Open Access Open Access  Restricted Access Subscription Access

Personal Health Record Sharing Scheme using Blockchain Technique

Seema Shivapur, Najmusher J, Husna Tabassum, Deepak N R

Abstract


In this article we offer a new safe EHR sharing system with verified data integrity based on blockchain and cloud computing. The new system uses symmetric encryption and attributes-based encryption techniques to achieve privacy protection and fine-grained access controls in the process of personal health record sharing, aiming at the issues of data protection and loss of control rights during personal health record sharing. Compared with current systems, the new system enables patients to give private key attributes to users, which prevents many security issues.

In addition, the new scheme utilises blockchain to handle scheme keys. The original strategy saves the hash upsides of encoded individual wellbeing data in blockchain and save the related file set in a savvy agreement to additional upgrade the effectiveness of confirmation of information respectability.


Full Text:

PDF

References


Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., & Buyya, R. (2016). Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Computing, 3(4), 58-64.

Bahga, A., & Madisetti, V. K. (2013). A cloud-based approach for interoperable electronic health records (EHRs). IEEE Journal of Biomedical and Health Informatics, 17(5), 894-906.

Ge, A., Zhang, J., Zhang, R., Ma, C., & Zhang, Z. (2012). Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2319-2321.

Deepak, N. R., & Balaji, S. (2015, December). Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1-5). IEEE.

Deepak, N. R., & Balaji, S. (2015). A Review of Techniques used in EPS and 4G-LTE in Mobility Schemes. International Journal of Computer Applications, 109(9).

Thanuja, N., & Deepak, N. R. (2021, April). A Convenient Machine Learning Model for Cyber Security. In 2021 5th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 284-290). IEEE.

Yang, K., Jia, X., & Ren, K. (2014). Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Transactions on Parallel and Distributed Systems, 26(12), 3461-3470.

Li, H., Zhang, F., He, J., & Tian, H. (2017). A searchable symmetric encryption scheme using blockchain. arXiv preprint arXiv:1711.01030.

Zhang, Y., Deng, R. H., Shu, J., Yang, K., & Zheng, D. (2018). TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access, 6, 31077-31087.

Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.


Refbacks

  • There are currently no refbacks.