Authentication of Electronic Health Records Using Visual Cryptography Technique
Abstract
In the medical field, securely transmitting and storing images has emerged as a challenge. The impact of insider attacks on the e-Healthcare system can result in incorrect assessments of a patient's health records, which have led to a lack of accountability in data usage and significant financial costs due to data breaches in e-healthcare without an effective detection method. Several health centers have encountered legal and reputational repercussions as a result. This situation underscores the need for an effective technique to address this issue, particularly in eHealth systems within cloud environments, as operations currently rely on cloud services. Until such techniques are developed, health records remain vulnerable to attacks, potentially resulting in inadequate patient care due to misinformation, which could ultimately lead to fatalities. This necessity serves as a primary motivation for this study. In this research, we introduced a new framework for detecting insider attacks in Cloud-based Healthcare systems through watermark extraction and logging detection techniques. The approach produced results regarding the activities conducted by users, detailing updates on legal and illegal intrusions into the system via an audit trail. The method demonstrated a high degree of precision, recall, and accuracy, showcasing its excellent performance for implementation based on the evaluations performed at the conclusion of the research.
DOI URL: