Page 167 - {PDF Title}
P. 167

Blockchain for secure e-health data in smart cities

                include diverse optimizing approaches. Similarly, in the   chosen-plaintext attack (CPA), known ciphertext
                case of HFR, the proposed STI-TSA-based optimization   attack (KCA), and known-plaintext attack (KPA) with
                obtained a high value of 0.95 when the data were 30%.   respect to key breaking time. CCA is an attack model
                In contrast, lower HFR values were achieved when data   for cryptanalysis where the cryptanalyst can gather
                were at 10% and 20%. However, for all data variations,   information by obtaining the decryptions of chosen
                the proposed STI-TSA-based optimization attained high   ciphertexts. CPA is an attack model for cryptanalysis
                HFR over STO, TSA, PFO, SBOA, BA, EHO-OBL,          that presumes that the attacker can obtain the cipher
                                                               34
                and BFL-PSO. 35                                     texts for arbitrary plaintexts.  The goal of the attack
                  As required, the MD is low for the proposed STI-  is  to  gain  information  that  reduces  the  security  of
                TSA-based optimization over STO, TSA, PFO, SBOA,    the encryption scheme. KPA is an attack model for
                BA, EHO-OBL,  and BFL-PSO.  A significantly low     cryptanalysis where the attacker has access to both
                              34
                                              35
                MD value (approximately 0.3) was obtained when data   the plaintext (called a crib) and its encrypted version
                were at 30%, whereas extant optimization approaches   (cipher text). KCA is an attack model for cryptanalysis
                obtained  high MD values.  Thus, with its balanced   where the attacker is assumed to have access only to a
                approach, STI-TSA delivers superior performance.    set of ciphertexts.
                                                                       A message tampering  attack  (MTA) entails
                8.3. Ablation study                                 the harmful alteration  of information,  whereas an
                Table 6 presents the ablation study for validating the   eavesdropping attack (EDA) refers to the unauthorized
                enhancement of the proposed STI-TSA with improved   real-time  interception  of private  communication
                ARM, compared to both the version without ARM and   through modern hacking technologies. Attack analysis
                the version with traditional ARM. After modifying the   reflects the level of protection against these threats –
                existing  ARM, we achieved better performance using   lower values indicate that the attacker takes more time
                the improved ARM. In Table 6, the proposed STI-TSA   to decrypt the sanitized data. For all data variations, the
                with improved ARM shows a high IPR of 0.958626,     proposed STI-TSA with  improved ARM has attained
                whereas the versions without ARM and with traditional   lower  values  over  extant  STO,  TSA, PFO, SBOA,
                ARM show lower IPR. The improved ARM could mine     BA, EHO-OBL,  and BFL-PSO.  This shows that the
                                                                                                  35
                                                                                   34
                the rules quicker with large datasets and create more   hacker needs more time to decrypt the sanitized data.
                meaningful and precise rules. The improved ARM could   Table 7 presents the results of CCA, where the
                identify complicated and subtle associations in the data   proposed STI-TSA with improved  ARM attained
                and manage data variations over time. This is evident   a lower value of 0.227 at  30% data,  compared  to
                from the HFR, where the proposed STI-TSA with the   relatively  higher values  for STO, TSA, PFO, SBOA,
                                                                                  34
                improved ARM reaches a value of 0.8645, compared to   BA, EHO-OBL,  and BFL-PSO,  which are 0.294249,
                                                                                                 35
                0.792064 and 0.813284 for the versions without ARM   0.286082, 0.292351, 0.290481, 0.292558, 0.323516,
                and with traditional ARM, respectively. The MD metric   and 0.304436, respectively. Moreover, the 30% data
                using the proposed STI-TSA with improved  ARM is    shows lower attack values compared to data variations
                lower (around 0.317), whereas the versions without ARM   of 10% and 20%. For KCA, the proposed STI-TSA with
                and with traditional ARM exhibit higher MD values.  improved ARM achieved  a value  of 0.218, while for
                                                                    KPA, it obtained a value of 0.171256. In regards to CPA,
                8.4. Attack analysis                                the proposed STI-TSA with improved ARM attains a
                Table 7 presents an analysis of various attack      low value of 0.21335. Moreover, for MTA and EDA,
                types,  namely,  chosen  ciphertext  attack  (CCA),   the proposed STI-TSA with improved ARM achieved

                 Table 6. Ablation analysis using Siberian Tiger Integrated Tuna Swarm algorithm with improved
                 association rule mining over conventional works
                 Metrics                    Proposed without       Proposed with        Siberian Tiger Integrated Tuna
                                             association rule   conventional association   Swarm algorithm with improved
                                                 mining             rule mining             association rule mining
                 Information preservation ratio  0.912531             0.928175                    0.958626
                 Hiding failure rate            0.792064              0.813284                    0.86452
                 Modification degree            0.427843              0.410396                    0.317007



                Volume 22 Issue 1 (2025)                       161                           doi: 10.36922/AJWEP025040017
   162   163   164   165   166   167   168   169   170   171   172