Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations

: A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required. Therefore, the security of data in transmission has been attracting increasing attention. In recent years, blockchain technology has also attracted more attention. Relevant research has been published at a high rate. Most methods of satisfying relevant security-related regulations use modular and exponential calculation. This study proposes a medical care information preservation mechanism that considers the entire process of data storage in devices from wearable devices to mobile devices to medical center servers. The entire process is protected and complies with HIPAA privacy and security regulations. The proposed scheme uses extended chaotic map technology to develop ID-based key negotiation for wearable devices, and thereby reduces the amount of computing that must be carried out by wearable devices and achieve lightness quantify. It also uses the non-tamperability of the blockchain to ensure that the data have not been tampered with, improving data security. The proposed mechanism can resist a variety of attacks and is computationally lighter than the elliptic curve point multiplication that has been used elsewhere, while retaining its security characteristics. about a user that are measured by a wearable device can enable doctors more accurately to determine the physical condition of the user. This study proposes a mechanism for preserving medical information that considers the entire process of data from data generation through transmission by wearable devices to mobile devices and then to a medical center server. When the data that are generated by a wearable device on the user are transmitted to be viewed by staff, this process is protected in a manner that complies with HIPAA privacy and security regulations. This goal of this work is to improve the security and privacy of users’ physiological data in transmission, and to provide a secure data transmission channel for telemedicine, supporting further developments in the medical industry. As part of future work, the scalability issue for healthcare big data must be taken care of seriously in order to make blockchain popular and to integrate artificial intelligence features in the process of analyzing collected health data and healthcare diagnosis decisions.


Introduction
A healthcare information system allows patients and other users to login remotely to medical services to access health data through the Internet. To protect the privacy of patients and ensure security over the public network, secure communication is necessary.
Rapid technological development has made access to information part of our daily life, along with health care. In the field of personal health care, data sharing has become an important topic. The security of data in transmission is attracting increasing attention. In recent years, blockchain technology has also been attracting more attention. Relevant research has been published at a high rate [1][2][3][4]. It draws on many fields, including medicine, leasehold, energy, and others. However, with respect to personal information privacy, most attempts to satisfy security-related regulations use modular and exponential calculation.
To improve the security of the healthcare system, many studies have proposed the use of blockchain technology. In 2016, Azaria et al. [1] proposed a method of using blockchain technology to decentralize the management of large-scale data in electronic medical records (EMR), and enable patients to access them. The use of blockchain technology makes the records immutable and prevents malicious tampering with user cases, which violates the rights of patients.
In the same year, Peterson et al. [5] proposed a scheme in which blockchain technology is used to share data among hospitals. Using the concept of a distributed ledger and fast

•
This research attempt to use light-weight operations such as hash function and chaotic mapping technology to improve computing efficiency; • This research uses extended chaotic mapping technology to develop a blockchain medical data protection mechanism and complies with Health Insurance Portability and Accountability Act (HIPAA) security regulations; • The proposed mechanism does not need to use time-consuming modular exponential calculations and elliptic curve point multiplication calculations, so it can reduce the computational complexity of the wearable device and improve computational efficiency.
The remainder of this paper is structured as follows. Section 2 discusses the main existing research in the healthcare information system. Section 3 introduces background knowledge relevant to the paper, such as HIPAA privacy/security, blockchain, and chaotic maps. Section 4 presents the proposed scheme in detail. Section 5 the result of the paper which evaluates the proposed scheme, and Section 6 introduces the discussion. Finally, Section 7 draws conclusions and future work.

