You are currently viewing a new version of our website. To view the old version click .
Healthcare
  • Article
  • Open Access

29 July 2020

Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts

,
and
1
Evergrande School of Management, Wuhan University of Science and Technology, Wuhan 430000, China
2
School of Economics and Management, Lanzhou Jiaotong University, Lanzhou 730070, China
3
Computer Science Department, School of Engineering and Technology, Universidad Internacional de la Rioja (UNIR), 26006 Logroño, Spain
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Cyber Security and Data Privacy for Healthcare Industry

Abstract

Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services. Besides, the blockchain can be described in a decentralized manner as an immutable ledger for recording data entries. Furthermore, this new technology has been developed to interrupt a variety of data-driven fields, including the health sector. However, blockchain refers to the distributed ledger technology, which constitutes an innovation in the information recording and sharing without a trusted third party. In this paper, blockchain and Distributed Ledger-based Improved Biomedical Security system (BDL-IBS) has been proposed to enhance the privacy and data security across healthcare applications. Further, our goal is to make it possible for patients to use the data to support their care and to provide strong consent systems for sharing data among different organizations and applications, since this includes managing and accessing a high amount of medical information, and this technology can maintain data to ensure reliability. Finally, results show that new blockchain-based digital platforms allow for fast, easy, and seamless interactions between data suppliers to enhance privacy and data security, including for patients themselves.

1. Introduction

Recent trends in technology are exploited for diverse real-world applications to provide definite solutions for end users. Assimilating technological aspects in user-related application provides diverse advantages, from the quality of service (QoS) to security [1]. The healthcare platform is visualized using electronic health records (EHRs) in its digital and technical format, providing unrestricted access to the end users. Diagnosis centers and healthcare infrastructures provide different access and data sharing processes for their users through EHRs [2,3,4]. EHR is an organized set of patient-/user-related information that is digitally shared through a secure platform for ubiquitous access [5]. User applications and graphical user interfaces designed for EHR access provide access to the healthcare data through simple authorization and authentication procedures. Since sensitive information, end-to-end security, and privacy are the prime concerns in sharing EHR’s between users [6], this is vital as the technology requires additional infrastructures such as cloud, Internet of things, mobile devices, etc. for sharing EHR’s [7].
Blockchain is another technology that is commonly used in different applications for providing distributed access to resources and unalterable information [8]. The blockchain paradigm is used for administering security in different communicating and processing systems. Healthcare application does not require trusted third-parties for administering security [9]. The electronic ledger is distributed across different communicating and processing systems to improve the swiftness in security administration and privacy preservation [10]. Besides, blockchain eases EHR sharing between end-user applications and healthcare infrastructures without interrupting the communication process [11,12]. Such facilities are provided through line-of-trust and authentication with interoperability using the distributed electronic ledger technology. Modern healthcare applications concentrate on the privacy of the users and security of the information shared to prevent anonymous and unauthorized access to illegitimate users [13,14].
Trust, authentication, and privacy are the major requirements in sharing EHRs between different users. Administering the blockchain paradigm as a decentralized ledger for monitoring shared information is becoming a familiar practice in recent years [15,16]. Blockchain-assisted authentication and trust-based security are assimilated with the medical systems for improving the quality of information sharing and preventing unauthorized interruptions [17,18]. Knowing the significance of the data, biomedical systems rely on robust authentication and trust schemes for confronting diverse attacks, data leakage, tampering, and loss. EHR access control, defining security levels, verifying users, and sharing sessions are collaboratively performed using the security systems [15,17,19]. Modified and sophisticated access control, encryption/decryption schemes, and auditing features are required to handle different attacks and illegitimacy in storing and sharing EHRs. In trust-based schemes, user-centric factors are assessed to differentiate the users to provide access controls, whereas authentication schemes focus on providing data/EHR security through hashing and encryption/decryption process [20,21].
However, blockchain refers to the distributed ledger technology, which constitutes an innovation in the information recording and sharing without a trusted third party. In this paper, Blockchain and Distributed Ledger based Improved Biomedical Security system (BDL-IBS) has been proposed to enhance the privacy and data security across healthcare applications.

