Page 72 - IJEEE-2023-Vol19-ISSUE-1
P. 72
68 | Fareed & Yassin
Operation TABLE IV Time REFERENCES
$) COMPUTATION COST RESULT. 0.08
$*+,- 0.17 [1] Q. Feng, D. He, S. Zeadally, M. K. Khan, and N.
$.*+,- Explain operation 0.085 Kumar, "A survey on privacy protection in blockchain
$) 0.08 system," Journal of Network and Computer Applications,
$*+,- 4!5 decryption 0.17 vol. 126, pp. 45-58, 2019.
$.*+,- 0.085
$*+,- 655/ to 6550 0.17 [2] A. Mubarakali, S. C. Bose, K. Srinivasan, A. Elsir, and
$.*+,- 6550 decryption O. Elsier, "Design a secure and efficient health record
4!5 decryption 0.08 transaction utilizing block chain (SEHRTB) algorithm for
6550 to 655/ 0.84 health record transaction in block chain," Journal of
655/ decryption Ambient Intelligence and Humanized Computing, pp. 1-9,
655/ to 6550 2019.
6550 decryption
TOTAL [3] A. Al Omar, M. Z. A. Bhuiyan, A. Basu, S. Kiyomoto,
and M. S. Rahman, "Privacy-friendly platform for
• Communication Cost healthcare data in cloud based on blockchain
environment," Future generation computer systems, vol.
We used seven different lengths for our communication 95, pp. 511-521, 2019.
analysis. Symmetric key encryption (256 bits) and a Schnorr
Signcryption (512 bits) are all supported. The [4] D. C. Nguyen, P. N. Pathirana, M. Ding, and A.
communication cost is shown in Table V. Seneviratne, "Blockchain for secure EHRs sharing of
mobile cloud based e-health systems," IEEE access, vol.
Message TABLE V Time 7, pp. 66792-66806, 2019.
Message1 COMMUNICATION COST. 256 *)9:
Message2 512 *)9: [5] A. Islam and S. Y. Shin, "A blockchain-based secure
Message3 Operation 512 *)9: healthcare scheme with the assistance of unmanned aerial
Message4 256 *)9: vehicle in Internet of Things," Computers & Electrical
Message5 $) 512 *)9: Engineering, vol. 84, p. 106627, 2020.
Message6 $*+,- 512 *)9:
Message7 $.*+,- 512 *)9: [6] G. Tripathi, M. A. Ahad, and S. Paiva, "S2HS-A
Message8 512 *)9: blockchain based approach for smart healthcare system,"
$) in Healthcare, 2020, vol. 8, no. 1: Elsevier, p. 100391.
$*+,- 4096
$.*+,- [7] R. Almadhoun, M. Kadadha, M. Alhemeiri, M.
$*+,- Alshehhi, and K. Salah, "A user authentication scheme of
$.*+,- IoT devices using blockchain-enabled fog nodes," in 2018
TOTAL IEEE/ACS 15th international conference on computer
systems and applications (AICCSA), 2018: IEEE, pp. 1-8.
VII. CONCLUSION
[8] Z. Cui et al., "A hybrid blockchain-based identity
This article presented a multi-factor authentication scheme authentication scheme for multi-WSN," IEEE
based on DGDB and Schnorr Signcryption to enhance the Transactions on Services Computing, vol. 13, no. 2, pp.
security performance of components of the healthcare 241-251, 2020.
security system to achieve preserve-privacy, access control,
and authority. Accordingly, the suggested healthcare system [9] Q. Hasan, A. A. Yassin, and O. Ata, "Electronic health
verified its ability to securely manage patients' medical records system using blockchain technology," 2021.
information and react quickly to an emergency without
depending on patient location. Furthermore, the proposed [10] M. Al-Zubi and A. A. Abu-Shareha, "Efficient
scheme is secure against well-known attacks such as MITM, signcryption scheme based on El-Gamal and Schnorr,"
Insider, and Reply, and it has many positive metrics such as Multimedia Tools and Applications, vol. 78, no. 9, pp.
mutual authentication, scalability, and privacy preservation. 11091-11104, 2019.
Finally, the proposed scheme achieves good computation
and communication cost results compared with other related [11] M. Lamberger and F. Mendel, "Higher-Order
works. Differential Attack on Reduced SHA-256," IACR
Cryptology ePrint Archive, vol. 2011, p. 37, 01/01 2011.
CONFLICT OF INTEREST
[12] X. Li, J. Ma, and S.-J. Moon, On the Security of the
The authors have no conflict of relevant interest to this Canetti-Krawczyk Model. 2005, pp. 356-363.
article.
[13] M. Burrows, M. Abadi, and R. M. Needham, "A logic
of authentication," Proceedings of the Royal Society of
London. A. Mathematical and Physical Sciences, vol. 426,
no. 1871, pp. 233-271, 1989.
[14] I. Khan, S. A. Chaudhry, M. Sher, J. I. Khan, and M. K.
Khan, "An anonymous and provably secure biometric-
based authentication scheme using chaotic maps for
accessing medical drop box data," The Journal of
Supercomputing, vol. 74, no. 8, pp. 3685-3703, 2018.
[15] M. N. Aman, K. C. Chua, and B. Sikdar, "A light-
weight mutual authentication protocol for IoT systems," in