Page 74 - 2023-Vol19-Issue2
P. 74

Received: 20 February 2023 | Revised: 14 April 2023 | Accepted: 14 April 2023

DOI: 10.37917/ijeee.19.2.9                                        Vol. 19 | Issue 2 | December 2023

                                                                               Open Access

Iraqi Journal for Electrical and Electronic Engineering

Original Article

A Privacy-Preserving Scheme for Managing Secure Data

                      in Healthcare System

                                                              Naba M. Hamed*1, Ali A Yassin2
                       1College of Computer Science and Information Technology, University of Basrah, Basrah, 61004, Iraq
              2Department of Computer science, Education College for Pure Sciences, University of Basrah, Basrah, 61004, Iraq

Correspondance
*Naba M.Hamed
Department of Computer science,
College of Computer Science and Information Technology,
University of Basrah, Basrah, Iraq.
Email: nabawq12@gmail.com

  Abstract
  In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the
  establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare
  has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic
  health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment.
  As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Several
  remote user authentication methods have been suggested. In this research, we present a feasible patient EHR migration
  solution for each patient. finally, each patient may securely delegate their current hospital’s information system to a
  hospital certification authority in order to receive migration proof that can be used to transfer their EHR to a different
  hospital. In addition, the proposed scheme is based on crypto-hash functions and asymmetric cryptosystems by using
  homomorphic cryptography. The proposed scheme carried out two exhaustive formal security proofs for the work that
  was provided. Using Scyther, a formal security tool, we present a secure user authentication technique in the proposed
  healthcare scheme that ensures security and informal analysis.

  Keywords
  Electronic Health Records, Scyther, Migration Data, Asymmetric encryption, Homomorphic Cryptography.

I. INTRODUCTION                                                   study fields have evolved to improve human life.

The internet has become an indispensable part of everyday             An Electronic Health Record (EHR) is a personal medical
life. Thanks to the fast progress of internet technology, we can  record incorporated into health information systems [3]. Many
now deliver any service from anywhere and at any time [1].        countries create health information systems to help administer
Remote user authentication is becoming an increasingly sig-       each patient’s activities and health monitoring. Consider the
nificant component of gaining access to valuable services or      following scenario: A patient (let’s call her Alice) plans to
resources in the healthcare system, cloud applications, multi-    see a doctor at a new hospital. If she visits a new hospital,
server configurations, and mobile devices. Remote user au-        she may be required to disclose her personal medical infor-
thentication is an essential component of any security strategy.  mation again. Furthermore, if her doctor needs her medical
In the absence of authentication, audit trails are opaque, and    treatment history from other institutions, she must decide how
authorization grants identity-based privileges [2]. If we can-    to securely communicate this information to her doctor. These
not distinguish between authorized and unauthorized parties,      issues are very pressing. Our proposed approach guarantees
secrecy and privacy will be violated. In recent years, various    that data access and data transfer are simple and secure. Each

This is an open-access article under the terms of the Creative Commons Attribution License,
which permits use, distribution, and reproduction in any medium, provided the original work is properly cited.
©2023 The Authors.
Published by Iraqi Journal for Electrical and Electronic Engineering | College of Engineering, University of Basrah.

https://doi.org/10.37917/ijeee.19.2.9                                          |https://www.ijeee.edu.iq 70
   69   70   71   72   73   74   75   76   77   78   79