Skip to main content
Top
Published in: The Journal of Supercomputing 14/2023

26-04-2023

Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network

Authors: Rati Bhan, Rajendra Pamula, Parvez Faruki, Jyoti Gajrani

Published in: The Journal of Supercomputing | Issue 14/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things (IoT) where the Things collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH). Smartphones and IoMTs are expected to maintain secure and trusted confidential patient record exchange while managing the patient remotely. Healthcare organizations deploy Healthcare Smartphone Networks (HSN) for personal patient data collection and sharing among smartphone users and IoMT nodes. However, attackers gain access to confidential patient data via infected IoMT nodes on the HSN. Additionally, attackers can compromise the entire network via malicious nodes. This article proposes a Hyperledger blockchain-based technique to identify compromised IoMT nodes and safeguard sensitive patient records. Furthermore, the paper presents a Clustered Hierarchical Trust Management System (CHTMS) to block malicious nodes. In addition, the proposal employs Elliptic Curve Cryptography (ECC) to protect sensitive health records and is resilient against Denial-Of-Service (DOS) attacks. Finally, the evaluation results show that integrating blockchains into the HSN system improved detection performance compared to the existing state of the art. Therefore, the simulation results indicate better security and reliability when compared to conventional databases.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhang M, Cui X, Li N (2022) Smartphone-based mobile biosensors for the point-of-care testing of human metabolites. Mater Today Biol 100254 Zhang M, Cui X, Li N (2022) Smartphone-based mobile biosensors for the point-of-care testing of human metabolites. Mater Today Biol 100254
2.
go back to reference Guo J (2017) Smartphone-powered electrochemical biosensing dongle for emerging medical IoTs application. IEEE Trans Ind Inf 14:2592–2597MathSciNetCrossRef Guo J (2017) Smartphone-powered electrochemical biosensing dongle for emerging medical IoTs application. IEEE Trans Ind Inf 14:2592–2597MathSciNetCrossRef
3.
go back to reference Yang Z, Zhou Q, Lei L, Zheng K, Xiang W (2016) An IoT-cloud based wearable ECG monitoring system for smart healthcare. J Med Syst 40:1–11CrossRef Yang Z, Zhou Q, Lei L, Zheng K, Xiang W (2016) An IoT-cloud based wearable ECG monitoring system for smart healthcare. J Med Syst 40:1–11CrossRef
4.
go back to reference Alkinoon M, Choi SJ, Mohaisen D (2021) Measuring healthcare data breaches. In: International Conference on Information Security Applications. Springer, pp 265–277 Alkinoon M, Choi SJ, Mohaisen D (2021) Measuring healthcare data breaches. In: International Conference on Information Security Applications. Springer, pp 265–277
5.
go back to reference Yu E (2018) Singapore suffers ’most serious’ data breach, affecting 1.5 m healthcare patients including prime minister Yu E (2018) Singapore suffers ’most serious’ data breach, affecting 1.5 m healthcare patients including prime minister
6.
go back to reference Wei L, Yang Y, Wu J, Long C, Li B (2022) A comprehensive study. IEEE Internet Things J Wei L, Yang Y, Wu J, Long C, Li B (2022) A comprehensive study. IEEE Internet Things J
7.
go back to reference Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) Btem: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616CrossRef Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) Btem: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616CrossRef
8.
go back to reference Chen L, Lee W-K, Chang C-C, Choo K-KR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Futur Gener Comput Syst 95:420–429CrossRef Chen L, Lee W-K, Chang C-C, Choo K-KR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Futur Gener Comput Syst 95:420–429CrossRef
9.
go back to reference Sharma A, et al (2020) Blockchain technology and its applications to combat covid-19 pandemic. Res Biomed Eng 1–8 Sharma A, et al (2020) Blockchain technology and its applications to combat covid-19 pandemic. Res Biomed Eng 1–8
10.
go back to reference Meng W, Li W, Xiang Y, Choo K-KR (2017) A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169CrossRef Meng W, Li W, Xiang Y, Choo K-KR (2017) A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169CrossRef
11.
go back to reference Liu Y, Wang J, Yan Z, Wan Z, Jäntti R (2023) A survey on blockchain-based trust management for internet of things. IEEE Internet Things J Liu Y, Wang J, Yan Z, Wan Z, Jäntti R (2023) A survey on blockchain-based trust management for internet of things. IEEE Internet Things J
12.
go back to reference Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef
