Page 68 - IJEEE-2023-Vol19-ISSUE-1
P. 68
64 | Fareed & Yassin
Additionally, Nguyen et al. [4] recommended a narrative III. PRIMITIVE TOOLS
framework used to transferred data of EHRs via a mobile
cloud server relied on blockchain and a shared data. A. Schnorr Signcryption
Blockchain technology has been used in the past to establish
a system for managing safe access to EHRs for patients and • Initialization
health care professionals. In addition, the Ethereum & = prime number (large), public variable.
blockchain was used in a specialized data exchange function ' = a prime factor of & - 1(large), public variable.
with Amazon cloud computing to propose a hypothetical * = integer number with order ' ,-. &, in [1,.., & - 1],
smartphone implementation. According to the research's
conclusions, virtual clouds may be used effectively to safely public variable.
transfer sensitive health data to prevent future attacks. h01h = a hash function
Moreover, lightweight network access architectures are more 23 = a one-way hash function key = 234(,) =
efficient through security research and device optimization.
In 2020, Islam and Shin [5] un-crewed aerial vehicles and the h01h(4, ,)
nearest storage portal were used to providing consumers with (E, D) = algorithms used to encrypt and decrypt a private
health data (HD) in a blockchain-based, secure healthcare
system (UAV). The UAV initially created a partnership with key.
the body sensor hives (BSH) using a token and a transfer key • Keygen sender
for small-power, safe communication. After extracting the The pair of keys (!!, "!):
HD, the UAV uses a two-phase authentication mechanism to !! = sender private key, randomly from [1, .., q-1].
decode the encrypted HD (BSH authenticated). The UAV "! = sender public key =#"#! mod p
sends the HD to the nearest server for long-term storage upon • Keygen receiver
successful certification. A protection evaluation was The pair of keys (!$, "$):
conducted to exhibit the feasibility of the healthcare system !$ = receiver private key, chosen randomly [1,.., q-1]
that are used currently. Analysis and implementation were "$ = receiver public key = #"#" %&' (.
subsequently used to evaluate the overall performance of the • Signcryption
conceptual design. As a result, the new approach encourages Signcrypt a message % to receiver of the following
more extensive BSH aid and maintains stability according to
the evaluation of protection and efficiency. In 2019, Tripathi operations:
et al. [6] reported the healthcare industry had been one of the ) = h,-h("$#) %&' (.
most popular uses of the Internet of Things (IoT) and its Split ) in )1 and )2 of appropriate length.
applications. However, widespread use was not easy to Calculate 1 = 23%&( %) = h,-h(h2, %)
accomplish, primarily due to the individuals involved and the Calculate - = 6 + (1 * !!) %&' 9
need to ensure the privacy and security of the information. Calculate : = ;%' (%) = the encryption of % with the key
Blockchain technology has emerged to address this issue as
a realistic means of improving data security. )1.
Sender sends to receiver the values (1, -, :).
However, their method suffers from several issues and • Usigncryption
concerns relating to data and user solidity, availability, and Unsigncrypt % from sender, receiver has does the following
secrecy that must be addressed. Studies of the conventional
approach, expert views, and customer expectations were operations:
explored concerning technical and social barriers to SHS Calculate ) <-=># 1, -, #, (, ", ,>' !? ,
implementation. In the SHS platform based on blockchain
was established to retain the system's inherent security and h,-h(#(. "!))"#"%&' ()
legality. Finally, we have explored the many research paths Split ) in )1 and )2 of appropriate length.
and applications for blockchain in healthcare. In 2018, Calculate % using the decrypt algorithm % = A%'(:).
Almadhoun et al. [7] suggested a large-scale, blockchain- Accept % is a valid message only if 23%&(%) = 1.
based secure system for IoT nodes and provided an
architecture that ensures end-users secure data exchange. In B. SHA-256 hash function:
2020, Zhihua et al. [8] offered a new alternative for dispersed
IoT systems through decentralized blockchain technology. In The SHA-256 created by the National Security Agency
2021, Hasan et al. [9] proposed that electronic healthcare is a variation of this algorithm (NSA). In addition, popular
records are advantageous over handwritten documents. Still, encryption protocols like SSL, TLS, and SSH and open-
they also have several drawbacks, including security, source operating systems like Unix/Linux all make use of
privacy, and the general shift of patient data from a central SHA-256 [11].
database to a decentralized database. In this paper, we
propose secure scheme overcome the weaknesses and The hash algorithm is incredibly secure, and its
security issues above mentioned and we refer to main workings are unknown to the general public. However, due
comparison with related work in Table 2. to the usage of digital signatures, it is utilized by the United
States government to ensure that sensitive information is
protected. In addition, it is used to validate passwords since
the hash values may be saved and compared to the user input
to check whether it is correct or not, which eliminates the
need to record specific passwords.
A hash value is practically impossible to decipher since
the original data is so difficult to find. In addition, the sheer
amount of possible combinations makes a brute force
approach impossible. Because of this, it is quite difficult to
come up with two data items (known as collisions) that have