Page 75 - 2023-Vol19-Issue2
P. 75

71 |                                                               Hamed & Yassin

user must be granted the proper access rights [4]. One of          tified in previous studies. In practice, the Scyther security
the most straightforward and practical security solutions is       proof was utilized to show the strong security and resistance
password-based authentication. Password-based authentica-          of our strategy against hostile attacks. The suggested tech-
tion mechanisms are used in the healthcare system, e-business,     nique strikes a good compromise between security complexity
database management systems, and smart card applications.          and performance, and it may be used in healthcare systems.
Our method presents a feasible and verifiable patient EHR
fair exchange for health information systems. Patients must            The remainder of the article is structured as follows. Sec-
not only delegate the transfer of their personal EHR from          tion 2 reviews the related work. Section 3 focuses on the
their current hospital health information system to the hospi-     proposed scheme. Section 4 This section evaluates security
tal system of their choice but also retain their privacy [4]. Our  analysis of the proposed scheme in terms of formal and in-
system ensures safe data storage and the secure transmission       formal security analysis. Section 5 presents the performance
of permitted information to a specified place. We propose a        results. Finally, section 6 presents the conclusions.
high-level, realistic, and demonstrable patient EHR fair ex-
change model with key agreements for health information                             II. RELATED WORK
systems. A patient can not only delegate the current hospital’s
health information systems to migrate their personal EHR to        A. Centralized Identity Management for Entity Authentica-
the chosen hospital system but also maintain their privacy [5].        tion

    In India, EHR guidelines advocate for the safe sharing         As part of a centralized identity management system, a cen-
of health information with minimal disclosure of personal          tralized identity distribution point (IDP) will be responsible
identification. The majority of identity-related breaches are      for issuing an identity (email ID, phone number, government
triggered by the leak of sensitive information associated with     identification code, patient identification code), as well as
identifiers, as well as the vast data collection and tracking      for maintaining the trust factor associated with those iden-
permitted by service providers [6]. The General Data Pro-          tities. Credential-based authentication is a well-established
tection Regulation encourages entity-controlled identifiers        initial line of defense in any identification scheme. As the pri-
and limited information collection to preserve privacy. Many       vacy and security of patient data records are critical in EHRs,
countries have laws in place to protect patients’ privacy, such    credential-based protection is a relatively simple and adapt-
as the Health Insurance Portability and Accountability Act         able first-hand solution that is able to identity theft, spoofing
(HIPAA)in the United States. Confidentiality in telecare ser-      attacks, data loss, and other types of privacy violations. It
vices has become a key problem, especially how to ensure           is possible to add an extra layer of protection to the current
patient data security and privacy while transmitting over a        credentials-based authentication by including secondary fac-
public channel [7] [8]. User authentication is the first step in   tors such as OTP, captchas, patterns, or biometrics in addition
ensuring that only authorized users have access to protected       to the credentials-based authentication [11]. Many studies on
data. Although password-based user authentication is the most      two-factor authentication [12] and three-factor authentication
convenient approach, it is prone to numerous attacks and may       [13] have been conducted for the purpose of validating medi-
pose a threat to data security. Multifactor authentication is a    cal records [12]. Although it adds an extra layer of protection,
recommended strategy in which any user is granted access to        multifactor authentication is vulnerable to attacks such as
specified data after verifying two or more pieces of evidence      identity theft, replay attacks, phishing attacks, and denial of
[9] [10] perform poorly or have serious security flaws in the      service attacks, among others. The authentication of entities
context of tele-health services. Our system stores data and        can be achieved by binding centralized identifiers to crypto-
securely transfers approved information to defined places. In      graphically generated keys, signatures, and certificates with
this paper, we offer a safe technique for authenticating EHR       the help of public key infrastructure (PKI).
patients and the Healthcare Center Server using real mem-
ber IDs and verification codes. To provide robust security         B. Decentralized identity management for entity authenti-
while maintaining good performance. The proposed work                  cation
employs, based on multi-factor authentication, a lightweight
crypto-hash function for the generation of One-Time Pass-          The whole concept of decentralization is founded on the basic
words (OTP) and symmetric key encryption (CTR mode) and            assumption that a transaction for the transfer of a commodity
an asymmetric key of homomorphic encryption Damgoard,              or asset between two parties is accepted by the participating
Geisler and Kroigaard (DGK) to offer strong security per-          nodes through the use of a consensus mechanism. This trans-
formance. The primary goal of this research is to provide a        action is recorded in an immutable distributed ledger as part
robust authentication mechanism to address difficulties iden-      of the transaction log. Blockchain is a practical distributed
                                                                   ledger technology, and it was this protocol that introduced
                                                                   the concept of decentralization into the settlement of finan-
                                                                   cial transactions. Later, the framework was generalized in
   70   71   72   73   74   75   76   77   78   79   80