Page 72 - IJEEE-2023-Vol19-ISSUE-1
P. 72

68 |                                                                                                                Fareed & Yassin

Operation             TABLE IV       Time                                                  REFERENCES
$)         COMPUTATION COST RESULT.  0.08
$*+,-                                0.17                       [1] Q. Feng, D. He, S. Zeadally, M. K. Khan, and N.
$.*+,-            Explain operation  0.085                        Kumar, "A survey on privacy protection in blockchain
$)                                   0.08                         system," Journal of Network and Computer Applications,
$*+,-              4!5 decryption    0.17                         vol. 126, pp. 45-58, 2019.
$.*+,-                               0.085
$*+,-               655/ to 6550     0.17                       [2] A. Mubarakali, S. C. Bose, K. Srinivasan, A. Elsir, and
$.*+,-            6550 decryption                                 O. Elsier, "Design a secure and efficient health record
                   4!5 decryption    0.08                         transaction utilizing block chain (SEHRTB) algorithm for
                    6550 to 655/     0.84                         health record transaction in block chain," Journal of
                  655/ decryption                                 Ambient Intelligence and Humanized Computing, pp. 1-9,
                    655/ to 6550                                  2019.
                  6550 decryption
                TOTAL                                           [3] A. Al Omar, M. Z. A. Bhuiyan, A. Basu, S. Kiyomoto,
                                                                  and M. S. Rahman, "Privacy-friendly platform for
• Communication Cost                                              healthcare data in cloud based on blockchain
                                                                  environment," Future generation computer systems, vol.
We used seven different lengths for our communication             95, pp. 511-521, 2019.
analysis. Symmetric key encryption (256 bits) and a Schnorr
Signcryption (512 bits) are all supported. The                  [4] D. C. Nguyen, P. N. Pathirana, M. Ding, and A.
communication cost is shown in Table V.                           Seneviratne, "Blockchain for secure EHRs sharing of
                                                                  mobile cloud based e-health systems," IEEE access, vol.
Message             TABLE V            Time                       7, pp. 66792-66806, 2019.
Message1   COMMUNICATION COST.       256	*)9:
Message2                             512	*)9:                   [5] A. Islam and S. Y. Shin, "A blockchain-based secure
Message3                 Operation   512	*)9:                     healthcare scheme with the assistance of unmanned aerial
Message4                             256	*)9:                     vehicle in Internet of Things," Computers & Electrical
Message5                      $)     512	*)9:                     Engineering, vol. 84, p. 106627, 2020.
Message6                    $*+,-    512	*)9:
Message7                   $.*+,-    512	*)9:                   [6] G. Tripathi, M. A. Ahad, and S. Paiva, "S2HS-A
Message8                             512	*)9:                     blockchain based approach for smart healthcare system,"
                              $)                                  in Healthcare, 2020, vol. 8, no. 1: Elsevier, p. 100391.
                            $*+,-      4096
                           $.*+,-                               [7] R. Almadhoun, M. Kadadha, M. Alhemeiri, M.
                            $*+,-                                 Alshehhi, and K. Salah, "A user authentication scheme of
                           $.*+,-                                 IoT devices using blockchain-enabled fog nodes," in 2018
            TOTAL                                                 IEEE/ACS 15th international conference on computer
                                                                  systems and applications (AICCSA), 2018: IEEE, pp. 1-8.
                        VII. CONCLUSION
                                                                [8] Z. Cui et al., "A hybrid blockchain-based identity
This article presented a multi-factor authentication scheme       authentication scheme for multi-WSN," IEEE
based on DGDB and Schnorr Signcryption to enhance the             Transactions on Services Computing, vol. 13, no. 2, pp.
security performance of components of the healthcare              241-251, 2020.
security system to achieve preserve-privacy, access control,
and authority. Accordingly, the suggested healthcare system     [9] Q. Hasan, A. A. Yassin, and O. Ata, "Electronic health
verified its ability to securely manage patients' medical         records system using blockchain technology," 2021.
information and react quickly to an emergency without
depending on patient location. Furthermore, the proposed        [10] M. Al-Zubi and A. A. Abu-Shareha, "Efficient
scheme is secure against well-known attacks such as MITM,         signcryption scheme based on El-Gamal and Schnorr,"
Insider, and Reply, and it has many positive metrics such as      Multimedia Tools and Applications, vol. 78, no. 9, pp.
mutual authentication, scalability, and privacy preservation.     11091-11104, 2019.
Finally, the proposed scheme achieves good computation
and communication cost results compared with other related      [11] M. Lamberger and F. Mendel, "Higher-Order
works.                                                            Differential Attack on Reduced SHA-256," IACR
                                                                  Cryptology ePrint Archive, vol. 2011, p. 37, 01/01 2011.
                     CONFLICT OF INTEREST
                                                                [12] X. Li, J. Ma, and S.-J. Moon, On the Security of the
     The authors have no conflict of relevant interest to this    Canetti-Krawczyk Model. 2005, pp. 356-363.
article.
                                                                [13] M. Burrows, M. Abadi, and R. M. Needham, "A logic
                                                                  of authentication," Proceedings of the Royal Society of
                                                                  London. A. Mathematical and Physical Sciences, vol. 426,
                                                                  no. 1871, pp. 233-271, 1989.

                                                                [14] I. Khan, S. A. Chaudhry, M. Sher, J. I. Khan, and M. K.
                                                                  Khan, "An anonymous and provably secure biometric-
                                                                  based authentication scheme using chaotic maps for
                                                                  accessing medical drop box data," The Journal of
                                                                  Supercomputing, vol. 74, no. 8, pp. 3685-3703, 2018.

                                                                [15] M. N. Aman, K. C. Chua, and B. Sikdar, "A light-
                                                                  weight mutual authentication protocol for IoT systems," in
   67   68   69   70   71   72   73   74   75   76   77