Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts

Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services. Besides, the blockchain can be described in a decentralized manner as an immutable ledger for recording data entries. Furthermore, this new technology has been developed to interrupt a variety of data-driven fields, including the health sector. However, blockchain refers to the distributed ledger technology, which constitutes an innovation in the information recording and sharing without a trusted third party. In this paper, blockchain and Distributed Ledger-based Improved Biomedical Security system (BDL-IBS) has been proposed to enhance the privacy and data security across healthcare applications. Further, our goal is to make it possible for patients to use the data to support their care and to provide strong consent systems for sharing data among different organizations and applications, since this includes managing and accessing a high amount of medical information, and this technology can maintain data to ensure reliability. Finally, results show that new blockchain-based digital platforms allow for fast, easy, and seamless interactions between data suppliers to enhance privacy and data security, including for patients themselves.


Introduction
Recent trends in technology are exploited for diverse real-world applications to provide definite solutions for end users. Assimilating technological aspects in user-related application provides diverse advantages, from the quality of service (QoS) to security [1]. The healthcare platform is visualized using electronic health records (EHRs) in its digital and technical format, providing unrestricted access to the end users. Diagnosis centers and healthcare infrastructures provide different access and data sharing processes for their users through EHRs [2][3][4]. EHR is an organized set of patient-/user-related information that is digitally shared through a secure platform for ubiquitous access [5]. User applications and graphical user interfaces designed for EHR access provide access to the healthcare data through simple authorization and authentication procedures. Since sensitive information, end-to-end security, and privacy are the prime concerns in sharing EHR's between users [6], this is vital as the technology requires additional infrastructures such as cloud, Internet of things, mobile devices, etc. for sharing EHR's [7].
Blockchain is another technology that is commonly used in different applications for providing distributed access to resources and unalterable information [8]. The blockchain paradigm is used for administering security in different communicating and processing systems. Healthcare application does not require trusted third-parties for administering security [9]. The electronic ledger is distributed across different communicating and processing systems to improve the swiftness in security administration and privacy preservation [10]. Besides, blockchain eases EHR sharing between end-user applications and healthcare infrastructures without interrupting the communication process [11,12]. Such facilities are provided through line-of-trust and authentication with interoperability using the distributed electronic ledger technology. Modern healthcare applications concentrate on the privacy of the users and security of the information shared to prevent anonymous and unauthorized access to illegitimate users [13,14].
Trust, authentication, and privacy are the major requirements in sharing EHRs between different users. Administering the blockchain paradigm as a decentralized ledger for monitoring shared information is becoming a familiar practice in recent years [15,16]. Blockchain-assisted authentication and trust-based security are assimilated with the medical systems for improving the quality of information sharing and preventing unauthorized interruptions [17,18]. Knowing the significance of the data, biomedical systems rely on robust authentication and trust schemes for confronting diverse attacks, data leakage, tampering, and loss. EHR access control, defining security levels, verifying users, and sharing sessions are collaboratively performed using the security systems [15,17,19]. Modified and sophisticated access control, encryption/decryption schemes, and auditing features are required to handle different attacks and illegitimacy in storing and sharing EHRs. In trust-based schemes, user-centric factors are assessed to differentiate the users to provide access controls, whereas authentication schemes focus on providing data/EHR security through hashing and encryption/decryption process [20,21].
However, blockchain refers to the distributed ledger technology, which constitutes an innovation in the information recording and sharing without a trusted third party. In this paper, Blockchain and Distributed Ledger based Improved Biomedical Security system (BDL-IBS) has been proposed to enhance the privacy and data security across healthcare applications.

Related Works
Tang et al. [22] proposed privacy-preserving healthcare in the trusted network to enhance the trustiness among the patient and caregivers. The Sybil attack is used to find the fake patient and terminate it from the network. The proposed method is used to make the authenticated person access the healthcare center.
Computer-aid design is implemented for security, and privacy of the trusted systems is introduced by Salnitri et al. [23]. It also gives the specification of experts to use the system from various characteristics. They are also using the higher goal for the business, and external threats are maintained for the trustworthiness in the network.
