1. Introduction
Smart city-based IoT such as smart healthcare enables the collection and transmission of vast amounts of health data and allows people and things to be connected anywhere, any time, and to anyone. It has led to the development of IoT-based smart healthcare systems, which enable real-time data collection and sharing of patient information. According to Butt et al. [
1], there are four steps to follow for the development of a smart healthcare system: (i) complete knowledge to abstract information from intelligent things connected with the network, (ii) maintenance and transmission of data, (iii) intelligent processing and decision making by the system, and (iv) securing from vulnerabilities.
Ghamari et al. emphasized the importance of smart healthcare systems in healthcare organizations [
2]. Meanwhile, Manogaran et al. acknowledged the rapid growth of IoT technology, which is expected to bring various healthcare applications [
3]. However, there are still major concerns related to security and privacy, particularly in the context of health information exchange (HIE).
HIEs can improve healthcare delivery by providing the ability to securely share healthcare information electronically across multiple healthcare organizations reliably and securely [
4]. HIE allows the sharing of healthcare information electronically among various organizations, while ensuring reliability and security in the edge computing environment. The main security issue in HIE is the protection of electronic patient records during transmission [
5]. According to [
6], patient data becomes more vulnerable to unauthorized access without the implementation of any proper security measures, such as encryption. Furthermore, the absence of suitable security measures may pose any potential risks not only to patient privacy but also to the integrity of the healthcare system and data itself.
Several studies have highlighted the importance of the security aspect in IoT-based smart healthcare, especially when HIE is involved. The absence of security measures may lead to patient data leakage or unauthorized data access, which compromises confidentiality [
5]. A CIA triad is crucial for secure HIE, which shows the need to prevent any inappropriate data access, protect data from unauthorized alteration, and ensure reliable access to information [
7].
Most of the traditional approaches for HIE emphasize processing time, but these approaches do not consider the resource constraints and scalability requirements which are important in smart healthcare environments. Focusing on safeguarding healthcare data, specifically personally identifiable information of patients and their health records, this study concentrates on two of the main goals: first, to improve the quality of life of citizens with smart healthcare, and second, to guarantee their privacy.
This study makes several key contributions to the field of secure HIE:
Comparative analysis: A comparison of the proposed techniques and the performance metrics used. A detailed comparison of different hybrid encryption approaches is provided, providing valuable insights related to the performance metrics used. Unlike prior studies that focus narrowly on encryption/decryption time, this work evaluates CPU usage, memory consumption, and scalability across varying file sizes—providing a holistic view of algorithm suitability for dynamic healthcare data environments.
Edge-enabled with a multi-layer approach: a novel edge-enabled multi-layer encryption framework that combines ECC for secure key exchange, HMAC-SHA256 for authentication, and multiple symmetric algorithms for confidentiality. By executing key exchange, authentication, and encryption at the network edge, the system ensures real-time responsiveness and lightweight processing—critical for smart healthcare systems operating with limited computational resources. This edge-enabled encryption proposes a dynamic mechanism that implement the strategy based on file size and resource constraints.
Holistic performance-centric evaluation: An extensive evaluation is used, with computational time, CPU usage, memory usage, and scalability aspects, providing a significant evaluation for IoT-based smart healthcare environments. While most of the previous studies focus only on encryption/decryption times, this research provides a more holistic performance analysis.
Scalability assessment: The assessment involves evaluating the algorithm’s performance using various file sizes. This approach demonstrates the consistent performance even with different file sizes, which provides a significant insight into how different cryptographic solutions scale in dynamic IoT-based smart healthcare data environments.
Seamless integration into HIE workflows: The architecture aligns with real-world HIE scenarios, enabling secure data exchange between healthcare entities (e.g., Hospital A to Hospital B), using ECC for key agreement, HMAC-SHA256 for integrity verification, and symmetric encryption for confidentiality. This layered approach supports compliance with the CIA triad and enhances interoperability across heterogeneous platforms.
2. Related Works
IoT-based smart healthcare systems facilitate real-time monitoring, early anomaly detection, and personalized treatment plans, ultimately improving patient care and outcomes. The seamless integration of IoT in healthcare has revolutionized the way medical data is collected, analyzed, and utilized, paving the way for more efficient, accurate, and patient-centric healthcare delivery [
5].
2.1. Health Information Exchange Security Requirements
HIE, which is a truly interoperable connected health system, enables data flows with both one-to-one and one-to-many connections, leading to the exchange of information among multiple interfaces which require systems to cooperate with one another. However, security issues for electronic patient records in transit hinder the usage of IoT in smart healthcare systems. Among these issues, the confidentiality and entity authentication of electronic patient records are major concerns [
5]. Furthermore, where HIE requires more sensitive data to be collected and shared among various platforms, protection against unauthorized use/access is essential. Unauthorized access to IoT devices could create a serious risk to patient’s health, as well as to their private information. Maintaining the security and privacy of patients’ health data is the biggest challenge in smart healthcare systems [
7].
Another important aspect that requires attention in IoT-based smart healthcare is the lack of interoperability among the heterogeneous platforms, which is identified as a potential vulnerability that could lead to data privacy loss, compliance regulation issues, and backward compatibility with legacy systems. Internal sharing of electronic medical records is the norm [
8]. Data leakage may occur throughout the sharing process between multiple healthcare organizations, as a result of human mistakes or flaws in the procedure or technology. Therefore, ensuring that the utmost priority is given to the security of patient data is crucial. Implementing comprehensive protection measures, including data encryption, user authentication, and application security, while adhering to current security standards and validation algorithms, is imperative [
9].