3. Blockchain and Distributed Ledger Based Improved Bio-Medical Security System

The proposed BDL-IBS is designed to improve the trust- and privacy-related specifications of the electronic shareable health records. The system focused on maximizing the sharing rate of the secured records along with less adversary impact. In this system, blockchain technology is exploited by the medical server that tracks the trust privacy factors between the users and records. In Figure 1, an illustration of a biomedical security system with blockchain technology is presented.
Figure 1. Biomedical Security System with blockchain.
The components of the bio-medical system include storage and a medical server. The storage contains the health records of the end-users in a digital format. The medical server is responsible for processing user requests and responding to them with appropriate records. A common sharing platform such as cloud and associated infrastructures are responsible for sharing EHRs. The blockchain and distributed ledger are used in both the medical server and end-user applications. In the blockchain associated with the medical server, the trust and privacy factors are analyzed, whereas the privacy factors are alone assessed in the end-user blockchain. The trust factors include successful access and response to request ration, and privacy relies on convergence and complexity. The trust process is analyzed and explained in detail in the following subsections.
Adversary Model: In this bio-medical security system, malicious access due to man-in-middle and data tempering adversary models are considered. In a man-in-middle attack, the adversary overlaps the end user to gain access to the HER. This results in sharing health information to an adversary and thus degrading the design of a secure biomedical system. In the case of a data tempering attack, the adversary breaches HER from any node communicating with the biomedical system. It either modifies the actual data/tracks the communication through the HER information. Figure 2a,b portrays the representation of the man-in-middle and data tampering attacks over the EHR.
Figure 2. (a) Man-in-middle attack. (b) Data tampering attack. (c) Server-client based blockchain technology.
For thwarting the above attack, the trust model and concentric authentication are introduced using the blockchain paradigm. As referred to earlier, the blockchain process is differentiated in both the medical server and end-user functions.
Apart from the regular two-layer network, the man-in-middle attack can be overcome by the server-client based blockchain technology as shown in Figure 2c. Since it is a server–client network, it is well suited for the medical user and end-user functions. To reduce the man-in-middle issue, a pure application-oriented implementation is followed in the objective of the proposed idea. A proper set of protocols should be determined in the server domain, and the appropriate application receives the data from the client side.
The process of trust-based validation is performed using linear decision-making, and authentication is augmented through classification-based learning.
Trust model based on Linear Decision Making: In the trust model, the factors are successful access and end-user application to fetch HER. Through conventional communication standards, the end-user application generates a query for accessing HER. The initial authorization for the end-user is provided using login ID/name and password information. This information is validated by the medical server to ensure the reputation of the user. The medical server is associated with the blockchain with the following entries, as in Table 1.
Table 1. Blockchain Entries.
For each Q generated and received in the medical server, the state of R (i.e., sharing EHR), the factors c ,   t s ,   t v , and τ are updated. This information remains unchanged in the blockchain paradigm. It is to be noted that τ is valid for t v , within which the sharing of EHR is completed. For any case of t v < t s , the τ 0 and the user is marked as illegitimate. For validating the above conditions, τ is computed as a linear combination of   ( R ,   Q ) and successful access probability ( ρ a ) . In a given t v , the τ is computed as
τ ( t v ) = R ( t s ) Q + ρ a w h e r e ,   ρ a = ( c Q ) + ( 1 R Q ) R }
The factor R Q is the ratio of response to the query request received by the medical server. The linearity in identifying the trust for a period of t v relies on R Q and ρ a , where both the factors are proportional to each other. The above linear relationship between ρ a and R Q is t s is recurrently analyzed using the t s c instance, i.e., the τ in all c instances is verified from its previous shared count that is given as
τ ¯ = 1 c ¯ [ R 1 Q 1 ( t s 1 ) ρ a ( t s 2 ) + R 2 Q 2 ( t s 2 ) ρ a 2 ( t s 2 ) + + R c Q c ( t s c ) ρ a c ( t s c ) ] = 1 c ¯ [ i = 1 c R i Q i ( t s i ) ρ a ( t s i ) ] = t s c [ i = 1 c 1 i ( R i Q i ρ a ) ] }
From the above sequence, the varying R Q or ρ a in t s is estimated for all the c shared to the end-user. In this sequence, the varying point p initiating the change in proportionality between ρ a and R Q is identified. Such identification helps to reduce the computations and security mechanisms (authentication) to prevent losses in sharing EHR. This point from the sequence t s is computed using Equation (3) as
p = i = 1 c [ 1 τ ( t v ) i ] [ τ ¯ i τ ( t v ) i ]
This validating point helps to hold the verification process and trust update in the blockchain, where the actual c is updated until p   τ ¯ sequence. The decision for pursuing/halting EHR sharing is determined using the conditions formulated in Table 2.
Table 2. Decision conditions.
The last three conditions in Table 2 represent the unfeasible conditions as τ ¯ < τ ( t v ) results in a negative   p that is not possible in case c > 1 . Similarly, the sequence and instant trust are the same in case of sharing only 1 record, after which p = . This provides continuous chances for EHR sharing, whereas, in practical EHR based biomedical systems, the condition does not hold. For p c condition, the point is detected after all the counts are shared. Therefore, the previous state of name/ID for which it is τ with the new t s or t v period. The blockchain is updated for the above and hence for further sharing of EHRs. The case of the first two conditions is different, where p < c follows τ ¯ and   τ ( t v ) as in Equations (3) and (2), respectively. The different case of condition 1 is to be differentiated from the other conditions as a trial to the user is given if the current trust is less than the previous sequence of trust. This impacts either ρ a or R Q and hence Equation (1) is modified as
τ ( t v ) = { [ 1 R ( t s ) Q ] + ρ a ( t s c × t v ) ,   i f   R Q   i s n o t a c o n s t a n t R ( t s ) Q + Q R Q ρ a ,   i f   ρ a   i s n o t a c o n s t a n t
If both the R Q and ρ a factors are not constant, then the sharing process is halted. Based on the different instances for R Q (or) ρ a , the decision is made such that the sharing is not halted, whereas it is paused until the next update if τ is observed. In this pausing instance, the sharing session of the end-user application is expired. Therefore, the user has to login again to re-initiate the EHR sharing session. The time of validity based on different instances of   τ ( t v ) is determined using Equations (5) and (6), respectively.
t s 1 = t v ( Q 1 R 1 Q 1 ) t s = t v ( a s t s = 0   f o r   t h e   f i r s t   i n s t a n c e ) ,     ( 1 R Q ) < ρ a t s 2 = t v ( Q 2 R 2 Q 2 ) t s 1 2 t s c = t v ( Q c R c Q c ) t s c c }
t s 1 = t v ( 1 R 1 Q 1 ) ρ a t s o = t v   ,     ( Q R Q ) ρ a < R Q t s 2 = t v ( 1 R 2 Q 2 ) ρ a t s 1 t s c = t v ( 1 R c Q c ) ρ a t s c }
For the above Equation of computing t v for fluctuating τ ( t v ) , tn Figure 3a,b, respectively.
Figure 3. (a) Sequential update (1 to p), (b) concurrent update (p to c).
The process of trust-based update in the blockchain is performed using t s using R Q and ρ a factors independently. The process is consecutive if t s and t v is updated based on R Q and concurrent if the update is based on ρ a . The process of differentiation relies on the p that is identified for both the conditions where ( R Q ρ a ) i < ( R Q ρ a ) i 1     i c . Finally, the user with max { τ } or max { { τ ¯ } ( t s ) } is identified in all the instances for providing better authentication. The linear representation in Equation (2) is either fluctuate between t s based on R A and ρ a independently. The fluctuation is based on the varying t s and t v instances as differentiated by p . This trust-based decision-making helps to improve the ratio of successful sharing under controlled response time. In Table 3, the observed records that are classified under different conditions of Table 1 is presented for the different sharing times.
Table 3. Records Classified under Table 1 Condition.
There is only one ending transmission in the sharing time of 70, where condition 4 is satisfied by sharing count of c . The records classified under conditions 3/5 are not sent to the end user, and hence their sessions are logged out.