S-Alex convolution neural network and dynamic game theory (SCNN-DGT) designed by Kong et al. [24] are used in the IoT-cloud computing environment for health data management. The initial step is obtaining the information of the healthcare and classifying them in Alex's net convolutional network. This method is designed to evaluate security in the healthcare system. It validates the index screening to verify the user.
Data integrity is used for sharing the records of healthcare in a verifiable way and is introduced by Wang et al. [25]. The author developed a blockchain for privacy usage through symmetric encryption and attribute-based encryption. It attains the fine-grained access control.
Zhao et al. [26], developed key management for healthcare blockchain. The efficient key management method is used as a privacy and security mechanism in the healthcare system. It is observed by embedding the sensor to analyze the blockchain. The proposed method is used to enhance the effectiveness and high security.
Guo et al. [27] modeled a multi-authority for the Tele-medical system to improve the efficient blockchain based on the ABE scheme. In this paper, both the dynamic authentication and authorization are used for MoD service under telemedicine. ABE is mainly used to manage the system in real-time scenarios for private healthcare data. This is done in a cloud-based environment.
A blockchain is proposed for the medical records to access and permits the MedChain process, which is addressed by Daraghmi et al. [28]. Medchain is used for interoperating, secure, and effective access for patients' privacy. The security is time-based access that gives the degree of health providers.
A blockchain is used for the Electronic Health Record system (EHRs) and is proposed by Guo et al. [29]. The authors implemented a secure attribute based on signature with multi authorities. The patients send the text according to the health as the attribute evidence to the healthcare center. The trust is given to the authorities to access the message, and both use the public and private keys to avoid the escrow problem.
The medical service framework is designed to store the secure records of the patient by using the blockchain method and is introduced by Chen et al. [30]. The storage is done on the cloud for large data access. The records are shared by its aspect based on its service related to the authorized user.
Tian et al. [31], observed medical data management with private access. The blockchain is used to protect the data in two aspects such as storing the data in the local database, encrypting the data, and sharing the key to the patient for further viewing. The shared key for security and integrity is established using sibling intractable function families (SIFF) aided by blockchain. The proposed method uses integrity, availability, and privacy of medical data for better efficiency.
Wang et al. [32] presented an e-healthcare system by using Wireless Body Area Networks WBAN. The blockchain is used to generate security and resolve the low power healthcare system. The WBAN is placed in the patient's body and transmits the data by using the blockchain process.
A blockchain -based healthcare system using formal methods is developed by Brunese et al. [33]. This paper aims to exchange information from the patients to the hospital network by using magnetic resonance images. The data are transmitted by the formal equivalent for validation. They are modeled by radiomic features for automata.
Uddin et al. [34] proposed blockchain leveraged decentralized eHealth architecture (BDeHA). This architecture consists of three layers, including a sensing layer for obtaining the data through the sensor. The second is NEAR processing for sensing the IoT devices and the third one is FAR processing, which is comprised of cloud computing servers.
Griggs et al. [35] observed a healthcare blockchain using smart contracts for patient monitoring. The smart contracts are used for secure analysis management for communication with the sensor. They are also used to monitor the patients and professionals to give notification regarding the health.
Brodersen et al. [36], globally and across several industries, present an innovation model that will allow business to business-and-consumer transactions to be faster, more efficient, and highly secure. Many healthcare participants hope the same distributive database technologies allowing this new model can lead to similar outcomes within the industry and recognize that confusion, like many other major innovations.

Blockchain and Distributed Ledger Based Improved Bio-Medical Security System
The proposed BDL-IBS is designed to improve the trust-and privacy-related specifications of the electronic shareable health records. The system focused on maximizing the sharing rate of the secured records along with less adversary impact. In this system, blockchain technology is exploited by the medical server that tracks the trust privacy factors between the users and records. In Figure 1, an illustration of a biomedical security system with blockchain technology is presented.