The expansions of HIEs may make it possible for their medical records to be accessible in a wider variety of healthcare settings. Thus, their concerns may grow if numerous entities and organizations can access and examine the clinical data of the patients. The establishment of IoT-based smart healthcare systems also relies on the sensing devices that are usually deployed in the open environment where numerous security risks exist. To ensure the security of sensitive data, a system should only restrict access to authorized users. Consequently, safeguarding the data against unauthorized access becomes crucial [
10]. Therefore, enhancing the quality of healthcare and improving ease of access to health records while maintaining the security and privacy of the data is crucial and challenging for healthcare organizations globally.
2.2. Cryptographic Techniques for Secure Smart Healthcare Systems
The reviewed literature focuses on the application of security techniques in the healthcare context. The literature review was carried out not only to identify the importance of performance optimization but also to influence the main goal of the study.
Existing studies have explored various cryptographic methods to secure HIE. Khan et al. (2020) proposed a secure framework for authentication and encryption of IoT-based medical sensors [
9]. An integration of data substitution–Caesar cipher and improved elliptical curve cryptography (IECC) is presented in this research and was simulated using Java and NS3; however, the simulation does not accurately represent the real-world performance of smart healthcare.
Popoola et al. (2024) proposed an optimized hybrid encryption framework which combined ECC-256R1 and AES-128 in EAX mode [
11]. This solution is implemented in a smart home healthcare environment, capable in mitigating common cybersecurity threats, such as man-in-the-middle and replay attacks. This research also highlights the need of lightweight and efficient cryptographic techniques for securing sensitive health data in IoT applications.
Meanwhile, Lahraoui et al. (2024) introduced a hash-based technique to securely embed messages into elliptic curve points, to enhance elliptic curve cryptography (ECC) during the HIE [
12]. Random parameters were used and secret points were shared from the elliptic curve of the Diffie–Hellman protocol to improve security against various attack models. The findings show that the proposed scheme maintained the linear complexity and ensured the integrity of the message via securely attached tags.
Nagarajan et al. (2021) utilized the RES-256 Algorithm with a more secure setup from any potential known attacks such as denial of service, attack blocking, or sensor attacks, in order to strengthen the safety of the patient data [
13]. Meanwhile, Qiu et al. (2020) used a proposed AES Encryption, which was able to provide high-level protection during data sharing, improve data integrity, and perform more efficiently with a smartphone platform [
14]. Therefore, this approach is not suitable to be implemented in large-scale data sharing scenarios, due to high computational and storage overhead, which raise conflicts with the scenario of smart healthcare environments.
Kaliyaperumal and Sammy (2022) introduced Attribute-Based Encryption (ABE) with the aim of addressing security challenges such as scalability, access flexibility, and account revocation, specifically in medical applications [
10]. In the proposed technique, an assumption is made where the third-party servers are considered secure and reliable, which is not the usual protocol. Xiong et al. (2020) proposed Ciphertext-Policy Attribute-based encryption, which provides powerful security with less computational overhead than the existing schemes, but may face challenges if sensitive medical information is being collected and shared [
15]. The Blowfish Algorithm proposed by [
16], with increased efficiency and key expansion, is thought to be effective and secure. However, it does not address interoperability with any current security mechanisms or protocols in the healthcare sector.
Table 1 shows that the existing studies tend to prioritize encryption and decryption time as the main performance indicators, but a more comprehensive assessment of cryptographic solutions’ suitability for HIE should consider a wider range of factors. This includes evaluating the algorithms’ ability to efficiently manage memory resources and maintain consistent performance as data volumes increase. Smart healthcare environments often involve large amounts of sensitive patient data, and the ability of security measures to efficiently handle growing data quantities is crucial. Thus, the existing research has notable limitations. There is a lack of comprehensive analysis regarding the scalability and memory utilization of these cryptographic techniques. Most studies primarily focus on encryption and decryption efficiency, without adequately addressing how the algorithms perform in terms of memory usage and scalability when dealing with varying file sizes and data volumes. These gaps underscore the need for holistic, performance-aware encryption strategies suitable for dynamic healthcare environments.
Table 2 shows the comparative summary of existing works and our proposed framework. This work advances the state of the art by bridging cryptographic rigor with practical deployment needs in smart healthcare. It offers a scalable, secure, and performance-aware solution for protecting sensitive patient data in next-generation HIE systems.
2.3. Edge-Enabled Encryption
Edge-enabled hybrid encryption framework distinguishes itself from some prior works through its comprehensive approach to health information exchange across IoT-based smart healthcare ecosystems. While Gowthamani et al. focus on edge cryptographic strategies [
18], Singh & Chatterjee on health monitoring security [
19], and Parah et al. on authentication mechanisms [
20], our work uniquely integrates a hybrid encryption architecture that strategically combines symmetric and asymmetric cryptographic methods across multiple system layers (device, edge, cloud). The key distinction lies in our framework’s emphasis on secure health information exchange between healthcare entities rather than just internal data protection, addressing security and performance optimization challenges. By distributing encryption tasks intelligently based on computational capabilities, our hybrid approach provides a more comprehensive solution for securing data throughout the entire healthcare information exchange lifecycle, from IoT sensors through edge processing to inter-organizational data sharing, which previous works do not address as holistically.
3. Proposed Framework
The following section explains the hybrid encryption architecture designed specifically for secure information exchange in IoT-based smart healthcare environments. We outline the key components and structure of the proposed edge-enabled hybrid encryption architecture, highlighting its tailored approach for IoT-based smart healthcare systems.
3.1. Information Exchange in IoT-Based Smart Healthcare
In normal data sharing between hospital, patients’ data from Hospital A should be able to be shared to Hospital B whenever requested. It contains patients’ medical records or general patient information that were stored in Hospital A’s repository, which is then exchanged across the HIE network to Hospital B’s repository upon request. During this request, an edge-enabled hybrid algorithm, which consists of a secure key exchange algorithm, hashing function, and symmetric encryption algorithm, can be applied when Hospital A is trying to send the data to Hospital B to ensure confidentiality, whereby encrypted messages cannot be viewed by attackers who do not own the decryption keys.