4. Classification-Based Concentric Authentication

In the classification-based concentric authentication, EHR is shared. In a concentric authentication, the common classification on point   p serves as the decision-making for generating authentic records. The classification-based learning allocates two types of non-sequential session keys for authenticating the sharing session. This classification is based on the fluctuating τ ( t v ) as in Equation (4). The impact of either of the fluctuation varies the administration of session keys to prevent the data tampering attacks. Initially, the session is set up between the medical server, and the end-user application follows a linear mapping map: RX   R c U . Here, R c is the group of response until a count c , and U is the random function of the end-user ( U ) . The group consists of a random generator r R c along with a differential prime number p n . For the different   τ ( t v ) , the variable r R c relies on computing hashes H MS and H U for the medical server and end-user, respectively. The general format of an initial authentication is denoted as { R c , R U , p n , r ,   H M S , H U , c } . The shared record count is obtained from the blockchain, where the trust of user access coupled with the records is stored. The distributed access to blockchain stored information is assessed in both end-user and medical server levels. For this authentication process, the classification occurrences of ( 1 R Q ) and ρ a in t s is performed. As stated previously, the sequential and concurrent update of the medical server blockchain process requires different session keys and authentication procedures. Therefore, the occurrence of p for condition 1 from Table 2 is the determining factor. Let ρ p and ρ s represent the fluctuating and sequential probabilities in a given time t s ; then,
s u c h   t h a t   ρ ( s | p ) = ρ ( p | s ) ρ s ρ p ρ ( p | s ) = i = 1 c ρ ( p i | s ) }
  As   ρ ( s | p ) = i = 1 c ρ ( p i | s ) . ρ s ρ p = i = 1 c ρ ( p i | s ) ρ s ( 1 ρ s ) , the above classification of probability,   s over   p is computed for all ρ s instead of ρ p to linearize the solutions as in Equation (1). Based on the relationship between R Q and ρ a , the classification of   ρ ( p | s ) is performed as
( o r ) ρ ( s | p 1 ,   p 2 , p c ) = ρ s   ρ ( p 1 , p 2 , p c | s ) ρ ( p 1 , p 2 , p c ) ρ ( s 1 , s 2 , s c | p ) = ρ ( p | s 1 , s 2 , s c ) ρ p ρ p = ρ ( p | s 1 , s 2 , , s c )   }
where ρ ( p | s 1 , s 2 , s c ) = ρ p i = 1 c ρ ( p | s i ) ρ ( p 1 , p 2 , p c ) . For condition 1, the classification rule is framed as in Equation (9) for identifying p over s as in Equation (8)
ρ ( p | s 1 , s 2 , s c ) ρ p i = 1 c ρ ( p i | s ) }
where s = argmax c ρ p i = 1 c ρ ( p i | s ) . Here in Equation (9), the probability of ρ p is computed based on the likelihood of p s instances and its normalization as
N ( p ) = c × ρ p + s ρ p + ( c × s )
The above likelihood normalization of p helps to classify   p ( 1 R Q ) < ρ a condition or   p ρ a < R Q condition. This helps to decide between sequential and concurrent authentication procedure through the same concentric point from the fluctuating sequence of t s . The normalization identifies precise p in the series of   ρ ( p | s ) such that   ρ ( s | p ) follows sequential authentication, whereas the previous occurrence relies on random concurrent security measures. Here, the priority of authentication is initiated from the first occurrence of ρ p of ρ s as determined by N ( p ) . For all the first occurrences of ρ p and ρ s , the sequence follows ρ ( p | s 1 , s 2 , s c ) or i = 1 c ρ ( p | s i ) , and i = 1 c ρ ( p | s i ) ρ s ( 1 ρ s ) (as in Equation (6)). Using this sequence and concurrency, the authentication is presented as follows. In two cases, the occurrence of the sequence and concurrency observed is discussed below.
Case 1: The sequence initiates with ρ s
Analysis 1: The hash sequence for both H M S and H U is formulated as
H M S ( p ) = r i | p n | + r i 1 | p n | + + r i c | p n | p c 1 ,     i c a n d H U ( c ) = r i c | p n | + r i c + 1 | p n | + + r i | p n | ρ ( p | s i ) ,     i p }
This hash is composed of [ R c ,   H U ( p ) ,   c ] and [ R U ,   H u ( c ) ,   c ]     { R c ,   R U , p n ,   r ,   c } and is subject to verification using the user ID and session key as follows,
K s i j = H M S [ H U j ( I d ) ] | p n | + r i j   ,     i c   a n d   j p a n d K v = i = 1 c g i | p n | ( i p ) }
