Page 76 - 2023-Vol19-Issue2
P. 76

72 |                                                               Hamed & Yassin

the healthcare ecosystem by introducing programming capa-          professional duties, such as physicians, nurses, and medical
bilities using smart contracts. were the first to propose the      researchers, make up the user data. In practice, user data
use of blockchain technology in the design of healthcare or        might be assigned to a separate sector of society, such as
the purpose of decentralized identity management. MedRec           healthcare. It also includes users who are intimately con-
[14], was the first functioning prototype of a blockchain-based    nected to a data owner (for example, family members or close
system for accessing health records that is built on Ethereum      friends), and have access to EHRs based on access privi-
smart contracts. Additionally, a solution for identity manage-     leges granted by the EHR’s owner. The architecture is made
ment and verification that uses blockchain technology was          up of four parts: EHR owner (EHRWi ), EHR user (EHRUj ),
created [15]. The system aims to enable greater flexibility        Cloud Health Server (CHS(CHSk)), a hospital certification
in health record access while simultaneously increasing pa-        authority HCA assists a patient (EHRUj ) in generating the
tient data privacy. Furthermore, an efficient authentication       patient’s migration permit signature to another hospital or
mechanism for a hospital network based on blockchain was           medical center in the public key infrastructure (PKI); where
proposed [16] for the identification of distributed patients       (1 = i = N),(1 = j = M),(1 = k = Z); each of N, M, Z repre-
among others. Additionally, [17] presented a group authenti-       sent the number of patient EHRW , users (EHRU ), healthcare
cation approach that would allow authorized group members          centers (CHS), respectively. The EHRWi is the individual
to access sensitive health information in the context of a re-     whose medical information is contained in the record, and
mote medical monitoring system. Moreover, using blockchain         he has full access to that data. The owner might share his
technology, [18] created a multi-identity verification system      information with friends, physicians, or nurses to seek clinical
for a secure medical data sharing paradigm, preventing depen-      advice. The EHRUj may be in the public or private sectors,
dence on a third party [19] which allows signers to update their   and their rights are determined by their roles with the EHR
certificates without having to sign again. Furthermore, a de-      owner. A user can be a healthcare professional such as a
centralized, secure, and lightweight certificate-less signature    doctor, a friend, a family member, or emergency personnel.
protocol was proposed by transforming the logic of the key         A CHSk is a storage facility that houses and manipulates sen-
generation center (KGC) into smart contract code, which can        sitive health data. Maintaining data privacy and accuracy of
withstand KGC compromised attacks and distributed denial of        patients necessitates a higher level of vigilance. The EHR
service attacks [20]. However, none of the above-mentioned         owner relies on the cloud server for remote data storage and
approaches takes into account the integration of authentication    record maintenance, alleviating the burden of establishing
with access control to increase the overall system efficiency.     and maintaining local storage infrastructure. Most cloud data
Consequently, the fundamental purpose of this research is          storage services also offer benefits such as availability, scala-
to provide a robust authentication technique based on cryp-        bility, low cost, and on-demand data sharing among a group of
tosystem tools to solve issues highlighted in previous studies     trusted users, such as physicians, insurance companies, emer-
and provide an efficient, verifiable, and practical EHR fair       gency personnel, family and friends in a collaboration team,
exchange method, allowing each patient to safely transfer          or employees in an enterprise organization. Because the data
their own EHR from one institution to another. The proposed        owner no longer has physical control over the data, it is vital
approach may also provide ease, speed, and integrity. We built     to allow the data owner to check that his data is being saved
a high-level, realistic, and verifiable EHR fair exchange plan     and maintained appropriately in the cloud. The registration
with essential agreement for the health information system. A      phase, the EHR migration phase, and the data exchange phase
patient could not only delegate the current hospital’s health in-  comprise the four steps of our proposed scheme.
formation systems to move their personal EHR to the chosen
hospital system but also maintain their privacy. We demon-         A. Registration Phase
strated the security of our protocol using security analysis and
the Scyther tool in the security analysis discussed in the fol-    In this phase, hospital certification authority (HCA) is respon-
lowing section. The performance comparison and efficiency          sible to distributes the key parameters and certificate between
analysis findings show that the proposed approach delivers         main components.
a greater level of security while maintaining computational
economy.                                                           1) Cloud Health Server Side

              III. PROPOSED SCHEME                                 Each health establishment (Cloud Health Server (CHSk))
                                                                   should be identified as a health mother institution (hospital
The major purpose of the proposed scheme is to enable safe         certification authority (HCA)) for the purpose of achieving,
patient-centric EHR access while also providing efficient data     distributing, and exchanging data among different patients
security and administration. Users with access based on their      belonging to different establishments. HCA applies the fol-
                                                                   lowing steps for each CHSk.
   71   72   73   74   75   76   77   78   79   80   81