Author Contributions
S.S.: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Validation, Visualization, Writing—review and editing. M.S.F.: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Validation, Visualization, Writing—original draft. R.M.: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Validation, Visualization, Writing—original draft. R.T.K.: Conceptualization, Data curation, Formal analysis, Investigation, Validation, Visualization, Writing—original draft. M.S.K.: Investigation, Methodology, Resources, Supervision, Writing—review and editing. M.S.H.: Investigation, Methodology, Project administration, Supervision, Writing—review and editing. K.A.: Conceptualization, Investigation, Project administration, Supervision, Writing—review and editing. R.K.: Investigation, Methodology, Project administration, Validation, Writing—review and editing. All authors have read and agreed to the published version of the manuscript.
Figure 1.
Key areas where blockchain enhances healthcare systems, such as drug safety, secure access to sensitive data, verification of medical staff credentials, protection of remote IoT-based monitoring, and improved transparency and coordination in supply chain operations.
Figure 1.
Key areas where blockchain enhances healthcare systems, such as drug safety, secure access to sensitive data, verification of medical staff credentials, protection of remote IoT-based monitoring, and improved transparency and coordination in supply chain operations.
Figure 2.
Structure of a blockchain, in which the Genesis Block and all subsequent blocks are linked sequentially, each containing data, timestamps, and cryptographic hashes. This ensures that records are secure, tamper-resistant, and maintained in a fully decentralized system, enabling transparency and trust without a central authority.
Figure 2.
Structure of a blockchain, in which the Genesis Block and all subsequent blocks are linked sequentially, each containing data, timestamps, and cryptographic hashes. This ensures that records are secure, tamper-resistant, and maintained in a fully decentralized system, enabling transparency and trust without a central authority.
Figure 3.
A blockchain and IPFS-enabled architecture for secure remote access of patient data: A step-by-step process flow including user registration via DApp, group signature authentication, encrypted data upload to EHR servers, hash storage on IPFS, blockchain-based verification, and decentralized data retrieval across hospital nodes.
Figure 3.
A blockchain and IPFS-enabled architecture for secure remote access of patient data: A step-by-step process flow including user registration via DApp, group signature authentication, encrypted data upload to EHR servers, hash storage on IPFS, blockchain-based verification, and decentralized data retrieval across hospital nodes.
Figure 4.
Sequence diagram of the proposed blockchain- and IPFS-enabled framework for decentralized electronic health record (EHR) management. The diagram illustrates the complete workflow, including the registration phase, the data upload phase, and the data retrieval phase.
Figure 4.
Sequence diagram of the proposed blockchain- and IPFS-enabled framework for decentralized electronic health record (EHR) management. The diagram illustrates the complete workflow, including the registration phase, the data upload phase, and the data retrieval phase.
Figure 5.
Key management and revocation workflow. (a) illustrates the hierarchical encryption model where the organizational root key secures departmental KEKs, which wrap DEKs used to protect EHRs stored in IPFS. (b) shows the on-chain smart contract responsible for key rotation and revocation, enabling immediate blocking of compromised credentials and controlled key version updates without re-encrypting the entire dataset.
Figure 5.
Key management and revocation workflow. (a) illustrates the hierarchical encryption model where the organizational root key secures departmental KEKs, which wrap DEKs used to protect EHRs stored in IPFS. (b) shows the on-chain smart contract responsible for key rotation and revocation, enabling immediate blocking of compromised credentials and controlled key version updates without re-encrypting the entire dataset.
Figure 6.
Workflow of the GDPR-compliant patient data erasure process in a blockchain-integrated EHR system. The workflow ensures authenticated erasure requests, crypto-erasure of Data Encryption Keys (DEKs), unpinning of data in IPFS, and immutable ledger updates.
Figure 6.
Workflow of the GDPR-compliant patient data erasure process in a blockchain-integrated EHR system. The workflow ensures authenticated erasure requests, crypto-erasure of Data Encryption Keys (DEKs), unpinning of data in IPFS, and immutable ledger updates.
Figure 7.
Successful deployment of a new smart contract via a blockchain transaction, illustrating secure and efficient execution with all parameters confirmed on the Ethereum test network, representing a key step in decentralized application development.
Figure 7.
Successful deployment of a new smart contract via a blockchain transaction, illustrating secure and efficient execution with all parameters confirmed on the Ethereum test network, representing a key step in decentralized application development.
Figure 8.
Successful execution of a smart contract, highlighting the transparency, security, and accuracy of blockchain systems in verifying and recording digital agreements on-chain.
Figure 8.
Successful execution of a smart contract, highlighting the transparency, security, and accuracy of blockchain systems in verifying and recording digital agreements on-chain.
Figure 9.
Transaction details from the Sepolia Testnet capturing a smart contract execution fully integrated into the blockchain, with confirmed status, block inclusion, multiple confirmations, and gas usage, demonstrating secure and verifiable decentralized operations.
