⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



An Adaptive Dual-Layer Cryptographic Architecture for Secure and Privacy-Enhanced Healthcare Data Management


Authors : Vemula Sai; Medikonda Jhoshna; Prasanna Guduru; R. J. Ramasree

Volume/Issue : Volume 11 - 2026, Issue 3 - March


Google Scholar : https://tinyurl.com/y4j8e28k

Scribd : https://tinyurl.com/ypre3jwd

DOI : https://doi.org/10.38124/ijisrt/26mar1753

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : In the proposed hybrid encryption scheme, Blowfish is utilised for encrypting the actual medical data because of its fast and computationally efficient symmetric encryption mechanism. Symmetric encryption algorithms require only one secret key for both encryption and decryption purposes, making them highly efficient for processing large amounts of data like patient records, reports, and medical data. Blowfish, functioning in the CBC mode, ensures the secure conversion of the plaintext to ciphertext with high performance and low processing cost. Conversely, RSA is utilized for encrypting and securely transmitting the Blowfish secret key. As RSA is an asymmetric encryption algorithm, it requires a public-private key pair, thereby completely eliminating the key distribution issue often encountered in symmetric encryption algorithms. By encrypting the symmetric key with RSA using secure padding like PKCS#1 OAEP, the proposed scheme ensures that only the intended recipient can decrypt the secret key. This hybrid encryption scheme effectively leverages the speed of symmetric encryption algorithms with the secure key exchange mechanism of asymmetric cryptography, thereby providing both efficiency and security.

Keywords : Hybrid Cryptography, Medical Data Security, Dual-Layer Encryption, Role-Based Access Control, Data Confidentiality, Integrity Verification, Secure Healthcare Systems.

References :

  1. IBM Security, “Cost of a Data Breach Report 2023,” IBM Corporation, 2023.
  2. World Health Organisation, “Global Strategy on Digital Health 2020–2025,” WHO Press, 2021.
  3. William Stallings, Cryptography and Network Security: Principles and Practice, 7th ed., Pearson, 2017.
  4. Douglas R. Stinson, Cryptography: Theory and Practice, 3rd ed., CRC Press, 2005.
  5. Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, 1993.
  6. Ron Rivest, Adi Shamir, and Leonard Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  7. National Institute of Standards and Technology, “Secure Hash Standard (SHS), FIPS PUB 180-4,” 2015.
  8. National Institute of Standards and Technology, “Post-Quantum Cryptography Standardization,” 2022.
  9. Cybersecurity and Infrastructure Security Agency, “Healthcare and Public Health Sector Cybersecurity Report,” 2022.
  10. A. Kumar and S. Singh, “A Secure Hybrid Encryption Approach for Healthcare Data Protection,” International Journal of Computer Applications, vol. 182, no. 10, pp. 25–30, 2018.
  11. M. Patel and R. Shah, “Hybrid Cryptography-Based Secure Data Sharing in Cloud Healthcare Systems,” Journal of Information Security and Applications, vol. 45, pp. 150–158, 2019.
  12. C. H. Lee, K. H. Lim, and S. Eswaran, “Secure healthcare data processing using homomorphic encryption: challenges and solutions,” Discover Public Health, vol. 22, pp. 1–15, 2025.
  13. W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed., Pearson Education, 2017.
  14. B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, Springer, pp. 191–204, 1994.
  15. R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  16. K. V. Saravanan and G. Sakthi Priya, “Hybrid Blowfish cryptography with elliptic curve Diffie–Hellman key exchange protocol for enhancing data security,” Discover Electronics, 2025.
  17. A. Shafique et al., “Hybrid encryption framework for secure transmission of medical images in IoT-based telemedicine networks,” Scientific Reports, vol. 14, 2024.
  18. P. Yanez and N. Yadav, “Homomorphic encryption for secure healthcare artificial intelligence applications,” Discover Artificial Intelligence, 2026.
  19. P. Venkataradha krishnamurty and K. Malathi, “Blockchain-based secure healthcare data management framework,” Scientific Reports, 2025.

In the proposed hybrid encryption scheme, Blowfish is utilised for encrypting the actual medical data because of its fast and computationally efficient symmetric encryption mechanism. Symmetric encryption algorithms require only one secret key for both encryption and decryption purposes, making them highly efficient for processing large amounts of data like patient records, reports, and medical data. Blowfish, functioning in the CBC mode, ensures the secure conversion of the plaintext to ciphertext with high performance and low processing cost. Conversely, RSA is utilized for encrypting and securely transmitting the Blowfish secret key. As RSA is an asymmetric encryption algorithm, it requires a public-private key pair, thereby completely eliminating the key distribution issue often encountered in symmetric encryption algorithms. By encrypting the symmetric key with RSA using secure padding like PKCS#1 OAEP, the proposed scheme ensures that only the intended recipient can decrypt the secret key. This hybrid encryption scheme effectively leverages the speed of symmetric encryption algorithms with the secure key exchange mechanism of asymmetric cryptography, thereby providing both efficiency and security.

Keywords : Hybrid Cryptography, Medical Data Security, Dual-Layer Encryption, Role-Based Access Control, Data Confidentiality, Integrity Verification, Secure Healthcare Systems.

Paper Submission Last Date
30 - April - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe