Cover
Vol. 19 No. 1 (2023)

Published: June 30, 2023

Pages: 62-69

Original Article

Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption

Abstract

Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.

References

  1. Q. Feng, D. He, S. Zeadally, M. K. Khan, and N. Kumar, "A survey on privacy protection in blockchain system," Journal of Network and Computer Applications, vol. 126, pp. 45-58, 2019.
  2. A. Mubarakali, S. C. Bose, K. Srinivasan, A. Elsir, and O. Elsier, "Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain," Journal of Ambient Intelligence and Humanized Computing, pp. 1-9, 2019.
  3. A. Al Omar, M. Z. A. Bhuiyan, A. Basu, S. Kiyomoto, and M. S. Rahman, "Privacy-friendly platform for healthcare data in cloud based on blockchain environment," Future generation computer systems, vol. 95, pp. 511-521, 2019.
  4. D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Seneviratne, "Blockchain for secure EHRs sharing of mobile cloud based e-health systems," IEEE access, vol. 7, pp. 66792-66806, 2019.
  5. A. Islam and S. Y. Shin, "A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things," Computers & Electrical Engineering, vol. 84, p. 106627, 2020.
  6. G. Tripathi, M. A. Ahad, and S. Paiva, "S2HS-A blockchain based approach for smart healthcare system," in Healthcare, 2020, vol. 8, no. 1: Elsevier, p. 100391.
  7. R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah, "A user authentication scheme of IoT devices using blockchain-enabled fog nodes," in 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA), 2018: IEEE, pp. 1-8.
  8. Z. Cui et al., "A hybrid blockchain-based identity authentication scheme for multi-WSN," IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 241-251, 2020.
  9. Q. Hasan, A. A. Yassin, and O. Ata, "Electronic health records system using blockchain technology," 2021.
  10. M. Al-Zubi and A. A. Abu-Shareha, "Efficient signcryption scheme based on El-Gamal and Schnorr," Multimedia Tools and Applications, vol. 78, no. 9, pp. 11091-11104, 2019.
  11. M. Lamberger and F. Mendel, "Higher-Order Differential Attack on Reduced SHA-256," IACR Cryptology ePrint Archive, vol. 2011, p. 37, 01/01 2011.
  12. X. Li, J. Ma, and S.-J. Moon, On the Security of the Canetti-Krawczyk Model. 2005, pp. 356-363.
  13. M. Burrows, M. Abadi, and R. M. Needham, "A logic of authentication," Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, vol. 426, no. 1871, pp. 233-271, 1989.
  14. I. Khan, S. A. Chaudhry, M. Sher, J. I. Khan, and M. K. Khan, "An anonymous and provably secure biometric- based authentication scheme using chaotic maps for accessing medical drop box data," The Journal of Supercomputing, vol. 74, no. 8, pp. 3685-3703, 2018.
  15. M. N. Aman, K. C. Chua, and B. Sikdar, "A light- weight mutual authentication protocol for IoT systems," in Fareed & Yassin | 69 GLOBECOM 2017-2017 IEEE Global Communications Conference, 2017: IEEE, pp. 1-6.
  16. Z. Xu, C. Xu, H. Chen, and F. Yang, "A lightweight anonymous mutual authentication and key agreement scheme for WBAN," Concurrency and computation: Practice and experience, vol. 31, no. 14, p. e5295, 2019.
  17. B. A. Alzahrani, A. Irshad, A. Albeshri, and K. Alsubhi, "A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks," Wireless Personal Communications, vol. 117, no. 1, pp. 47-69, 2021.
  18. D. He, S. Zeadally, B. Xu, and X. Huang, "An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681-2691, 2015.
  19. C.-C. Chang and H.-C. Tsai, "An anonymous and self- verified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3346-3353, 2010.
  20. H. I. Nasser and M. A. Hussain, "Provably curb man- in-the-middle attack-based ARP spoofing in a local network," Bulletin of Electrical Engineering and Informatics, vol. 11, no. 4, 2022.
  21. Mustafa H. Alzuwaini, and Ali A. Yassin, " An Efficient Mechanism to Prevent the Phishing Attacks " Iraqi Journal for Electrical & Electronic Engineering, vol. 17, Issue 1, pp. 125-135, 2021.