Page 85 - 2023-Vol19-Issue2
P. 85

81 |                                                                Hamed & Yassin

                     TABLE V.                                             thentication in electronic health records,” Cogent Engi-
NOTATION USED IN THE PROPOSED SCHEME.                                     neering, vol. 9, no. 1, 2022.

Symbol                         Description                           [7] H. A. Younis, I. M. Hayder, I. S. Seger, and H. A. Younis,
                                   User                                   “Design and implementation of a system that preserves
   Ui                                                                     the confidentiality of stream cipher in non-linear flow
 CHS                   Cloud Healthcare Server                            coding,” Journal of Discrete Mathematical Sciences and
                        Key Generator Center                              Cryptography, vol. 23, no. 7, pp. 1409–1419, 2020.
 KGC                        XOR operation
   ?                                                                 [8] Y. Chen, J. Sun, Y. Yang, T. Li, X. Niu, and H. Zhou,
                      Man-In the middle attack                            “Psspr: a source location privacy protection scheme
MITM                 Electronic healthcare record                         based on sector phantom routing in wsns,” International
                  Public key of cloud health server                       Journal of Intelligent Systems, vol. 37, no. 2, pp. 1204–
 E H Ri          Private key of cloud health server                       1221, 2022.
PUCHSk
PrCHSk                   Identity of patient Wi.                     [9] N. C. Basjaruddin, S. Ramadhan, F. Adinugraha, and
                        Password of patient Wi                            K. Kuspriyanto, “Baggage tracing at airports using near
 IDWi            The current medical establishment                        field communication,” in in 2019 International Confer-
 PWWi                                                                     ence on Advanced Mechatronics, Intelligent Manufac-
 CH Sk                    Shared key of user                              ture and Industrial Automation (ICAMIMIA), pp. 109–
 SKUi                       QRcode of user                                113, 2019.
 QRU i
EH(Wi)            Homomorphic encryption of Wi                      [10] D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Senevi-
  h(.)                  One-way hash function                             ratne, “Bedgehealth: A decentralized architecture for
                                                                          edge-based iomt networks using blockchain,” IEEE In-
   ri    The one-time random number generated by user                     ternet of Things Journal, vol. 8, no. 14, pp. 11743–
                                                                          11757, 2021.
              CONFLICT OF INTEREST
                                                                    [11] I. Indu, P. R. Anand, and V. Bhaskar, “Identity and access
The authors have no conflict of relevant interest to this article.        management in cloud environment: Mechanisms and
                                                                          challenges,” Engineering science and technology, an
                     REFERENCES                                           international journal, vol. 21, no. 4, pp. 574–588, 2018.

 [1] P. D. Singh, G. Dhiman, and R. Sharma, “Internet of            [12] A. Chaturvedi, D. Mishra, and S. Mukhopadhyay, “An
      things for sustaining a smart and secure healthcare sys-            enhanced dynamic id-based authentication scheme for
      tem,” Sustainable computing: informatics and systems,               telecare medical information systems,” Journal of King
      vol. 33, p. 100622, 2022.                                           Saud University-Computer and Information Sciences,
                                                                          vol. 29, no. 1, pp. 54–62, 2017.
 [2] M. Hartmann, U. S. Hashmi, and A. Imran, “Edge
      computing in smart health care systems: Review, chal-         [13] K. Renuka, S. Kumari, and X. Li, “Design of a secure
      lenges, and research directions,” Transactions on Emerg-            three-factor authentication scheme for smart healthcare,”
      ing Telecommunications Technologies, vol. 33, no. 3,                Journal of medical systems, vol. 43, no. 5, pp. 1–12,
      2022.                                                               2019.

 [3] R. Fazal, M. A. Shah, H. A. Khattak, H. T. Rauf, and           [14] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman,
      F. A. Turjman, “Achieving data privacy for decision sup-            “Medrec: Using blockchain for medical data access and
      port systems in times of massive data sharing,” Cluster             permission management,” in in 2016 2nd international
      Computing, pp. 1–13, 2022.                                          conference on open and big data (OBD), pp. 25–30,
                                                                          2016.
 [4] B. K. Rai, A. Tyagi, B. Arora, and S. Sharma,
      “Blockchain based electronic healthcare record (ehr),”        [15] Y. Liang, “Identity verification and management of elec-
      in in ICCCE 2021: Springer, pp. 185–193, 2022.                      tronic health records with blockchain technology,” in
                                                                          In 2019 IEEE International Conference on Healthcare
 [5] M. T. Chen and T. H. Lin, “A provable and secure patient             Informatics (ICHI), pp. 1–3, 2019.
      electronic health record fair exchange scheme for health
      information systems,” Applied Sciences, vol. 11, no. 5,
      2021.

 [6] T. Manoj, K. Makkithaya, and V. Narendra, “A
      blockchain based decentralized identifiers for entity au-
   80   81   82   83   84   85   86   87   88   89   90