Skip to main content
Log in

RETRACTED ARTICLE: Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 23 May 2022

This article has been updated

Abstract

Healthcare systems are heterogeneous by nature, where each device is running on different architectures, platform and operating system. This heterogeneity affects the communication performance in-terms of delay and security threats. An optimized quantum key management technique has been proposed for the purpose of managing the keys with little overhead, which enhances the health care information security by reducing the threats. And also the communication with the key authority is simulated with the quantum channel. The generated key is distributed via a dedicated quantum channel in terms of quantum bits which decreases the eavesdropping rate, transmission error, and leakage to maximum extent which improves the security further. Healthcare User group and content server communicate with the key server via a quantum channel sending them photons. Then they discuss results using a public channel. After getting an encryption key from the key server via the quantum channel, the content server can encrypt their healthcare content and send them by any public channel to the healthcare user groups. This proposed research work investigates group secret key generation problems for different types of Healthcare networks and also addresses the quantum key distribution which enhances the key security in healthcare networks. The analysis shows that the two algorithms yield optimal group key rates in healthcare networks. Numerical results are also provided to validate the performance of the proposed key generation, optimization and quantum distribution. The key generation, optimization and healthcare content encryption and decryption using those keys enhances the security of patient data and quantum simulation shows that about 90% of eavesdropping rate is reduced in healthcare network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  • Clemens Scott K, Benjamin F, Taylor J, Monticone DK (2017) Cyber security in healthcare: a systematic review of modern threats and trends. Technol Health Care. 25:1–10. https://doi.org/10.3233/THC-161263

    Article  Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Human Comput 10(10):4151–4166

    Article  Google Scholar 

  • DongHyun J, Yoon-Ho C, Seung-Woo S (2013) Subscription-period-aware key management for secure vehicular multicast communications. IEEE Trans Veh Technol 62(9):4213–4227

    Article  Google Scholar 

  • Hoonjung L, Hasoo E, Heekuck O (2012) User-oriented key management scheme for content protection in OPMD environment. IEEE Trans Consum Electron 58(2):484–490

    Article  Google Scholar 

  • Juliana C, Adrian B, Margaret AF (2016) A study to determine the most popular lifestyle smartphone applications and willingness of the public to share their personal data for health research. Telemed e-Health 22(8):655–665

    Article  Google Scholar 

  • Lei Z, Qianhong Wu, Josep D, Bo Q, Zheming D (2015) Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure groupcommunications. IEEE Trans Inform Forensics Security. 10(11):2352–2364

    Article  Google Scholar 

  • Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS (2016) Cyber threats to health information systems: a systematic review. Technol Health Care 24(1):1–9

    Article  Google Scholar 

  • Min-Ho P, Young-Hoon P, Han-you J, Seung-woo S (2013) Secure multiple multicast services in wireless networks. IEEE Trans Mob Comput 12(9):1712–1723

    Article  Google Scholar 

  • Nicole K, Andrea S, Jens E, Andreas M, Thomas H, Andreas V, Stefan W (2016) Validation of a new heart rate measurement algorithm for fingertip recording of video signals with smartphones. Telemed e-Health 22(8):631–636

    Article  Google Scholar 

  • Priyanka KV (2013) Hash chain based key management for mobile heterogeneous sensor network. Int J Comput Appl 69(23):33–36

    Google Scholar 

  • Qianhong W, Bo Q, Lei Z, Josep DF, Jesus AM (2013) Fast transmission to remote cooperative groups: A new key management paradigm. IEEE/ACM Trans Netw 21(2):621–633

    Article  Google Scholar 

  • Richard R, Raj A (2014) A network security architecture to reduce the risk of data leakage for health care organizations. In: IEEE 16th international conference on e-health networking applications and services. (Healthcom). 15–18. doi: 10.1109/HealthCom.2014.7001846.

  • Robert B, Juan Miguel A, Alexander L (2017) Progress in satellite quantum key distribution. npj Quantum Inform. doi: 10.1038/s41534-017-0031-5.

  • Shaohua T, Lingling Xu, Niu L, Xinyi H, Jintai D, Zhiming Y (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263

    Article  Google Scholar 

  • Singh A, Chatterjee K (2019) Trust based access control model for securing electronic healthcare system. J Ambient Intell Human Comput 10(11):4547–4565

    Article  Google Scholar 

  • Tianqi Z, Jian S, Xiong L, Chen W, Jun S (2018) (2018) Quantum cryptography for the future internet and the security analysis. Hindawi Security Commun Netw 1:1–7

    Google Scholar 

  • Wei Yue L, Xian-F Z, Wu T, Feng ZL, Biao J, Tang Y, Hu H-M, Li Z-P, Liang Z, Wen-Qi C, Sheng-Kai L, Yuan C, Cheng-Zhi P (2017) Experimental free-space quantum key distribution with efficient error correction. Opt Express 25(10):10716–10723

    Article  Google Scholar 

  • Yanji P, Jong U, Usman T, Manpyo H (2012) Polynomial-based critical information management for secure intra-group and inter-group communication. Elsevier J Comput Math Appl. https://doi.org/10.1016/j.camwa.2012.02.008

    Article  Google Scholar 

  • Young-Hoon P, Dong-Hyun J, Min-Ho P, seung-Woo S (2014) Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans Mobile Comput. 13(4):783–796

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edward Rajan Samuel Nadar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-03963-1

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Perumal, A.M., Nadar, E.R.S. RETRACTED ARTICLE: Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. J Ambient Intell Human Comput 12, 7173–7180 (2021). https://doi.org/10.1007/s12652-020-02393-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02393-1

Keywords

Navigation