where K s and K v are the secret and verification keys generated for the hashes, and therefore in the sharing process, K s [ H M S ( p ) ,   R , c ] is contributed to the end-user. At the receiver end, the K v is used for verification. If the process of sharing the records is sequential, then i c is sequential until   p or the likelihood N ( p ) occurs. This is followed for all [ H M S ( p ) , R ] until the c = p is reached, and then the coherency of H U ( c ) = H U ( p ) until ρ ( s | p ) is observed. The verification of the process is also sequential by mapping R × R 1   to   p R U where R U is observed from the range of hashes from 1 to ρ ( s | p 1 , p 2 ,   p c ) . The first sharing verification is performed as
[ H M S ( 1 | | B ) , r ] = [ H M S ( 1 | | B ) ,   K s ] [ H M S ( 2 | | B ) , r ] = [ H M S ( 2 | | B ) ,   K s ] [ H M S ( p | | B ) , r ] = [ H M S ( p | | B ) ,   K s ] }
where, B denotes the blockchain record for the grouped storage of [ R , c ] after the hashing process. In the verification at the user end, the relevance is first validated, followed by the verification process as in Equations (14) and (15) respectively.
H M S ( p | | B ) ,   r ] = { [ H u ( p | | B ) p n ,   r ] ( o r ) [ H u ( p | | B ) ,   r c p ( o r ) [ H u ( p | | B ) ,   c ρ ( s i | P ) ] ,   i   c )
[ i = 1 c ρ ( p i | s ) ρ s ( 1 ρ s ) ,   H M S ( P | | B ) ,   K s ] = [ i = 1 c B i . H U ( I d ) i K v i ,   r ]
In the above, the range of   c is valid until p , i.e., the N ( p ) is the halting factor for sequential authentication. In the verification process, sequence as mapped in R × R C R U is the balancing factors where the sending and receiving sequence until ρ ( p | s ) is obtained. In this case, the converging interval of the proposed method is extended until the c , i.e., the restricted time from 1 to p is extended from p to c in a concentric manner. The next sequence for p to c authentication is discussed in Case 2.
Case 2: The sharing sequence experiences ρ p .
Analysis 2: This case is unique as both sequential and concurrent authentication is performed with interfering with other processes. It is to be noted that the convergence time from the sequential process is experienced to ρ ( p | s 1 ,   s 2 , s c ) from the ρ p . This helps to identify more ρ ( s | p ) , and thus the concentricity of the authentication process is expanded, reducing the chances of convergence. In this authentication process, both H M S and H U are used for performing secure sharing between the medical server and the end user. The blockchain is updated with p and N ( p ) along with the previous sequence for the appropriate user ID. Therefore, the session is initiated by verifying the following
[ H M S ( p | | B ) ,   ( c p ) ] = [ H M S ( p | | B ) ,   K s ,   p ] ,     p   t o   c   i n   t h e   m e d i c a l   s e r v e r a n d [ H U ( c p | | B ) ,   c ] = [ H U ( c p ) | | B ,   K v , c ] ,     p r e c e i v e d   b y   t h e   e n d   u s e r   a p p l i c a t i o n }
There are two verification steps followed for authenticating the sharing due to the fluctuating instances in t s . The first authentication follows Equation (14), whereas the range from p to   c follows
[ H M S ( p | | B ) ,   c p ] = { [ H M S ( p | | B ) c p ,   c ] ( o r ) H M S ( c p ) | | B ,   ρ ( p | s i ) ,   i c a n d   [ H U ( c p | | B ) ,   ρ p ] = i = 1 c B c i H U ( I d ) i K v . ( v p ) i }
The above process of authentication in sharing and receiving B is performed in both the medical server and the end user. Finally, the received   B is verified using   1 to   p sequence as in Equation (15), whereas the t to c received B is verified as follows.
[ H M S ( ρ | | B ) ,   ( c p ) ,   K s ] = [ H u ( c p | | B ) ,   H U ( I d   ) ,   K v ,   c p ) ]   i   p   t o   c
This verification is processed for all the fluctuating shared R through the classification process. This prevents unnecessary convergence and overload complexity in handling medical records at different time instances. In Table 4, the ρ s and ρ p for the varying p in different sharing time along with the complexity is tabulated.
Table 4. ρ s and ρ p and Complexity.
In Table 4, the complexity is computed as the number of additional hashes generated due to ρ p to the actual existing hashes. The complexity is measured in terms of count of additional steps required for verification and authentication as observed in the keying process. If the impact of attacks is high, then the ρ p factor increases to prevent unnecessary data tampering or modification. Hence, in this case, the number of   c fluctuates as the classification is grouped under both the sharing instances.

