A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication

被引:0
|
作者
Shweta Mittal
Mohona Ghosh
机构
[1] Indira Gandhi Delhi Technical University for Women,
来源
关键词
Blockchain; Electronic medical data; IPFS; Proxy re-encryption; Group communication;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the popularity of blockchain application in healthcare sector has increased manifold due to features such as decentralized architecture, security, immutability and authentication. However, there are some challenges associated with blockchain-based healthcare frameworks. Firstly, blockchain provides data verifiability meaning that anything stored there is accessible to all nodes in the network for verification. However, it is unacceptable for sensitive medical data to be made accessible to everyone. Secondly, healthcare sectors are group-oriented and frequently involve open networks for communication which lead to data breaches and other security risks. Lastly, due to limited size of a block in blockchain, many hospitals prefer storing patient’s data locally in a centralized server or opt for cloud storage which have their own threat vectors. In this work, we propose a three-phase unified approach to solve the above problems. Our framework utilizes proxy re-encryption and advanced cryptographic techniques to provide stringent access control. Next, a blockchain-based group encryption is proposed to ensure secure group communication. A group session key will be agreed upon by the authorized group members and used to protect sensitive patient information. Lastly, IPFS-based blockchain data storage is proposed to maintain data securely offsite. We provide a comparative security analysis of the proposed framework with other existing peer models and show that our framework offers several new security features. We also examine the security of the proposed framework using BAN logic. Furthermore, the proposed framework is simulated using the OMNET++ software, and its storage and computation costs are examined to establish its effectiveness.
引用
收藏
页码:7955 / 7992
页数:37
相关论文
共 50 条
  • [21] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [22] Blockchain aware proxy re-encryption algorithm-based data sharing scheme
    Keshta, Ismail
    Aoudni, Yassine
    Sandhu, Mukta
    Singh, Abha
    Xalikovich, Pardayev Abdunabi
    Rizwan, Ali
    Soni, Mukesh
    Lalar, Sachin
    [J]. PHYSICAL COMMUNICATION, 2023, 58
  • [23] Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems
    Li, Wenchao
    Jin, Chuanjie
    Kumari, Saru
    Xiong, Hu
    Kumar, Sachin
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
  • [24] A Scheme for Electronic Evidence Sharing Based on Blockchain and Proxy Re-encryption
    Miao, Zhikun
    Ye, Chengxu
    Yang, Ping
    Liu, Rui
    Liu, Bing
    Chen, Ying
    [J]. 2021 4TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2021, 2021, : 11 - 16
  • [25] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [26] A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
    Huang, Der-Chen
    Liu, Ling-Chun
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Zeng, Kuang-Wei
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6953 - 6983
  • [27] Secure Group Communication Based on Distributed Parallel ID-based Proxy Re-encryption
    Zhang Minqing
    Wu Xuguang
    Han Yiliang
    Guo Yao
    [J]. 2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6364 - 6367
  • [28] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [29] Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
    Wang, Xu An
    Yang, Xiaoyuan
    Li, Cong
    Liu, Yudong
    Ding, Yong
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) : 585 - 614
  • [30] KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
    Pareek, Gaurav
    Purushothama, B. R.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63