14.
go back to reference Zhou H, Wu Y, Feng L, Liu D (2016) A security mechanism for cluster-based WSN against selective forwarding. Sensors 16:1537CrossRef Zhou H, Wu Y, Feng L, Liu D (2016) A security mechanism for cluster-based WSN against selective forwarding. Sensors 16:1537CrossRef
15.
go back to reference Umar IA, Hanapi ZM, Sali A, Zulkarnain ZA (2017) Trufix: a configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access 5:2550–2562CrossRef Umar IA, Hanapi ZM, Sali A, Zulkarnain ZA (2017) Trufix: a configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access 5:2550–2562CrossRef
16.
go back to reference Jiang J, Han G, Shu L, Chan S, Wang K (2015) A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans Ind Inf 13:342–350CrossRef Jiang J, Han G, Shu L, Chan S, Wang K (2015) A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans Ind Inf 13:342–350CrossRef
17.
go back to reference AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Hum Comput 1–11 AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Hum Comput 1–11
18.
go back to reference Liu H, Zhang Y, Yang T (2018) Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw 32:78–83CrossRef Liu H, Zhang Y, Yang T (2018) Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw 32:78–83CrossRef
19.
go back to reference Nguyen GN, Le Viet NH, Devaraj AFS, Gobi R, Shankar K (2020) Blockchain enabled energy efficient red deer algorithm based clustering protocol for pervasive wireless sensor networks. Sustain Comput Inf Syst 28:100464 Nguyen GN, Le Viet NH, Devaraj AFS, Gobi R, Shankar K (2020) Blockchain enabled energy efficient red deer algorithm based clustering protocol for pervasive wireless sensor networks. Sustain Comput Inf Syst 28:100464
20.
go back to reference Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21:772CrossRef Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21:772CrossRef
21.
go back to reference Kumar R et al (2019) A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7:64411–64430CrossRef Kumar R et al (2019) A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7:64411–64430CrossRef
22.
go back to reference Tariq N et al (2020) A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors 21:23CrossRef Tariq N et al (2020) A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors 21:23CrossRef
23.
go back to reference She W et al (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956CrossRef She W et al (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956CrossRef
24.
go back to reference Hammi MT, Bellot P, Serhrouchni A (2018) Bctrust: a decentralized authentication blockchain-based mechanism. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–6 Hammi MT, Bellot P, Serhrouchni A (2018) Bctrust: a decentralized authentication blockchain-based mechanism. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–6
26.
go back to reference Srivastava G, Crichigno J, Dhar S (2019) A light and secure healthcare blockchain for IoT medical devices. In: 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). IEEE, pp 1–5 Srivastava G, Crichigno J, Dhar S (2019) A light and secure healthcare blockchain for IoT medical devices. In: 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). IEEE, pp 1–5
27.
go back to reference Yánez W, Mahmud R, Bahsoon R, Zhang Y, Buyya R (2020) Data allocation mechanism for internet-of-things systems with blockchain. IEEE Internet Things J 7:3509–3522CrossRef Yánez W, Mahmud R, Bahsoon R, Zhang Y, Buyya R (2020) Data allocation mechanism for internet-of-things systems with blockchain. IEEE Internet Things J 7:3509–3522CrossRef
28.
go back to reference Namasudra S, Sharma P, Crespo RG, Shanmuganathan V (2022) Blockchain-based medical certificate generation and verification for IoT-based healthcare systems. IEEE Consum Electron Mag Namasudra S, Sharma P, Crespo RG, Shanmuganathan V (2022) Blockchain-based medical certificate generation and verification for IoT-based healthcare systems. IEEE Consum Electron Mag
29.
go back to reference Abdellatif AA et al (2020) sshealth: toward secure, blockchain-enabled healthcare systems. IEEE Netw 34:312–319CrossRef Abdellatif AA et al (2020) sshealth: toward secure, blockchain-enabled healthcare systems. IEEE Netw 34:312–319CrossRef
30.
go back to reference Jeet R, Kang SS, Safiul Hoque SM, Dugbakie BN (2022) Secure model for IoT healthcare system under encrypted blockchain framework. Secur Commun Netw 2022 Jeet R, Kang SS, Safiul Hoque SM, Dugbakie BN (2022) Secure model for IoT healthcare system under encrypted blockchain framework. Secur Commun Netw 2022
31.