The components of the bio-medical system include storage and a medical server. The storage contains the health records of the end-users in a digital format. The medical server is responsible for processing user requests and responding to them with appropriate records. A common sharing platform such as cloud and associated infrastructures are responsible for sharing EHRs. The blockchain and distributed ledger are used in both the medical server and end-user applications. In the blockchain associated with the medical server, the trust and privacy factors are analyzed, whereas the privacy factors are alone assessed in the end-user blockchain. The trust factors include successful access and response to request ration, and privacy relies on convergence and complexity. The trust process is analyzed and explained in detail in the following subsections. The components of the bio-medical system include storage and a medical server. The storage contains the health records of the end-users in a digital format. The medical server is responsible for processing user requests and responding to them with appropriate records. A common sharing platform such as cloud and associated infrastructures are responsible for sharing EHRs. The blockchain and distributed ledger are used in both the medical server and end-user applications. In the blockchain associated with the medical server, the trust and privacy factors are analyzed, whereas the privacy factors are alone assessed in the end-user blockchain. The trust factors include successful access and response to request ration, and privacy relies on convergence and complexity. The trust process is analyzed and explained in detail in the following subsections.
Adversary Model: In this bio-medical security system, malicious access due to man-in-middle and data tempering adversary models are considered. In a man-in-middle attack, the adversary overlaps the end user to gain access to the HER. This results in sharing health information to an adversary and thus degrading the design of a secure biomedical system. In the case of a data tempering attack, the adversary breaches HER from any node communicating with the biomedical system. It either modifies the actual data/tracks the communication through the HER information.  Adversary Model: In this bio-medical security system, malicious access due to man-in-middle and data tempering adversary models are considered. In a man-in-middle attack, the adversary overlaps the end user to gain access to the HER. This results in sharing health information to an adversary and thus degrading the design of a secure biomedical system. In the case of a data tempering attack, the adversary breaches HER from any node communicating with the biomedical system. It either modifies the actual data/tracks the communication through the HER information. Figure 2a,b portrays the representation of the man-in-middle and data tampering attacks over the EHR.
For thwarting the above attack, the trust model and concentric authentication are introduced using the blockchain paradigm. As referred to earlier, the blockchain process is differentiated in both the medical server and end-user functions.
Apart from the regular two-layer network, the man-in-middle attack can be overcome by the server-client based blockchain technology as shown in Figure 2c. Since it is a server-client network, it is well suited for the medical user and end-user functions. To reduce the man-in-middle issue, a pure application-oriented implementation is followed in the objective of the proposed idea. A proper set of protocols should be determined in the server domain, and the appropriate application receives the data from the client side.
The process of trust-based validation is performed using linear decision-making, and authentication is augmented through classification-based learning.
Trust model based on Linear Decision Making: In the trust model, the factors are successful access and end-user application to fetch HER. Through conventional communication standards, the end-user application generates a query for accessing HER. The initial authorization for the end-user is provided using login ID/name and password information. This information is validated by the medical server to ensure the reputation of the user. The medical server is associated with the blockchain with the following entries, as in Table 1. and data tempering adversary models are considered. In a man-in-middle attack, the adversary overlaps the end user to gain access to the HER. This results in sharing health information to an adversary and thus degrading the design of a secure biomedical system. In the case of a data tempering attack, the adversary breaches HER from any node communicating with the biomedical system. It either modifies the actual data/tracks the communication through the HER information. Figure 2a,b portrays the representation of the man-in-middle and data tampering attacks over the EHR. For thwarting the above attack, the trust model and concentric authentication are introduced using the blockchain paradigm. As referred to earlier, the blockchain process is differentiated in both the medical server and end-user functions.
Apart from the regular two-layer network, the man-in-middle attack can be overcome by the server-client based blockchain technology as shown in Figure 2c. Since it is a server-client network, it is well suited for the medical user and end-user functions. To reduce the man-in-middle issue, a pure application-oriented implementation is followed in the objective of the proposed idea. A proper set of protocols should be determined in the server domain, and the appropriate application receives the data from the client side.