Related Work
This section will discuss the main existing research in the healthcare information system where blockchain technology has been used to improve the security. Table 1 summarizes related work in this paper according to their main contributions and goals.
In 2019, Vazirani et al. [13] studied blockchain as a way to manage healthcare information efficiently the study was discussing potential benefits and limitations of blockchain technology for healthcare and the paper concluded the discussion on how blockchain could be a better fit for managing health care records on the cloud system, while maintaining security and privacy of data.
In 2020, Khatoon [14] presented a healthcare smart contract system for different medical workflow and to streamline complex medical procedures. He also indicated the potential use of blockchain in healthcare and to show blockchain research's challenges and possible directions.
In 2020, Tripathi et al. [15] proposed a blockchain-based smart healthcare system (SHS) framework in order to provide a secured and privacy-preserved healthcare system. The paper explores the technological and social barriers in adoption of SHS by analyzing state-of-the-art expert views and user's perception.
In 2020, Khan et al. [16] presented a state-of-the-art network for blockchain healthcare applications with a mobile app model called HDG for the automation of medical records without compromising privacy, and discussed security challenges on a smart grid and its application for sustainable development in healthcare.
In 2019, Han et al. [17] proposed a blockchain-based health information sharing prototype to protect the patient's medical record includes personal information. Han et al. [17] used digital signatures to protect the record against forgery and unauthorized access and concluded that blockchain technology has a great potential for healthcare systems, providing data integrity and medical data sharing traceability. However, some security issues such as availability, scalability, and privacy were not evaluated.
In 2020, Jabbar et al. [18] proposed BiiMED: a blockchain-based framework method which use Ethereum. The framework is used to manage and validate shared data between medical providers who register health data in the cloud and share Electronic Health Records (EHR) of patients. This method presented the Trusted Third-Party Auditor (TTPA) based on blockchain technology. The proposed solution ensures data interoperability and integrity while sharing health data and according to the evaluation of the solution was conducted by testing the following properties: Turing-complete operations, scalability across large populations of patients, user identification and authentication, structural interoperability at the minimum, and cost-effectiveness.
In 2021, Shakor and Surameery [19] proposed a hybrid cryptosystem in a cloud framework using a built-in encrypted cloud storage system to make the proposed system strong against vulnerabilities. The framework combines the Advanced Encryption Standard (AES) and the Cryptographic Curve Cryptography (ECC). The paper shows that the impact of this built-in approach is more important than the other secure algorithms. In addition, it also showed that the availability of security and speed in this system makes it most suitable for storing sensitive data for the COVID-19 pandemic in health institutions.
In 2021, Zaabar et al. [20] proposed a system, HealthBlock, which is based on an architecture that leverages both blockchain and IoT technologies to ensure a secure healthcare management system including Remote Patient Monitoring (RPM) and Electronic Health Record (EHR) sharing. The HealthBlock system allows patients to manage their healthcare data securely on their own and its performance evaluation results proves that the performance of our proposed system is far better than the prominent existing ones, as it reduces the mining cost, the latency, and provides a considerable increase in overall throughput.

Reference Contribution/Goal
Khatoon [14] Design and implementation of different medical workflows Tripathi et al. [15] Design and implementation of health data Khan et al. [16] Improvement in throughput of the blockchain network and a mobile app Han et al. [17] Health Data Sharing Jabbar et al. [18] Shared EHR of patients with a decentralized Trusted Third-Party Auditor (TTPA) Shakor and Surameery [19] COVID-19 Data Sharing Zaabar et al. [20] Design and implementation of RPM and EHR sharing

Preliminaries
This section describes the underlying primitives that are used in this paper. They are HIPAA privacy/security, blockchain, and chaotic maps.

HIPAA Privacy Guidelines
Privacy guidelines define terms that are related to the limits of patients' privacy and rights to understand and control the use/disclosure of protected health information (PHI), which (comprises OR consists of TRY includes) the patient's name, address, contact number and medical records. The privacy guidelines of HIPAA [21][22][23], use the following seven main terms.
(1) Patients' understanding: Patients have the right to understand how their health information will be stored and used and kept by care providers; (2) Confidentiality: Various software safeguards such as encryption, decryption, and authentication protect health data during storage and transmission. The health data of patients must not be undisclosed to any party who has no right to access the data; (3) Patients' control: Patients must be able to control who can access and use their health data; (4) Data integrity: Patients' electronic health information should be protected from improper alteration or destruction; (5) Consent exception: In limited circumstances (life-saving and other exceptional situations), health information can be disclosed and used without a patient's individual authorization; (6) Non-repudiation: To ensure that authorities meet their responsibilities in relation to patients' information, any related activity must be provable with evidence; (7) Auditing: To ensure that patients' health information is protected, that information and logs of related activity must be frequently monitored and assurance must be provided to patients regarding the security of their health information.