3.2. Overview of the Proposed Architecture
To address the limitations identified in the existing approaches discussed in
Section 2, this study proposed an edge-enabled hybrid encryption approach that integrates multiple security layers tailored for secure information exchange in IoT-based smart healthcare environments.
Figure 1 shows how the proposed architecture fits into the IoT-based smart healthcare environment, which consists of four layers. The patients’ data is being collected and stored in Hospital A’s repository; meanwhile, Hospital B, who requested the data, send the request via the HIE network within an edge computing environment. This architecture offers superior performance metrics while maintaining the utmost security of patients’ medical records during information exchange. The architecture combines the following:
- ○
Elliptic curve cryptography (ECC) for secure key exchange;
- ○
Hash-based message authentication code (HMAC) with SHA256 for data integrity and authentication;
- ○
Symmetric encryption algorithms (AES, Salsa20, Blowfish, ChaCha20) for efficient data encryption.
This approach is designed to ensure compliance with the CIA triad while maintaining low computational overhead in an edge computing environment.
3.3. Key Components of the Architecture
The proposed edge-enabled hybrid encryption algorithm combines ECC and HMAC with a symmetric cryptographic algorithm in order to provide a secure transmission between entities (healthcare organizations) by securely exchanging the key that also reduces computational load [
16], adds an extra layer of security by adding a hash function in order to verify the data’s authenticity and detect tampering during transmission [
21], and provides confidentiality in the data using robust symmetric encryptions [
22].
ECC is one of the approaches to public key encryption techniques that is based on the algebraic structure of elliptic curves over finite fields. Since this paper focuses on security and efficiency, ECC is adopted as it is reported to have a high level of security compared to other traditional algorithms such as RSA, making it more suitable for resource-constrained environments like smart healthcare [
14,
23]. HMAC is used to verify the accuracy of data that is stored or transferred across an unreliable channel [
21]. HMAC combines a hash function with a secret key to generate a code that can be used to verify the authenticity and integrity of the data. To elaborate, the hash function uses SHA256 or SHA3 combined with the secret key to create the authentication code. Therefore, upon receiving the message and its corresponding HMAC, the recipient could compute the HMAC of the received message by utilizing the same secret key. In the instance that the values correspond, it can be concluded that the message has remained unaltered during transmission. In this study, SHA256 is used as the hash function as it can generate a compressed message that is smaller than the plaintext. ECC is used as the public key for secure key exchange, and HMAC paired with SHA256 is also used.
To address the varied computational capabilities and latency constraints of edge devices in IoT-based smart healthcare systems, this study integrates four symmetric encryption algorithms: AES, ChaCha20, Blowfish, and Salsa20. Each algorithm is chosen for its distinct performance and security attributes. AES (Advanced Encryption Standard) is widely adopted and benefits from hardware acceleration across many platforms, making it a strong and efficient choice for high-throughput environments [
21]. ChaCha20, a stream cipher optimized for software implementations, provides robust resistance to timing attacks and performs exceptionally well on resource-constrained devices lacking dedicated cryptographic hardware [
24]. Blowfish is recognized for its simplicity and rapid key setup, making it suitable for encrypting short messages with minimal overhead, though it is less favored for large-scale data due to its smaller block size [
25]. Salsa20, the predecessor to ChaCha20, offers comparable speed and security, serving as an alternative for scenarios where lightweight stream ciphers are preferred [
26]. By incorporating these algorithms into a modular framework, the system facilitates adaptive encryption strategies based on file size, device capabilities, and latency requirements, ensuring both flexibility and resilience in dynamic healthcare data exchange scenarios. These symmetric algorithms are used for data encryption in this proposed method using the cipher key of 128. A 128-bit key is advisable for systems operating in hard real-time. It is indicated that this key size provides a balance between security and performance [
21].
To conclude, this edge-enabled hybrid encryption approach combining ECC (elliptic curve cryptography) for secure key exchange, HMAC-SHA256 for data integrity and authentication, and the encryption algorithms for encryption will create a hybrid cryptographic scheme for confidentiality. This layered approach ensures compliance with the CIA triad while maintaining low computational overhead suitable for edge environments.
The encryption process follows these steps:
- (a)
Key exchange: Hospital A and Hospital B generate ECC key pairs. Using Elliptic Curve Diffie–Hellman (ECDH), a shared secret is derived;
- (b)
Key derivation: The shared secret is processed via PBKDF2 with SHA256 and a random salt to produce a symmetric key;
- (c)
Authentication: HMAC-SHA256 is computed over the plaintext to generate a message authentication code (MAC);
- (d)
Encryption: The plaintext is encrypted using one of the selected symmetric algorithms with a session specific IV or nonce;
- (e)
Transmission: The ciphertext, IV/nonce, and HMAC tag are transmitted securely;
- (f)
Verification and decryption: The receiver verifies the HMAC and decrypts the ciphertext using the derived symmetric key.
Figure 2 shows the sequence diagram of the Algorithm 1, the proposed edge-enabled hybrid encryption algorithms. The procedure is as follows:
- ○
ECC is one of the public key encryption techniques for secure key exchange;
- ○
HMAC with SHA256 is used to generate a cryptographic hash function with a secret key that creates unique code for each message;
- ○
Symmetric algorithms such as AES, Salsa20, Blowfish, ChaCha20 are used to encrypt the data using the cipher key of 128.
| Algorithm 1: Proposed authentication and encryption scheme algorithm |
1. Generate ECC key pair (Hospital A); 2. Receive ECC public key (Hospital B); 3. Derive shared secret via ECDH; 4. Apply PBKDF2 with SHA256 and salt → symmetric key; 5. Generate IV/nonce (algorithm-specific); 6. Compute HMAC-SHA256 over plaintext; 7. Encrypt plaintext using selected symmetric algorithm; 8. Transmit: {ciphertext, IV/nonce, HMAC tag}; 9. Receiver: a. Derive symmetric key; b. Verify HMAC; c. Decrypt ciphertext. |
4. Proposed Solution and Experiments
As a hybrid approach, the enhancement was studied using datasets, experiment configuration, performance metrics evaluation, scalability, and statistical analysis. To generate the dummy dataset for the experiments, a Python script was developed to create realistic patient information records. The dataset consists of general patient information, including attributes such as Patient ID, Patient Name, Age, Gender, Blood Group, Diagnosis, Medication, and Next Appointment.
