1. Introduction
Being an important part of electronic information technology, the EMR is a general methodical way to store the patients’ information and biomedical images in the hospitals. The Information, related to a particular patient, is kept in the records of the hospitals. Hence, a complex effort is required to create a complete summary of each patient’s records and make it available in the hospital since it involves great level of security and privacy issues. In the interim, the present EMR systems require a regular sharing policy in managing the data, which, otherwise can create complex problems for the scientists in the fields of pharmaceutical and mediate supported with the accurate medication data collected from applications [1].
The EMR, within the e-health system, generally, provide common information such as personal information about a patient, biomedical images, Physician details, and treatment history, as it is composed of the entity's medical data preparation. There is a necessity for the EMR to develop fool-proof methods of transferring information to several places.
The authors show that almost twelve million patients’ blood tests records, obtained through Quest Diagnostics as hacked, and the major data stolen ever [2]. In fact, the e-health structure have more of data breaches than the erstwhile sectors and more than 95% of the agencies, included in the survey, suffered from the attacks of networks. The electronic records, thus, stolen were sold in black market as they are 10 fold expensive in the open networks, when compared to the credit card records [3]. Since the e-health systems suffer from huge threat, there is a need for an intelligent and viable strategy to analyse, fabricate, and frame a secured and well maintained system of storage facility of the records, related to the patients, along with the assurance of preserving the privacy of the individuals.
So, the author suggests viable methods to solve the issues of security and reliability in multiple watermarking by using Discrete Wavelet Transform (DWT) along with Singular Value Decomposition (SVD) for healthcare images. Their digital healthcare image watermarking scheme has been produced with higher quality watermarked images and the extraction watermarks have good perceptions as described in [4].
The revealed challenges will be solved with the Blockchain technology presented in [5]. This technology has become extraordinarily popular, in the present time, as it specifies a series of blocks filled with the details of a particular person or concept. This technology, originated in 1991, has been incorporated in time stamps digitized records. It is insufferable and never gets corrupt like a notary. However, it has been initially presented by Satoshi Nakamoto in 2008 [6] to make digital e-currency. The Blockchain could be an open system of ledger which everyone can have access [7]. Once the block is formed, the records can never be altered or erased as the result of each and every transaction can be confirmed by the entire members.
Jesse et al. [8] concludes that the applications of Blockchain have specialized more than 80% of the research articles in Bitcoin method and the remaining 20% arrangements have different applications like, e-health, law-enforcement, smart contracts, on-line music and voting system. This is necessary to know about the current applications enlarged with the technology. It is necessary to recognize the different applications, since it will be easy to appreciate erstwhile guidelines and traditions to use the Blockchain technology. The Blockchain technology increases its holds on security and privacy considerations, currently, because it presents a novel thought of sharing the records [9]. When the Blockchain’s latent are used within the healthcare model, it can really evaluate these limitations. Thus, the planned-effort explores how this technology is useful for an e-health model. Thakur et al. [10] present a novel watermarking technique utilizing the transform domains for e-health systems. For superior privacy, the authors apply the chaos supported watermarking encryption algorithm for the images used with a fewer complex methods. The results of the investigation show the present method as being greatly robust with adequate security against different forms of attacks exclusive of any major distortions among the original and watermarked image.
1.1 Problem definition.
. Many researchers could have studied and proposed the Blockchain technology as suitable for resolving the cryptocurrency application problems. However, it is essential to discover the erstwhile applications based on Blockchain technology. Thus, this technology, considered to be safe to the e-health model, is implemented.
. The methodology for the construction of the each block, within the Blockchain technology, is similar. But, the needs of e-health models, measured and planned by the methodology for the formation of the each block, are formed dissimilar and applied through single and various multiple image watermarking techniques.
. Generally, the EMRs are swapped, from one area to the needed area, via unsecured open-networks. In such cases, it may create a risk and the results indicate undesirable results. Considering this reality, the EMRs are employed in planned Blockchain technology with multiple image watermarking techniques. It is essential to avoid various problems such as, transparency, higher security and maintenance of the privacy of the patients.
. Although researchers have studied the e-healthcare systems based on Blockchain technology, their works may not have included in different disciplinaries [11]..
The Blockchain execution principle is shown in Fig. 1.
Fig. 1. Outline of Blockchain implementation principle
2. Related Works
In several types of businesses, a novel model is employed that enables quicker, more professional and extremely protected business with consumer dealings. People employed in healthcare system expect similar distributed database technologies, which adopt this new method to preserve the related results inside the business. The formation of portable, secured, confidential information need to have a higher level of fidelity and integrity and must be confidential over the healthcare system continuum [12]. The authors proposed a new and decentralized data managing scheme to hold the e-healthcare system, via Blockchain technology. Their method provides the patients a complete, unalterable log with simple access to their record over the suppliers and healing locations [13].