Blockchain
Blockchain is an open and distributed ledger that is based on peer-to-peer networks and consensus algorithms. It refers to a chain of blocks that are linked and secured using cryptography [4]. The most obvious and outstanding benefit of blockchain is the fact that it removes the need for a centralized trusted third party in distributed applications. By enabling two or more parties to carry out transactions in a distributed environment without a centralized authority, blockchain overcomes the problem of the single point of failure that a central authority otherwise introduces. Blockchain is now considered to be a general proposed technology that has found applications in different industries and has various use cases, such as identity management, dispute resolution, contract management, supply chain management, insurance, and healthcare [24,25].
The benefits of blockchain for healthcare systems are as follows [25].
(1) Decentralization: Blockchain provides a decentralized health data management backbone, meaning that all users (doctors, patients, and others) can access the same health records; (2) Improved data security and privacy: The immutability of blockchain can improve the security of health data, which, once saved to the blockchain, cannot be corrupted or altered; (3) Ownership of health data: Blockchain helps patients to own their health data and control how their data are used through strong cryptographic protocols and welldefined smart contracts; (4) Availability/robustness: The availability of patients' health data that are stored on blockchain is resilient against data losses, data corruption, and some security attacks; (5) Transparency and trust: Blockchain, being open and transparent, establishes a sense of trust in distributed healthcare systems; (6) Data verifiability: Even without accessing the plaintext of records that are stored on blockchain, the integrity and validity of those records can be verified.

Chaotic Maps
A chaotic map is a non-linear dynamical system that exhibits statistical properties, such as responsiveness to parameters, pseudo-random generator, and a large selection of points. The definition of the chaotic map is based on a Chebyshev polynomial. The Chebyshev chaotic map has special features, such as a semigroup structure and the commutative property. Recent research shows that cryptographic systems that use chaotic mapping are more efficient than those that use exponential and scalar multiplication on elliptic curves. Additionally, enhanced Chebyshev polynomials exhibit the semi-group property and the commutative property, and they are subject to the discrete logarithm problem and the Diffie-Hellman problem [26][27][28], which are described as follows.
where r, s ∈ N, x ∈ [−1, 1]. The Chebyshev polynomials satisfy the semi-group property and are commutative under composition. Then,

Enhanced Chebyshev Maps
The cryptographic system, which is based on chaotic maps, has proven to be more efficient than traditional cryptographic systems that use modular exponential operations and point multiplication operations on elliptic curves [26][27][28][29][30][31]. Enhanced Chebyshev polynomials have semi-group and commutative properties and suffer from the discrete logarithm problem, the Diffie-Hellmann problem, and the inverse assumption.
After the security problems of the Chebyshev polynomial were raised by Bergamo et al. [27], Zhang [31] proposed an improved Chebyshev polynomial and proved that if that Chebyshev polynomial is defined not in the interval [−1, +1] but in (−∞, +∞), then the security issue can be solved, and the characteristics are maintained. The definition and characteristics of the Chebyshev polynomials and their enhancement are described as follows.
when x ∈ (−∞, +∞) and p is a large prime number. Chebyshev polynomial satisfies the Semi-Group characteristics (closure and associativity) and the commutative rate.
The variable y is the result of the operation of Chebyshev polynomial degree as r. When x, y, and p are known, it's difficult to find an integer r to satisfy the following formula: (2) Extended Chaotic Map-Based Diffie-Hellman Problem: Knowing that T u (x), T v (x), T(.), x and p, when u, v ≥ 2 and x ∈ (−∞, +∞), p is a large prime number, it is difficult to find the following formula: (3) Extended Chaotic Map-Based Inverse Assumption: Since the Chebyshev polynomial satisfies the semi-group (closure and associativity), it is known that u, v, T(·), x and p; u, v ≥ 2; x ∈ (−∞, +∞), and p is a large prime number, it is difficult to find an integer u −1 that satisfies the following formula:

Review of the Novel Blockchain-Based Data Preservation System of Li et al.
Li et al. [7] proposed a novel blockchain-based data preservation system (DPS) for medical data. Their scheme comprises preservation submission (PS) and primitiveness verification (PV), as follows.
(1) Preservation submission (PS): In the PS phase, the user uploads text or files that need to be preserved. After confirmation that the uploaded content is correct, this content is stored officially in the DPS and cannot be changed. The three steps in this process are as follows.
Step 1: Receiving and processing the as-yet unpreserved health data that have been uploaded by the user.
The DPS can accept health data in two formats-as a file or as text. If the preserved data is of the file type, then the system will process the file, store it in randomly generated folders, and calculate the hashr of the file using the SHA-256 algorithm. If the preserved data are text files, then they will be stored temporarily in the database, and the hashr of the text files will be calculated using the SHA-256 algorithm. Finally, a pair of asymmetrical keys is generated by the ECC algorithm.
Step 2: Protecting the processed data by encryption This function is invoked when a user verifies the validity of the data to be preserved. If the user confirms the preservation, then the DPS uses the AES algorithm to encrypt the as-of-yet unpreserved data using a symmetric key Ksym. Next, Ksym is encrypted using the public key pubKey, which is the asymmetric key that was generated in step 1. Finally, the encrypted data are returned. The stored files in the random folder or text in the database will be deleted.
Step 3: Storing data to be preserved in the blockchain. First, the identity of the user is checked to determine whether she/he is legal, based on the user's registration information and past preserve operations. If the user is legal, then the preserved data will be stored in the blockchain, and the DPS will then return the transaction hash Tx.
The PV module implements three main steps.
Step 4: Viewing the preserved health data that are stored in the blockchain. First, the DPS retrieves the stored and encrypted data from the blockchain by using Tx. Then, the private key priKey is used to decrypt the data C. Second, the consistency with the stored hashr, which hash is extracted from the original data, with hashc, which is the calculated hash of content M, is checked. If they are consistent, then the preserved information is decrypted and returned. Otherwise, null is returned.
Step 5: Verifying consistency with original data. The data that are uploaded by users must be verified by the DPS, which calculates hashc using the SHA-256 algorithm and hashr from the original data. If they are consistent, then the health data to be verified are deemed identical to the preserved data.
Step 6: Extracting health data from the blockchain. The DPS obtains all information using the transaction hash Tx and extracts the health data that were previously preserved.
Li et al. [7] used a cryptographic mechanism to securely and reliably share a patient's data, but if the user stores many files, he or she will need to record the private key and Tx of each file separately. As the number of patients increases daily, this fact makes the management of patients' key pairs a huge challenge in their system.

Method
This section concerns blockchain-based healthcare information preservation using extended chaotic maps to satisfy HIPAA privacy/security regulations. Figure 1 shows the authorization and access control of the proposed medical care information system. Patients' health data may be held by various medical organizations, such as hospitals and clinics. All users, which may include patients, healthcare experts, healthcare staff, and medical staff, must be able to request patients' health records within the medical care information system. Patients' health data are stored in the PHI database of the healthcare service provider, which exploits the non-tampering feature of the blockchain, as follows. (a) Medical Sensor, S: A sensor is worn by the patient. It collects physiological data, which are verified and transmitted by a mobile device; (b) Mobile Device, M: A mobile device is carried by the patient. It integrates the data that are measured by each sensor and transmits them to the server at a medical center. The mobile device may be a smartphone or a tablet; (c) Medical Center Server, MCS: The Medical Center Server stores the data that are received from the user's mobile device in a database. It uploads a summary of the data to the blockchain to verify the integrity of the data; (d) Registration Center, RC: The registration center allows network entities to register their identity and obtain corresponding private keys. After registration, the registration center publishes the identity.

The Proposed Scheme Uses Extended Chaotic Maps
The mechanism that is described in this paper has three phases, which are the parameter initialization phase, the registration phase, and the key generation phase. Table 2 presents the symbols that will be used hereafter.

Parameter Initialization Phase
The registration center prepares the necessary parameters, which are the chaotic map function T(·), the hash function h(·), a random number x, a prime number p, and publishes x, p, T(·), h(·).