The process of trust-based validation is performed using linear decision-making, and authentication is augmented through classification-based learning.
Trust model based on Linear Decision Making: In the trust model, the factors are successful access and end-user application to fetch HER. Through conventional communication standards, the end-user application generates a query for accessing HER. The initial authorization for the end-user is provided using login ID/name and password information. This information is validated by the medical server to ensure the reputation of the user. The medical server is associated with the blockchain with the following entries, as in Table 1.  For each Q generated and received in the medical server, the state of R (i.e., sharing EHR), the factors c, t s , t v , and τ are updated. This information remains unchanged in the blockchain paradigm. It is to be noted that τ is valid for t v , within which the sharing of EHR is completed. For any case of t v < t s , the τ → 0 and the user is marked as illegitimate. For validating the above conditions, τ is computed as a linear combination of (R, Q) and successful access probability (ρ a ). In a given t v , the τ is computed as The factor R Q is the ratio of response to the query request received by the medical server. The linearity in identifying the trust for a period of t v relies on R Q and ρ a , where both the factors are proportional to each other. The above linear relationship between ρ a and R Q is t s is recurrently analyzed using the t s c instance, i.e., the τ in all c instances is verified from its previous shared count that is given as From the above sequence, the varying R Q or ρ a in t s is estimated for all the c shared to the end-user. In this sequence, the varying point p initiating the change in proportionality between ρ a and R Q is identified. Such identification helps to reduce the computations and security mechanisms (authentication) to prevent losses in sharing EHR. This point from the sequence t s is computed using Equation (3) as This validating point helps to hold the verification process and trust update in the blockchain, where the actual c is updated until p ∈ τ sequence. The decision for pursuing/halting EHR sharing is determined using the conditions formulated in Table 2.

Condition
Description Solution Current trust is less than the previous trust in any of the instance of the sequence Pause sharing until the next update is received The actual share count is high that the identified point The identified point is greater than the shared EHRs. Halt EHR sharing Sequence trust is the same as the instance trust value computed Not feasible until c = 1 Sequence trust is high that the instance trust value Halt EHR sharing The last three conditions in Table 2 represent the unfeasible conditions as τ < τ(t v ) results in a negative p that is not possible in case c > 1. Similarly, the sequence and instant trust are the same in case of sharing only 1 record, after which p = ∞. This provides continuous chances for EHR sharing, whereas, in practical EHR based biomedical systems, the condition does not hold. For p ≥ c condition, the point is detected after all the counts are shared. Therefore, the previous state of name/ID for which it is τ with the new t s or t v period. The blockchain is updated for the above and hence for further sharing of EHRs. The case of the first two conditions is different, where p < c follows τ and τ(t v ) as in Equations (3) and (2), respectively. The different case of condition 1 is to be differentiated from the other conditions as a trial to the user is given if the current trust is less than the previous sequence of trust. This impacts either ρ a or R Q and hence Equation (1) is modified as If both the R Q and ρ a factors are not constant, then the sharing process is halted. Based on the different instances for R Q (or) ρ a , the decision is made such that the sharing is not halted, whereas it is paused until the next update if τ is observed. In this pausing instance, the sharing session of the end-user application is expired. Therefore, the user has to login again to re-initiate the EHR sharing session. The time of validity based on different instances of τ(t v ) is determined using Equations (5) and (6), respectively.
For the above Equation of computing t v for fluctuating τ(t v ), tn Figure 3a,b, respectively. if the update is based on ρ . The process of differentiation relies on the p that is identified for both the conditions where − ρ < − ρ ∀ i ∈ c. Finally, the user with max τ or max τ (t ) is identified in all the instances for providing better authentication. The linear representation in Equation (2) is either fluctuate between t based on and ρ independently. The fluctuation is based on the varying t and t instances as differentiated by p. This trust-based decision-making helps to improve the ratio of successful sharing under controlled response time. In Table 3, the observed records that are classified under different conditions of Table 1 is presented for the different sharing times.