4.1. Datasets and Setup
Firstly, the script defines the structure of the patient information records by specifying the attributes to be included, such as Patient ID, Patient Name, Age, Gender, Blood Group, Diagnosis, Medication, and Next Appointment. The random values for the patient records are created and then exported as CSV files.
In this healthcare scenario, the dummy dataset is generated, which duplicates real-world patient information, representing realistic data of a smart healthcare environment. Different file sizes are created so that experiments can be conducted for performance evaluation and scalability of the proposed architecture across various data volumes.
4.2. Experimental Setup and Requirements
The experiments were employed on a Macbook Air (2017) with a 1.8 GHz Dual-Core Intel Core i5 processor and memory of 8 GB 1600 MHz DDR3, and 512 GB SSD for storage, sufficient capacity for the datasets and generated files. While this configuration does not reflect the constrained computational capacity of embedded or wearable IoT nodes, it was intentionally selected to establish a controlled proof-of-concept environment and ensure consistent benchmarking across hybrid encryption configurations. The MacBook Air supports cross-compilation toolchains (arm-none-eabi, gcc-aarch64) for building binaries targeting ARM Cortex or Jetson platforms.
Python 3.10.9 was chosen as the programming language for implementing the proposed architecture and experiments implementation. The code was written and executed using Visual Studio Code (Version 1.81.0) as the integrated development environment (IDE).
Several cryptographic libraries were utilized to implement the hybrid cryptographic algorithms. These libraries include the following:
cryptography.hazmat.primitives for basic cryptographic primitives;
cryptography.hazmat.primitives.ciphers for cipher algorithms;
cryptography.hazmat.primitives.kdf.pbkdf2 for key derivation functions;
cryptography.hazmat.primitives.asymmetric import ec for elliptic curve cryptography;
cryptography.hazmat.backends for cryptographic backends.
Additionally, the psutil library was used to monitor system resources, such as CPU and memory usage, during the execution of the experiments. Using Python and the mentioned cryptographic libraries allowed for efficient implementation of the hybrid cryptographic algorithms, including ECC for key exchange, HMAC-SHA256 for authentication, and symmetric algorithms (AES, Salsa20, Blowfish, ChaCha20) for encryption and decryption. The psutil library facilitated the monitoring and collection of performance metrics, such as CPU and memory usage, during the experiments.
4.3. Edge-Enabled Hybrid Algorithms
This study introduced proposed enhanced performance, so 128-bit keys are used for the symmetric algorithms, which is advisable for systems operating in hard real-time [
21]. The next section discusses how the approach determines which multi-layer hybrid algorithm is most suitable for a smart healthcare environment.
4.3.1. ECC + HMAC-SHA256 + AES
Algorithm 2 incorporates ECC for secure key exchange with HMAC with SHA256 to hash large amounts of data for quick and efficient authentication and AES for data encryption. The implementation is as follows:
| Algorithm 2: ECC + HMAC-SHA256 + AES |
#Generate private ECC key for Hospital A private_key_a=ec.generate_private_key(ec.SECP224R1(), default_backend()) #Obtain public ECC key of Hospital B: public_key_b = [Received securely from Hospital B] #Generate shared secret using ECDH: shared_secret = private_key_a.exchange(ec.ECDH(), public_key_b) #Generate a 16-byte salt: salt = os.urandom(16) #Derive AES symmetric key from shared secret: key_derivation = PBKDF2HMAC( algorithm = SHA256, length = 32, salt = salt, iterations = 100,000, backend = default_backend() ) symmetric_key = key_derivation.derive(shared_secret) #Generate a 16-byte Initialization Vector (IV) for AES: iv = os.urandom(16) #Create AES cipher in CFB mode: cipher = Cipher(algorithms.AES(symmetric_key), modes.CFB(iv), backend=default_backend()) encryptor = cipher.encryptor() #Encrypt plaintext data: plaintext = b”Confidential patient record” ciphertext = encryptor.update(plaintext) + encryptor.finalize() End Algorithm |
4.3.2. ECC + HMAC-SHA256 + Chacha20
Algorithm 3 utilizes ECC for key exchange with HMAC with SHA256 to hash large amounts of data quickly and efficiently and Chacha20 for data encryption. The implementation is as follows:
| Algorithm 3: ECC + HMAC-SHA256 + Chacha20 |
#Generate ECC private key for Hospital A: private_key_a=ec.generate_private_key(ec.SECP224R1(), default_backend()) #Obtain public ECC key of Hospital B: public_key_b = [Hospital B’s ECC public key] #Generate shared secret using ECDH: shared_secret = private_key_a.exchange(ec.ECDH(), public_key_b) #Generate 16-byte salt: salt = os.urandom(16) #Derive a 32-byte symmetric key using PBKDF2HMAC: key_derivation = PBKDF2HMAC( algorithm = SHA256, length = 32, //Required size for ChaCha20 salt = salt, iterations = 100,000, backend = default_backend() ) symmetric_key = key_derivation.derive(shared_secret) #Generate a 16-byte nonce for ChaCha20: nonce = os.urandom(16) #Create ChaCha20 cipher: cipher = Cipher(algorithms.ChaCha20(symmetric_key, nonce), mode=None, backend=default_backend()) #Encrypt data: encryptor = cipher.encryptor() plaintext = b”Confidential patient data from Hospital A” ciphertext = encryptor.update(plaintext) + encryptor.finalize() End Algorithm |
4.3.3. ECC + HMAC-SHA256 + Blowfish
Algorithm 4 utilizes ECC for key exchange with HMAC with SHA256 to hash large amounts of data quickly and efficiently and Blowfish for data encryption. The implementation is as follows:
| Algorithm 4: ECC + HMAC-SHA256 + Blowfish |