Figure 9.
Transaction details from the Sepolia Testnet capturing a smart contract execution fully integrated into the blockchain, with confirmed status, block inclusion, multiple confirmations, and gas usage, demonstrating secure and verifiable decentralized operations.
Figure 10.
Interface of the deployed “Healthcare” Solidity smart contract on the Ethereum blockchain prior to data entry. The contract defines the “Patient” and “Doctor” structs and includes functions to set and retrieve patient and physician information, illustrating the structure of a blockchain-based system for secure healthcare data management.
Figure 10.
Interface of the deployed “Healthcare” Solidity smart contract on the Ethereum blockchain prior to data entry. The contract defines the “Patient” and “Doctor” structs and includes functions to set and retrieve patient and physician information, illustrating the structure of a blockchain-based system for secure healthcare data management.
Figure 11.
Interface of the “Healthcare” Solidity smart contract on the Ethereum blockchain after data entry. Patient and physician information has been recorded using the “Patient” and “Doctor” structs, demonstrating how the contract securely stores and allows retrieval of healthcare data in a decentralized system.
Figure 11.
Interface of the “Healthcare” Solidity smart contract on the Ethereum blockchain after data entry. Patient and physician information has been recorded using the “Patient” and “Doctor” structs, demonstrating how the contract securely stores and allows retrieval of healthcare data in a decentralized system.
Figure 12.
Efficient latency handling across varying block sizes. The latency increases gradually as block size grows from 0.5 MB to 16 MB, but the rate of increase remains relatively low and stable. This indicates that the proposed system handles larger data blocks efficiently, demonstrating strong performance and scalability under heavy load conditions compared to typical systems.
Figure 12.
Efficient latency handling across varying block sizes. The latency increases gradually as block size grows from 0.5 MB to 16 MB, but the rate of increase remains relatively low and stable. This indicates that the proposed system handles larger data blocks efficiently, demonstrating strong performance and scalability under heavy load conditions compared to typical systems.
Figure 13.
Impact of file size on throughput in the proposed system. Throughput decreases as file size increases from 10 KB to 800 KB. The decline is steeper at smaller file sizes and gradually levels off, indicating increased processing overhead for larger files.
Figure 13.
Impact of file size on throughput in the proposed system. Throughput decreases as file size increases from 10 KB to 800 KB. The decline is steeper at smaller file sizes and gradually levels off, indicating increased processing overhead for larger files.
Figure 14.
Scalability analysis based on gas consumption vs. file size. Gas usage increases with file size, rising from approximately 85,000 to over 98,000 units as the file size grows from 10 KB to 800 KB. The trend shows diminishing growth in gas cost at larger file sizes, indicating that the proposed system scales reasonably well in terms of gas efficiency for increasing data sizes.
Figure 14.
Scalability analysis based on gas consumption vs. file size. Gas usage increases with file size, rising from approximately 85,000 to over 98,000 units as the file size grows from 10 KB to 800 KB. The trend shows diminishing growth in gas cost at larger file sizes, indicating that the proposed system scales reasonably well in terms of gas efficiency for increasing data sizes.
Figure 15.
System throughput under simulated EHR workloads inspired by MIMIC-III. The framework scales nearly linearly up to 3000 requests/s before flattening at 2700 tps under 5000 requests/s. Latency increases due to consensus delays and IPFS retrieval overhead, while success rate remains above 92 percent.
Figure 15.
System throughput under simulated EHR workloads inspired by MIMIC-III. The framework scales nearly linearly up to 3000 requests/s before flattening at 2700 tps under 5000 requests/s. Latency increases due to consensus delays and IPFS retrieval overhead, while success rate remains above 92 percent.
Table 1.
Adoption of recent technologies such as blockchain, IoT, EHR systems, and cryptography in modern healthcare management.
Table 1.
Adoption of recent technologies such as blockchain, IoT, EHR systems, and cryptography in modern healthcare management.
Reference | Based On | Limitations |
---|
[49] | Blockchain, IPFS | TCCM has limitations in platform reliance, complexity, ethical risks, access control, and scalability. |
[50] | Blockchain, IPFS | The framework faces limitations in scalability, model accuracy, explainability, and standard compliance, requiring further validation across diverse healthcare settings. |
[51] | Blockchain, IPFS | The system faces limitations in scalability, user dependence, and institutional adoption. |
[52] | IoT, EHR | The scheme is limited by its simulation-based evaluation, single authority support, and lack of quantum resistance. |
[53] | IoT, EHR | The main limitation of the study is its validation using data from a single hospital’s EHR system and one type of wearable device (Garmin), limiting generalizability. |
[54] | Blockchain, EHR | B-HIES is limited by assumptions on ethical data use, lack of scalability testing, partial semantic interoperability, absence of data quality control, and no integrated threat modeling. |
[55] | Blockchain, EHR | The system lacks real-world evaluation, scalability testing, and integration with AI and IoT for advanced healthcare functionality. |
[56] | Blockchain, Group Signature | The proposed TASS scheme lacks real-world deployment and has not yet addressed resistance to malicious aborts in distributed settings. |
[57] | Blockchain, Key Distribution | The study lacks practical implementation or evaluation of ECC within real-world healthcare systems. |
Table 2.