5. Performance Analysis

The performance of the proposed BDL–IBS is assessed using simulations using an opportunistic network environment. In this environment, a maximum of 100,000 EHRs (unique and repeated) are shared for 110 users in different time instances. A user is capable of generating four Qs at the same time, for which the sharing interval is 90 s (max). The medical server of storage 4 × 1 TB is used for storing LHRs, and two blockchain servers with restricted read/write access are configured in this simulation environment. The medical server is capable of dispatching 20 records of size 70 mb in 1 s time. The maximum wait time for a record is 60 s, and the hash process follows hyperelliptic curve cryptography of a maximum size of 160 bits. Similarly, K v and K s is fit as 48-bits and 36-bit, respectively. Using this simulation environment, the existing 31FF [23], BDe HA [26], and SCNN–DGT [16] methods are considered for comparative analysis. For this comparative analysis, the metrics sharing ratio, response time, computation time, and convergence time are analyzed.

5.1. Successful Sharing Ratio

The proposed security system relies on record—user-access-based trust and differential authentication to improve the successful sharing of EHRs. The trust-based relationship between ρ a and R / Q is validated for the possible conditions in Table 2, generating τ ( t v ) and τ ¯ at different instances. In the sharing instances, pursuing/pausing sharing is determining based on ρ a > R Q or ρ a < R Q conditions. This condition-based decision-making determines t s for ( p + 1 ) to c instances and or t s for   ( p + 1 2   to   c ) instances in either sequential/concurrent manner. The concentric sharing process follows t s c for any instance of τ ( t v ) ; if the τ ( t v ) is maximum, then the sharing is performed either in a sequential or concurrent manner. In this process, the blockchain updates the trust for the linear ρ a and R Q relation, which remains unchanged. Therefore, sharing for varying time and EHRs follows conditional satisfaction as in Table 2, achieving a high successful sharing ratio (refer to Figure 4a, b).
Figure 4. (a) Successful sharing ratio versus sharing time. (b) Successful sharing ratio versus shared records.