#Generate ECC private key for Hospital A: private_key_a=ec.generate_private_key(ec.SECP224R1(), default_backend()) #Obtain public ECC key of Hospital B: public_key_b = [Hospital B’s ECC public key] #Generate shared secret via ECDH: shared_secret = private_key_a.exchange(ec.ECDH(), public_key_b) #Generate a 16-byte salt: salt = os.urandom(16) #Derive symmetric key using PBKDF2HMAC: key_derivation = PBKDF2HMAC( algorithm = SHA256, length = 32, salt = salt, iterations = 100,000, backend = default_backend() ) symmetric_key = key_derivation.derive(shared_secret) #Generate IV for Blowfish (typically 8 bytes): iv = os.urandom(8) #Create Blowfish cipher in CFB mode: cipher = Cipher(algorithms.Blowfish(symmetric_key), modes.CFB(iv), backend=default_backend()) #Encrypt data: encryptor = cipher.encryptor() plaintext = b”Confidential patient data from Hospital A” ciphertext = encryptor.update(plaintext) + encryptor.finalize() End Algorithm |
4.3.4. ECC + HMAC-SHA256 + Salsa20
Algorithm 5 utilizes ECC for key exchange with HMAC with SHA256 to hash large amounts of data quickly and efficiently and Salsa20 for data encryption. The implementation is as follows:
| Algorithm 5: ECC + HMAC-SHA256 + Salsa20 |
#Generate ECC private key for Hospital A: private_key_a=ec.generate_private_key(ec.SECP224R1(), default_backend()) #Obtain public ECC key of Hospital B: public_key_b = [Hospital B’s ECC public key] #Generate shared secret using ECDH: shared_secret = private_key_a.exchange(ec.ECDH(), public_key_b) #Generate a 16-byte salt: salt = os.urandom(16) #Derive symmetric key from shared secret: key_derivation = PBKDF2HMAC( algorithm = SHA256, length = 32, //256-bit key for Salsa20 salt = salt, iterations = 100,000, backend = default_backend() ) symmetric_key = key_derivation.derive(shared_secret) #Generate 8-byte nonce for Salsa20 (required): nonce = os.urandom(8) #Create Salsa20 cipher: cipher = Cipher(algorithms.Salsa20(symmetric_key, nonce), mode=None, backend=default_backend()) #Initialize encryptor and encrypt the data: encryptor = cipher.encryptor() plaintext = b”Confidential patient data from Hospital A” ciphertext = encryptor.update(plaintext) + encryptor.finalize() End Algorithm |
5. Performance and Scalability Evaluation
5.1. Performance Evaluation
A comprehensive evaluation of the proposed algorithms has been conducted, focusing on the aspects of performance and scalability. The proposed solution emphasizes performance-centric encryption, particularly in resource-constrained environments common in IoT-based smart healthcare settings. A custom dataset simulating real patient records was generated to benchmark algorithm performance across varying file sizes. The performance metrics used are processing time (encryption/decryption), CPU usage (encryption/decryption), and memory usage (encryption/decryption).
Table 3,
Table 4 and
Table 5 illustrate the performance evaluation for the four edge-enabled hybrid encryption algorithms.
According to [
9], file encryption time was measured based on different input file sizes with the same key size of 128. File encryption time indicates the time utilized by the encryption algorithm to create a ciphertext from a plaintext, and file decryption time indicates the time utilized by the decryption algorithm to obtain a plaintext from a ciphertext, as shown in Equations (1) and (2) below.
where
= total encryption time (seconds)
= total decryption time (seconds)
= file size
= Encryption speed
= Decryption speed
= Overhead time (seconds)
CPU usage (encryption and decryption) measured the percentage of CPU time used during encryption and decryption over a specific time interval. The CPU usage depends on the algorithm, data size, hardware capabilities, and implementation. It is as shown in Equations (3) and (4) below.
where
CPU Usage during encryption (%)
CPU Usage during decryption (%)
total CPU time consumed for encryption
total CPU time consumed for decryption
and = wall clock time taken
= number of CPU cores
Memory usage refers to the amount of RAM (Random Access Memory) consumed by a system or application during the encryption or decryption process. It is measured as a percentage of memory usage during encryption and decryption consumed by an algorithm while processing data securely, as shown in Equations (5) and (6):
where
= % of RAM used for encryption
= % of RAM used for encryption
= Memory used during encryption (MB)
= Memory used during decryption (MB)
= Total available RAM on the system (MB)
5.2. Scalability Evaluation
The scalability analysis was guided directly by the constraints typical in edge computing environments used in IoT-based smart healthcare settings. Unlike cloud servers, edge devices operate with limited CPU capacity, restricted memory, and strict real-time response requirements. Because of these limitations, scalability cannot be evaluated only through encryption and decryption time. It must also account for how well an algorithm performs as data volume grows while running on resource-constrained hardware.
For this reason, three quantitative metrics were selected. Processing time captures how quickly the device can complete encryption and decryption as file sizes increase. CPU usage reflects the computational load placed on the edge node, which is important because edge processors typically have low clock speeds and cannot support heavy workloads for extended periods. Memory usage indicates how efficiently the algorithm uses available RAM, an essential factor for continuous patient monitoring, where multiple processes often run in parallel. The experimental design therefore increases file sizes from 256 KB up to 151 MB to simulate real-world scenarios where patient records accumulate and change frequently. By observing how each hybrid encryption scheme behaves under these growing data conditions, the analysis demonstrates not only performance but also the practical capacity of the edge device to handle future data expansion without system slowdown or failure.
