Skip to main content
Erschienen in: The Journal of Supercomputing 2/2024

18.08.2023

Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network

verfasst von: Divya Rani, Sachin Tripathi

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Health data collected from IoT devices can be utilised for predicting various medical information. The information collected is stored in centralised server and can be shared among various branches of the cooperative hospital network for analysis purposes. However, these communications are wireless which leads to various security threats like unauthorized access by intruders and misuse of health data. The existing work provides an authentication scheme that depends on trusted third party and centralised storage. This increases the computational burden and latency at the centralised server and may lead to a single-point failure. To solve this issue, a Blockchain-based authentication and key agreement scheme is proposed for sharing health data. The proposed scheme incorporates the concept of Blockchain that makes the system distributed, immutable, and transparent. An Elliptic Curve Cryptography based authentication scheme is proposed where all the information is stored in the Blockchain. In addition, a secret key is established to provide secure communication among patients, Hospital servers, and IoT devices. Hyperledger Fabric platform is used for Blockchain implementation that supports channel communication. There is a formal analysis using the ROR model that proves the security of the session key. The formal simulation using the Scyther tool shows that there is no attack within bound. Moreover, the informal analysis proves that the proposed work is resistant to various attacks and satisfies the security goals. The comparative study demonstrates that the proposed work is more effective as compared to others. The proposed work involves implementing a system of cooperative hospital servers that communicate through a shared channel. Hospital servers belonging to the same channel will be able to communicate securely and privately. This setup also facilitates the efficient transfer of health data among various hospital servers, eliminating the need for redundant computations during registration and authentication processes on each server. Additionally, the use of Blockchain reduces dependency on third party, makes the system distributed, provides immutable storage and increases confidentiality among members by using channel communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier
2.
Zurück zum Zitat Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963CrossRef Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963CrossRef
3.
Zurück zum Zitat Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554CrossRef Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554CrossRef
4.
Zurück zum Zitat Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
5.
Zurück zum Zitat Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301CrossRef Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301CrossRef
6.
Zurück zum Zitat Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554CrossRef Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554CrossRef
7.
Zurück zum Zitat Cheng X, Chen F, Xie D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer Cheng X, Chen F, Xie D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer
8.
Zurück zum Zitat Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9CrossRef Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9CrossRef
9.
Zurück zum Zitat Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689CrossRef Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689CrossRef
10.
Zurück zum Zitat Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49CrossRef Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49CrossRef
11.
Zurück zum Zitat Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449CrossRef Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449CrossRef
12.
Zurück zum Zitat Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410CrossRef Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410CrossRef
13.
Zurück zum Zitat He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef
14.
Zurück zum Zitat Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750CrossRef Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750CrossRef
15.
Zurück zum Zitat Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401CrossRef Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401CrossRef
16.
Zurück zum Zitat Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473CrossRef Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473CrossRef
17.
Zurück zum Zitat Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3) Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3)
18.
Zurück zum Zitat Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef
19.
Zurück zum Zitat Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490CrossRef Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490CrossRef
20.
Zurück zum Zitat Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075CrossRef Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075CrossRef
21.
Zurück zum Zitat Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273CrossRef Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273CrossRef
22.
Zurück zum Zitat Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656CrossRef Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656CrossRef
23.
Zurück zum Zitat Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204 Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204
24.
Zurück zum Zitat Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397CrossRef Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397CrossRef
25.
Zurück zum Zitat Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151CrossRef Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151CrossRef
26.
Zurück zum Zitat Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434CrossRef Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434CrossRef
27.
Zurück zum Zitat Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926CrossRef Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926CrossRef
28.
Zurück zum Zitat Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE
29.
Zurück zum Zitat Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753CrossRef Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753CrossRef
30.
Zurück zum Zitat Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press
31.
Zurück zum Zitat Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761 Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761
32.
Zurück zum Zitat Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.” Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.”
33.
Zurück zum Zitat Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916CrossRef Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916CrossRef
34.
Zurück zum Zitat Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689CrossRef Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689CrossRef
35.
Zurück zum Zitat Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021CrossRef Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021CrossRef
36.
Zurück zum Zitat Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019 Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019
37.
Zurück zum Zitat Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370CrossRef Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370CrossRef
38.
Zurück zum Zitat Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32 Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
39.
Zurück zum Zitat Xiang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783CrossRef Xiang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783CrossRef
40.
Zurück zum Zitat Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510CrossRef Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510CrossRef
Metadaten
Titel
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network
verfasst von
Divya Rani
Sachin Tripathi
Publikationsdatum
18.08.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05577-6

Weitere Artikel der Ausgabe 2/2024

The Journal of Supercomputing 2/2024 Zur Ausgabe

Premium Partner