Yue et al. [14] discuss centrical access method to ensure the patients in managing the health record by themselves. Being easy and united, the indicator – centrical scheme – can help arrange all types of personal healthcare records practically and simply. Their method, besides printing the Secure Multi-Party Computing (MPC), is helpful in allowing the untrusted third-party to perform computation across patient records, exclusively, by violating the privacy rules.
This technology’s various benefits and important features are discussed in [15]. This technology, even now developing with major scope for various industries and field, is going to modify the globe. However, it isn't liberated from the difficulties; a little of them have been highlighted. While the technology is at the back of Bitcoin, its employability is not restricted only to the economic area. In 2016, Blockchain was introduced as the major modern technology in the trade industry than in any former industry. In 2017, Blockchain became the governing excitement expression for the trade industry.
Deepayan and Tian [16] present new watermarking supported multimedia Blockchain based framework which can concentrate on several problems. The sole watermark symbol has two parts of data - the cryptographic hash contains the operation histories and the image hash conserves the retrievable cover-media. Once the watermark symbol is extracted, the initial part of the watermark symbol can be approved by a distributed ledger to regain the past transaction check and the final part can be utilized to recognize the tampered or edited sections.
Alevtina et al. [17] propose the perspectives for Blockchain supported electronic health records administration, in exacting the Electronic Medical Records distribution among the healthcare contributors with research studies. This agenda assists in managing and distributing the Electronic Medical Records for the cancer patients’ history. Their works make easy the revolving time for the Electronic Medical Records, furthermore, to develop the decision creation for the healthcare professionals so as to decrease the general expenditure.
Ananth et al. [12] present a secured healthcare system based on private blockchain technology. The distributed ledger blocks, from various schemes like, primary care, multidisciplinary approach and cross-disciplinary referral utilizing dissimilar watermarking methods and its protocols, are found important to apply the Blockchain technology in healthcare model. The presentation of their method achieves the imperceptibility and also the robust values of every block of the distributed ledger which can be measured. However, the author has covered the partial disciplinaries of team healthcare models. Hongyu Li et al. [18] implemented a model of the DPS which is supported on the real world blockchain-based platform Ethereum. The performance assessment grades show the fact that their proposed systems are effective and efficient.
HaoWang et al. [19] proposed Electronic Health Record (EHR) system which is supported by attribute-based cryptosystem with Blockchain technology. Their system- Attribute Based Encryption (ABE) along with the Identity Based Encryption (IBE) - helps in encrypting the healthcare data and the Identity Based Signature (IBS) helps in implementing the digital signatures. In accretion, the Blockchain technology ensures the honesty and traceability of healthcare data.
3. Material and Models
3.1 Digital Image Watermarking Technique
The watermarking technique presents authentication and copyright production of digital images. It has been divided into two types [20],
Single watermarking: The only one watermark image which can be inserted into the novel image.
Multiple watermarking: It is an extension of single watermarking. Being greater than the single watermark image, it can be inserted into the novel image.
3.2 The Hash Algorithm
Every block has a unique ID like a finger-print. The unique ID is generated on the basis of the data using the hash-algorithm. A hash-algorithm is a kind of mathematical function which turns the data into a fingerprint of the data known as hash. It’s like a formula which takes the input of the data and turns it into an output of a fixed length data, which stands for the fingerprint of the data.
Always, a hash-algorithm gives the same hash for the same input data. Fascinatingly, if even one character, within the input data, is altered, the output hash value will be changed. In addition, a hash-algorithm is a one-way function; hence it is not possible to generate back the input data from its hash value. Therefore, we can go from the input data towards the hash, but not from the hash towards the input data [21]. The NIST (National Institute of Standards and Technology) recommended cryptographic-secured hash algorithm (SHA – 256) has been used to secure the proposed system. [22].
3.3 Blockchain Technology
This technology gives an immutable, transparent, and shared record of the entire connections to make the applications accountable, transparent and also trustful. It presents an exclusive opportunity to expand the trustable, secured record supervision and the sharing method [23].
The Blockchain technology has 3 types as mentioned below [24].
Private: It permits merely particular persons in the group to confirm and insert the business blocks, although each individual of the group can usually approve the vision.
Consortium: It permits merely a group of societies which can confirm and insert transaction blocks, although the ledger can be open or accessible only to certain groups.