A detailed comparison of the proposed framework with existing blockchain–IPFS–encryption approaches, highlighting differences in privacy mechanisms, revocation handling, and scalability.
Table 2.
A detailed comparison of the proposed framework with existing blockchain–IPFS–encryption approaches, highlighting differences in privacy mechanisms, revocation handling, and scalability.
Reference | Privacy Mechanism | Revocation Handling | Scalability/Rotation |
---|
[58] | zk-SNARKs | Not supported | High computation cost; limited TPS |
[59] | Proxy Re-Encryption | Limited, delegation only | Overhead grows with number of delegates |
[60] | Attribute-Based Encryption | Policy-based revocation (complex) | Large key sizes; poor scalability to thousands of users |
Proposed Method | Group Signatures + Hierarchical key Management | On-chain, immediate via smart contract | Constant-size signatures, efficient verification, low-cost key rotation |
Table 3.
Representative performance of group signature operations (pairing-based, BLS/BBS schemes), including the time required for signature generation, signature verification, and revocation checks, along with the corresponding signature sizes in bytes. This table provides an overview of the efficiency and storage overhead of typical group signature schemes.
Table 3.
Representative performance of group signature operations (pairing-based, BLS/BBS schemes), including the time required for signature generation, signature verification, and revocation checks, along with the corresponding signature sizes in bytes. This table provides an overview of the efficiency and storage overhead of typical group signature schemes.
Operation | Time (ms) | Signature Size (bytes) |
---|
Signature Generation | 2.1 | 200 |
Signature Verification | 3.0 | 200 |
Revocation Check | 0.5 | Negligible |
Table 4.
Comparison of alternative cryptographic mechanisms with respect to suitability in healthcare EHR sharing. Group signatures provide the most balanced trade-off between privacy, efficiency, and scalability, making them preferable for hospital-scale deployments.
Table 4.
Comparison of alternative cryptographic mechanisms with respect to suitability in healthcare EHR sharing. Group signatures provide the most balanced trade-off between privacy, efficiency, and scalability, making them preferable for hospital-scale deployments.
Mechanism | Advantages | Limitations in Healthcare EHR Context | Scalability Concern |
---|
Zero-Knowledge Proofs (ZKP) | Strong privacy, non-interactive proofs possible | High computation cost, inefficient for frequent authentication | Scales poorly with frequent transactions |
Proxy Re-Encryption (PRE) | Enables delegation without sharing private keys | Complex key management, added decryption latency | Overhead grows with number of delegates |
Attribute-Based Encryption (ABE) | Fine-grained access control policies | Large key sizes, high ciphertext overhead | Scalability issues for thousands of users |
Group Signatures | Anonymous authentication, constant-size signatures, efficient verification | Requires trusted group manager, credential issuance overhead | Scales efficiently with large networks using multi-manager models |
Table 5.
Comparison of proposed system with previous systems.
Table 5.
Comparison of proposed system with previous systems.
Feature | Kaur et al. [28] | Khan et al. [63] | Tiwari et al. [64] | Mallick et al. [65] | Ma et al. [66] | Proposed System |
---|
Scalability | High gas and encryption overhead | High gas fees and latency | Improved but limited scalability | Limited throughput | Dependent on Ethereum congestion | Controlled latency, scalable throughput for large files |
Data Privacy and Encryption | Depends on external CP-ABE encryption | Privacy risks due to blockchain transparency | Requires external encryption | Limited privacy focus | Metadata privacy limited | Uses group signatures and source encryption; secure IPFS storage |
Smart Contract Security | Complex smart contract management | Risk of bugs from insufficient auditing | Complex system due to combined tech | Complex integration | Requires specialized expertise | Optimized smart contracts for validation and consensus |
Regulatory Compliance (HIPAA/GDPR) | Not specifically addressed | Challenges due to immutability | GDPR “right to erasure” conflict | Not deeply addressed | Not addressed | Group signature and encryption support confidentiality and privacy needs |
Real-World Integration | Simulated only | Prototype, no live integration | Limited integration | Limited hospital interoperability | Not deployed in real environments | Integrated with hospital EHR systems and tested for real-world use |
Interoperability | Not addressed | Not addressed | Difficult integration with legacy systems | Limited interoperability | Not addressed | Designed for hospital EHR compatibility via blockchain and IPFS |
User Management | Complex and unscalable attribute management | Not addressed | Not addressed | Not addressed | Not addressed | Uses group signatures for scalable decentralized authentication |