5.2. Response Time

The sharing time t s < t v is ensured in all the instances of EHR processing for the received Q. If t v < t s is observed, then the response time increases. For analyzing the instances of sharing c , the variable τ ¯ and τ ( t v ) is differentiated. In this case, t s c for ρ a > R Q is estimated as t v ( Q c R c Q c ) t s c c and t v ( 1 R c Q c ) ρ a t s c independently. If the condition t s < t v is achieved, then the varying point p is identified to differentiate the sharing of EHRs. Therefore, the joint sharing is not facilitated for trust varying or condition 1 (Table 2), dissatisfying users. Hence, a small wait time in a response is experienced; this disintegrates the conditions of t s < t v , where concurrent sharing and authentication is performed without additional wait time. Therefore, for the conditions 1 and 2, the response time for a Q from the end user is less compared to the other methods (refer to Figure 5).
Figure 5. Avg. response time versus shared records.

5.3. Computation Time

Figure 6 presents the computation time of the proposed system as a comparative analysis with the existing methods. The authentication computing process requires either of the instances based on p , from which HMB and Hu are commonly adapted for the varying impact of untrusted users (classified under conditions 3 and 5 from Table 2). This helps to process the same number of c with the different authentication process and thereby reduces the complexity and required computations in the sequential sharing. Instead, the concurrent dissemination process of the records requires a change in first-level authentication as Equations (12) and (17) to satisfy N ( p ) , confining t s within t v . Therefore, the required computation increases by 1, and hence some additional time for verifying the second authentication is required. The verifying process is common in both the instances, demanding less/same time of computation. Hence, the overall computation time is differentiated by ρ p , and ρ ( p | s ) and ρ ( s | p ) is less in the proposed security system.
Figure 6. Avg. computation time versus malicious impact factor.

5.4. Convergence Time

The proposed security system achieves less convergence time in the authentication process. The convergence is identified using the classification of   p based on the occurrence of the ρ p and ρ s . Following the classification process, N ( p ) for ρ ( p | s i ) , i c or ρ ( p i | s ) , the converging time is identified in forehand, restricting in breaches in sharing and shared data tampering. Therefore, the identification based on p and N ( p ) helps to divide the authentication for ρ a > R Q and ρ a < R Q instances. The verification and authentication observed for the above conditions are different, without generating different point and probabilities. Here, detection of   p segregates the authentication process for sequential and concurrent instances as 1   to   p and p   to   c without requiring a new hash or verification procedure. As the number of convergence increases, the concurrency is increased without requiring additional computation steps. Therefore, the probabilistic classification of i = 1 c ρ ( p i | s ) and i = 1 c ρ ( p | s i ) for N ( p ) achieves less convergence in the proposed security system (refer to Figure 7). In Table 5, the comparative analysis results are tabulated.
Figure 7. Converging time versus malicious impact factor.
Table 5. Comparative Analysis.
From Table 5, it is seen that the proposed security system is capable of achieving better performance by reducing the response time and increasing the ratio of successful sharing through trust-based validations. In the authentication process, the computation and converging time are found to be less since the instances of sharing are segregated based on p .
As in Table 5 and in Figure 8, the proposed security system achieves a very high performance for analyzing various attacks. The better performance is achieved by consuming low response time, less computation time and reduced converging time. As opposite, it achieves a high successful sharing rate.
Figure 8. Privacy and security ratio against attacks.

6. Conclusions

This paper introduced a blockchain and distributed ledger-based improved biomedical security system for improving the privacy and security of EHRs. This security system relies on the blockchain paradigm for providing trust validation through linear decision-making. The authentication of EHRs is preceded using classification-based learning for identifying sequential and concurrent sharing. The process is focused on both user-level and sharing-level security and privacy of the biomedical systems. The classification of sharing instances helps to reduce the complex and overloaded computations in the authentication process with less computation time. The blockchain technology coupled with this process helps to share trust-related information and differentiate the sharing based on classification instances. The experimental analysis of the proposed security system shows that it is capable of increasing the sharing ratio by 8.077% and 7.03% for sharing time and records, respectively. It also achieves 20.11% less response time compared to the other methods. In the case of authentication, the proposed system confines computation and convergence time by 10.26% and 12.31%.

Author Contributions

Formal analysis, H.L.; funding acquisition, H.L.; methodology, R.G.C.; project administration, O.S.M.; resources, R.G.C.; software, H.L.; supervision, O.S.M.; validation, O.S.M.; visualization, R.G.C. All authors have read and agreed to the published version of the manuscript.

