthorized password access attempts. Additionally, encrypted communication channels are implemented to further mitigate the risk of interception in unencrypted connections. The proposed approach aims to strengthen private cloud security and ensure reliable, secure data exchanges.

You might also be interested in these eBooks

Info:

Periodical:

Engineering Headway (Volume 35)

Pages:

254-260

Citation:

Online since:

February 2026

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2026 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A.S. Abdulbaqi, A.A. Abdulhameed and A.J. Obaid, Cardiopathy symptoms diagnosis based on a secure real-time ECG signal transmission, Int. J. Nonlinear Anal. and Appl. 12(2) (2021) 1353–1370.

Google Scholar

[2] A.S. Abdulbaqi and R.H. Mahdi, Biometrics detection and recognition based-on geometrical features extraction, In 2018 Int. Conf. Adv. Sustainable Engin. Appl. IEEE, (2018) 59–63.

DOI: 10.1109/icasea.2018.8370956

Google Scholar

[3] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for medical image encryption, J. Discrete Math. Sci. Crypt. (2021) 1–11.

DOI: 10.1080/09720529.2021.1884378

Google Scholar

[4] J.M. Beaver, C.T. Symons, R.E. Gillen, A learning system for discriminating variants of malicious network traffic, 8th Annual Cyber Security and Information Intelligence Research Workshop, (2012) p.1–4.

DOI: 10.1145/2459976.2460003

Google Scholar

[5] D.S.A. Elminaam, H.M.K. Abdual and M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Network Secur. 10(3) (2010) 216–222.

Google Scholar

[6] N. Gura, A. Patel, A. Wander, H. Eberle and S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, M. Joye and J.J. Quisquater (eds), Cryptographic Hardware and Embedded Systems - CHES 2004, 3156 (2004) 119–132.

DOI: 10.1007/978-3-540-28632-5_9

Google Scholar

[7] A. Khalique, K. Singh and S. Sood, A password-authenticated key agreement scheme based on ECC using smart cards, Int. J. Comput. Appl. 2(3) (2010) 26–30.

DOI: 10.5120/647-903

Google Scholar

[8] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud Based IoT Smart Healthcare System for Remote Patient Moni- toring, EAI Endorsed Transactions on Pervasive Health and Technology, 2021.

DOI: 10.4108/eai.15-7-2021.170296

Google Scholar

[9] P. Mell and T. Grance, The NIST Definition of Cloud Computing, Computer Security Division, Inf. Tech. Lab. Nat. Inst. Stand. Tech. 800(145) (2011).

Google Scholar

[10] J. Owens and J. Matthews, A study of passwords and methods used in brute-force SSH attacks, USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET), 2008.

Google Scholar

[11] R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM Magazine 21(2) (1978) 120–126.

DOI: 10.1145/359340.359342

Google Scholar

[12] S.P. Singh and R. Maini, Comparison of data encryption algorithms, Int. J. Comput. Sci. Commun. 2(1) (2011) 125–127.

Google Scholar

[13] M. Strebe, Network Security Foundations: Technology Fundamentals for IT Success, Wiley, 2004.

Google Scholar