Security enhancements in M-health using distributed ledger technology based digital locker system

被引:0
作者
Soumya Ray [1 ]
Kamta Nath Mishra [1 ]
Sandip Dutta [1 ]
机构
[1] Department of Computer Science and Engineering, B.I.T. Mesra, Jharkhand, Ranchi
关键词
Distributed denial of service attacks; Distributed ledger technology-based digital locker; M-healthcare systems; Network security; Sensitive data;
D O I
10.1007/s41870-024-02054-y
中图分类号
学科分类号
摘要
Electronic Medical Records (E.M.Rs) comprise sensitive and private information of the patients in m-healthcare, and the passing of data across different medical institutions poses severe challenges. Leakage of information could destroy the privacy of the data, and the availability of the data at runtime may be disrupted by the DDoS (Distributed Denial of Service) attack. Distributed Ledger Technology (DLT) helps overcome the challenges of the trusted decentralized database. It is possible to validate all the stakeholders by a single-step authentication process using distributed ledger technology. In this research paper, the authors have proposed a distributed ledger technology architecture (DLTA) using an m-health digital locker (DL) system and presented the interaction of the different m-healthcare entities with the anticipated model. The authors have designed the mathematical model to enhance the security re-assurance of the DLTA-based m-health DL system. The security analysis of the proposed model is highlighted and compared the same with the non-distributed system architecture. The key factors considered for evaluating the proposed model are network congestion, throughput, average turnaround time, average response time, average waiting time, and network consumption. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:4253 / 4271
页数:18
相关论文
共 47 条
[1]  
Walker-Roberts S., Hammoudeh M., Dehghantanha A., A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access, 6, pp. 25167-25177, (2018)
[2]  
Abrar H., Et al., Risk analysis of cloud sourcing in healthcare and public health industry, IEEE Access, 6, pp. 19140-19150, (2018)
[3]  
Yang Y., Et al., MedShare: a novel hybrid cloud for medical resource sharing among autonomous healthcare providers, IEEE Access, 6, pp. 46949-46961, (2018)
[4]  
Hnamte V., Hussain J., An efficient DDoS attack detection mechanism in SDN environment, Int J Inf Technol, 15, pp. 2623-2636, (2023)
[5]  
Ray S., Mishra K.N., Dutta S., Big data security issues from the perspective of IoT and cloud computing: a review, Recent Adv Comput Sci Commun Benthem Sci J, 13, pp. 1-25, (2020)
[6]  
Kamal K.K., Gupta S., Joshi P., Et al., An efficient mCK signing and mobile based identity solution for authentication, Int J Inf Technol, 15, pp. 1637-1646, (2023)
[7]  
Yuan Y., Wang F.Y., Parallel blockchain: concept, methods, and issues, Acta Autom Sin, 43, 10, pp. 1703-1712, (2017)
[8]  
Ray S., Mishra K.N., Dutta S., Susceptible data classification and security re-assurance in cloud-IoT based computing environment, Sadhana J Eng Sci, 46, pp. 1-24, (2021)
[9]  
Mawgoud A.A., Karadawy A.I., Tawfik B.S., A Secure Authentication Technique in the Internet of Medical Things through Machine Learning, pp. 1-25, (2020)
[10]  
Chaudhary R.R.K., Chatterjee K.A., Lightweight security framework for electronic healthcare system, Int J Inf Technol, 14, pp. 3109-3121, (2022)