go back to reference Dai H-N, Imran M, Haider N (2020) Blockchain-enabled internet of medical things to combat covid-19. IEEE Internet Things Mag 3:52–57CrossRef Dai H-N, Imran M, Haider N (2020) Blockchain-enabled internet of medical things to combat covid-19. IEEE Internet Things Mag 3:52–57CrossRef
32.
go back to reference Nimbalkar P, Kshirsagar D (2021) Analysis of rule-based classifiers for IDS in IoT. In: Data Science and Security. Springer, pp 461–467 Nimbalkar P, Kshirsagar D (2021) Analysis of rule-based classifiers for IDS in IoT. In: Data Science and Security. Springer, pp 461–467
33.
go back to reference Satheesbabu S, Gokulakrishnan P, Dhanalakshmi N (2021) The surveillance of intrusion detection systems and approaches. Inf Technol Ind 9:1135–1150 Satheesbabu S, Gokulakrishnan P, Dhanalakshmi N (2021) The surveillance of intrusion detection systems and approaches. Inf Technol Ind 9:1135–1150
34.
go back to reference Alevizos L, Ta VT, Hashem Eiza M (2021) Augmenting zero trust architecture to endpoints using blockchain: a state-of-the-art review. Secur Privacy e191 Alevizos L, Ta VT, Hashem Eiza M (2021) Augmenting zero trust architecture to endpoints using blockchain: a state-of-the-art review. Secur Privacy e191
35.
go back to reference Gu J, Lu S (2021) An effective intrusion detection approach using SVM with Naïve Bayes feature embedding. Comput Secur 103:102158CrossRef Gu J, Lu S (2021) An effective intrusion detection approach using SVM with Naïve Bayes feature embedding. Comput Secur 103:102158CrossRef
36.
go back to reference Li W, Meng W, Parra-Arnau J, Choo K-KR (2021) Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, pp 1–8 Li W, Meng W, Parra-Arnau J, Choo K-KR (2021) Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, pp 1–8
37.
go back to reference Marcus Y, Heilman E, Goldberg S (2018) Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol ePrint Arch 2018:236 Marcus Y, Heilman E, Goldberg S (2018) Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol ePrint Arch 2018:236
39.
go back to reference Xu X et al (2021) Concurrent practical byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans Internet Technol (TOIT) 21:1–17CrossRef Xu X et al (2021) Concurrent practical byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans Internet Technol (TOIT) 21:1–17CrossRef
40.
go back to reference Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14:2447–2459CrossRef Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14:2447–2459CrossRef
41.
go back to reference Zhang B et al (2023) A reputation mechanism based deep reinforcement learning and blockchain to suppress selfish node attack motivation in vehicular ad-hoc network. Futur Gener Comput Syst 139:17–28CrossRef Zhang B et al (2023) A reputation mechanism based deep reinforcement learning and blockchain to suppress selfish node attack motivation in vehicular ad-hoc network. Futur Gener Comput Syst 139:17–28CrossRef
42.
go back to reference Ji D, et al (2022) Smartphone-based electrochemical system for biosensors and biodetection. In: Biomedical Engineering Technologies. Springer, pp 493–514 Ji D, et al (2022) Smartphone-based electrochemical system for biosensors and biodetection. In: Biomedical Engineering Technologies. Springer, pp 493–514
44.
go back to reference Vahdati Z, Yasin S, Ghasempour A, Salehi M (2019) Comparison of ECC and RSA algorithms in IoT devices. J Theor Appl Inf Technol 97 Vahdati Z, Yasin S, Ghasempour A, Salehi M (2019) Comparison of ECC and RSA algorithms in IoT devices. J Theor Appl Inf Technol 97
45.
go back to reference Chen G, Branch J, Pflug M, Zhu L, Szymanski B (2015) Sense: a wireless sensor network simulator. In: Advances in Pervasive Computing and Networking. Springer, pp 249–267 Chen G, Branch J, Pflug M, Zhu L, Szymanski B (2015) Sense: a wireless sensor network simulator. In: Advances in Pervasive Computing and Networking. Springer, pp 249–267
46.
go back to reference Sharma P, Namasudra S, Crespo RG, Parra-Fuente J, Trivedi MC (2023) Ehdhe: enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain. Inf Sci 629:703–718CrossRef Sharma P, Namasudra S, Crespo RG, Parra-Fuente J, Trivedi MC (2023) Ehdhe: enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain. Inf Sci 629:703–718CrossRef
48.
go back to reference Wagner P et al (2020) Ptb-xl, a large publicly available electrocardiography dataset. Sci Dta 7:154 Wagner P et al (2020) Ptb-xl, a large publicly available electrocardiography dataset. Sci Dta 7:154
Metadata
Title
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network
Authors
Rati Bhan
Rajendra Pamula
Parvez Faruki
Jyoti Gajrani
Publication date
26-04-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 14/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05272-6

Other articles of this Issue 14/2023

The Journal of Supercomputing 14/2023 Go to the issue

Premium Partner