(a) (b)   The process of trust-based update in the blockchain is performed using t s using R Q and ρ a factors independently. The process is consecutive if t s and t v is updated based on R Q and concurrent if the update is based on ρ a . The process of differentiation relies on the p that is identified for both the conditions Finally, the user with max{τ} or max{{τ}(t s )} is identified in all the instances for providing better authentication. The linear representation in Equation (2) is either fluctuate between t s based on R A and ρ a independently. The fluctuation is based on the varying t s and t v instances as differentiated by p. This trust-based decision-making helps to improve the ratio of successful sharing under controlled response time. In Table 3, the observed records that are classified under different conditions of Table 1 is presented for the different sharing times. There is only one ending transmission in the sharing time of 70, where condition 4 is satisfied by sharing count of c. The records classified under conditions 3/5 are not sent to the end user, and hence their sessions are logged out.

Classification-Based Concentric Authentication
In the classification-based concentric authentication, EHR is shared. In a concentric authentication, the common classification on point p serves as the decision-making for generating authentic records. The classification-based learning allocates two types of non-sequential session keys for authenticating the sharing session. This classification is based on the fluctuating τ(t v ) as in Equation (4). The impact of either of the fluctuation varies the administration of session keys to prevent the data tampering attacks. Initially, the session is set up between the medical server, and the end-user application follows a linear mapping map: RX R c → R U . Here, R c is the group of response until a count c, and R U is the random function of the end-user (U). The group consists of a random generator r ∈ R c along with a differential prime number p n . For the different τ(t v ), the variable r ∈ R c relies on computing hashes H MS and H U for the medical server and end-user, respectively. The general format of an initial authentication is denoted as R c , R U , p n , r, H MS , H U , c . The shared record count is obtained from the blockchain, where the trust of user access coupled with the records is stored. The distributed access to blockchain stored information is assessed in both end-user and medical server levels. For this authentication process, the classification occurrences of 1 − R Q and ρ a in t s is performed. As stated previously, the sequential and concurrent update of the medical server blockchain process requires different session keys and authentication procedures. Therefore, the occurrence of p for condition 1 from Table 2 is the determining factor. Let ρ p and ρ s represent the fluctuating and sequential probabilities in a given time t s ; then, such that As , the above classification of probability, s over p is computed for all ρ s instead of ρ p to linearize the solutions as in Equation (1). Based on the relationship between R Q and ρ a , the classification of ρ(p s) is performed as ρ(p 1 ,p 2 ,...p c ) . For condition 1, the classification rule is framed as in Equation (9) for identifying p over s as in Equation (8) ρ(p|s 1 , where s = argmax c ρ p c i=1 ρ(p i s). Here in Equation (9), the probability of ρ p is computed based on the likelihood of p s instances and its normalization as The above likelihood normalization of p helps to classify p ∈ 1 − R Q < ρ a condition or p ∈ ρ a < R Q condition. This helps to decide between sequential and concurrent authentication procedure through the same concentric point from the fluctuating sequence of t s . The normalization identifies precise p in the series of ρ(p s) such that ρ(s p) follows sequential authentication, whereas the previous occurrence relies on random concurrent security measures. Here, the priority of authentication is initiated from the first occurrence of ρ p of ρ s as determined by N (p). For all the first occurrences of ρ p and ρ s , the sequence follows ρ(p s 1 , (as in Equation (6)). Using this sequence and concurrency, the authentication is presented as follows. In two cases, the occurrence of the sequence and concurrency observed is discussed below. Case 1: The sequence initiates with ρ s Analysis 1: The hash sequence for both H MS and H U is formulated as H MS (p) = r i pn + r i−1 pn + . . . + r i−c pn p c−1 , ∀ i ∈ c and H U (c) = r i−c pn + r i−c+1 pn + . . .