6. Results and Discussion
6.1. Edge-Enabled Hybrid Encryption Performance Analysis
The focus of this study is to examine the durations required for encryption and decryption, the extent of CPU usage during these operations, and the amount of memory utilized by each technique. This extensive research highlights the relative efficiency of several encryption techniques in real-life situations, offering significant perspectives on their practicality and resource utilization.
6.1.1. Encryption and Decryption Time
When utilizing the ECC + HMAC-SHA256 + Blowfish encryption algorithm, a pattern of longer encryption times corresponds to bigger file sizes. Meanwhile, the ECC + HMAC-SHA256 + Chacha20 algorithm’s encryption time for various file sizes has a tendency toward longer encryption times as file size increases. The encryption time increases noticeably to 2.033 s as the file size increases, especially in the case of the highest file size of 151 MB. Therefore, these correlations emphasize the impact of file size on the performance of the algorithm, with larger files requiring more processing time for encryption.
Based on the performance, the ECC + HMAC-SHA256 + AES approach outperforms the other options. Without the rapid increase observed with Salsa20 and Chacha20, the approach under consideration has stable and predictable encryption time for larger file sizes. Blowfish has a linear link between encryption time and file size, making it an option, though it is less efficient than AES. The Salsa20 method’s quick increase in encryption time as file size increases suggests it may not be ideal for large datasets.
The time evaluation suggests that the best algorithm depends on the application context and file size (
Figure 3). ECC + HMAC-SHA256 + Salsa20 Encryption is best for quick file size decryption. ECC + HMAC-SHA256 + AES Encryption can also be used to prioritize smaller files. Due to their slower decryption speeds, Blowfish and Chacha20 may perform poorly on larger data. Therefore, when choosing an algorithm for an application, it is vital to consider the compromises between encryption level and decryption efficiency.
6.1.2. CPU Usage
Based on CPU evaluation, the study showed that Salsa20 is the best CPU algorithm for varied file sizes (
Figure 4). AES offers robust encryption but increases CPU consumption as file size increases. AES uses more system resources than Salsa20, hence it may not be as efficient at managing larger files. The ECC + HMAC-SHA256 + AES method is the preferred choice for decryption processing in terms of CPU efficiency. Salsa20’s architecture makes it ideal for resource-constrained embedded devices. It uses 27.44% CPU for the largest file (151 MB) and regularly uses low CPU. This shows that it can process data efficiently without straining the CPU. As file size increases, Salsa20’s CPU utilization scales effectively. The combination of ECC, HMAC-SHA256, and AES offers robust encryption but increases CPU consumption as file size increases.
The ECC + HMAC-SHA256 + AES algorithm consistently exhibited better performance in file decryption than the other algorithms under evaluation. This remarkable advantage can be attributed to the algorithm’s efficient use of CPU usage. As the size of the file increased in size, the CPU usage for the ECC + HMAC-SHA256 + AES algorithm likewise increased, although to a smaller degree when compared to the other techniques.
The utilization of ECC + HMAC-SHA256 AES demonstrated enhanced efficiency in managing this increased load, leading to reduced CPU usage. On the other hand, it was observed that ECC + HMAC-SHA256 + Salsa20, ECC + HMAC-SHA256 + Blowfish, and ECC + HMAC-SHA256 + Chacha20 demonstrated a rise in CPU usage with increasing file size, suggesting an inefficient utilization of CPU resources. Consequently, taking into account all of the above, it can be concluded that the ECC + HMAC-SHA256 + AES method is the preferred choice for decryption processes in terms of CPU efficiency.
6.1.3. Memory Usage
In the context of memory usage, the combination of ECC, HMAC-SHA256, and Salsa20 performs best when considering different file sizes (
Figure 5). The memory usage remains continuously low throughout various file sizes. This combination consistently utilizes the minimum amount of memory, while ensuring a predictable scaling pattern. This characteristic makes it the preferred option in scenarios when the encryption process requires minimal memory use. The algorithm comprising ECC, HMAC-SHA256, and AES emerges as the most optimal solution for decryption due to its consistent and efficient utilization of memory resources, rendering it a dependable option for processing data of various sizes.
6.1.4. Analysis
The experiment facilitates code portability and reduces debugging overhead during edge deployment. This choice enables valid comparative analysis of algorithmic efficiency, scalability, and resource consumption under ideal conditions, providing a reliable baseline for future adaptation to lower-powered edge hardware. The results thus serve as a reference point for evaluating trade-offs and guiding implementation decisions in real-world healthcare deployments.
Based on these aspects, the edge-enabled hybrid approach assesses the processing time required, the usage of CPU during these tasks, and memory usage required, for both encryption and decryption. The performance evaluation of encryption algorithms has a significant implication for future implementation in real-world healthcare systems. The results emphasize the importance of selecting a suitable encryption technique based on the overall healthcare system requirements, including different types of data, and its characteristics. For instance, ECC + HMAC-256 + AES demonstrates consistent performance across various file sizes; therefore, it is suitable for systems that handle different medical data types. On the other hand, ECC + HMAC-SHA256 + Salsa20 achieves faster results when used with smaller file sizes. The study also underscores the critical nature of resource utilization, with Salsa20 showing efficient CPU usage across different file sizes, while AES exhibits effective memory usage during decryption. ChaCha20’s ARX-based design provides exceptional performance for small-to-medium healthcare records (≤10 MB), with minimal memory overhead ideal for edge devices. However, the lack of hardware acceleration on commodity processors results in linear scaling challenges for large datasets. The algorithm’s constant-time execution and absence of lookup tables offer superior resistance to cache-timing attacks—a critical consideration for distributed healthcare environments, where adversaries may have physical access to edge nodes.
