1. Introduction
The blockchain idea is well-known for its application in crypto currencies such as bitcoin. It has received much interest from many people because of its vast business opportunity and uses in various applications like finance, medical, and logistics [1-3]. Healthcare industry services are the most visible and essential services that must be completed on time, reliably, and confidentially. As a fully decentralized technology, blockchain can play a significant role in the provision of such medical services. The healthcare industry benefits significantly from blockchain-based, which guarantees safe data storage and sharing between stakeholders, countrywide data interoperability, and customizable and rapid invoicing modalities [4].
We are currently living in a new technological era. After mobile Network techniques and the Internet dominated the last two decades, the Internet of Things (IoT) explosion has arrived. Every element is uniquely determined and reachable, becoming a part of the Web in the IoT technology. Gadgets that generate, analyze, and exchange privacy-sensitive data make up the IoT, and Medication management, home automation, transport, farming, and environmental sensing are just several solutions available. In addition, a wide range of cognitive IoT devices uses on each layer of IoT. Because these IoT devices gather and process many sensitive documents, data privacy and security are critical. In addition, IoT systems are thin and compact, with reduced power consumption.
Because the limited quantity of power generated is typically required to accomplish core program operations, addressing other issues like privacy and data security. Traditional data security and data privacy measures are ineffective due to gadgets' dispersed architecture and resource limits. As a result, IoT requires scalability, compact and decentralized data security protection. Because of its encrypted, decentralized, unchangeable, open, and publicly available record, the blockchain system that supports Cryptocurrency [5] can resolve the difficulties listed above. The blockchain protocol organizes all data into a series of linked blocks that record transactions relating to their purpose. It forms a chain when blocks connect to the original existing block. It also needs a mining technique to attach the blocks to the chain when it is full of transactions.
Miners do the mining procedure who solve a resource-intensive computational challenge referred to as Proof of Work (PoW) [6]. Nevertheless, using blockchain in the field of IoT is not simple. It faces several issues, including low scalability, high resource consumption, and traffic congestion, to name a few. We present a novel blockchain architecture tailored for IoT devices in this study, and we use the example of Remote Medical Surveillance to demonstrate our point (RPM). RPM allows healthcare providers to interact with patients outside of a traditional clinical environment. Patients wear Wearable intelligent gadgets, and these gadgets can send communication among healthcare professionals such as blood sugar levels, pulse rate, and respiration patterns, among other things.
In the context of current security needs for medical systems, there is a specific need for a robust and reliable blockchain-based medical service that will offer easy and secure access to patient information. Also, many key stakeholders are involved, such as doctors, who can extract and attach information only with the patient's consent. Simultaneously, the platform must adhere to essential security aspects like secrecy, consistency, and authenticity [7]. This study suggests a blockchain-based health service in which authorized physicians can safely append or retrieve patients' health information with the patient's authorization. Furthermore, our developed scheme can provide scalability, a critical necessity in today's medical systems.
2. Motivation
Modern internet medical services, including Digital Health/Medical Records (EHR/EMR), serve an important in saving, exchanging, and keeping individuals' private medical information. However, there seem to be a variety of flaws that could result in the leakage of patients' confidential health information. For example, patients may find tracking which party receives patient records and use different techniques to manage medical systems. In such circumstances, distributed ledger technology can be critical since it delivers data-ledger-based capabilities disseminated to all communicating nodes. A patient can keep track of which entities access information and allow access to only those who are permitted. As a result, the main aim of this project is to use private blockchain in health services and address possible flaws in present medical systems. This work's novelty is that it contributes much too securing patient records using a blockchain-based N2N network technique. While transferring, the patient information gathered from the sensing device must be protected. Patient records unboxing are done only, satisfying the wise agreement policy, so we are motivated to work on proof of agreement (PoA). The technical soundness of this work is much more focused on securing patient data over the blockchain network.
3. Related Work
Conoscenti et al. [8] examine how to use blockchain technology and peer-to-peer (P2P) techniques in a personal IoT. Their analysis uncovered significant flaws in blockchain technologies' integrity, invisibility, and flexibility. They conclude that while large blockchain networks (such as Bitcoin) are trustworthy, they are not suitable for IoT due to capacity difficulties. Moreover, [9] shows how blockchain might help with several common IoT issues. Blockchain-based smart agreements, for illustration, can enhance safety in IoT supply chain operations. Finally, Reyna et al. [10] investigate the problems of IoT and blockchain incorporation. The study compiles and analyzes IoT applications as blockchain subsystems, significant technology, and the latest IoT-Blockchain deployments. Ethereum is the most widely used IoT with a blockchain-based platform.
