In-Depth Analysis of Encryption Techniques for the Protection of Mobile Health Care Applications

Authors

  • Umal Anuraga Nanumura Cybersecurity Researcher, Department of Computer Engineering, University of South Wales, South Wales, United Kingdom

Keywords:

healthcare, mHealth, symmetric, asymmetric, data security

Abstract

Mobile healthcare applications, also known as mHealth apps, play an essential part in handling private patient information in today's healthcare system. In this article, the vital role that encryption plays in the process of data protection is investigated. We take a look at a variety of encryption techniques, such as symmetric and asymmetric encryption, homomorphic encryption, and end-to-end encryption, and evaluate the benefits and drawbacks of each. Several crucial factors, including secure key management and compliance with healthcare legislation, are dissected in this article. Case studies provide an illustration of the impact that data breaches have in the real world as well as successful encryption solutions in mHealth. This study examines existing difficulties and new trends in data security, providing stakeholders in the healthcare industry important insights and suggestions as a result.

Downloads

Download data is not yet available.

Downloads

Published

26-11-2023

Issue

Section

Articles

How to Cite

[1]
U. A. Nanumura, “In-Depth Analysis of Encryption Techniques for the Protection of Mobile Health Care Applications”, IJRESM, vol. 6, no. 11, pp. 139–142, Nov. 2023, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2868

Most read articles by the same author(s)