Registration Phase
In this phase, the entity (e) registers its identity (ID) with the registration center (RC) and generates the corresponding private key (SK). This SK is then sent back through a secure channel to the entity (e), whose identity (ID) is published. Figure 2 schematically depicts the registration phase.
Step 1: Network entity(e) send IDe to the registration center (RC).
Step 2: Registration center (RC) has known x, p, T(·), h(·). After the registration center (RC) receiving the IDe from the network entity(e), the registration center (RC) calculates its corresponding privacy key SK i .

SK i = T h(ID e ) * mk (x) mod p.
After calculating the private key SKe, send it back to the network entity (e) through the secure channel.
Step 3: After the registration center (RC) sends back the private key SKe and publishes the identity IDe of the network entity.

P
Origin data C1, C2 Encrypted data V Verification data

Parameter Initialization Phase
The registration center prepares the necessary parameters, which are the chaotic map function T(·), the hash function h(·), a random number x, a prime number p, and publishes x, p, T(·), h(·).

Registration Phase
In this phase, the entity (e) registers its identity (ID) with the registration center (RC) and generates the corresponding private key (SK). This SK is then sent back through a secure channel to the entity (e), whose identity (ID) is published. Figure 2 schematically depicts the registration phase. Step 1: Network entity(e) send IDe to the registration center (RC).
After calculating the private key SKe, send it back to the network entity (e) through the secure channel.
Step 3: After the registration center (RC) sends back the private key SKe and publishes the identity IDe of the network entity.

Key Generation Phase
This phase comprises two parts. The first part is the protocol that governs the sending of data by the wearable device sensor to the database for storage through the mobile node. It can be subdivided into the sensor data collection stage and the social network information transmission stage, separated by dotted lines in Figure 2. The second part concerns the agreement for medical staff under which they access data; in this part, a data summary is uploaded to the blockchain for subsequent verification and to increase its confidentiality. The second part manifests the main contribution of this paper.
Step 1: Mobile devices M connect to sensor S, and send IDM and random number x to the sensor Step 2: The sensor S calculates the key by using the identity IDM of the mobile devices M

Key Generation Phase
This phase comprises two parts. The first part is the protocol that governs the sending of data by the wearable device sensor to the database for storage through the mobile node. It can be subdivided into the sensor data collection stage and the social network information transmission stage, separated by dotted lines in Figure 2. The second part concerns the agreement for medical staff under which they access data; in this part, a data summary is uploaded to the blockchain for subsequent verification and to increase its confidentiality. The second part manifests the main contribution of this paper.
Step 1: Mobile devices M connect to sensor S, and send IDM and random number x to the sensor Step 2: The sensor S calculates the key by using the identity IDM of the mobile devices M Then, calculate the encryption key by using the random number r 1 and key K MS .
After calculating the encryption key key MS , encrypt the origin data P by key MS .
The sensor S sends its identity IDS and encrypted data C 1 back to the mobile devices M after encrypting the origin data P.
Step 3: The mobile devices M calculates the key by using the identity IDS of the Sensor S Then, calculate the encryption key by using the random number r 1 and key K MS .
After calculating the encryption key key MS , decrypt the encrypted data C 1 by key MS After obtaining the original data P, send the identity of mobile device IDM to the medical center server MCS.
Step 4: Medical center server MCS returned its identity IDMCS and random number r 2 to the mobile device M.
Step 5: The mobile devices M calculates the key by using the identity of the medical center server IDMSC.
Then, using the random number r 2 and key K MMCS to calculate the encryption key key MMCS .
After calculating the encryption key key MMCS , encrypt the origin data P by key MMCS .
When the data is encrypted, send the encrypted data C 2 to the medical center server MCS.
Step 6: The medical center server MCS calculates the message summary v by using the encrypted data C 2 and random number r 2 . After calculating the message summary v, it uploads it to the blockchain.
Step 7: The medical center server stores the encrypted data C 2 , random number r 2 , and messages the summary v to the database.
When the data have been stored by the medical center server MCS, when they need to be authorized, an authorization action is performed. When the MCS confirms that the requester has a right to access the data, it decrypts those data and uses its private key and the public key of the requester to generate a new key, which is used to encrypt the data for sending back to the data requester. The data requester can use his or her private key and the public key of the MCS to calculate the encryption and decryption keys to decrypt the data. Having received the file, the data requester can verify the message summary against the message summary that is stored on the blockchain. Figure 3 presents the key agreement in the proposed scheme.

