Cover
Vol. 19 No. 2 (2023)

Published: December 31, 2023

Pages: 70-82

Original Article

A Privacy-Preserving Scheme for Managing Secure Data in Healthcare System

Abstract

In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment. As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Several remote user authentication methods have been suggested. In this research, we present a feasible patient EHR migration solution for each patient. finally, each patient may securely delegate their current hospital’s information system to a hospital certification authority in order to receive migration proof that can be used to transfer their EHR to a different hospital. In addition, the proposed scheme is based on crypto-hash functions and asymmetric cryptosystems by using homomorphic cryptography. The proposed scheme carried out two exhaustive formal security proofs for the work that was provided. Using Scyther, a formal security tool, we present a secure user authentication technique in the proposed healthcare scheme that ensures security and informal analysis.

References

  1. P. D. Singh, G. Dhiman, and R. Sharma, “Internet of things for sustaining a smart and secure healthcare sys- tem,” Sustainable computing: informatics and systems, vol. 33, p. 100622, 2022.
  2. M. Hartmann, U. S. Hashmi, and A. Imran, “Edge computing in smart health care systems: Review, chal- lenges, and research directions,” Transactions on Emerg- ing Telecommunications Technologies, vol. 33, no. 3, 2022.
  3. R. Fazal, M. A. Shah, H. A. Khattak, H. T. Rauf, and F. A. Turjman, “Achieving data privacy for decision sup- port systems in times of massive data sharing,” Cluster Computing, pp. 1–13, 2022.
  4. B. K. Rai, A. Tyagi, B. Arora, and S. Sharma, “Blockchain based electronic healthcare record (ehr),” in in ICCCE 2021: Springer, pp. 185–193, 2022.
  5. M. T. Chen and T. H. Lin, “A provable and secure patient electronic health record fair exchange scheme for health information systems,” Applied Sciences, vol. 11, no. 5, 2021.
  6. T. Manoj, K. Makkithaya, and V. Narendra, “A blockchain based decentralized identifiers for entity au- thentication in electronic health records,” Cogent Engi- neering, vol. 9, no. 1, 2022.
  7. H. A. Younis, I. M. Hayder, I. S. Seger, and H. A. Younis, “Design and implementation of a system that preserves the confidentiality of stream cipher in non-linear flow coding,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 23, no. 7, pp. 1409–1419, 2020.
  8. Y. Chen, J. Sun, Y. Yang, T. Li, X. Niu, and H. Zhou, “Psspr: a source location privacy protection scheme based on sector phantom routing in wsns,” International Journal of Intelligent Systems, vol. 37, no. 2, pp. 1204– 1221, 2022.
  9. N. C. Basjaruddin, S. Ramadhan, F. Adinugraha, and K. Kuspriyanto, “Baggage tracing at airports using near field communication,” in in 2019 International Confer- ence on Advanced Mechatronics, Intelligent Manufac- ture and Industrial Automation (ICAMIMIA), pp. 109– 113, 2019.
  10. D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Senevi- ratne, “Bedgehealth: A decentralized architecture for edge-based iomt networks using blockchain,” IEEE In- ternet of Things Journal, vol. 8, no. 14, pp. 11743– 11757, 2021.
  11. I. Indu, P. R. Anand, and V. Bhaskar, “Identity and access management in cloud environment: Mechanisms and challenges,” Engineering science and technology, an international journal, vol. 21, no. 4, pp. 574–588, 2018.
  12. A. Chaturvedi, D. Mishra, and S. Mukhopadhyay, “An enhanced dynamic id-based authentication scheme for telecare medical information systems,” Journal of King Saud University-Computer and Information Sciences, vol. 29, no. 1, pp. 54–62, 2017.
  13. K. Renuka, S. Kumari, and X. Li, “Design of a secure three-factor authentication scheme for smart healthcare,” Journal of medical systems, vol. 43, no. 5, pp. 1–12, 2019.
  14. A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management,” in in 2016 2nd international conference on open and big data (OBD), pp. 25–30, 2016.
  15. Y. Liang, “Identity verification and management of elec- tronic health records with blockchain technology,” in In 2019 IEEE International Conference on Healthcare Informatics (ICHI), pp. 1–3, 2019. 82 | Hamed & Yassin
  16. A. Yazdinejad, G. Srivastava, R. M. Parizi, A. Dehghan- tanha, K. R. Choo, and M. Aledhari, “Decentralized authentication of distributed patients in hospital net- works using blockchain,” IEEE journal of biomedical and health informatics, vol. 24, no. 8, pp. 2146–2156, 2020.
  17. C. T. Li, D. H. Shih, C. C. Wang, C. L. Chen, and C. C. Lee, “A blockchain based data aggregation and group authentication scheme for electronic medical system,” IEEE Access, vol. 8, pp. 173904–173917, 2020.
  18. X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, “De- sign of a secure medical data sharing scheme based on blockchain,” Journal of medical systems, vol. 44, no. 2, pp. 1–11, 2020.
  19. C. Lin, X. H. D. He, M. K. Khan, and K. K. R. Choo, “A new transitively closed undirected graph authentica- tion scheme for blockchain-based identity management systems,” IEEE Access, vol. 6, pp. 28203–28212, 2018.
  20. L. Xiong, F. Li, M. He, Z. Liu, and T. Peng, “An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services,” IEEE Transactions on Cloud Computing, vol. 10, no. 4, pp. 2309–2323, 2020.
  21. O. Siedlecka-Lamch, “Probabilistic and timed analysis of security protocols,” in In Computational Intelligence in Security for Information Systems Conference, pp. 142– 151, 2019.
  22. M. Kompara, S. H. Islam, and M. H¨olbl, “A robust and efficient mutual authentication and key agreement scheme with untraceability for wbans,” Computer Net- works, vol. 148, pp. 196–213, 2019.
  23. T. Y. Wu, L. Yang, Z. Lee, C. M. Chen, J. S. Pan, and S. Islam, “Improved ecc-based three-factor multiserver authentication scheme,” Security and Communication Networks, vol. 2021, 2021.
  24. B. H. Taher, F. A. H. Liu, H. L. A. A. Yassin, and A. J. Mohammed, “A secure and lightweight three-factor re- mote user authentication protocol for future iot applica- tions,” Journal of Sensors, vol. 2021, 2021.
  25. M. H. Alzuwaini and A. A. Yassin, “An efficient mecha- nism to prevent the phishing attacks,” Iraqi Journal for Electrical and Electronic Engineering, vol. 17, no. 1, 2021.
  26. A. A. Yassin, J. Yao, and S. Han, “Strong authentication scheme based on hand geometry and smart card factors,” Computers, vol. 5, no. 3, 2016.