RETRACTED: On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment (Retracted Article)

被引:6
作者
Zala, Kirtirajsinh [1 ]
Thakkar, Hiren Kumar [2 ]
Jadeja, Rajendrasinh [3 ]
Dholakia, Neel H. [1 ]
Kotecha, Ketan [4 ]
Jain, Deepak Kumar [5 ]
Shukla, Madhu [1 ]
机构
[1] Marwadi Univ, Dept Comp Engn, Rajkot 360006, Gujarat, India
[2] Pandit Deendayal Energy Univ, Sch Technol, Dept Comp Sci & Engn, Gandhinagar 382007, Gujarat, India
[3] Marwadi Univ, Fac Technol, Rajkot 360006, Gujarat, India
[4] Symbiosis Int Deemed Univ, Symbiosis Ctr Appl Artificial Intelligence, Pune, India
[5] Chongqing Univ Posts & Telecommun, Univ Chongqing, Coll Automat, Key Lab Intelligent Air Ground Cooperat Control, Chongqing, Peoples R China
关键词
PRIVACY ISSUES; BIG DATA; STORAGE; DEVICES; SYSTEM; ROBUST; MODEL;
D O I
10.1155/2022/3804553
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients' medical records due to cloud computing. The cloud's services are very cost-effective and scalable, and provide various mobile access options for a patient's electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will be fewer attacks on e-healthcare records now that stakeholders will have a safe interface and data on the cloud will not be accessible to them. End-to-end encryption is ensured by using multiple keys generated by the key conclusion function (KCF), and access to cloud services is granted based on a person's identity and the relationship between the parties involved, which protects their personal information that is the methodology used in the proposed scheme. The proposed scheme is best suited for cloud-based e-healthcare services because of its simplicity and robustness. Using different Amazon EC2 hosting options, we examine how well our cloud-based web application service works when the number of requests linearly increases. The performance of our web application service that runs in the cloud is based on how many requests it can handle per second while keeping its response time constant. The proposed secure access scheme for cloud-based web applications was compared to the Ethereum blockchain platform, which uses internet of things (IoT) devices in terms of execution time, throughput, and latency.
引用
收藏
页数:19
相关论文
共 63 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   Ontology based Public Healthcare System in Internet of Things (IoT) [J].
Abinaya ;
Kumar, Vinoth ;
Swathika .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :99-102
[3]   Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications [J].
Al Ameen, Moshaddique ;
Liu, Jingwei ;
Kwak, Kyungsup .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :93-101
[4]   A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography [J].
Al Hamid, Hadeal Abdulaziz ;
Rahman, Sk Md Mizanur ;
Hossain, M. Shamim ;
Almogren, Ahmad ;
Alamri, Atif .
IEEE ACCESS, 2017, 5 :22313-22328
[5]   Towards context-sensitive collaborative media recommender system [J].
Alhamid, Mohammed F. ;
Rawashdeh, Majdi ;
Al Osman, Hussein ;
Hossain, M. Shamim ;
El Saddik, Abdulmotaleb .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (24) :11399-11428
[6]  
Alotaibi M, 2016, INT CONF COMPUT POW, P1, DOI 10.1109/ICCPEIC.2016.7557206
[7]   Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J].
Amanlou, Sanaz ;
Hasan, Mohammad Kamrul ;
Abu Bakar, Khairul Azmi .
COMPUTER NETWORKS, 2021, 199
[8]  
Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
[9]  
Azfar A., 2015, ARXIV
[10]  
Bui Nicola., 2011, P 4 INT S APPL SCI B, P131