Results
This section will analyze the security and performance of the proposed scheme.

Results
This section will analyze the security and performance of the proposed scheme.

Security Analysis
Analysis of the security of the proposed scheme will be divided into a sensor data collection phase, a social network information transmission phase, and a HIPAA security regulation analysis phase for the purposes of discussion.

1.
Mutual Authentication: All devices register their ID with the RC and obtain their own private keys SK. When device B encrypts data, it uses device A's IDA and its private key SKB to calculate the encryption key and encrypt the data. Device A uses device B's IDB and its private key SKA to calculate the decryption key and decrypt the encrypted data. Based on the assumption that A can correctly decrypt the encrypted data, the mutual authentication of devices A and B is successful; 2.
Impersonation Attack: Attackers, including internal legal users, cannot obtain the private key mk of the RC, the private key SKS and SKM of the wearable device and the mobile device, respectively, or the communication key key MS between the wearable device and the mobile device. Therefore, such attackers cannot impersonate other wearable devices or mobile devices to send out messages; 3.
Known Key Security: If the communication key key = T x (k) mod p of both parties is unfortunately leaked, then the other communication key will not have been leaked because each communication generates a new random number x, where k is key MS or K MMCS ; 4.
Forward Secrecy: As in known key security, even if any communication key is disclosed, the attacker cannot calculate a previous communication key; 5.
Node Capture Attack: If an attacker captures any legal node, only the private key that is obtained during registration and its ID are stored in the node. Other revealed information is composed of random numbers and an exchanged message. The attacker wants to use known information to calculate the private key of the RC, and so faces the Extended Chaotic Map-Based Discrete Logarithm Problem (DLP). Therefore, the proposed scheme is secure against node capture attacks. 6.
Replay Attack: The mobile device generates a new random number x in every new session and so can use x to ensure that the data that are received in each round are up to date. The challenge-response principle is applied to verify the freshness of the messages. The random number x that is generated in each round is a challenge. If the mobile device receives data from the sensor and can use x to decrypt those data correctly, then the challenge is successful. When data are being collected, the random number x in the round differs from those in the previous round. The correct information cannot be decrypted, and the challenge fails. 7.
Man-in-the-middle Attack: Since the mutual authentication of the devices and the attacker cannot yield the private key of the wearable device, the encryption and decryption key cannot be calculated. Furthermore, the original data cannot be calculated by the attacker, which cannot use its private for encryption. Therefore, the proposed mechanism resists the man-in-middle attack. 8.
Modification Attack: As in the man-in-middle attack, the attacker cannot obtain the private key of the wearable device and therefore cannot calculate the encryption and decryption keys and then modify the transmitted data. Therefore, this attack is ineffective. Sending Data Error: Since the transmitted data are all encrypted, if a problem with the data occurs during the transmission process, then the correct data will not be able to be decrypted successfully. Restated, if the correct data can be decrypted, no problem can have occurred during data transmission; 3.
Data Tampering: After the MCS receives the encrypted data that are sent by the mobile device, it uses these data and the random number x to calculate a message summary v, which it uploads to the blockchain for storage. When the user accesses data in the database, the message summary v' is calculated and compared with the message summary v on the blockchain. If the data have been tampered with, this tampering will be identified immediately when the data are accessed. In this study, the MCS performs only data upload actions and does not directly interact with miners' computers. Tampering with data on the blockchain requires control of more than 51% of the computers. Therefore, data on the blockchain is prevented from being tampered with and the accuracy of the verification data is ensured.

HIPAA Security Regulation Analysis Phase
Since this study only studies the data transmission to the server for storage and does not authorize the data. Therefore, there is no safety analysis of Patient's Control and Consent Exception.

