An Efficient Integrity Verification based Multi-User Cloud Access Control Framework using Block Chain Technology on EHR Database
Keywords:
cloud computing, block chain, electronic medical records, encryptionAbstract
Most of the traditional block chain based medical applications are insecure and difficult to provide strong data integrity with variable size due to large number of transactions and data storage type. Conventional healthcare software often faces security risks due to their reliance on fixed variables. On the other hand, cloud storage solutions designed for medical use provide improved data protection and computational security through the use of blockchain-based data structures and advanced memory management. The challenge of ensuring data security intensifies as media files grow larger on both public and private cloud services. This complexity is further amplified by the variety of file formats and the multi-dimensional nature of the data. To address these challenges, a novel mathematical chaotic function based multi-client encryption and decryption model is proposed in order to improve traditional block-chain frameworks on large cloud electronic health record(HER) datasets. In this work, a hybrid dynamic-sized hash verification and encryption framework in a cloud environment to provide data security for large medical databases. The approach enhances security in a real-time cloud computing environment. Experimental results indicate that it outperforms traditional blockchain frameworks for medical data types.
Downloads
References
Mrs. U. Chelladurai, Dr. S. Pandian, and Dr. K. Ramasamy, “A Blockchain based Patient Centric EHR Storage and Integrity Management for e-Health Systems,” Health Policy and Technology, p. 100513, May 2021, doi: 10.1016/j.hlpt.2021.100513.
X. Qin, Y. Huang, Z. Yang, and X. Li, “A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing,” Journal of Systems Architecture, vol. 112, p. 101854, Jan. 2021, doi: 10.1016/j.sysarc.2020.101854.
H. Li and T. Jing, “A Ciphertext-Policy Attribute-based Encryption Scheme with Public Verification for an IoT-Fog-Cloud Architecture,” Procedia Computer Science, vol. 174, pp. 243–251, Jan. 2020, doi: 10.1016/j.procs.2020.06.080.
M. B. Taha, C. Talhi, and H. Ould-Slimanec, “A Cluster of CP-ABE Microservices for VANET,” Procedia Computer Science, vol. 155, pp. 441–448, Jan. 2019, doi: 10.1016/j.procs.2019.08.061.
M. Xie, Y. Ruan, H. Hong, and J. Shao, “A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices,” Future Generation Computer Systems, vol. 121, pp. 114–122, Aug. 2021, doi: 10.1016/j.future.2021.03.021.
K. Sowjanya, M. Dasgupta, and S. Ray, “A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems,” Journal of Systems Architecture, vol. 117, p. 102108, Aug. 2021, doi: 10.1016/j.sysarc.2021.102108.
Z. Zhang, W. Zhang, and Z. Qin, “A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing,” Future Generation Computer Systems, May 2021, doi: 10.1016/j.future.2021.04.022.
Y. Su, Y. Li, K. Zhang, and B. Yang, “A privacy-preserving public integrity check scheme for outsourced EHRs,” Information Sciences, vol. 542, pp. 112–130, Jan. 2021, doi: 10.1016/j.ins.2020.06.043.
S. Shamshad, Minahil, K. Mahmood, S. Kumari, and C.-M. Chen, “A secure blockchain-based e-health records storage and sharing scheme,” Journal of Information Security and Applications, vol. 55, p. 102590, Dec. 2020, doi: 10.1016/j.jisa.2020.102590.
Z. Wang, C. Cao, N. Yang, and V. Chang, “ABE with improved auxiliary input for big data security,” Journal of Computer and System Sciences, vol. 89, pp. 41–50, Nov. 2017, doi: 10.1016/j.jcss.2016.12.006.
H. Huang, X. Sun, F. Xiao, P. Zhu, and W. Wang, “Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments,” Journal of Parallel and Distributed Computing, vol. 148, pp. 46–57, Feb. 2021, doi: 10.1016/j.jpdc.2020.10.002.
K. Sheela and C. Priya, “Blockchain-based security & privacy for biomedical and healthcare information exchange systems,” Materials Today: Proceedings, May 2021, doi: 10.1016/j.matpr.2021.04.105.
T. Benil and J. Jasper, “Cloud based security on outsourcing using blockchain in E-health systems,” Computer Networks, vol. 178, p. 107344, Sep. 2020, doi: 10.1016/j.comnet.2020.107344.
S. Cao, G. Zhang, P. Liu, X. Zhang, and F. Neri, “Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain,” Information Sciences, vol. 485, pp. 427–440, Jun. 2019, doi: 10.1016/j.ins.2019.02.038.
P. Deshmukh, “Design of cloud security in the EHR for Indian healthcare services,” Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 281–287, Jul. 2017, doi: 10.1016/j.jksuci.2016.01.002.
M. Sangeetha, P. Vijayakarthik, S. Dhanasekaran, and B. S. Murugan, “Fine grained access control using H-KCABE in cloud storage,” Materials Today: Proceedings, vol. 37, pp. 2735–2737, Jan. 2021, doi: 10.1016/j.matpr.2020.08.542.
L. D. Serbanati, “Health digital state and Smart EHR systems,” Informatics in Medicine Unlocked, vol. 21, p. 100494, Jan. 2020, doi: 10.1016/j.imu.2020.100494.
S. Banerjee et al., “Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment,” Journal of Information Security and Applications, vol. 53, p. 102503, Aug. 2020, doi: 10.1016/j.jisa.2020.102503.
S. Badr, I. Gomaa, and E. Abd-Elrahman, “Multi-tier Blockchain Framework for IoT-EHRs Systems,” Procedia Computer Science, vol. 141, pp. 159–166, Jan. 2018, doi: 10.1016/j.procs.2018.10.162.
R. Sarma, C. Kumar, and F. A. Barbhuiya, “PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT,” Sustainable Computing: Informatics and Systems, vol. 30, p. 100527, Jun. 2021, doi: 10.1016/j.suscom.2021.100527.
V. Odelu, A. K. Das, Y. S. Rao, S. Kumari, M. K. Khan, and K.-K. R. Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment,” Computer Standards & Interfaces, vol. 54, pp. 3–9, Nov. 2017, doi: 10.1016/j.csi.2016.05.002.
M. B. Taha, C. Talhi, and H. Ould-Slimane, “Performance Evaluation of CP-ABE Schemes under Constrained Devices,” Procedia Computer Science, vol. 155, pp. 425–432, Jan. 2019, doi: 10.1016/j.procs.2019.08.059.
K. Sethi, A. Pradhan, and P. Bera, “Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation,” Journal of Information Security and Applications, vol. 51, p. 102435, Apr. 2020, doi: 10.1016/j.jisa.2019.102435.
S. Banerjee, B. Bera, A. K. Das, S. Chattopadhyay, M. K. Khan, and J. J. P. C. Rodrigues, “Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT,” Computer Communications, vol. 169, pp. 99–113, Mar. 2021, doi: 10.1016/j.comcom.2021.01.023.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.