Public: It perceives every person on the open-network and any person can confirm and insert a transaction block to the Blockchain.
For the above three types, the consortium Blockchain technology excitements are appropriate in the proposed method. Thus, we can utilize the consortium Blockchain technology.
3.4 Team Healthcare Models: Disciplinaries
Alexander [25] presented five different disciplinaries in healthcare as shown in Fig. 2:
Fig. 2. Types of Disciplinaries
1. Intradisciplinary: dealing with the concept found in a homogeneous frame.
2. Crossdisciplinary: approaching a totally different field with the notions of another field.
3. Multidisciplinary: it is a mixture of many disciplinaries in which many work to gain the knowledge required for them.
4. Interdisciplinary: using the approach common to many disciplinaries and draw the necessary knowledge.
5. Transdisciplinary: crossing the borders of a particular field and integrating all the concepts and knowledge related to the base concept.
The difference between inter-disciplinary and multi-disciplinary care: the interdisciplinary care involves the panel members from dissimilar disciplines functioning collaboratively, with a general reason, to set the goals, create assessments, divide the resources and the responsibilities. Whereas, the multidisciplinary care engages the panel members functioning independently to make the discipline follow the specific-care procedure that are executed concurrently, although without explicit regard to their communication discussed in [26]. Nandiwada et al. [27] discussed the transdisciplinary healthcare which is vital among the underserved populations since these patients not only carry the major burden of chronic disease or infection, but also subject to economic, environmental and social determinants of health that contribute to make worse the results than in other groups.
4. The Proposed Method
The proposed method has a grouping of watermarking as well as Blockchain technology, initially; the single or multiple watermarks are embedded into EMR and, finally, store the embedded EMR in the distributed ledger using the blockchain technology.
The embedding process develops the quality of the embedded- image along with more robustness of the extracted watermark symbols utilizing the DWT and the SVD. The novel image and the containing the Patient’s information and the watermark image containing the Doctor’s information, as mentioned in the block diagram of the embedding method, are represented in Fig. 3. All the team healthcare models are examined below:
Fig. 3. The embedding process diagram
4.1 Structure of the Proposed Block
The structure of the proposed block has three parts as seen in Fig. 4. It includes the header, body and footer.
Fig. 4. Structure of the proposed block
The header of the block has two components: Hash value of the present block and the Block Id.
The body of the block has four components: The identity of the block owner (Patient); the Identity of block generator (Doctor); and the embedded information (watermarked information) and its keywords.
The footer of the block has three components: Date and Time-stamp (generation date and time of the block), Size of the Block in addition to the hash value of the previous block.
4.2 Intradisciplinary Care
The preparation of the abilities and scope of instruction, which classify the primary-care of single discipline physician, contains the factors like the elementary examination, the treatment of fundamental diseases along with the medical condition. Diagnostic procedures help interview the patients to collect information regarding the current symptoms, prior medical history and erstwhile healthcare information, which may be followed by a physical assessment. Fig. 5 displays the creation of block 1 (genesis block) as Intradisciplinary care:
Fig. 5. Creation of genesis block as Intradisciplinary care
Algorithm - Intradisciplinary block
Input: User Instructions
Output: Encrypted Intradisciplinary block
1. if the user confirms the conservation then
2. P(i,j) ← Identity of the block owner (Patient)
3. Q(i,j) ← Identity of the block generator (Doctor)
4. Embedded Image ← S(i,j) ← P(i,j) + α × Q(i,j)
5. Tw ← Block’s Keywords
6. PubKey ← generate the public key
7. Stores the file in the block
8. else
9. deletes the temporary storage of data conservation
10. end if
11. Stores the size of the block
12. Stores the date and time-stamps
13. Stores the hash value of the current block
4.3 Interdisciplinary Care
An inter-disciplinary care engages the panel members from dissimilar disciplines functioning collaboratively, through a common principle, to set the targets, create assessments and share the resources and the tasks. A panel of physicians, from dissimilar disciplines, jointly with the patient, develops a care plan, diagnoses, undertakes assessment, sets the goal and intervenes. Every one of the health-care physicians, who belongs to different disciplines, can suggest particular treatment procedure to the patient. Fig. 6 exhibits the creation of block 2 as Interdisciplinary care:
Fig. 6. Creation of block 2 as Interdisciplinary care
Algorithm - Interdisciplinary block
Input: User Instructions
Output: Encrypted Interdisciplinary block
Initialization: Hash value of the previous block and the Id of the block
1. if the user confirms the conservation then
2. P(i,j) ← Identity of the block owner (Patient)
3. Q1(i,j) ← Identity of the block generator (Doctor 1)
4. Q2(i,j) ← Identity of the block generator (Doctor 2)
5. Q(i,j) ← Q1(i,j) + Q2(i,j)
6. Embedded Image ← S(i,j) ← P(i,j) + α × Q(i,j)
7. Tw ← Block’s Keywords
8. PubKey ← generate the public key
9. Stores the file in the block
10.else
11. deletes the temporary storage of data conservation
12. end if
13. Stores the size of the block
14. Stores the date and time-stamps
15. Stores the hash value of the current block
4.4 Crossdisciplinary Care
In electronic healthcare model, a recommendation, effected for the transfer of care for a patient from one hospital or physician to another is necessary. The main objective is to develop and modernize the communication with basic-care physicians, specialists and any erstwhile health providers concerned with a patient's care. Fig. 7 shows the formation of block 3 as a cross-disciplinary care. The embedding steps are observed, rolled back and reapplied with the DWT. It permits the system to find out the order in which the physician’s information is inserted. In this scenario, the EMR, when recommended, may be embedding the information equally between the physician and the patient. Lest, one more recommendation can occur, and on each occasion, the corresponding physician’s information can be embedded.
