Anil Singh

Work place: Department of Computing Science, Umea University, Sweden

E-mail: asingh@cs.umu.se

Website:

Research Interests: Network Security, Security Services

Biography

Anil Singh is working as a Postdoctoral Research Fellow, at Umea University, Sweden. His research is focused on energy-aware Cloud Computing. He has been awarded Doctor of Philosophy in Fog (Edge) Computing from IIT Ropar in 2021. He has qualified MTech in CSE from NIT Hamirpur in 2013 and BE in CSE from Uttarakhand Technical University in 2010. He worked as an Assistant Professor in APG Shimla University from 2013 to 2015 and at Thapar University from January 2021 to June 2023. He has published several research papers in security aware scheduling in fog computing and network edge domain.

Author Articles
Fast Encryption Scheme for Secure Transmission of e-Healthcare Images

By Devisha Tiwari Bhaskar Mondal Anil Singh

DOI: https://doi.org/10.5815/ijigsp.2023.05.07, Pub. Date: 8 Oct. 2023

E-healthcare systems (EHSD), medical communications, digital imaging (DICOM) things have gained popularity over the past decade as they have become the top contenders for interoperability and adoption as a global standard for transmitting and communicating medical data. Security is a growing issue as EHSD and DICOM have grown more usable on any-to-any devices. The goal of this research is to create a privacy-preserving encryption technique for EHSD rapid communication with minimal storage. A new 2D logistic-sine chaotic map (2DLSCM) is used to design the proposed encryption method, which has been developed specifically for peer-to-peer communications via unique keys. Through the 3D Lorenz map which feeds the initial values to it, the 2DLSCM is able to provide a unique keyspace of 2544 bits (2^544bits) in each go of peer-to-peer paired transmission. Permutation-diffusion design is used in the encryption process, and 2DLSCM with 3DLorenz system are used to generate unique initial values for the keys. Without interfering with real-time medical transmission, the approach can quickly encrypt any EHSD image and DICOM objects. To assess the method, five distinct EHSD images of different kinds, sizes, and quality are selected. The findings indicate strong protection, speed, and scalability when compared to existing similar methods in literature.

[...] Read more.
Other Articles