A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication

被引:0
|
作者
Shweta Mittal
Mohona Ghosh
机构
[1] Indira Gandhi Delhi Technical University for Women,
来源
关键词
Blockchain; Electronic medical data; IPFS; Proxy re-encryption; Group communication;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the popularity of blockchain application in healthcare sector has increased manifold due to features such as decentralized architecture, security, immutability and authentication. However, there are some challenges associated with blockchain-based healthcare frameworks. Firstly, blockchain provides data verifiability meaning that anything stored there is accessible to all nodes in the network for verification. However, it is unacceptable for sensitive medical data to be made accessible to everyone. Secondly, healthcare sectors are group-oriented and frequently involve open networks for communication which lead to data breaches and other security risks. Lastly, due to limited size of a block in blockchain, many hospitals prefer storing patient’s data locally in a centralized server or opt for cloud storage which have their own threat vectors. In this work, we propose a three-phase unified approach to solve the above problems. Our framework utilizes proxy re-encryption and advanced cryptographic techniques to provide stringent access control. Next, a blockchain-based group encryption is proposed to ensure secure group communication. A group session key will be agreed upon by the authorized group members and used to protect sensitive patient information. Lastly, IPFS-based blockchain data storage is proposed to maintain data securely offsite. We provide a comparative security analysis of the proposed framework with other existing peer models and show that our framework offers several new security features. We also examine the security of the proposed framework using BAN logic. Furthermore, the proposed framework is simulated using the OMNET++ software, and its storage and computation costs are examined to establish its effectiveness.
引用
收藏
页码:7955 / 7992
页数:37
相关论文
共 50 条
  • [41] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145
  • [42] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [43] Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
    Luo, Fucai
    Wang, Haiyan
    Susilo, Willy
    Yan, Xingfu
    Zheng, Xiaofan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2919 - 2934
  • [44] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    [J]. The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [45] WB-PROXSHARE: A WARRANT-BASED PROXY RE-ENCRYPTION MODEL FOR SECURE DATA SHARING IN IOT NETWORKS VIA BLOCKCHAIN
    Sey, Collins
    Lei, Hang
    Li, Xiaoyu
    Qian, Weizhong
    Barnes, Obed
    Fiasam, Linda Delali
    Zhang, Cong
    Kodjiku, Seth Larweh
    Agyemang, Isaac Osei
    Adjei-Mensah, Isaac
    Shang, Xiaolei
    [J]. 2022 19TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2022,
  • [46] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [47] A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Tran Viet Xuan Phuong
    Xie, Qi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1667 - 1680
  • [48] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    [J]. Soft Computing, 2020, 24 : 2101 - 2108
  • [49] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    [J]. SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [50] Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
    Hu, Huidan
    Zhou, Yuanjian
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):