Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems

被引:0
|
作者
Esfahani, Maryam Nasr [1 ]
Ghahfarokhi, Behrouz Shahgholi [1 ]
Borujeni, Shahram Etemadi [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 02期
关键词
Blockchain; Electronic healthcare systems; End-to-end privacy; Internet of Things; ACCESS-CONTROL; DATA PROTECTION; ARCHITECTURE; SECURE; AUTHENTICATION; FRAMEWORK; PROTOCOL; MODEL;
D O I
10.1007/s11227-023-05522-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet-of-Things (IoT)-based healthcare systems, real-time healthcare data are gathered from patients' sensors with limited resources and transferred to end-users through gateways and healthcare service providers. Privacy of patients is a main challenge of these systems. Although privacy has already been considered in IoT-based healthcare systems, best centralized approaches yet suffer from collusion attack. Therefore, some researchers have come up with blockchain-based solutions to protect patients' privacy in IoT-based healthcare systems. However, those methods assume that parts of the entities along the end-to-end communication path from patients' sensors to the end-users are trusted or even assuming no privacy threats from internal attackers. Therefore, there is a lack of a blockchain-based approach in IoT-based healthcare systems to provide privacy for patients, assuming that all system entities are untrusted. To overcome these challenges, in this paper, we leverage a three-layered hierarchical blockchain, the zero-knowledge proof (ZKP), and the ring signature method to achieve data and location privacy of patients against both internal and external attackers. In addition, the proposed method provides anonymous authentication, authorization, and scalability, which are essential features in healthcare systems. Intuitive and formal security analyses demonstrate the resilience of our scheme against various attacks such as denial of service (DoS), modification, mining, storage, and replay attacks. The proposed method is compared to a recent blockchain-based method and also a centralized privacy-preserving scheme. Compared to the similar blockchain-based method, the computational overhead and delay of the authentication and data transfer phase are about 35% and 37% higher, respectively. Instead, the proposed method reduces memory usage of gateways by about 55% and diminishes the computational overhead and delay of information access phase by about 30% and 33% compared to the previous blockchain-based method. Therefore, the proposed method does not increase overhead and end-to-end delay considerably compared to the previous blockchain-based scheme, while some other performance metrics and security features are improved. Moreover, compared to a previous centralized method, the proposed approach shows more than 25% decrease in communication overhead and 22% improvement in memory usage of gateways, in average. Although the use of the blockchain imposes more computational overhead on service providers and may increase the latency compared to the centralized approach (depending on the type of the blockchain technology that is used), these weaknesses are negligible at the expense of increased security.
引用
收藏
页码:2067 / 2127
页数:61
相关论文
共 50 条
  • [1] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    [J]. The Journal of Supercomputing, 2024, 80 : 2067 - 2127
  • [2] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Nasr Esfahani, Maryam
    Shahgholi Ghahfarokhi, Behrouz
    Etemadi Borujeni, Shahram
    [J]. WIRELESS NETWORKS, 2021, 27 (06) : 4009 - 4037
  • [3] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    [J]. Wireless Networks, 2021, 27 : 4009 - 4037
  • [4] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [5] Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha Nabila
    [J]. WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 68 - 78
  • [6] BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications
    Hossein, Koosha Mohammad
    Esmaeili, Mohammad Esmaeil
    Dargahi, Tooska
    Khonsari, Ahmad
    Conti, Mauro
    [J]. COMPUTER COMMUNICATIONS, 2021, 180 : 31 - 47
  • [7] Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
    Zhao, Quanyu
    Chen, Siyi
    Liu, Zheli
    Baker, Thar
    Zhang, Yuan
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)
  • [8] (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
    Hongtao Li
    Feng Guo
    Wenyin Zhang
    Jie Wang
    Jinsheng Xing
    [J]. Journal of Medical Systems, 2018, 42
  • [9] A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs
    Lu, Zhaojun
    Wang, Qian
    Qu, Gang
    Zhang, Haichun
    Liu, Zhenglin
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2792 - 2801
  • [10] A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates
    Wang, Lianhai
    Liu, Xiaoqian
    Shao, Wei
    Guan, Chenxi
    Huang, Qihao
    Xu, Shujiang
    Zhang, Shuhui
    Chen, Chin-Ling
    [J]. SYMMETRY-BASEL, 2024, 16 (01):