This hash is composed of [R c , H U (p), c] and [R U , H u (c), c] ∀ R c , R U , pn, r, c and is subject to verification using the user ID and session key as follows, where K s and K v are the secret and verification keys generated for the hashes, and therefore in the sharing process, K s [H MS (p), R, c] is contributed to the end-user. At the receiver end, the K v is used for verification. If the process of sharing the records is sequential, then i ∈ c is sequential until p or the likelihood N (p) occurs. This is followed for all [H MS (p), R] until the c = p is reached, and then the coherency of H U (c) = H U (p) until ρ(s p) is observed. The verification of the process is also sequential by mapping R × R 1 to p → R U where R U is observed from the range of hashes from 1 to ρ(s p 1 , p 2 , . . . p c ) . The first sharing verification is performed as where, B denotes the blockchain record for the grouped storage of [R, c] after the hashing process.
In the verification at the user end, the relevance is first validated, followed by the verification process as in Equations (14) and (15) respectively.
In the above, the range of c is valid until p, i.e., the N (p) is the halting factor for sequential authentication. In the verification process, sequence as mapped in R × R C → R U is the balancing factors where the sending and receiving sequence until ρ(p s) is obtained. In this case, the converging interval of the proposed method is extended until the c, i.e., the restricted time from 1 to p is extended from p to c in a concentric manner. The next sequence for p to c authentication is discussed in Case 2.
Case 2: The sharing sequence experiences ρ p . Analysis 2: This case is unique as both sequential and concurrent authentication is performed with interfering with other processes. It is to be noted that the convergence time from the sequential process is experienced to ρ(p s 1 , s 2 , . . . s c ) from the ρ p . This helps to identify more ρ(s p) , and thus the concentricity of the authentication process is expanded, reducing the chances of convergence. In this authentication process, both H MS and H U are used for performing secure sharing between the medical server and the end user. The blockchain is updated with p and N (p) along with the previous sequence for the appropriate user ID. Therefore, the session is initiated by verifying the following There are two verification steps followed for authenticating the sharing due to the fluctuating instances in t s . The first authentication follows Equation (14), whereas the range from p to c follows The above process of authentication in sharing and receiving B is performed in both the medical server and the end user. Finally, the received B is verified using 1 to p sequence as in Equation (15), whereas the t to c received B is verified as follows.
This verification is processed for all the fluctuating shared R through the classification process. This prevents unnecessary convergence and overload complexity in handling medical records at different time instances. In Table 4, the ρ s and ρ p for the varying p in different sharing time along with the complexity is tabulated. In Table 4, the complexity is computed as the number of additional hashes generated due to ρ p to the actual existing hashes. The complexity is measured in terms of count of additional steps required for verification and authentication as observed in the keying process. If the impact of attacks is high, then the ρ p factor increases to prevent unnecessary data tampering or modification. Hence, in this case, the number of c fluctuates as the classification is grouped under both the sharing instances.

Performance Analysis
The performance of the proposed BDL-IBS is assessed using simulations using an opportunistic network environment. In this environment, a maximum of 100,000 EHRs (unique and repeated) are shared for 110 users in different time instances. A user is capable of generating four Qs at the same time, for which the sharing interval is 90 s (max). The medical server of storage 4 × 1 TB is used for storing LHRs, and two blockchain servers with restricted read/write access are configured in this simulation environment. The medical server is capable of dispatching 20 records of size 70 mb in 1 s time. The maximum wait time for a record is 60 s, and the hash process follows hyperelliptic curve cryptography of a maximum size of 160 bits. Similarly, K v and K s is fit as 48-bits and 36-bit, respectively. Using this simulation environment, the existing 31FF [23], BDe HA [26], and SCNN-DGT [16] methods are considered for comparative analysis. For this comparative analysis, the metrics sharing ratio, response time, computation time, and convergence time are analyzed.

