SRMDS: Hybrid Cryptography with Block Chain for Secure and Reliable Medical Data Sharing in E-Health Systems

SRMDS: Hybrid Cryptography with Block Chain for Secure and Reliable Medical Data Sharing in E-Health Systems

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-4
Year of Publication : 2024
Author : M. Madhavi, T. Sasirooba, G. Kranthi Kumar
DOI : 10.14445/22315381/IJETT-V72I4P123

How to Cite?

M. Madhavi, T. Sasirooba, G. Kranthi Kumar, "SRMDS: Hybrid Cryptography with Block Chain for Secure and Reliable Medical Data Sharing in E-Health Systems," International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 216-225, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I4P123

Abstract
Medical data sharing can increase diagnosis precision in an e-health system where security and privacy are essential objectives. Blockchain (BC) has been proposed as a potential way of improving the exchange of Personal Health Information (PHI) due to its unchangeability. However, there is still a need for improvement in terms of patient privacy protection and PHI-sharing security. Thus, this study presents a Secure and Reliable Medical Data Sharing (SRMDS) system. This system consists of Consortium BC (CBC), private BC (PBC), and hybrid cryptography. Every patient's PHI has been encrypted employing Advanced Encryption Standards (AES) to improve privacy preservation, and Adaptive Elliptic Curve Cryptography (AECC) is employed to conduct the AES key's encryption. The AES key and PHI ciphertexts are kept in a block on the hospital's private BC. Additionally, PHI's keyword is sent to the CBC. By looking up the relevant PHI keyword, the physician can retrieve a patient's PHI from the PBC. Simulation results demonstrate that the suggested SRMDS-based electronic health (e-health) system reduces storage overhead, encryption, and decryption, enhancing patient confidentiality and safety preservation.

Keywords
Medical data sharing, BC, CBC, AES, AECC.

References
[1] R. Canetti et al., “Multicast Security: A Taxonomy and Some Efficient Constructions,” IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, New York, USA, vol. 2, pp. 708-716, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[2] H. Harney, and C. Muckenhirn, “Group Key Management Protocol (GKMP) Architecture,” Network Working Group, pp. 1-22, 1997.
[Google Scholar] [Publisher Link]
[3] O.S. Albahri et al., “Systematic Review of Real-Time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations,” Journal of Medical Systems, vol. 42, pp. 1-27, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[4] A.S. Albahri et al., “Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects,” Journal of Medical Systems, vol. 42, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] A.A. Zaidan et al., “A Review on Smartphone Skin Cancer Diagnosis Apps in Evaluation and Benchmarking: Coherent Taxonomy, Open Issues and Recommendation Pathway Solution,” Health and Technology, vol. 8, pp. 223-238, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] M.A. Alsalem et al., “A Review of the Automated Detection and Classification of Acute Leukaemia: Coherent Taxonomy, Datasets, Validation and Performance Measurements, Motivation, Open Challenges and Recommendations,” Computer Methods and Programs in Biomedicine, vol. 158, pp. 93-112, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Alevtina Dubovitskaya et al., “Secure and Trustable Electronic Medical Records Sharing Using Blockchain, AMIA Annual Symposium Proceedings, pp. 650-659, 2017.
[Google Scholar] [Publisher Link]
[8] Assad Abbas, and Samee U. Khan, “A Review on the State-of-Theart Privacy-Preserving Approaches in the e-Health Clouds,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 4, pp. 1431-1441, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Muzammil Hussain et al., “Conceptual Framework for the Security of Mobile Health Applications on Android Platform,” Telematics and Informatics, vol. 35, no. 5, pp. 1335-1354, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] A.A. Zaidan et al., “Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS,” Journal of Biomedical Informatics, vol. 53, pp. 390-404, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[11] M.L. Mat Kiah et al., “An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1,” Journal of Medical Systems, vol. 37, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Chun Zhang et al., “Comparison of Inter-Area Rekeying Algorithms for Secure Wireless Group Communications,” Performance Evaluation, vol. 49, no. 1-4, pp. 1-20, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[13] M.L.M. Kiah et al., “Open Source EMR Software: Profiling, Insights and Hands-On Analysis,” Computer Methods and Programs in Biomedicine, vol. 117, no. 2, pp. 360-382, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[14] A.A. Zaidan et al., “Multi-Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study,” Decision Support Systems, vol. 78, pp. 15-27, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu, “Secure Sharing of Electronic Health Records in Clouds,” 8 th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, PA, USA, pp. 711-718, 2012.
[Google Scholar] [Publisher Link]
[16] Ahmed Ibrahim, Baban Mahmood, and Mukesh Singhal, “A Secure Framework for Sharing Electronic Health Records Over Clouds,” 2016 IEEE International Conference on Serious Games and Applications for Health (SeGAH), Orlando, FL, USA, pp. 1-8, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Zuobin Ying et al., “A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud,” IEEE Access, vol. 6, pp. 53698-53708, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hira Fariha Anjum et al., “Mapping Research Trends of Blockchain Technology in Healthcare,” IEEE Access, vol. 8, pp. 174244- 174254, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Cornelius C. Agbo, Qusay H. Mahmoud, and J. Mikael Eklund, “Blockchain Technology in Healthcare: A Systematic Review,” Healthcare, vol. 7, no. 2, pp. 1-30, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Israa Abu-Elezz et al., “The Benefits and Threats of Blockchain Technology in Healthcare: A Scoping Review,” International Journal of Medical Informatics, vol. 142, pp. 1-9, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Mehedi Masud, M. Shamim Hossain, and Atif Alamri, “Data Interoperability and Multimedia Content Management in e-Health Systems,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1015-1023, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Salman Iqbal et al., “Real-Time-Based E-Health Systems: Design and Implementation of a Lightweight Key Management Protocol for Securing Sensitive Information of Patients,” Health and Technology, vol. 9, pp. 93-111, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Aiqing Zhang, and Xiaodong Lin, “Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain,” Journal of Medical Systems, vol. 42, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Xiaojun Zhang et al., “Enabling Identity-based Authorized Encrypted Diagnostic Data Sharing for Cloud-Assisted E-Health Information Systems,” Journal of Information Security and Applications, vol. 54, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Salman Shamshad et al., “A Secure Blockchain-based e-Health Records Storage and Sharing Scheme,” Journal of Information Security and Applications, vol. 55, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Khaled Shuaib et al., “Secure Decentralized Electronic Health Records Sharing System Based on Blockchains,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 8, pp. 5045-5058, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Dinh C. Nguyen et al., “Blockchain for Secure EHRs Sharing of Mobile Cloud-Based E-Health Systems,” IEEE Access, vol. 7, pp. 66792-66806, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Sherali Zeadally, Jesús Téllez Isaac, and Zubair Baig, “Security Attacks and Solutions in Electronic Health (E-health) Systems,” Journal of Medical Systems, vol. 40, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[29] P. Chinnasamy et al., “Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System,” Applied Sciences, vol. 13, no. 6, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]