RETRACTED: Securing e-health records using keyless signature infrastructure blockchain technology in the cloud (Retracted Article)

被引:72
作者
Nagasubramanian, Gayathri [1 ]
Sakthivel, Rakesh Kumar [2 ]
Patan, Rizwan [3 ]
Gandomi, Amir H. [4 ]
Sankayya, Muthuramalingam [1 ]
Balusamy, Balamurugan [3 ]
机构
[1] Thiagarajar Coll Engn, Dept Informat Technol, Madurai, Tamil Nadu, India
[2] PTR Coll Engn & Technol, Dept Comp Sci & Engn, Madurai, Tamil Nadu, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Noida, India
[4] Stevens Inst Technol, Sch Business, Hoboken, NJ USA
关键词
Electronic health record (EHR); e-Health; Keyless signature infrastructure (KSI); Timestamped algorithm; Merkle tree; Blockchain; ENABLING TECHNOLOGIES; INTERNET; THINGS;
D O I
10.1007/s00521-018-3915-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Health record maintenance and sharing are one of the essential tasks in the healthcare system. In this system, loss of confidentiality leads to a passive impact on the security of health record whereas loss of integrity leads can have a serious impact such as loss of a patient's life. Therefore, it is of prime importance to secure electronic health records. Health records are represented by Fast Healthcare Interoperability Resources standards and managed by Health Level Seven International Healthcare Standards Organization. Centralized storage of health data is attractive to cyber-attacks and constant viewing of patient records is challenging. Therefore, it is necessary to design a system using the cloud that helps to ensure authentication and that also provides integrity to health records. The keyless signature infrastructure used in the proposed system for ensuring the secrecy of digital signatures also ensures aspects of authentication. Furthermore, data integrity is managed by the proposed blockchain technology. The performance of the proposed framework is evaluated by comparing the parameters like average time, size, and cost of data storage and retrieval of the blockchain technology with conventional data storage techniques. The results show that the response time of the proposed system with the blockchain technology is almost 50% shorter than the conventional techniques. Also they express the cost of storage is about 20% less for the system with blockchain in comparison with the existing techniques.
引用
收藏
页码:639 / 647
页数:9
相关论文
共 26 条
[1]  
[Anonymous], ARTIFICIAL INTELLIGE
[2]   Multi-tier Blockchain Framework for IoT-EHRs Systems [J].
Badr, Shaimaa ;
Gomaa, Ibrahim ;
Abd-Elrahman, Emad .
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 :159-166
[3]  
Begum S., 2016, INT J COMPUTER SCI M, V5, P138
[4]  
Bhattacharjya A, 2016, P INT C INTERNET THI, P46
[5]   Elliptic Curve Cryptography in Practice [J].
Bos, Joppe W. ;
Halderman, J. Alex ;
Heninger, Nadia ;
Moore, Jonathan ;
Naehrig, Michael ;
Wustrow, Eric .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :157-175
[6]   A Reference Model for Internet of Things Middleware [J].
da Cruz, Mauro A. A. ;
Rodrigues, Joel Jose P. C. ;
Al-Muhtadi, Jalal ;
Korotaev, Valery V. ;
de Albuquerque, Victor Hugo C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :871-883
[7]  
Ekblaw A., 2016, Proceedings of IEEE open big data conference, V13, P13
[8]  
Fisher Justin, 2016, U. S. Patent Application No, Patent No. [15/083,238, 15083238]
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]   Exploiting hierarchical identity-based encryption for access control to pervasive computing information [J].
Hengartner, U ;
Steenkiste, P .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :384-393