Successful Sharing Ratio
The proposed security system relies on record-user-access-based trust and differential authentication to improve the successful sharing of EHRs. The trust-based relationship between ρ a and R/Q is validated for the possible conditions in Table 2, generating τ(t v ) and τ at different instances. In the sharing instances, pursuing/pausing sharing is determining based on ρ a > R Q or ρ a < R Q conditions. This condition-based decision-making determines t s for (p + 1) to c instances and or t s for p+1 2 to c instances in either sequential/concurrent manner. The concentric sharing process follows t s c for any instance of τ(t v ); if the τ(t v ) is maximum, then the sharing is performed either in a sequential or concurrent manner. In this process, the blockchain updates the trust for the linear ρ a and R Q relation, which remains unchanged. Therefore, sharing for varying time and EHRs follows conditional satisfaction as in Table 2, achieving a high successful sharing ratio (refer to Figure 4a, b). and ort for ( to c) instances in either sequential/concurrent manner. The concentric sharing process follows t for any instance of τ(t ); if the τ(t ) is maximum, then the sharing is performed either in a sequential or concurrent manner. In this process, the blockchain updates the trust for the linear ρ and relation, which remains unchanged. Therefore, sharing for varying time and EHRs follows conditional satisfaction as in Table 2, achieving a high successful sharing ratio (refer to Figure  4a

Response Time
The sharing time t s < t v is ensured in all the instances of EHR processing for the received Q. If t v < t s is observed, then the response time increases. For analyzing the instances of sharing c, the variable τ and τ(t v ) is differentiated. In this case, t s c for ρ a > R Q is estimated as If the condition t s < t v is achieved, then the varying point p is identified to differentiate the sharing of EHRs. Therefore, the joint sharing is not facilitated for trust varying or condition 1 (Table 2), dissatisfying users. Hence, a small wait time in a response is experienced; this disintegrates the conditions of t s < t v , where concurrent sharing and authentication is performed without additional wait time. Therefore, for the conditions 1 and 2, the response time for a Q from the end user is less compared to the other methods (refer to Figure 5). is identified to differentiate the sharing of EHRs. Therefore, the joint sharing is not facilitated for trust varying or condition 1 (Table 2), dissatisfying users. Hence, a small wait time in a response is experienced; this disintegrates the conditions of t ˂ t , where concurrent sharing and authentication is performed without additional wait time. Therefore, for the conditions 1 and 2, the response time for a Q from the end user is less compared to the other methods (refer to Figure 5).   Table 2). This helps to process the same number of c with the different authentication process and thereby reduces the complexity and required computations in the sequential sharing. Instead, the concurrent dissemination process of the records requires a change in first-level authentication as Equations (12) and (17) to satisfy (p), confining t within t . Therefore, the required computation increases by 1, and hence some additional time for verifying the second authentication is required. The verifying process is common in both the instances, demanding less/same time of computation. Hence, the overall computation time is differentiated by ρ , and ρ(p|s) and ρ(s|p) is less in the proposed security system.   Table 2). This helps to process the same number of c with the different authentication process and thereby reduces the complexity and required computations in the sequential sharing. Instead, the concurrent dissemination process of the records requires a change in first-level authentication as Equations (12) and (17) to satisfy N (p), confining t s within t v . Therefore, the required computation increases by 1, and hence some additional time for verifying the second authentication is required. The verifying process is common in both the instances, demanding less/same time of computation. Hence, the overall computation time is differentiated by ρ p , and ρ(p s) and ρ(s p) is less in the proposed security system.

Convergence Time
The proposed security system achieves less convergence time in the authentication process. The convergence is identified using the classification of p based on the occurrence of the ρ and ρ . Following the classification process, (p) for ρ(p|s ) , i ∈ c or ρ(p |s) , the converging time is identified in forehand, restricting in breaches in sharing and shared data tampering. Therefore, the

Convergence Time
The proposed security system achieves less convergence time in the authentication process. The convergence is identified using the classification of p based on the occurrence of the ρ p and ρ s . Following the classification process, N (p) for ρ(p s i ), i ∈ c or ρ(p i |s ), the converging time is identified in forehand, restricting in breaches in sharing and shared data tampering. Therefore, the identification based on p and N (p) helps to divide the authentication for ρ a > R Q and ρ a < R Q instances. The verification and authentication observed for the above conditions are different, without generating different point and probabilities. Here, detection of p segregates the authentication process for sequential and concurrent instances as 1 to p and p to c without requiring a new hash or verification procedure. As the number of convergence increases, the concurrency is increased without requiring additional computation steps. Therefore, the probabilistic classification of achieves less convergence in the proposed security system (refer to Figure 7). In Table 5, the comparative analysis results are tabulated.

