Page 85 - 2023-Vol19-Issue2
P. 85
81 | Hamed & Yassin
TABLE V. thentication in electronic health records,” Cogent Engi-
NOTATION USED IN THE PROPOSED SCHEME. neering, vol. 9, no. 1, 2022.
Symbol Description [7] H. A. Younis, I. M. Hayder, I. S. Seger, and H. A. Younis,
User “Design and implementation of a system that preserves
Ui the confidentiality of stream cipher in non-linear flow
CHS Cloud Healthcare Server coding,” Journal of Discrete Mathematical Sciences and
Key Generator Center Cryptography, vol. 23, no. 7, pp. 1409–1419, 2020.
KGC XOR operation
? [8] Y. Chen, J. Sun, Y. Yang, T. Li, X. Niu, and H. Zhou,
Man-In the middle attack “Psspr: a source location privacy protection scheme
MITM Electronic healthcare record based on sector phantom routing in wsns,” International
Public key of cloud health server Journal of Intelligent Systems, vol. 37, no. 2, pp. 1204–
E H Ri Private key of cloud health server 1221, 2022.
PUCHSk
PrCHSk Identity of patient Wi. [9] N. C. Basjaruddin, S. Ramadhan, F. Adinugraha, and
Password of patient Wi K. Kuspriyanto, “Baggage tracing at airports using near
IDWi The current medical establishment field communication,” in in 2019 International Confer-
PWWi ence on Advanced Mechatronics, Intelligent Manufac-
CH Sk Shared key of user ture and Industrial Automation (ICAMIMIA), pp. 109–
SKUi QRcode of user 113, 2019.
QRU i
EH(Wi) Homomorphic encryption of Wi [10] D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Senevi-
h(.) One-way hash function ratne, “Bedgehealth: A decentralized architecture for
edge-based iomt networks using blockchain,” IEEE In-
ri The one-time random number generated by user ternet of Things Journal, vol. 8, no. 14, pp. 11743–
11757, 2021.
CONFLICT OF INTEREST
[11] I. Indu, P. R. Anand, and V. Bhaskar, “Identity and access
The authors have no conflict of relevant interest to this article. management in cloud environment: Mechanisms and
challenges,” Engineering science and technology, an
REFERENCES international journal, vol. 21, no. 4, pp. 574–588, 2018.
[1] P. D. Singh, G. Dhiman, and R. Sharma, “Internet of [12] A. Chaturvedi, D. Mishra, and S. Mukhopadhyay, “An
things for sustaining a smart and secure healthcare sys- enhanced dynamic id-based authentication scheme for
tem,” Sustainable computing: informatics and systems, telecare medical information systems,” Journal of King
vol. 33, p. 100622, 2022. Saud University-Computer and Information Sciences,
vol. 29, no. 1, pp. 54–62, 2017.
[2] M. Hartmann, U. S. Hashmi, and A. Imran, “Edge
computing in smart health care systems: Review, chal- [13] K. Renuka, S. Kumari, and X. Li, “Design of a secure
lenges, and research directions,” Transactions on Emerg- three-factor authentication scheme for smart healthcare,”
ing Telecommunications Technologies, vol. 33, no. 3, Journal of medical systems, vol. 43, no. 5, pp. 1–12,
2022. 2019.
[3] R. Fazal, M. A. Shah, H. A. Khattak, H. T. Rauf, and [14] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman,
F. A. Turjman, “Achieving data privacy for decision sup- “Medrec: Using blockchain for medical data access and
port systems in times of massive data sharing,” Cluster permission management,” in in 2016 2nd international
Computing, pp. 1–13, 2022. conference on open and big data (OBD), pp. 25–30,
2016.
[4] B. K. Rai, A. Tyagi, B. Arora, and S. Sharma,
“Blockchain based electronic healthcare record (ehr),” [15] Y. Liang, “Identity verification and management of elec-
in in ICCCE 2021: Springer, pp. 185–193, 2022. tronic health records with blockchain technology,” in
In 2019 IEEE International Conference on Healthcare
[5] M. T. Chen and T. H. Lin, “A provable and secure patient Informatics (ICHI), pp. 1–3, 2019.
electronic health record fair exchange scheme for health
information systems,” Applied Sciences, vol. 11, no. 5,
2021.
[6] T. Manoj, K. Makkithaya, and V. Narendra, “A
blockchain based decentralized identifiers for entity au-