Fig. 7. Creation of block 3 as Crossdisciplinary care
Algorithm - Crossdisciplinary block
Input: User Instructions
Output: Encrypted Crossdisciplinary block
Initialization: Hash value of the previous block and the Id of the block
1. if the user confirms the conservation then
2. P(i,j) ← Identity of the block owner (Patient)
3. Q1(i,j) ← Identity of the block generator (Doctor 1)
4. Q2(i,j) ← Identity of the block generator (Doctor 2)
5. S1(i,j) ← P(i,j) + α × Q1(i,j)
6. Embedded Image ← S2(i,j)← S1(i,j) + α × Q2(i,j)
7. Tw ← Block’s Keywords
8. PubKey ← generate the public key
9. Stores the file in the block
10. else
11. deletes the temporary storage of data conservation
12. end if
13. Stores the size of the block
14. Stores the date and time-stamps
15. Stores the hash value of the current block
4.5 Multidisciplinary Care
Multi-disciplinary care is an integrated team-heed extended to a patient. The team members, working independently on discipline-specific care procedure, can execute simultaneously, but with no explicit regard to their communication. This strategy coordinates their treatments and obtains the group functioning jointly to achieve a particular set of objectives. Fig. 8 shows the formation of block 4 as a multi-disciplinary care.
Algorithm - Multidisciplinary block
Input: User Instructions
Output: Encrypted Multidisciplinary block
Initialization: Hash value of the previous block and the Id of the block
1. if the user confirms the conservation then
2. P(i,j) ← Identity of the block owner (Patient)
3. Q1(i,j) ← Identity of the block generator (Doctor 1)
4. Q2(i,j) ← Identity of the block generator (Doctor 2)
5. Sliced_A-Image and Sliced_B-Image ←Sliced into two parts←P(i,j)
6. S1(i,j)← Sliced_A-Image + α × Q1(i,j)
7. S2(i,j)←Sliced_B-Image + α × Q2(i,j)
8. Embedded Image ← S2(i,j) + S1(i,j))
9. Tw ←Block’s Keywords
10. PubKey ← generate the public key
11. Stores the file in the block
12.else
13. deletes the temporary storage of data conservation
14. end if
15. Stores the size of the block
16. Stores the date and time-stamps
17. Stores the hash value of the current block
Fig. 8. Creation of block 4 as multidisciplinary care
4.6 Transdisciplinary Care
Transdisciplinary healthcare is engaged on the spaces among the disciplines to generate optimistic healthcare results during teamwork. This representation of care efficiently integrates the clinicians like, physicians, physician assistants, nurses, physical therapists, community health workers, complementary and alternative medicine practitioners and other healthcare providers to make a team that gives comprehensive precautionary primary healthcare. Fig. 9 shows the formation of block 5 as a transdisciplinary care.
