International Journal of Engineering Trends and Applications (IJETA) Volume 7 Issue 5, Sep-Oct 2020 ISSN: 2393-9516 www.ijetajournal.org Page 23 Secure Data Transmission on Internet of Healthcare Things Dr. S. Rama Sree Professor In Cse Aditya Engineering College-Surampalem ABSTRACT The ever-growing advancement in communication innovation of modern smart objects carries with it a new era of improvement for IoT (Internet of Things) based networks. The health care system is the best approach to store the patient’s personal health data in online with high privacy. Ensuring the privacy and confidentiality of patient information in the cloud is of utmost importance; here, enhanced security model of healthcare data gives rise to trust. Then, we presented healthcare service providers for giving the full scope of medical services to people enrolled in IoHT. The performance of Secure Data is approved through simulations in terms of energy cost, computation time, etc. of the proposed algorithms and the results show that Secure Data can be efficient while applying for ensuring security chances in IoT-based healthcare systems. Keywords: Internet of things (IoT), Security, Optimization, Sensor Network, share creation and block ciphers. I. INTRODUCTION The Internet of Things (IoT) is gathered of an extraordinary number of things (devices) that are linked through the Internet [1-10]. In everyday things the framework can be equipped with distinguishing, measuring, network and processing capabilities; for such a way that this device can interact with different devices and it can give service to accomplish a specific objective through the internet [2]. In attractive virtual and physical world, this system related to an integrated communication environment of interconnected devices and platforms [11-20]. Therefore, it is important to build up an effective model to guarantee the security and integrity of the patient's diagnostic information transmitted and received from IoT environment [21-26]. The sophisticated chips and sensors are surrounded in the physical things that envelop us, for each transmitting valuable data [5].The way toward sharing such substantial measure of information starts with the devices themselves which should safely communicate with the IoT stage [27-35]. In most countries, the healthcare data offer real sensitive information that should be confined by law via Health Information and Portability Accountability Association (HIPAA) [36]. A need of serial to parallel converter and parallel to serial converter is avoided by choosing lightweight figure (simeck, simon, katan) family which is having adaptability [37-40] in choosing variable information and key sizes [15]. In the secret cipher sharing, a whole cipher is analyzed into a number of shares at the computing layer [41]. II. LITERATURE REVIEW In 2018 Sanaz Rahimi Moosavi et al. [42] proposed the scheme is demonstrated by simulation and a full hardware/software prototype. The result showed that the energy-performance evaluation compared to existing approaches. The proposed model reduces the communication by 26% communication latency between smart gateways and end users by 16%. Investigation of our usage uncovered that the handover idleness caused by versatility is low and the handover procedure does not bring about any preparing or correspondence overhead on the sensors. The security system authenticates a user based on the Open ID standard by Mahmud Hossain et al in 2018 [43]. In security the system that ensures user authentication and protected access to resources and services by IoT. Once the authentication is successful, the user is issued an authorization ticket, called Security Access Token (SAT). The SAT contains a set of privileges that grants the user access to medical IoT devices and their services and/or resources. The SAT is cryptographically protected to guard against forgery. A medical IoT device verifies the SAT prior to serving a request, and thus, ensures protected access. A secure data collection scheme for IoT based healthcare system named SecureData by Hai Tao et al. [44]. We use the idea of secret cipher sharing technique to protect patients’ data privacy and it is implemented and optimized in the FPGA hardware platform using KATAN algorithm. In the cloud computing layer, apply a distributed database technique that includes a number of cloud data servers to guarantee patients’ personal data privacy at the cloud computing layer. The result showed that RESEARCH ARTICLE OPEN ACCESS