An Efficient Integrity Verification based Multi-User Cloud Access Control Framework using Block Chain Technology on EHR Database

Authors

  • Keesara Sravanthi Research Scholar, Department of Computer Science and Engineering, GITAM, Vizag, AP, India
  • P Chandra Sekhar Associate Professor, Department of Computer Science and Engineering, GITAM, Vizag, AP, India

Keywords:

cloud computing, block chain, electronic medical records, encryption

Abstract

Most of the traditional block chain based medical applications are insecure and difficult to provide strong data integrity with variable size due to large number of transactions and data storage type. Conventional healthcare software often faces security risks due to their reliance on fixed variables. On the other hand, cloud storage solutions designed for medical use provide improved data protection and computational security through the use of blockchain-based data structures and advanced memory management. The challenge of ensuring data security intensifies as media files grow larger on both public and private cloud services. This complexity is further amplified by the variety of file formats and the multi-dimensional nature of the data. To address these challenges, a novel mathematical chaotic function based multi-client encryption and decryption model is proposed in order to improve traditional block-chain frameworks on large cloud electronic health record(HER) datasets. In this work, a hybrid dynamic-sized hash verification and encryption framework in a cloud environment to provide data security for large medical databases. The approach enhances security in a real-time cloud computing environment. Experimental results indicate that it outperforms traditional blockchain frameworks for medical data types.

Downloads

Download data is not yet available.

References

Mrs. U. Chelladurai, Dr. S. Pandian, and Dr. K. Ramasamy, “A Blockchain based Patient Centric EHR Storage and Integrity Management for e-Health Systems,” Health Policy and Technology, p. 100513, May 2021, doi: 10.1016/j.hlpt.2021.100513.

X. Qin, Y. Huang, Z. Yang, and X. Li, “A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing,” Journal of Systems Architecture, vol. 112, p. 101854, Jan. 2021, doi: 10.1016/j.sysarc.2020.101854.

H. Li and T. Jing, “A Ciphertext-Policy Attribute-based Encryption Scheme with Public Verification for an IoT-Fog-Cloud Architecture,” Procedia Computer Science, vol. 174, pp. 243–251, Jan. 2020, doi: 10.1016/j.procs.2020.06.080.

M. B. Taha, C. Talhi, and H. Ould-Slimanec, “A Cluster of CP-ABE Microservices for VANET,” Procedia Computer Science, vol. 155, pp. 441–448, Jan. 2019, doi: 10.1016/j.procs.2019.08.061.

M. Xie, Y. Ruan, H. Hong, and J. Shao, “A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices,” Future Generation Computer Systems, vol. 121, pp. 114–122, Aug. 2021, doi: 10.1016/j.future.2021.03.021.

K. Sowjanya, M. Dasgupta, and S. Ray, “A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems,” Journal of Systems Architecture, vol. 117, p. 102108, Aug. 2021, doi: 10.1016/j.sysarc.2021.102108.

Z. Zhang, W. Zhang, and Z. Qin, “A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing,” Future Generation Computer Systems, May 2021, doi: 10.1016/j.future.2021.04.022.

Y. Su, Y. Li, K. Zhang, and B. Yang, “A privacy-preserving public integrity check scheme for outsourced EHRs,” Information Sciences, vol. 542, pp. 112–130, Jan. 2021, doi: 10.1016/j.ins.2020.06.043.

S. Shamshad, Minahil, K. Mahmood, S. Kumari, and C.-M. Chen, “A secure blockchain-based e-health records storage and sharing scheme,” Journal of Information Security and Applications, vol. 55, p. 102590, Dec. 2020, doi: 10.1016/j.jisa.2020.102590.

Z. Wang, C. Cao, N. Yang, and V. Chang, “ABE with improved auxiliary input for big data security,” Journal of Computer and System Sciences, vol. 89, pp. 41–50, Nov. 2017, doi: 10.1016/j.jcss.2016.12.006.

H. Huang, X. Sun, F. Xiao, P. Zhu, and W. Wang, “Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments,” Journal of Parallel and Distributed Computing, vol. 148, pp. 46–57, Feb. 2021, doi: 10.1016/j.jpdc.2020.10.002.

K. Sheela and C. Priya, “Blockchain-based security & privacy for biomedical and healthcare information exchange systems,” Materials Today: Proceedings, May 2021, doi: 10.1016/j.matpr.2021.04.105.

T. Benil and J. Jasper, “Cloud based security on outsourcing using blockchain in E-health systems,” Computer Networks, vol. 178, p. 107344, Sep. 2020, doi: 10.1016/j.comnet.2020.107344.

S. Cao, G. Zhang, P. Liu, X. Zhang, and F. Neri, “Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain,” Information Sciences, vol. 485, pp. 427–440, Jun. 2019, doi: 10.1016/j.ins.2019.02.038.

P. Deshmukh, “Design of cloud security in the EHR for Indian healthcare services,” Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 281–287, Jul. 2017, doi: 10.1016/j.jksuci.2016.01.002.

M. Sangeetha, P. Vijayakarthik, S. Dhanasekaran, and B. S. Murugan, “Fine grained access control using H-KCABE in cloud storage,” Materials Today: Proceedings, vol. 37, pp. 2735–2737, Jan. 2021, doi: 10.1016/j.matpr.2020.08.542.

L. D. Serbanati, “Health digital state and Smart EHR systems,” Informatics in Medicine Unlocked, vol. 21, p. 100494, Jan. 2020, doi: 10.1016/j.imu.2020.100494.

S. Banerjee et al., “Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment,” Journal of Information Security and Applications, vol. 53, p. 102503, Aug. 2020, doi: 10.1016/j.jisa.2020.102503.

S. Badr, I. Gomaa, and E. Abd-Elrahman, “Multi-tier Blockchain Framework for IoT-EHRs Systems,” Procedia Computer Science, vol. 141, pp. 159–166, Jan. 2018, doi: 10.1016/j.procs.2018.10.162.

R. Sarma, C. Kumar, and F. A. Barbhuiya, “PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT,” Sustainable Computing: Informatics and Systems, vol. 30, p. 100527, Jun. 2021, doi: 10.1016/j.suscom.2021.100527.

V. Odelu, A. K. Das, Y. S. Rao, S. Kumari, M. K. Khan, and K.-K. R. Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment,” Computer Standards & Interfaces, vol. 54, pp. 3–9, Nov. 2017, doi: 10.1016/j.csi.2016.05.002.

M. B. Taha, C. Talhi, and H. Ould-Slimane, “Performance Evaluation of CP-ABE Schemes under Constrained Devices,” Procedia Computer Science, vol. 155, pp. 425–432, Jan. 2019, doi: 10.1016/j.procs.2019.08.059.

K. Sethi, A. Pradhan, and P. Bera, “Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation,” Journal of Information Security and Applications, vol. 51, p. 102435, Apr. 2020, doi: 10.1016/j.jisa.2019.102435.

S. Banerjee, B. Bera, A. K. Das, S. Chattopadhyay, M. K. Khan, and J. J. P. C. Rodrigues, “Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT,” Computer Communications, vol. 169, pp. 99–113, Mar. 2021, doi: 10.1016/j.comcom.2021.01.023.

Downloads

Published

30.12.2023

How to Cite

Sravanthi, K. ., & Sekhar, P. C. . (2023). An Efficient Integrity Verification based Multi-User Cloud Access Control Framework using Block Chain Technology on EHR Database . International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 536 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4406

Issue

Section

Research Article