Algorithm - Transdisciplinary block
Input: User Instructions
Output: Encrypted Transdisciplinary block
Initialization: Hash value of the previous block and the Id of the block
1. if the user confirms the conservation then
2. P(i,j) ← Identity of the block owner (Patient)
3. Q1(i,j) ← Identity of the block generator (Doctor)
4. Q2(i,j) ← Identity of the block generator (Nurse)
5. Embedded Image ← S(i,j)← P(i,j) + α × Q1(i,j) + β × Q2(i,j))
6. Tw ← Block’s Keywords
7. PubKey ← generate the public key
8. Stores the file in the block
9. else
10. deletes the temporary storage of data conservation
11. end if
12. Stores the size of the block
13. Stores the date and time-stamps
14. Stores the hash value of the current block
Fig. 9. Creation of block 5 as trans-disciplinary care
4.7 Healthcare Model utilizing Blockchain Technology
In the proposed healthcare model, using the Secure Hash Algorithm (SHA-256), every encrypted image has 64 characters with unique hash value. Fig. 10 shows the summary of electronic healthcare model utilizing the Blockchain technology. It has five different types of blocks; each block has separate own hash value and the hash value of the prior block. Consequently, block 5 is pointed towards the block 4 and the block 4 is pointed towards the block 3 and all the remaining blocks are pointed in this order. The opening block is an unusual one; this block cannot be pointed towards the prior block as it is the opening block. Thus, the opening block is called genesis block.
Fig. 10. Summary of Healthcare model utilizing Blockchain technology
5. Results and Discussion
The presentation of the different scenarios within the e-healthcare model utilizing the watermarking, hash algorithm, Blockchain technology, and several trials, are presented with the original images of dimension 512×512 and the watermarks dimension 48×48, used as two dissimilar physician’s information (watermark) images, are shown in Fig. 11.
Fig. 11. Original and watermark images
5.1 Performance analysis
In this section, we discuss the security and efficiency of the proposed system.
5.1.1 Performance analysis of watermarking techniques
The advent of communication and information technology boosts the potential of digital information. At the same time, these benefits introduce parallel risks to unauthorized users. To overcome this problem, digital watermarking is a useful technique for preventing the misuse of an image and protecting the copyright of digital information. The embedding process is carried out for tetra-furcating the watermark and gets embedded into the subbands of the original image.
The image quality of every watermarked image can be calculated by finding the Peak Signal to Noise Ratio (PSNR) values of five different blocks and the patient’s particulars. The PSNR assessment of ratio, among the signal and the noise and the articulation, in decibels, are given below:
\(P S N R(d B)=10 \log _{10} \frac{255^{2}}{M S E}\) (1)
Where,
MSE = Mean square error
Normalized Correlation (NC) finds the worth of the watermark after recovery. It is a difference between the inserted watermark W (i, j) and the recovered watermark W’ (i, j) as given by
\(N C=\frac{\sum_{i=1}^{H} \sum_{j=1}^{L} W(i, j) \times W^{\prime}(i, j)}{\sum_{i=1}^{H} \sum_{j=1}^{L}[W(i, j)]^{2}}\) (2)
Table 1 and Table 2 demonstrate the point that the PSNR and NC values of different disciplinaries (without attacks).
Table 1. PSNR values on various disciplinaries (Without Attacks)
Table 2. NC values of Extracted Physician Informations on various disciplinaries (Without Attacks)
The performance of the watermarking technique achieved only after withstanding a variety of attacks. Table 3 and Table 4 show the values of PSNR and NC about various disciplinaries for patient image and biomedical image against the attacks. To confirm the robustness, the watermarked image is tested with particular attacks. The watermarked images are corrupted with speckle noise variance of 0.005. The median filtering intensity value is 0.03 and it is used to decrease noise in the image. The cropping attack on the small portion of the embedded image can be cut or removed. The rotation can be tested by rotating 60 degrees direction of the image. The compression attack and the embedded images are compressed by quality factor 20.
Table 3. PSNR values on various disciplinaries (With Attacks)
Table 4. NC values of Extracted Physician Informations on various disciplinaries (With Attacks)
The performance analysis of the PSNR and the NC values are found only after the first layer protection of the watermarking encryption is employed.
The imperceptibility of encrypted image quality is indicated with the PSNR values. The robustness of extracted watermark quality is indicated with the NC values. After applying various attacks, simulation result demonstrates that the proposed watermarking techniques have good imperceptibility on the encrypted image and good robustness on the extracted watermark.
5.2 Security Analysis of the Proposed System
The proposed system has three layers of protection based on watermarking techniques, secure hash algorithm and Blockchain technology. The uses of the proposed watermarking techniques are secured as discussed earlier. However, the image encryption with the addition of the secure hash algorithm (SHA – 256) is more secured. The hash value contains hexadecimal representation (0-9, a-f) and the hash value is like a figure print that each and every encrypted images has a unique hash value. A hash is not ‘encryption’ – it cannot be decrypted back to the original text (it is a ‘one-way’ cryptographic function having a fixed size for any size of source data).
