Blockchain-Inspired Lightweight Dynamic Encryption Schemes for a Secure Health Care Information Exchange System
Received: 31 March 2024 | Revised: 22 April 2024 | Accepted: 1 May 2024 | Online: 2 August 2024
Corresponding author: Etikala Aruna
Abstract
The telemedicine sector has entered a new phase marked by the integration of Internet of Things (IoT) devices to identify and then send patient health data to medical terminals for additional diagnostic and therapeutic procedures. Today, patients can receive prompt and expert medical care at home in comfortable settings. Due to the unique nature of these services, it is essential to verify patient healthcare data, as it contains a greater amount of personal information that is vulnerable to privacy violations and data breaches. Blockchain technology has attracted interest in addressing security concerns due to its decentralized, immutable, shared, and distributed characteristics. This study proposes lightweight dynamic blockchain-enabled encryption schemes to secure physiological data during authentication and exchange processes. The proposed scheme introduces the logistic Advanced Encryption Scheme (AES) that combines chaotic logistic maps to secure the data in the blockchain network and mitigate different attacks. The model was deployed on the Ethereum blockchain and performance metrics, such as computation and transaction time, were calculated and compared with other current blockchain-inspired encryption models. Furthermore, the NIST test was conducted to prove the strength of the proposed scheme. The proposed model exhibits high security and a shorter transaction time (0.964 s) than other existing schemes. Finally, the proposed model generates high-dynamic keys that are suitable for defending against unpredictable attacks on blockchain.
Keywords:
Internet of things, Logistic AES, NIST, authentication, telemedicine, Etherum blockchain, exchange processDownloads
References
B. E. Dixon and C. M. Cusack, "Measuring the value of health information exchange," in Health Information Exchange, 2nd ed., B. E. Dixon, Ed. Academic Press, 2023, pp. 379–398.
X. Liu, K. Li, G. Min, Y. Shen, A. X. Liu, and W. Qu, "Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way," IEEE Transactions on Computers, vol. 64, no. 1, pp. 87–96, Jan. 2015.
S. Jiang, J. Cao, Y. Liu, J. Chen, and X. Liu, "Programming Large-Scale Multi-Robot System with Timing Constraints," in 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, Aug. 2016, pp. 1–9.
A. Ekblaw, A. Azaria, J. D. Halamka, and A. Lippman, "A Case Study for Blockchain in Healthcare:‘MedRec’ prototype for electronic health records and medical research data," in Proceedings of IEEE open & big data conference, 2016, vol. 13.
Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, "Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing," IEEE Transactions on Cloud Computing, vol. 6, no. 1, pp. 276–286, Jan. 2018.
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, Jan. 2013.
Y. J. Choi, H. J. Kang, and I. G. Lee, "Scalable and Secure Internet of Things Connectivity," Electronics, vol. 8, no. 7, Jul. 2019, Art. no. 752.
M. Shen, B. Ma, L. Zhu, X. Du, and K. Xu, "Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1998–2008, Apr. 2019.
S. Dowling, M. Schukat, and H. Melvin, "A ZigBee honeypot to assess IoT cyberattack behaviour," in 2017 28th Irish Signals and Systems Conference (ISSC), Killarney, Ireland, Jun. 2017, pp. 1–6.
A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, "Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1832–1843, Dec. 2017.
H. Hou, "The Application of Blockchain Technology in E-Government in China," in 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, Canada, Jul. 2017, pp. 1–4.
P. Kalpana and R. Anandan, "A Capsule Attention Network for Plant Disease Classification.," Traitement du Signal, vol. 40, no. 5, 2023.
Z. Shae and J. J. P. Tsai, "On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine," in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, Jun. 2017, pp. 1972–1980.
M. Jakobsson and A. Juels, "Proofs of Work and Bread Pudding Protocols(Extended Abstract)," in Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99), Leuven, Belgium, Sep. 1999, pp. 258–272.
U. Farooq and M. F. Aslam, "Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA," Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 295–302, Jul. 2017.
N. Teslya and I. Ryabchikov, "Blockchain-based platform architecture for industrial IoT," in 2017 21st Conference of Open Innovations Association (FRUCT), Helsinki, Nov. 2017, pp. 321–329.
D. Derler, K. Samelin, D. Slamanig, and C. Striecks, "Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based," in Proceedings 2019 Network and Distributed System Security Symposium, San Diego, CA, USA, 2019.
P. Kalpana, R. Anandan, A. G. Hussien, H. Migdady, and L. Abualigah, "Plant disease recognition using residual convolutional enlightened Swin transformer networks," Scientific Reports, vol. 14, no. 1, Apr. 2024, Art. no. 8660.
I. Puddu, A. Dmitrienko, and S. Capkun, "μchain: How to Forget without Hard Forks." 2017, [Online]. Available: https://eprint.iacr.org/2017/106.
Downloads
How to Cite
License
Copyright (c) 2024 Etikala Aruna, Arun Sahayadhas
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.