1.
Patient's Understanding: The patient signs a consent from at the registration stage, which clearly states how the medical center server will use and storage medical record data; 2.
Confidentiality: During the data upload stage, the mobile device and medical center server do the Chaotic Map-based Diffie Hellman Key Exchange to generate key k MS = T h(ID M ) (SK S ) mod p, key MS = T r 1 (k MS ) mod p, k MMCS = T h(ID MCS ) (SK M ) mod p, and key MMCS = T r 2 (k MMCS ) mod p. In the process of data transmission, the data transmitted are all encrypted data C 1 = P ⊕ key MS , and C 2 = P ⊕ key MMCS to ensure the confidentiality of patient data; 3.
Date Integrity: In the process of data transmission, the data transmitted are encrypted data C 1 = P ⊕ key MS and C 2 = P ⊕ key MMCS , which can ensure the integrity of patient data.

Performance Analysis
The method that is proposed herein is compared with those proposed by Li et al. [7] and Zhang et al. [32] in terms of computational complexity and response time. For a detailed analysis, refer to Table 3 below. The simulation environment and test results are listed in Table 4 below. The mechanism that is proposed herein uses only light-weight computing techniques such as chaotic mapping and the hash function. The required time and computational complexity in the sensor data transmission stage are less than those of the elliptic-curve point multiplication that is used by Zhang et al. [32]. Figure 4 displays simulation results concerning the response time in the sensor data transmission stage in the scheme of Zhang et al. [32] and proposed scheme for n = 1, 10, 50, 100, 200, and 500. In the social network information transmission stage, the data encryption and decryption are more efficient than those associated with the symmetrical formula of Li et al. [7] Figure 5 displays simulation results for the reaction time of social network information transmission stage of Li et al. [7] and proposed scheme for n = 1, 10, 50, 100, 200, and 500.

Discussion
To improve the security of the healthcare system most of the research is still relying on computationally heavy modular exponential operations or elliptic curve point multi-

Discussion
To improve the security of the healthcare system most of the research is still relying on computationally heavy modular exponential operations or elliptic curve point multi-

Discussion
To improve the security of the healthcare system most of the research is still relying on computationally heavy modular exponential operations or elliptic curve point multiplication operations. The structures of these operations are very complicated and the amount of calculations are huge. The proposed authentication and key agreement Scheme using extended Chaotic Maps has a number of advantages compared to previous health data system. The first is that it can reduce the amount of computing on wearable devices to achieve lightness to quantify the effect of the operation. The password system based on identity authentication can reduce the information that the device needs to store. It only needs to save the private key of the device, which it obtains from the registration server. After the mobile device collects the physiological data of the wearable device, it is uploaded to the database of the medical center server for storage. The second advantage is the data is calculated for the message summary and uploaded to the blockchain for storage. Using the non-tampering feature of the blockchain, the data in the medical center server can be compared with the message summary on the blockchain to ensure that the data has not been tampered with and improve data security. In terms of security, the proposed mechanism can resist a variety of attacks to reduce to possibility of privacy disclosure.
However, the current scheme still needs to be improved. There are some limitations to the proposed scheme. The first is about the structure of the data stored in the blockchain. It is difficult to query data within a blockchain, limiting the statistical and research uses of data. A better data structure could be setup to write a large number of different health data in the blockchain for more efficiency and to implement high concurrency. The second limitation is the scalability issue for healthcare big data, due to blockchain using a decentralized architecture. If millions of users, including private clinics, healthcare centers, patients, and IoT startups etc., were to use different block chain infrastructures and blockchain technologies, a higher computation power would be required, which not every user would be able to provide.

Conclusions and Future Work
Advancements in science and technology have led to new research on telemedicine. Data about a user that are measured by a wearable device can enable doctors more accurately to determine the physical condition of the user. This study proposes a mechanism for preserving medical information that considers the entire process of data from data generation through transmission by wearable devices to mobile devices and then to a medical center server. When the data that are generated by a wearable device on the user are transmitted to a hospital to be viewed by medical staff, this process is protected in a manner that complies with HIPAA privacy and security regulations. This goal of this work is to improve the security and privacy of users' physiological data in transmission, and to provide a secure data transmission channel for telemedicine, supporting further developments in the medical industry. As part of future work, the scalability issue for healthcare big data must be taken care of seriously in order to make blockchain popular and to integrate artificial intelligence features in the process of analyzing collected health data and healthcare diagnosis decisions.