Skip to main content
Top
Published in: The Journal of Supercomputing 2/2024

18-08-2023

Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network

Authors: Divya Rani, Sachin Tripathi

Published in: The Journal of Supercomputing | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Health data collected from IoT devices can be utilised for predicting various medical information. The information collected is stored in centralised server and can be shared among various branches of the cooperative hospital network for analysis purposes. However, these communications are wireless which leads to various security threats like unauthorized access by intruders and misuse of health data. The existing work provides an authentication scheme that depends on trusted third party and centralised storage. This increases the computational burden and latency at the centralised server and may lead to a single-point failure. To solve this issue, a Blockchain-based authentication and key agreement scheme is proposed for sharing health data. The proposed scheme incorporates the concept of Blockchain that makes the system distributed, immutable, and transparent. An Elliptic Curve Cryptography based authentication scheme is proposed where all the information is stored in the Blockchain. In addition, a secret key is established to provide secure communication among patients, Hospital servers, and IoT devices. Hyperledger Fabric platform is used for Blockchain implementation that supports channel communication. There is a formal analysis using the ROR model that proves the security of the session key. The formal simulation using the Scyther tool shows that there is no attack within bound. Moreover, the informal analysis proves that the proposed work is resistant to various attacks and satisfies the security goals. The comparative study demonstrates that the proposed work is more effective as compared to others. The proposed work involves implementing a system of cooperative hospital servers that communicate through a shared channel. Hospital servers belonging to the same channel will be able to communicate securely and privately. This setup also facilitates the efficient transfer of health data among various hospital servers, eliminating the need for redundant computations during registration and authentication processes on each server. Additionally, the use of Blockchain reduces dependency on third party, makes the system distributed, provides immutable storage and increases confidentiality among members by using channel communication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier
2.
go back to reference Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963CrossRef Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963CrossRef
3.
go back to reference Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554CrossRef Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554CrossRef
4.
go back to reference Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
5.
go back to reference Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301CrossRef Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301CrossRef
6.
go back to reference Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554CrossRef Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554CrossRef
7.
go back to reference Cheng X, Chen F, Xie D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer Cheng X, Chen F, Xie D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer
8.
go back to reference Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9CrossRef Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9CrossRef
9.
go back to reference Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689CrossRef Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689CrossRef
10.
go back to reference Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49CrossRef Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49CrossRef
11.
go back to reference Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449CrossRef Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449CrossRef
12.
go back to reference Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410CrossRef Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410CrossRef
13.
go back to reference He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef
14.
go back to reference Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750CrossRef Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750CrossRef
15.
go back to reference Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401CrossRef Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401CrossRef
16.
go back to reference Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473CrossRef Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473CrossRef
17.
go back to reference Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3) Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3)
18.
go back to reference Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef
19.
go back to reference Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490CrossRef Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490CrossRef
20.
go back to reference Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075CrossRef Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075CrossRef
21.
go back to reference Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273CrossRef Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273CrossRef
22.
go back to reference Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656CrossRef Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656CrossRef
23.
go back to reference Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204 Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204
24.
go back to reference Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397CrossRef Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397CrossRef
25.
go back to reference Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151CrossRef Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151CrossRef
26.
go back to reference Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434CrossRef Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434CrossRef
27.
go back to reference Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926CrossRef Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926CrossRef
28.
go back to reference Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE
29.
go back to reference Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753CrossRef Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753CrossRef
30.
go back to reference Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press
31.
go back to reference Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761 Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761
32.
go back to reference Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.” Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.”
33.
go back to reference Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916CrossRef Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916CrossRef
34.
go back to reference Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689CrossRef Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689CrossRef
35.
go back to reference Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021CrossRef Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021CrossRef
36.
go back to reference Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019 Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019
37.
go back to reference Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370CrossRef Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370CrossRef
38.
go back to reference Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32 Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
39.
go back to reference Xiang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783CrossRef Xiang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783CrossRef
40.
go back to reference Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510CrossRef Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510CrossRef
Metadata
Title
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network
Authors
Divya Rani
Sachin Tripathi
Publication date
18-08-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 2/2024
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05577-6

Other articles of this Issue 2/2024

The Journal of Supercomputing 2/2024 Go to the issue

Premium Partner