Patient information is regarded as very confidential and must be protected safely and adequately. As a result, healthcare information should be stored, shared, and managed safely. Different methods offer to handle these concerns. For instance, [11-13] presents several authentication protocols to meet the demand for robust and reliable health information retrieval, management, and other critical safety needs. Such methods helped meet multiple security needs in targeted occupational health & safety to a certain level. However, despite recent improvements in medical technologies, these techniques are no longer adequate since numerous parties have abused patients through various means, even without one‘s permission [14]. Therefore, experts are eager to identify multiple security systems relying on blockchain-based medical solutions in this context [15].
Huh, et al. [16] suggest a new Ethereum-based PKI management platform based on intelligent agreements. The security plan employs Public key cryptographic encryptions, with credentials kept on Ethereum and secret keys possessed on personal devices. However, there are two issues with the suggested system. The primary issue is that each transaction takes a long time to accomplish. The next issue is a huge storage need for IoT customers' restricted equipment. The level of protection reduces by fixing this issue with a proxy gateway that's the third trusted party. Ethereum is an open, decentralized platform [17] that allows users to build intelligent contracts that concentrate on advancing Distributed ledger BC technology. An intelligent agreement is a computer-based framework that consists of principles that participants decide upon to meet the specific needs and a Turing complete structure for protecting patient information and regulations that may update by the juristic person their identity is on the agreement [18]. An intelligent agreement may also communicate with the BC and health professionals based on individual needs. It can also maintain the hospital's patient records by administering the stakeholder's security controls and safe management of the medical history [19].
Multiple research investigations on the possible use of BC in medicine have now been reported in several studies by numerous investigators [20]. The most prominent sectors of implementation where BC technologies can provide value are digital medical care procedures for physical and remote monitoring of patients' record and preserving the privacy of health records [21]. The research in [16] presented MedRec, a distributed approach to EHR/EMR management based on BC technologies. The researchers also included a possible case analysis of BC use in medicine, which serves as a model for EHR/EMR systems. Furthermore, a study in [22] shows that MedShare gives the permissionless approach of exchanging health information across diverse service suppliers utilizing blockchain. As a result, the academics are proposing several techniques for safe data accessible in a blockchain-based health service.
Dorri et al. [23] demonstrate a simple BC implementation in an intelligent house. Local private BCs define as unchangeable ledgers that record policies and transactional content, and the proprietor controls the suggested private blockchain that does not use PoW. Each home automation has its blockchain, which a resident miner administers. These miners get a list of products and evaluate all home automation activities. A public key secures unicast connectivity between mobile, whereas the host miner creates these credentials. Another Dorri et al. study [24] proposes an identical general model blockchain-based for larger IoT systems.
By employing personal BC for safer and speedier healthcare information retrieval, this work contributes to a more effective and efficient detail accessing strategy. As a result, this study provides an approach for data acquisition and access from other parties dependent on the patient's identity management. Medical information maintains in a repository on N2N networks, which addresses records on the ledger. The accessibility determines the content that patients are authorized to access, whereas doctors require patient permission. This research suggests a blockchain-based protection system for a clinical networking application in which individuals securely and privately communicate their healthcare information with hospitals and doctors.
4. System Model
This chapter summarizes a BC-based authentication scheme for real-world IoT devices, such as an intelligent health monitoring network. We'll look at a basic remote healthcare setup where patients utilize health monitoring IoT devices. These gadgets will collect patients' health records, such as heart rate, body temperature, and sleeping habits. Any other individuals, such as healthcare workers, must be granted or denied, and we can achieve revoked data access by the patient through PoA. If a person requires medication, he may exchange his information with the medical practitioners of his choice. He can disable network file sharing once the treatment has ended. The suggested framework, seen in Fig. 2, consists of five stages: patient enrollment, data appending or retrieval across a blockchain-connected N2N channel, smart agreement deployment, patient records storage in the cloud, and proof of agreement (PoA).
4.1 Local Block Chain Network
Fig 1 shows the implementation of the local blockchain network, which uses the degree of care. The black thick line on the graph represents the primary private blockchain network. The hospitals or medical centers are responsible for maintaining the crucial network components and must sync with global databases. To keep their database up-to-date and accurate, the clinics merely need to synchronize with the nodes of the local blockchain network.
Fig. 1. Simple Local Block Chain Network Architecture
Red Dotted lines represent data queries from patients looking for medical records to the blockchain network. Since their network infrastructure can handle the high data traffic brought on by many requests, the primary blockchain network nodes in this situation (such as the hospital or healthcare center) manage the queries. Therefore, the speed and accuracy of the synchronization should be ensured as a central node in the blockchain network.