Assume that an attacker can tamper or steal any information before the blockchain created from the communication network between the image encryption and the mining process at any time. An attacker can change even a single bit, in such a situation the hash value of the transaction also gets changed. The minors confirm each transaction with the hash value, in the mining process, and it can be identified by the miners. The proposed system, in this section, before the blockchain is created, provides an authoritative platform, for confirming the integrity of encrypted image combined with the hash value, which can effectively resolve the tampering attacks on the encrypted images.
We can check the similarity of the compared hash values of the images in the following algorithm,
Algorithm – Similarity measure of hash values of the images
Input: User Instructions
Output: Similarity checks whether same image or not
Initialization: Calling hashfile( ) function to obtain hashes of the images
1. Read the image – 1
2. Read the image – 2
3. f1_hash = hashfile (image – 1)
4. f2_hash = hashfile (image – 2)
5. if f1_hash == f2_hash then
6. print ("Both files are same")
7. print (f"Hash: {f1_hash}")
8. else
9. print ("Files are different!")
10. print (f"Hash of File 1: {f1_hash}")
11. print (f"Hash of File 2: {f2_hash}")
12. end if
The uses of the proposed watermarking techniques and secure-hash algorithm are more secured. However, the image encryption and the secure hash algorithm with the addition of Blockchain technology are the most secured.
Every block is tied with the chain (hash value) of the previous block and the next block as shown in Fig. 10. No attacker can tamper or steal any information after the blockchain is created from the distributed ledger of the decentralized networks at any time.
When facing such an attacker, if some modification happens in any block, it will craft all the subsequent blocks as invalid, because it no longer has the ability to store the suitable hash value of the prior block. Therefore, it is not possible to modify any of the block in the distributed ledger on the Blockchain technology. The five color test images are used to verify the tamper detection ability of the proposed system. Assume that each encrypted image has been tampered with varying degrees, during the transmission (the number of pixels being changed is 1, 25, 50 and 100 respectively), the minor extracts the 256-bit hash code in the transaction and compares it with the 256-bit hash code of the received encrypted image to determine whether the encrypted image has been tampered with during the transmission. The test results confirm that the proposed system can successfully detect the illegal tampering encountered when the encrypted images are transmitted on untrusted channels.
If a user desires to access the information effectively, the user should meet the access control protocol and decrypt the information. In our scenario, we presume that the user never exposes his identity credential to others and so the key cannot be recovered by the attacker. We assume that X is a user, Y is a distributed ledger, Z is an attacker and A is an authentication node. K is defined as a public-private key, Eka−1 (m ) is defined as a watermark, Eka(m) is an image, encrypted by Ka. Z(X), indicates the Z is disguised as X to send a message.
Attacks on security protocols.
Scenario – 1:
\(Z \rightarrow Y: E_{\left(K_{z}^{(-1)}\right)}\left(E_{K_{y}}\left(N_{x}, Z\right)\right)\); (3)
If the attacker, without identity credential, tries to access the ledger, he cannot see the watermark collection and encrypted summary. It is of no benefit to the attacker.
Scenario – 2:
\(X \rightarrow Z(Y): E_{\left(K_{x}^{(-1)}\right)}\left(E_{K_{y}}\left(N_{x}, X\right)\right)\); (4)
\(Z(X) \rightarrow Y: E_{\left(K_{x}^{(-1)}\right)}\left(E_{K_{y}}\left(N_{x}, X\right)\right)\); (5)
\(Y \rightarrow Z(X): E_{\left(K_{y}^{(-1)}\right)}\left(E_{K_{x}}(M)\right)\) ; (6)
We permit the attackers to interrupt the messages sent by the users and execute reply attacks. And we suppose that Z can successfully deceive Y, which leads Y to regard Z as X. Also, they can query the information on the Blockchain. But, as an outcome, they can only get a piece of encrypted information without using the decryption method.
\(X \rightarrow Z(A): X, Y, N_{x}\); (7)
\(Z(X) \rightarrow A: X, Z, N_{x}\); (8)
\(A \rightarrow Z(X): A, E_{\left(K_{A}^{(-1)}\right)}\left(A, X, N_{x}, Z, K_{z}\right)\); (9)
\(Z(A) \rightarrow X: A, E_{\left(K_{A}^{(-1)}\right)}\left(A, X, N_{x}, Z, K_{z}\right)\); (10)
It is presumed that the public key of Y is Ky, and the public key of the attacker Z is Kz. And the attacker needs the user X to believe that the public key of Y is Kz, hence, the binding attack is executed. Though the returned information contains the Z identity information, the X can find the target as inconsistent and avoid the binding attacks.
