Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease
Keywords:
Cuckoo Search, Fragments, EncryptionAbstract
This paper presents a novel and secured approach of transmission using the Cuckoo search metaheuristic algorithm. Dental disease is mostly caused by the colonization of the bacteria inside the oral cavity. Colonization of bacteria affects our teeth, gums, nerves, etc. Such patients are very common and to be cured appropriately. If left untreated, it may lead to severe damages inside the oral cavity. Cardiovascular and metabolic activities are also affected due to dental diseases. To transmit such information of any patient, here an encryption technique has been proposed preceded by generation of suitable key. Fittest session key has been generated by implementing the Cuckoo search metaheuristic algorithm. A mask matrix has been created for the proposed ciphering technique. Patient’s E-prescription proposed by the dentist would be fragmented into multiple fragments. In this paper, serial test has been used for testing the robustness of key and test results obtained reflects the good randomness in nature.
References
[1] Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K., Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm, In the Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT 2013), April 6-8 2013, Gwalior, India, pp. 453-461.
[2] Christian Blum, Ant Colony Optimization: Introduction and recent trends,Physics of Life Review, Elsevier, Vol. 2, Issue 4, December 2005, pp. 353-373
[3] Ping Duan, Yong AI, Research on an Improved Ant Colony Optimization Algorithm and its application, International Journal of Hybrid Information Technology Vol.9, No.4 (2016), pp. 223-234.
[4] Clark, J.A., Nature-Inspired Cryptography: Past, Present and Future, In Proceedings of Conference on Evolutionary Computation, December 8-12, 2003, Canberra, Australia.
[5] M. Mareli, B. Twala, An adaptive cuckoo search algorithm for optimisation, Applied Computing and Informatics, Volume 14, Issue 2, pp. 107-115, July. 2018.
[6] Prabir Kr. Naskar, Hari Narayan Khan, Atal Chaudhuri, A Key Based Secure Threshold Cryptography for Secret Image, International Journal of Network Security, Vol.18, No.1, PP.68-81, Jan. 2016
[7] Preeti Singh et al, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014, pg. 410-415.
[8] H. F. Hua ng and C.C. Chang “A novel efficient (t, n) threshold proxy signature scheme”, Information Sciences 176(10): 1338-1349, 2006.
[9] Bozkurt, Kaya, Selcuk, Guloglu ,“Threshold Cryptography Based On Blakely Secret Sharing”, Information Sciences 177(19):4148–4160, 2008.
[10] Stallings William, “Cryptography and Network Security”, Pearson India Education Service Pvt. Ltd., pp.111-155, 2015
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