Convergence Time
The proposed security system achieves less convergence time in the authentication process. The convergence is identified using the classification of p based on the occurrence of the ρ and ρ . Following the classification process, (p) for ρ(p|s ) , i ∈ c or ρ(p |s) , the converging time is identified in forehand, restricting in breaches in sharing and shared data tampering. Therefore, the identification based on p and (p) helps to divide the authentication for ρ > and ρ < instances. The verification and authentication observed for the above conditions are different, without generating different point and probabilities. Here, detection of p segregates the authentication process for sequential and concurrent instances as 1 to p and p to c without requiring a new hash or verification procedure. As the number of convergence increases, the concurrency is increased without requiring additional computation steps. Therefore, the probabilistic classification of ∏ ρ(p |s) and ∏ ρ(p|s ) for (p) achieves less convergence in the proposed security system (refer to Figure 7). In Table 5, the comparative analysis results are tabulated.  From Table 5, it is seen that the proposed security system is capable of achieving better performance by reducing the response time and increasing the ratio of successful sharing through  From Table 5, it is seen that the proposed security system is capable of achieving better performance by reducing the response time and increasing the ratio of successful sharing through trust-based validations. In the authentication process, the computation and converging time are found to be less since the instances of sharing are segregated based on p.
As in Table 5 and in Figure 8, the proposed security system achieves a very high performance for analyzing various attacks. The better performance is achieved by consuming low response time, less computation time and reduced converging time. As opposite, it achieves a high successful sharing rate.
trust-based validations. In the authentication process, the computation and converging time are found to be less since the instances of sharing are segregated based on p.
As in Table 5 and in Figure 8, the proposed security system achieves a very high performance for analyzing various attacks. The better performance is achieved by consuming low response time, less computation time and reduced converging time. As opposite, it achieves a high successful sharing rate.

Conclusions
This paper introduced a blockchain and distributed ledger-based improved biomedical security system for improving the privacy and security of EHRs. This security system relies on the blockchain paradigm for providing trust validation through linear decision-making. The authentication of EHRs is preceded using classification-based learning for identifying sequential and concurrent sharing. The process is focused on both user-level and sharing-level security and privacy of the biomedical systems. The classification of sharing instances helps to reduce the complex and overloaded computations in the authentication process with less computation time. The blockchain technology coupled with this process helps to share trust-related information and differentiate the sharing based on classification instances. The experimental analysis of the proposed security system shows that it is capable of increasing the sharing ratio by 8.077% and 7.03% for sharing time and records, respectively. It also achieves 20.11% less response time compared to the other methods. In the case of authentication, the proposed system confines computation and convergence time by 10.26% and 12.31%.

Conclusions
This paper introduced a blockchain and distributed ledger-based improved biomedical security system for improving the privacy and security of EHRs. This security system relies on the blockchain paradigm for providing trust validation through linear decision-making. The authentication of EHRs is preceded using classification-based learning for identifying sequential and concurrent sharing. The process is focused on both user-level and sharing-level security and privacy of the biomedical systems. The classification of sharing instances helps to reduce the complex and overloaded computations in the authentication process with less computation time. The blockchain technology coupled with this process helps to share trust-related information and differentiate the sharing based on classification instances. The experimental analysis of the proposed security system shows that it is capable of increasing the sharing ratio by 8.077% and 7.03% for sharing time and records, respectively. It also achieves 20.11% less response time compared to the other methods. In the case of authentication, the proposed system confines computation and convergence time by 10.26% and 12.31%.