Scenario – 3:
\(X \rightarrow Z(Y): E_{\left(K_{x}^{(-1)}\right)}\left(E_{K_{y}}\left(N_{x}, X\right)\right)\); (11)
\(Z \rightarrow Y: E_{\left(K_{x}^{(-1)}\right)}\left(E_{K_{y}}\left(N_{x}, X\right)\right)\); (12)
\(Y \rightarrow Z(X): E_{\left(K_{y}^{(-1)}\right)}\left(E_{K_{x}}(M)\right)\); (13)
\(Z(Y) \rightarrow X: E_{\left(K_{z}^{(-1)}\right)}\left(E_{K_{x}}\left(M^{\prime}\right)\right)\); (14)
Even if the attacker wants to send false information to the patient, it can be judged as false information due to the absence of authentication information of the distributed ledger.
Analyzing the overall security of the proposed system, we can start with two parts.
The X is a user, Y is a distributed ledger, K is defined as the public-private key and m is defined as a watermark.
Authentication stage:
\(\frac{Y \text { Received } m_{1} \text { SignedWith } K_{x}^{-1}, x \text { in } m_{1}, Y \text { IsTrustedOn } K_{x}}{Y \text { Can Prove }(X \text { Says } x)}\) (15)
Reception stage:
\(\frac{X \text { Received } m_{2} \text { SignedWith } K_{y}^{-1}, X \text { CanProve(K Authenicates Y) }}{X \text { Can Prove }(Y \text { Says } m_{2})}\) (16)
Table 5 indicates that the proposed system as resisting the tamper detection, identity disguise, reply attack and binding attack.
Table 5. List of system resistance attack
A successful Blockchain technology result wants to be sustainable. The presented scheme exploits a consortium Blockchain, constructed by the distributed ledger for backend functions of different disciplinaries, for instance the maintenance a ledger of embedded data with the storing of the authorized records.
The first and foremost, it approves the authorization of the EMR vision. Second, there is no gas expenses attached with consortium Blockchain as they employ predefined verified nodes. Through this method, every time, a stored EMR can be read or updated, as it is cost free. Third, it permits the stand to verify the communication at higher speeds.
5.3 Comparison with Related Works
This part evaluates the proposed system with the existing system.
Table 6 evaluates the properties of the present model with the Blockchain supported methods Fan [1], Yue [14], Ananth [11] and Wang [19], and non-Blockchain based method Thakur [10]. The table contains the proposed method to achieve and cover all the properties in e-health system.
Table 6. Comparison with existing works
6. Conclusion
The challenges of sharing the EMR within the e-healthcare domain are important. Mere sharing of the information or records is not adequate. The important role of this method enables the medical records immutable, keeps them protected and shares them inside a decentralized network using the consortium Blockchain technology. The proposed build blocks are distinct and the higher ranking team healthcare models and their protocols have the necessity to apply this novel technology in the electronic healthcare system. In this work, we have discussed all the possibilities of working in the healthcare system such as, intradisciplinary, interdisciplinary, crossdisciplinary, multidisciplinary and transdisciplinary. Ultimately, we evaluated the performance of imperceptibility values on all the blocks of the distributed ledger.
References
- K. Fan, S. Wang, Y. Ren, H. Li, and Y. Yang, "MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain," J. Med. Syst., vol. 42, no. 8, Art. no. 136, Jun. 2018.
- Erin Elizabeth, "Electronic medical records fail again, as 12 million patient records at Quest Diagnostics get hacked," Jun. 07, 2019. [Online] Available: https://www.healthnutnews.com/major-data-breach-shows-dangers-of-online-records-storage/ (accessed Jul. 10, 2019).
- "Medicalchain-Whitepaper-EN.pdf" Accessed: Sep. 05, 2018. [Online]. Available: https://medicalchain.com/Medicalchain-Whitepaper-EN.pdf.
- Mohananthini N and Yamuna G, "A Study of DWT-SVD based Multiple Watermarking Scheme for Medical Images," Int. J. Network Security, vol. 17, no. 5, pp. 558-568, Jan. 2015.
- Y. Ji, J. Zhang, J. Ma, C. Yang, and X. Yao, "BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems," J. Med. Syst., vol. 42, no. 8, Jun. 2018, Art. no. 147.
- "Bitcoin: A Peer-to-Peer Electronic Cash System" [Online] Available: https://bitcoin.org/en/bitcoin-paper (accessed Sep. 05, 2018).
- "Blockchain Tutorial - A Beginner's Guide to Blockchain Technology | Edureka," Edureka Blog, Sep. 06, 2017. [Online] Available: https://www.edureka.co/blog/blockchain-tutorial/ (accessed Sep. 05, 2018).
- Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander, "Where Is Current Research on Blockchain Technology?-A Systematic Review," PLoS ONE, vol. 11, no. 10, 2016.
- "Blockchain Technology in Health Care: Decoding the Hype," NEJM Catalyst, Feb. 09, 2017. [Online] Available: https://catalyst.nejm.org/decoding-blockchain-technology-health/ (accessed Sep. 05, 2018).
- S. Thakur, A. K. Singh, S. P. Ghrera, and M. Elhoseny, "Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications," Multimed. Tools Appl., vol. 78, pp. 3457-3470, 2019. https://doi.org/10.1007/s11042-018-6263-3
- C. Ananth, M. Karthikeyan, and N. Mohananthini, "A secured healthcare system using private blockchain technology," J. Eng. Technol., vol. 6, no. 2, pp. 42-54, July 2018.
- A. Zhang and X. Lin, "Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain," J. Med. Syst., vol. 42, no. 8, Jun. 2018, Art. no. 140.
- A. Ekblaw, A. Azaria, J. D. Halamka, and A. Lippman, "A Case Study for Blockchain in Healthcare: "MedRec" prototype for electronic health records and medical research data" [Online] Available: https://www.healthit.gov/sites/default/files/5-56-onc_blockchainchallenge_mitwhitepaper.pdf (accessed Sep. 05, 2018).
- X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, "Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control," J. Med. Syst., vol. 40, no. 10, Aug. 2016, Art. no. 218.
- Brodersen, "Blockchain: Securing a New Health Interoperability Experience," 2016. [Online] Available: https://www.healthit.gov/sites/default/files/2-49-accenture_onc_blockchain_challenge_response_august8_final.pdf (accessed Sep. 05, 2018).
- D. Bhowmik and T. Feng, "The multimedia blockchain: A distributed and tamper-proof media transaction framework," in Proc. of 2017 22nd International Conference on Digital Signal Processing (DSP), pp. 1-5, Aug. 2017.
- A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, "Secure and Trustable Electronic Medical Records Sharing using Blockchain," AMIA. Annu. Symp. Proc., vol. 2017, pp. 650-659, Apr. 2018.
- H. Li, L. Zhu, M. Shen, F. Gao, X. Tao, and S. Liu, "Blockchain-Based Data Preservation System for Medical Data," J. Med. Syst., vol. 42, no. 8, Art. no. 141, Jun. 2018.
- H. Wang and Y. Song, "Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain," J. Med. Syst., vol. 42, no. 8, Jul. 2018, Art. no. 152.
- M. Natarajan and Y. Govindarajan, "Performance Comparison of single and multiple watermarking techniques," Int. J. Comput. Netw. Inf. Secur., vol. 6, no. 7, pp. 28-34, Jun. 2014. https://doi.org/10.5815/ijcnis.2014.07.04
- A. L. Selvakumar and C. S. Ganadhas, "The Evaluation Report of SHA-256 Crypt Analysis Hash Function," in Proc. of 2009 International Conference on Communication Software and Networks, pp. 588-592, Feb. 2009.
- "What are NIST Encryption Standards?," Hashed Out by The SSL StoreTM, Dec. 11, 2017. [Online] Available: https://www.thesslstore.com/blog/what-are-nist-encryption-standards/ (accessed Apr. 18, 2021).
- Z. Feixiang, L. Mingzhe, W. Kun, and Z. Hong, "Color image encryption via Henon-zigzag map and chaotic restricted Boltzmann machine over Blockchain," Opt. Laser Technol., vol. 135, p. 106610, Mar. 2021, https://doi.org/10.1016/j.optlastec.2020.106610
- Simply Explained - Savjee, How does a blockchain work - Simply Explained. [Online] Available: https://www.youtube.com/watch?v=SSo_EIwHSd4.
- Alexander Refsum Jensenius, "Disciplinarities: intra, cross, multi, inter, trans" [Online] Available: http://www.arj.no/2012/03/12/disciplinarities-2/ (accessed Sep. 05, 2018).
- D. of H. & H. Services, "Interdisciplinary approach to caring for older people in hospital fact sheet" [Online] Available: https://www2.health.vic.gov.au:443/hospitals-and-health-services/patient-care/older-people/resources/improving-access/ia-interdisciplinary (accessed Sep. 11, 2018).
- D. R. Nandiwada and C. Dang-Vu, "Transdisciplinary health care education: training team players," J. Health Care Poor Underserved, vol. 21, no. 1, pp. 26-34, Feb. 2010. https://doi.org/10.1353/hpu.0.0233