Funding

Thanks to the Lanzhou Jiaotong University Tianyou Young Talent Promotion Program (2019) for supporting this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Piras, E.M.; Cabitza, F.; Lewkowicz, M.; Bannon, L. Personal health records and patient-oriented infrastructures: Building technology, shaping (new) patients and healthcare practitioners. Comput. Support. Cooper. Work CSCW 2019, 28, 1001–1009. [Google Scholar] [CrossRef]
  2. Tsai, M.F.; Hung, S.Y.; Yu, W.J.; Chen, C.C.; Yen, D.C. Understanding physicians adoption of electronic medical records: Healthcare technology self-efficacy, service level and risk perspectives. Comput. Stand. Interfaces 2019, 66, 103342. [Google Scholar] [CrossRef]
  3. Muthu, B.A.; Sivaparthipan, C.B.; Manogaran, G.; Sundarasekar, R.; Kadry, S.; Shanthini, A.; Dasel, A. IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. Peer Peer Netw. Appl. 2020, 1–12. [Google Scholar] [CrossRef]
  4. Baskar, S.; Shakeel, P.M.; Kumar, R.; Burhanuddin, M.A.; Sampath, R. A dynamic and interoperable communication framework for controlling the operations of wearable sensors in smart healthcare applications. Comput. Commun. 2020, 149, 17–26. [Google Scholar] [CrossRef]
  5. Gu, D.; Li, T.; Wang, X.; Yang, X.; Yu, Z. Visualizing the intellectual structure and evolution of electronic health and telemedicine research. Int. J. Med. Inform. 2019, 130, 103947. [Google Scholar] [CrossRef]
  6. Manogaran, G.; Lopez, D. A survey of big data architectures and machine learning algorithms in healthcare. Int. J. Biomed. Eng. Technol. 2017, 25, 182–211. [Google Scholar] [CrossRef]
  7. Enaizan, O.; Zaidan, A.A.; Alwi, N.H.M.; Zaidan, B.B.; Alsalem, M.A.; Albahri, O.S.; Albahri, A.S. Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. Health Technol. 2018, 10, 795–822. [Google Scholar] [CrossRef]
  8. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. Continuous patient monitoring with a patient centric agent: A block architecture. IEEE Access 2018, 6, 32700–32726. [Google Scholar] [CrossRef]
  9. Zhang, P.; Schmidt, D.C.; White, J.; Lenz, G. Block chain technology offers potential in healthcare. Pharmac. Econ. Outcomes News 2018, 809, 1–41. [Google Scholar]
  10. Radanović, I.; Likić, R. Opportunities for use of block chain technology in medicine. Appl. Health Econ. Health Policy 2018, 16, 583–590. [Google Scholar] [CrossRef]
  11. Firdaus, A.; Anuar, N.B.; Razak, M.F.A.; Hashem, I.A.T.; Bachok, S.; Sangaiah, A.K. Root exploit detection and features optimization: Mobile device and block chain based medical data management. J. Med. Syst. 2018, 42, 112. [Google Scholar] [CrossRef] [PubMed]
  12. Manogaran, G.; Varatharajan, R.; Lopez, D.; Kumar, P.M.; Sundarasekar, R.; Thota, C. A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting. Futur. Gener. Comput. Syst. 2017, 80, 1–10. [Google Scholar] [CrossRef]
  13. Tanwar, S.; Parekh, K.; Evans, R. Block chain—Based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 2020, 50, 102407. [Google Scholar]
  14. Pujitha, A.K.; Sivaswamy, J. Solution to overcome the sparsity issue of annotated data in medical domain. CAAI Trans. Intell. Technol. 2018, 3, 153–160. [Google Scholar] [CrossRef]
  15. Sun, Y.; Lo, F.P.W.; Lo, B. Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access 2019, 7, 183339–183355. [Google Scholar] [CrossRef]
  16. Thakur, S.; Singh, A.K.; Ghrera, S.P.; Elhoseny, M. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 2019, 78, 3457–3470. [Google Scholar] [CrossRef]
  17. Raisaro, J.L.; Troncoso-Pastoriza, J.R.; Misbach, M.; Sousa, J.S.; Pradervand, S.; Missiaglia, E.; Michielin, O.; Ford, B.; Hubaux, J.P. MedCo: Enabling secure and privacy-Preserving exploration of distributed clinical and genomic data. IEEE/ACM Trans. Computat. Biol. Bioinform. 2019, 16, 1328–1341. [Google Scholar] [CrossRef]
  18. Wazid, M.; Das, A.K.; Kumar, N.; Conti, M.; Vasilakos, A.V. A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J. Biomed. Health Inform. 2017, 22, 1299–1309. [Google Scholar] [CrossRef]