Fig. 2. Proposed BSDA-IoHT Architecture
4.2 Patient Enrollment Phase
Before seeing a physician, a new patient needs to enroll with the RS. Customers must submit their identification (𝑖P𝑡), public key (𝑃𝑡𝐾𝑝u), and also the public key of physician(s) serving patients (𝑃𝑛𝐾𝑝u) via their tablet or smartphone because it is a one-time enrollment. We only examine one physician for the sake of clarity. Families can participate in the plan in the same way physicians can, with only viewing privileges. The RS then transmits (𝑖P𝑡,𝑃𝑡𝐾𝑝u,𝑃𝑛𝐾𝑝u) to a BC via the N2N network, verified by the patients and the RS. First, it must be cross-verified that (𝑖P𝑡 and 𝑃𝑛𝐾𝑝u) are already transmitted to the BC. Next, the BC checks the patient's and RS's registrations and records (𝑖P𝑡,𝑃𝑡𝐾𝑝u,𝑃𝑛𝐾𝑝u) over that N2N connected BC. Table 1 depicts the notations and meanings.
Table 1. Notations and Meanings
4.3 Data Block Append or Retrieval Phase
With the client's permission, the physician needs to rewrite/append patient record (𝑅P𝑡) to the BC in this step. We assume that both the physician and the client have their Smartphone’s (𝐺𝑑) with healthcare software application installation. As a result, the physician encodes the information with a shared key that the client can deduce. Following that, the client verifies the encryption's correctness and, if it is, signs the encoded value. Ultimately, the physician signs the patient's consent and transfers the message to the BC. To become even more specific, this resulted in the following actions:
• Use 𝑇𝑠 to represent the present timing. The physician calculates M=m𝑃𝑡 by determining m=ℎ (𝑖P𝑛, 𝑃𝑛𝐾𝑝u, 𝑇𝑠). The physician then calculates the symmetric cryptographic key 𝑘= m𝑃𝑡𝐾𝑝u and the symmetric encryption 𝐸𝑑𝑇1= 𝐸𝑛𝑘(𝑅P𝑡,𝑇𝑠). The above value, along with T, and R, is communicated to the patients.
• In addition, the client can also calculate 𝑘= M𝑃𝑡𝐾𝑝r which can utilize to decode𝐸𝑑𝑇1. The communication time compares to the physician's current details (in live time) to the patients.
• If the test is affirmative, the patient issues a signature using the formula 𝐸𝑑𝑇2 = 𝑃𝑡𝐾𝑝rℎ (𝑖P𝑛 ∥ 𝑃𝑡𝐾𝑝u ∥ 𝑃𝑛𝐾𝑝u ∥ 𝐸𝑑𝑇1 ∥ 𝑀 ∥ 𝑇𝑠) ⊻ 𝑘ℎ(𝑖P𝑡 ∥ 𝐸𝑑𝑇1 ∥ 𝑀 ∥ 𝑇𝑠). Also, it calculates 𝐾𝑠=𝑘P𝑛, which use to verify signatures. Finally, the patient transmits to the physician the outcome as a capsule CAP = (𝑖P𝑛,𝑃𝑛𝐾𝑝u, 𝐾𝑠,𝐸𝑑𝑇1 ,𝐸𝑑𝑇2, 𝑇𝑠).
• Next, the physician verifies whether𝐸𝑑𝑇1 ,𝑇𝑠,𝑀, 𝑖P𝑡, 𝑃𝑛𝐾𝑝r , and 𝐾𝑠=𝑘P𝑛 have not altered. Then, it transmits (𝑖P𝑡, 𝑃𝑛𝐾𝑝r ,𝑇𝑠, 𝑀, 𝐾𝑠, 𝐸𝑑𝑇1 ,𝐸𝑑𝑇2) to that same BC if it is the scenario. Again, remember that it is unnecessary to confirm the signature's trustworthiness because the agreement's miners will be doing it.
The BC then takes different steps after obtaining the capsule:
• First, the BC seeks up the patient's shared key and the related enrollment agreement using the timestamp 𝑇𝑠.
• It then checks the equivalence 𝐸𝑑𝑇2 . 𝑃𝑛 = 𝑃𝑡𝐾𝑝nℎ (𝑖P𝑛 ∥ 𝑃𝑡𝐾𝑝u ∥𝑃𝑛𝐾𝑝u ∥ 𝐸𝑑𝑇1 ∥ 𝑀 ∥ 𝑇𝑠) ⊻𝑘ℎ(𝑖P𝑡 ∥ 𝐸𝑑𝑇1 ∥ 𝑀 ∥ 𝑇𝑠) to ensure that the certificate and, consequently, this test verifies which data originated using patient 𝑖P𝑛 and that the physician with public key 𝑃𝑛𝐾𝑝u is participating.
• If true, the CAP capsule is saved on the BC.