The findings highlight that a conventional approach is not sufficient anymore, while there is a need for a balanced approach, considering security, efficiency, and resource constraints when implementing encryption in healthcare systems. Performance obtained from the algorithms with different file sizes also shows that HIE systems might benefit from employing multiple encryption methods, as a single and conventional is not appropriate when it comes to specific data types and security requirements for each transaction. This research contributes to the development of more secure, efficient, and responsive healthcare data sharing systems, potentially improving the overall quality and timeliness of patient care.
6.2. Scalability Assessment
Scalability assessment was performed through a comprehensive experimental setup that simulated varying data sizes to evaluate system performance under dynamic conditions. This assessment is important in IoT-based smart healthcare environments, particularly those operating within edge computing infrastructures, where patient data is collected, growing, and changing between parties involved. Patient data was generated with four distinct file sizes ranging from 256 KB (4500 records) to 151 MB (2,340,689 records). Each dataset undergoes a constant process of key exchange, hashing, encryption, and decryption for different encryption algorithms. This incremental increase in file size does not allow for an observation of how each algorithm handles increasing data volumes.
The results show that the system has the ability to maintain operational integrity and acceptable performance levels while the file size increases, unlike most of the existing approaches in the literature, which disregard the scalability aspect when discussing secure HIE systems. By incorporating this evaluation, the study provides valuable insights into how well encryption algorithms are able to perform under various file sizes, which is a critical requirement for real-world healthcare scenarios. Overall, the findings confirm that the proposed edge-enabled hybrid approach is scalable and capable of supporting secure HIE, even as the amount of data grows significantly, which is a normal situation in this domain. This ensures that the system remains robust and responsive in high-volume environments typical of smart healthcare infrastructures.
7. Conclusions and Future Work
This study introduced an edge-enabled hybrid encryption framework tailored for secure and efficient health information exchange (HIE) in IoT-based smart healthcare systems. By integrating ECC for secure key exchange, HMAC-SHA256 for integrity verification, and multiple symmetric algorithms for confidentiality, the proposed architecture demonstrated promising performance across encryption time, CPU usage, memory consumption, and scalability.
To ensure practical deployment, future work will focus on integrating the framework into real-world HIE workflows such as HL7 FHIR systems, while benchmarking across heterogeneous edge devices like Raspberry Pi, Jetson Nano, and ARM Cortex-M. This will enable a granular evaluation of performance variability and help identify optimal cryptographic configurations tailored to device-specific capabilities. Optimization strategies including lightweight cryptographic tuning, parallel processing, and memory reduction could also be explored to enhance responsiveness and energy efficiency. Additionally, dynamic algorithm-selection mechanisms and adversarial resilience testing could potentially be developed to support context-aware encryption. This may involve embedding lightweight rule-based decision engines or adaptive models at the edge to autonomously select the most efficient and secure encryption pathway. Furthermore, security validation under adversarial conditions—including replay, man-in-the-middle, and side-channel attacks—will be conducted to ensure robustness and resilience.
Thus, the demonstrated efficiency of the ECC + HMAC-SHA256 + AES hybrid approach underscores the importance of edge-enabled encryption for securing health data during transmission and storage in IoT-based smart healthcare systems. However, further research is needed to explore alternative cryptographic combinations, device capabilities, and dynamic selection methods that adapt to varying data attributes and operational contexts. These efforts aim to advance secure, scalable, and regulation-aligned encryption solutions for next-generation healthcare information exchange in IoT-based smart healthcare systems.
Author Contributions
Conceptualization, N.A.G.; methodology, all authors; software, all authors; validation, N.A.G. and B.A.B.; formal analysis, M.A. and H.T.; investigation, N.A.G.; resources, N.A.G.; data curation, all authors; writing—original draft preparation, all authors; writing—review and editing, N.A.G. and B.A.B.; visualization, N.A.G.; supervision, N.A.G. and M.A.; project administration, H.T.; funding acquisition, N.A.G. All authors have read and agreed to the published version of the manuscript.
Funding
This paper has been supported by The UM International Collaboration Grant, under University Grant IMG005-2023, titled “A Framework for Secure Health Information Exchange in Smart Healthcare Environments and The Adjunct Professor Program, Batch 2” (No Ref: 01703/UN10.A0101/B/TU.01.00.1/2024), from the Faculty of Computer Science, Universitas Brawijaya, Indonesia.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
No real-world data were used in this study. The dataset used was synthetically generated using a Python-based simulation model that reproduces statistical characteristics of real-world healthcare data.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Butt, S.A.; Diaz-Martinez, J.L.; Jamal, T.; Ali, A.; De-La-Hoz-Franco, E.; Shoaib, M. IoT Smart Health Security Threats. In Proceedings of the 2019 19th International Conference on Computational Science and Its Applications (ICCSA), Saint Petersburg, Russia, 1–4 July 2019; IEEE: Saint Petersburg, Russia, 2019; pp. 26–31. [Google Scholar]