  19. Shakeel, P.M.; Baskar, S.; Dhulipala, V.R.S.; Mishra, S.; Jaber, M.M. Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 2018, 42, 186. [Google Scholar] [CrossRef]
  20. Amin, R.; Islam, S.H.; Gope, P.; Choo, K.K.R.; Tapas, N. Anonymity preserving and lightweight multimedical server authentication protocol for telecare medical information system. IEEE J. Biomed. Health Inform. 2019, 23, 1749–1759. [Google Scholar] [CrossRef]
  21. Fatima, A.; Colomo-Palacios, R. Security aspects in healthcare information systems: A systematic mapping. Proc. Comput. Sci. 2018, 138, 12–19. [Google Scholar] [CrossRef]
  22. Tang, W.; Ren, J.; Zhang, Y. Enabling trusted and privacy-preserving healthcare services in social media health networks. IEEE Trans. Multimed. 2019, 21, 579–590. [Google Scholar] [CrossRef]
  23. Salnitri, M.; Angelopoulos, K.; Pavlidis, M.; Diamantopoulou, V.; Mouratidis, H.; Giorgini, P. Modelling the interplay of security, privacy and trust in sociotechnical systems: A computer-aided design approach. Softw. Syst. Model. 2019, 19, 467–491. [Google Scholar] [CrossRef]
  24. Kong, F.; Zhou, Y.; Xia, B.; Pan, L.; Zhu, L. A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing Environment. IEEE Access 2019, 7, 161822–161830. [Google Scholar] [CrossRef]
  25. Wang, S.; Zhang, D.; Zhang, Y. Block chain-based personal health records sharing scheme with data ontegrity verifiable. IEEE Access 2019, 7, 102887–102901. [Google Scholar] [CrossRef]
  26. Zhao, H.; Bai, P.; Peng, Y.; Xu, R. Efficient key management scheme for health block chain. CAAI Trans. Intell. Technol. 2018, 3, 114–118. [Google Scholar] [CrossRef]
  27. Guo, R.; Shi, H.; Zheng, D.; Jing, C.; Zhuang, C.; Wang, Z. Flexible and efficient block chain-based ABE scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 2019, 7, 88012–88025. [Google Scholar] [CrossRef]
  28. Daraghmi, E.Y.; Daraghmi, Y.A.; Yuan, S.M. MedChain: A design of block chain-based system for medical records access and permissions management. IEEE Access 2019, 7, 164595–164613. [Google Scholar] [CrossRef]
  29. Guo, R.; Shi, H.; Zhao, Q.; Zheng, D. Secure attribute-based signature scheme with multiple authorities for block chain in electronic health records systems. IEEE Access 2018, 6, 11676–11686. [Google Scholar] [CrossRef]
  30. Chen, Y.; Ding, S.; Xu, Z.; Zheng, H.; Yang, S. Block chain-based medical records secure storage and medical service framework. J. Med. Syst. 2018, 43, 5. [Google Scholar] [CrossRef]
  31. Tian, H.; He, J.; Ding, Y. Medical data management on blockchain with privacy. J. Med. Syst. 2019, 43, 26. [Google Scholar] [CrossRef] [PubMed]
  32. Wang, J.; Han, K.; Alexandridis, A.; Chen, Z.; Zilic, Z.; Pang, Y.; Jeon, G.; Piccialli, F. A block chain-based eHealthcare system interoperating with WBANs. Future Gener. Comput. Syst. 2019, 110, 675–685. [Google Scholar] [CrossRef]
  33. Brunese, L.; Mercaldo, F.; Reginelli, A.; Santone, A. A block chain based proposal for protecting healthcare systems through formal methods. Proc. Comput. Sci. 2019, 159, 1787–1794. [Google Scholar] [CrossRef]
  34. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. Blockchain leveraged decentralized IoTeHealth framework. Internet Things 2020, 9, 100159. [Google Scholar] [CrossRef]
  35. Griggs, K.N.; Ossipova, O.; Kohlios, C.P.; Baccarini, A.N.; Howson, E.A.; Hayajneh, T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 2018, 42, 130. [Google Scholar] [CrossRef] [PubMed]
  36. Brodersen, C.; Kalis, B.; Leong, C.; Mitchell, E.; Pupo, E.; Truscott, A.; Accenture, L. Blockchain: Securing A New Health Interoperability Experience. Available online: http://www.truevaluemetrics.org/DBpdfs/Technology/Blockchain/2-49-accenture_onc_blockchain_challenge_response_august8_final.pdf (accessed on 27 July 2020).

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.