Page 68 - IJEEE-2023-Vol19-ISSUE-1
P. 68

64 |                                                                                                                 Fareed & Yassin

     Additionally, Nguyen et al. [4] recommended a narrative                           III. PRIMITIVE TOOLS
framework used to transferred data of EHRs via a mobile
cloud server relied on blockchain and a shared data.             A. Schnorr Signcryption
Blockchain technology has been used in the past to establish
a system for managing safe access to EHRs for patients and       • Initialization
health care professionals. In addition, the Ethereum             & = prime number (large), public variable.
blockchain was used in a specialized data exchange function      ' = a prime factor of & - 1(large), public variable.
with Amazon cloud computing to propose a hypothetical            * = integer number with order	'	,-.	&, in [1,.., & - 1],
smartphone implementation. According to the research's
conclusions, virtual clouds may be used effectively to safely         public variable.
transfer sensitive health data to prevent future attacks.        h01h = a hash function
Moreover, lightweight network access architectures are more      23 = a one-way hash function key = 234(,) =
efficient through security research and device optimization.
In 2020, Islam and Shin [5] un-crewed aerial vehicles and the         	h01h(4, ,)
nearest storage portal were used to providing consumers with     (E, D) = algorithms used to encrypt and decrypt a private
health data (HD) in a blockchain-based, secure healthcare
system (UAV). The UAV initially created a partnership with            key.
the body sensor hives (BSH) using a token and a transfer key     • Keygen sender
for small-power, safe communication. After extracting the        The pair of keys (!!, "!):
HD, the UAV uses a two-phase authentication mechanism to         !! = sender private key, randomly from [1, .., q-1].
decode the encrypted HD (BSH authenticated). The UAV             "! = sender public key =#"#! mod p
sends the HD to the nearest server for long-term storage upon    • Keygen receiver
successful certification. A protection evaluation was            The pair of keys (!$, "$):
conducted to exhibit the feasibility of the healthcare system    !$ = receiver private key, chosen randomly [1,.., q-1]
that are used currently. Analysis and implementation were        "$ = receiver public key = #"#"	%&'	(.
subsequently used to evaluate the overall performance of the     • Signcryption
conceptual design. As a result, the new approach encourages      Signcrypt a message % to receiver of the following
more extensive BSH aid and maintains stability according to
the evaluation of protection and efficiency. In 2019, Tripathi        operations:
et al. [6] reported the healthcare industry had been one of the  )	 = 	h,-h("$#)	%&'	(.
most popular uses of the Internet of Things (IoT) and its        Split ) in )1 and )2 of appropriate length.
applications. However, widespread use was not easy to            Calculate 1	 = 	 23%&(	%) 	 = 	h,-h(h2, %)	
accomplish, primarily due to the individuals involved and the    Calculate -	 = 	6 + (1 * !!)	%&'	9	
need to ensure the privacy and security of the information.      Calculate	:	 = 	 ;%'	(%)	= the encryption of % with the key
Blockchain technology has emerged to address this issue as
a realistic means of improving data security.                         )1.
                                                                 Sender sends to receiver the values (1, -, :).
     However, their method suffers from several issues and       • Usigncryption
concerns relating to data and user solidity, availability, and   Unsigncrypt % from sender, receiver has does the following
secrecy that must be addressed. Studies of the conventional
approach, expert views, and customer expectations were                operations:
explored concerning technical and social barriers to SHS         Calculate )	<-=>#	1, -, #, (, ",	,>'	!?	,	
implementation. In the SHS platform based on blockchain
was established to retain the system's inherent security and          h,-h(#(. "!))"#"%&'	()
legality. Finally, we have explored the many research paths      Split ) in )1 and )2 of appropriate length.
and applications for blockchain in healthcare. In 2018,          Calculate % using the decrypt algorithm	%	 = 	 A%'(:).	
Almadhoun et al. [7] suggested a large-scale, blockchain-        Accept % is a valid message only if 23%&(%) 	 = 	1.
based secure system for IoT nodes and provided an
architecture that ensures end-users secure data exchange. In       B. SHA-256 hash function:
2020, Zhihua et al. [8] offered a new alternative for dispersed
IoT systems through decentralized blockchain technology. In           The SHA-256 created by the National Security Agency
2021, Hasan et al. [9] proposed that electronic healthcare       is a variation of this algorithm (NSA). In addition, popular
records are advantageous over handwritten documents. Still,      encryption protocols like SSL, TLS, and SSH and open-
they also have several drawbacks, including security,            source operating systems like Unix/Linux all make use of
privacy, and the general shift of patient data from a central    SHA-256 [11].
database to a decentralized database. In this paper, we
propose secure scheme overcome the weaknesses and                      The hash algorithm is incredibly secure, and its
security issues above mentioned and we refer to main             workings are unknown to the general public. However, due
comparison with related work in Table 2.                         to the usage of digital signatures, it is utilized by the United
                                                                 States government to ensure that sensitive information is
                                                                 protected. In addition, it is used to validate passwords since
                                                                 the hash values may be saved and compared to the user input
                                                                 to check whether it is correct or not, which eliminates the
                                                                 need to record specific passwords.

                                                                      A hash value is practically impossible to decipher since
                                                                 the original data is so difficult to find. In addition, the sheer
                                                                 amount of possible combinations makes a brute force
                                                                 approach impossible. Because of this, it is quite difficult to
                                                                 come up with two data items (known as collisions) that have
   63   64   65   66   67   68   69   70   71   72   73