- Ghamari, M.; Janko, B.; Sherratt, R.S.; Harwin, W.; Piechockic, R.; Soltanpur, C. A Survey on Wireless Body Area Networks for Ehealthcare Systems in Residential Environments. Sensors 2016, 16, 831. [Google Scholar] [CrossRef] [PubMed]
- Manogaran, G.; Lopez, D.; Thota, C.; Abbas, K.M.; Pyne, S.; Sundarasekar, R. Big Data Analytics in Healthcare Internet of Things. In Understanding Complex Systems; Qudrat-Ullah, H., Tsasis, P., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 263–284. ISBN 978-3-319-55773-1 (Print). 978-3-319-55774-8 (Online). [Google Scholar]
- Esmaeilzadeh, P. The Effect of the Privacy Policy of Health Information Exchange (HIE) on Patients’ Information Disclosure Intention. Comput. Secur. 2020, 95, 101819. [Google Scholar] [CrossRef]
- Bashir, A.; Mir, A.H. Secure Framework for Internet of Things Based E-Health System. Int. J. E-Health Med. Commun. 2019, 10, 16–29. [Google Scholar] [CrossRef]
- Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.S. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors 2018, 18, 2796. [Google Scholar] [CrossRef] [PubMed]
- Nidhya, R.; Kumar, M.; Maheswar, R.; Pavithra, D. Security and Privacy Issues in Smart Healthcare System Using Internet of Things. In IoT-Enabled Smart Healthcare Systems, Services and Applications; Rani, S., Rajagopal, M., Kumar, N., Shah, S.H.A., Eds.; Wiley: Hoboken, NJ, USA, 2022; pp. 63–85. ISBN 9781119816829. [Google Scholar]
- Tang, M.; Zeng, L.; Zeng, Z.; Liu, J.; Yuan, J.; Wu, D.; Lu, Y.; Zi, J.; Ye, M. Proteomics Study of Colorectal Cancer and Adenomatous Polyps Identifies TFR1, SAHH, and HV307 as Potential Biomarkers for Screening. J. Proteom. 2021, 243, 104246. [Google Scholar] [CrossRef] [PubMed]
- Khan, M.A.; Quasim, M.T.; Alghamdi, N.S.; Khan, M.Y. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data. IEEE Access 2020, 8, 52018–52027. [Google Scholar] [CrossRef]
- Kaliyaperumal, K.; Sammy, F. An Efficient Key Generation Scheme for Secure Sharing of Patients Health Records Using Attribute Based Encryption. In Proceedings of the 2022 International Conference on Communication, Computing and Internet of Things, IC3IoT 2022—Proceedings, Chennai, India, 10–11 March 2022; IEEE: Chennai, India, 2022; pp. 1–6. [Google Scholar]
- Popoola, O.; Rodrigues, M.A.; Marchang, J.; Shenfield, A.; Ikpehai, A.; Popoola, J. An Optimized Hybrid Encryption Framework for Smart Home Healthcare: Ensuring Data Confidentiality and Security. Internet Things 2024, 27, 101314. [Google Scholar] [CrossRef]
- Lahraoui, Y.; Lazaar, S.; Amal, Y.; Nitaj, A. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. Cryptography 2024, 8, 23. [Google Scholar] [CrossRef]
- Nagarajan, S.M.; Deverajan, G.G.; Kumaran, U.; Thirunavukkarasan, M.; Alshehri, M.D.; Alkhalaf, S. Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm. IEEE Trans. Ind. Inform. 2022, 18, 8876–8884. [Google Scholar] [CrossRef]
- Qiu, H.; Qiu, M.; Liu, M.; Memmi, G. Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0. IEEE J. Biomed. Health Inform. 2020, 24, 2499–2505. [Google Scholar] [CrossRef] [PubMed]
- Xiong, S.; Ni, Q.; Wang, L.; Wang, Q. SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage. IEEE Internet Things J. 2020, 7, 2914–2927. [Google Scholar] [CrossRef]
- Abhishek, B.; Panjanathan, R.; Raja Sarobin, V.; Edwin Raja, B.; Narendra, M. Data Security in E-Health Monitoring System. Mater. Today Proc. 2022, 62, 4620–4628. [Google Scholar] [CrossRef]
- Qiu, T.; Chi, J.; Zhou, X.; Ning, Z.; Atiquzzaman, M.; Wu, D.O. Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges. IEEE Commun. Surv. Tutor. 2020, 22, 2462–2488. [Google Scholar] [CrossRef]
- Gowthamani, R.; Manoj, S.O.; Rani, K.S.K. Empowering Integrity and Confidentiality in Smart Healthcare Systems through Effective Edge Cryptographic Strategies. Automatika 2025, 66, 853–870. [Google Scholar] [CrossRef]
- Singh, A.; Chatterjee, K. Edge Computing Based Secure Health Monitoring Framework for Electronic Healthcare System. Clust. Comput. 2023, 26, 1205–1220. [Google Scholar] [CrossRef] [PubMed]
- Parah, S.A.; Kaw, J.A.; Bellavista, P.; Loan, N.A.; Bhat, G.M.; Muhammad, K.; Albuquerque, V.H.C. de Efficient Security and Authentication for Edge-Based Internet of Medical Things. IEEE Internet Things J. 2021, 8, 15652–15662. [Google Scholar] [CrossRef] [PubMed]
- Baban, A.B.; Hameed, S.A. Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC. Iraqi J. Electr. Electron. Eng. 2023, 19, 93–99. [Google Scholar] [CrossRef]
- Pronika; Tyagi, S.S. Secure Data Storage in Cloud Using Encryption Algorithm. In Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021, Tirunelveli, India, 4–6 February 2021; IEEE: Tirunelveli, India, 2021; pp. 136–141. [Google Scholar]
- Barker, E. Recommendation for Key Management—Part 1: General; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016. [Google Scholar]
- Grignani, W.; Santana, K.G.Q.; Santos, D.A.; Dilillo, L.; Melo, D.R. Implementation and Reliability Evaluation of a ChaCha20 Stream Cipher Hardware Accelerator. In Proceedings of the 2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Didcot, UK, 8–10 October 2024; pp. 1–4. [Google Scholar]
- Palka, P.; Perez, R.A.; Fang, T.; Saniie, J. Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. In Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MN, USA, 19–21 May 2022; pp. 193–197. [Google Scholar]
- Le, V.T.D.; Pham, H.L.; Duong, T.S.; Tran, T.H.; Nguyen, Q.D.N.; Nakashima, Y. RHCP: A Reconfigurable High-Efficient Cryptographic Processor for Decentralized IoT Platforms. In Proceedings of the 2023 15th International Conference on Knowledge and Systems Engineering (KSE), Hanoi, Vietnam, 18–20 October 2023; pp. 1–6. [Google Scholar]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).