Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3568231.3568261acmotherconferencesArticle/Chapter ViewAbstractPublication PagessietConference Proceedingsconference-collections
research-article

Implementation of the SPECK Cipher Algorithm on Patient Blood Pressure Data Using the Internet of Things (IoT)

Published: 13 January 2023 Publication History

Abstract

Internet of Things technology allows humans to collect information about daily activities, for example to find out someone's health information, but at the time of data transmission it has an impact on one's privacy. Sniffing can record data sent from the user to the database server, this results in a leak of individual privacy. The SPECK algorithm is one of the cryptographic algorithms that guarantees confidentiality because the SPECK algorithm has varying key lengths and block sizes. Adding the SPECK cipher Algorithm to the node that holds sensor data can minimize privacy data leaks caused by data transmission on the Internet of Things. The SPECK algorithm has the same results as the test vectors in published journals and the resulting ciphertext can be returned to its original form by decryption. The encryption time is 0.089354 seconds and the decryption time on the server is 0.00610295 seconds.

References

[1]
M. J. Sarnak, “Kidney disease as a risk factor for development of cardiovascular disease: a statement from the American Heart Association Councils on Kidney in Cardiovascular Disease, High Blood Pressure Research, Clinical Cardiology, and Epidemiology and Prevention,” Circulation, vol. 108, no. 17, pp. 2154–2169, 2003.
[2]
H. Denolin, H. Kuhn, H. Krayenbuehl, F. Loogen, and A. Reale, “The defintion of heart failure,” Eur. Heart J., vol. 4, no. 7, pp. 445–448, 1983.
[3]
A. Majid, “Factors analysis related to readmission on patient with congestive heart failure In Yogyakarta hospital year 2010,” Universitas Indonesia, 2010.
[4]
M. K. Suh, “WANDA B,” Weight Act. with Blood Press. Monit. Syst. Hear. Fail. Patients, 2011.
[5]
M. G. Wicaksono, A. Suharsono, and A. Bhawiyuga, “Implementasi Metode Store and Forward Pada Hypertext Transfer Protocol (HTTP),” Universitas Brawijaya, 2016.
[6]
D. Zheng, B. Qin, Y. Li, and A. Tian, “Cloud-assisted attribute-based data sharing with efficient user revocation in the internet of things,” IEEE Wirel. Commun., vol. 27, no. 3, pp. 18–23, 2020.
[7]
B. Ray, S. Douglas, J. Smith, and others, “The SIMON and SPECK lightweight block ciphers,” in Proceedings of the 52nd Annual Design Automation Conference, 2015, p. 175.
[8]
M. A. Razzaque, “Milojevic-Jevric M Palade A Clarke S,” Middlew. internet things a Surv. IEEE Internet Things J, vol. 3, no. 1, p. 70, 2016.
[9]
N. Yazid and A. Harjoko, “Pemantau tekanan darah digital berbasis sensor tekanan MPX2050GP,” IJEIS, vol. 1, no. 1, pp. 35–39, 2011.
[10]
H. H. Mariyono and K. Suryana, “ADVERSE DRUG REACTION,” J. Intern. Med., 2012, [Online]. Available: https://ojs.unud.ac.id/index.php/jim/article/view/3862.
[11]
F. Wang, L. Hu, J. Zhou, Y. Wu, J. Hu, and K. Zhao, “Software toolkits: practical aspects of the internet of things—a survey,” Int. J. Distrib. Sens. Networks, vol. 11, no. 9, p. 534378, 2015.
[12]
D. Nofriansyah, “A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” in Journal of Physics: Conference Series, 2018, vol. 954, no. 1, p. 12003.
[13]
D. Kuswanto and A. Rachmad, “Combination Scheme of Aes Encryption and Error Correction Turbo Code for Cryptography of Cloud Storage,” in International Conference on Science and Technology (ICST 2018), 2018, pp. 720–724.
[14]
V. J. R. Winkler, Securing the Cloud: Cloud computer Security techniques and tactics. Elsevier, 2011.
[15]
R. Buyya, J. Broberg, and A. M. Goscinski, Cloud computing: Principles and paradigms. John Wiley & Sons, 2010.
[16]
J. Wu, L. Ping, X. Ge, Y. Wang, and J. Fu, “Cloud storage as the infrastructure of cloud computing,” in 2010 International conference on intelligent computing and cognitive informatics, 2010, pp. 380–383.
[17]
H. Nguyen, Z. Shen, X. Gu, S. Subbiah, and J. Wilkes, “$\{$AGILE$\}$: Elastic Distributed Resource Scaling for $\{$Infrastructure-as-a-Service$\}$,” in 10th International Conference on Autonomic Computing (ICAC 13), 2013, pp. 69–82.
[18]
K. M. Khan and Q. Malluhi, “Establishing trust in cloud computing,” IT Prof., vol. 12, no. 5, pp. 20–27, 2010.
[19]
I. Bhardwaj, A. Kumar, and M. Bansal, “A review on lightweight cryptography algorithms for data security and authentication in IoTs,” in 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017, pp. 504–509.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIET '22: Proceedings of the 7th International Conference on Sustainable Information Engineering and Technology
November 2022
398 pages
ISBN:9781450397117
DOI:10.1145/3568231
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 January 2023

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SIET '22

Acceptance Rates

Overall Acceptance Rate 45 of 57 submissions, 79%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 39
    Total Downloads
  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media