• If a doctor suggests acquiring a patient's information in a proper time frame𝑇𝑓, the physician will transmit (𝑖P𝑡, 𝑖P𝑛, 𝑇𝑓) to the BC, certified by the physician. Following the issuance of this information, the BC will take the necessary actions:
• The BC currently examines the𝑇𝑓's timeliness, the signature's legitimacy, and whether the patient has given the physician right to share the information (as stored on BC).
• If this is the case, it obtains all information for that time frame. CSR0= is the format of the message (𝑃𝑡𝐾𝑝u,𝑇𝑠,𝑀,𝐸𝑑𝑇1,𝐸𝑑𝑇2). Observe that 𝑃𝑡𝐾𝑝u replaces𝑖P𝑡, and 𝑃𝑛𝐾𝑝u is deleted from the recorded capsule because the physician previously knew it. The authenticity is verified by BC already, So it is adequate for the physician to calculate the password 𝑘 =ℎ(𝑃𝑛𝐾𝑝r, 𝑇𝑠)𝑃𝑡𝐾𝑝u and the simultaneous decoding of 𝐸𝑑𝑇1.
4.3 Deployment of Smart Agreement
Smart agreements are a BC-based transactional automating technology. It allows counterparties to define the conditions under which they can complete transactions electronically. We will use smart contracts in several different environments. Smart contracts, in additional terms, enable applications to manipulate a code on a BC system in a verifiable manner, allowing them to make various decisions without the use of the trust. Customers can put their trust straight within precise procedures and guarantees provided in a contract instead of related parties [25-28]. Each intelligent contract does have its location and identity on the BC. As a result, it can keep all its state and claim ownership of assets on the BC, allowing it to operate as a trusted service. Smart agreements provide the system with an interface of activities that can activate by transmitting transactions to the agreement. Because it will store an agreement on the BC, every node may see and implement its commands and record every transaction. We can use a patient's information generated by an IoT gadget and medical professionals as two examples of entities who need the BC channel's trustworthiness [29-32]. Patients can also provide or remove access to personal information via various innovative agreements, as previously signed by both parties.
An agreement is activated when a condition is true and information transmits to the blockchain (Fig. 3). Try setting a constraint in the smart contract for the patient's peak and minimum sugar levels. If the measurement falls above or below the specified threshold, the smart contract will transmit a notification and information to the BC network. Let's imagine an IoT Sensor is used to track the sugar levels of patients. The patient's sugar levels will be measured regularly by an IoT device, and it will compare information to a smart contract, which might exchange between the Patient and Physician [26]. If a Physician requests that a notification be delivered if sugar levels exceed a specific limit, it records the activity and associated information to a central server by keeping the data hashing on a BC linked to the N2N connection. Finally, as part of the related smart contract, a medical warning is given to the Physician.
Fig. 3. Process Flow Diagram of Smart Contract Deployment
4.4 Cloud Storage
The information sent by patient gadgets is stored securely. For example, when a smart contract sends a network alarm, it sends pertinent healthcare information to the cloud. The nodes append a digital certificate to the health records before delivering it via the cloud. We are only transmitting data that goes beyond the prescribed Standard area in this case, not all information that an IoT healthcare gadget may generate. Next, the node verifies the digital signatures added to cloud storage. Cloud services will destroy data if the hash value and signature are incorrect or unavailable. Finally, the cloud servers organize the user's information into unique blocks and provide the block's hashes to the N2N network—a hashing of data that can use SHA to compute the hash. The source could be a large text, but the functions return a fixed length, such as 256 or 512 bits. We calculate the aggregate hashes of all data in the structure of a Merkle Tree when a single block involves multiple records or phrases. Merkle trees are a network of hashing that makes things simpler to authenticate data effectively, not a technique for storing data. Merkle trees additionally allow the customer to keep only the tree's base (combination hash), not just the complete history; thus, it will collect original information in the server while sending the cumulative hash to the BC network.
4.5 Proof of Agreement (PoA)
Proof of Agreement (PoA) is a class of permissions underlying blockchain techniques that gained popularity leading to enhanced efficiency over traditional Byzantine Fault Tolerant methods due to fewer communication links. We suggest a PoA at the very first for secure networks as an element of the Ethereum blockchain [33-35]. The regulators are a group of N trustworthy nodes that rely on PoA methods. Each authority is identifiable by a unique ID, and most sources, at least N2, are presumed to be reliable. To organize the transactions provided by patients, the regulators run an agreement. We use PoA methods for an extraction rotation framework, a commonly accepted approach to equitably disseminate the ownership of block creation between patients and physicians. Attempting to make it seem less computationally and power-efficient than that of the PoW mentioned above methodologies has gained attention in other blockchain application fields. PoA techniques are far more suitable for IoT devices than their PoW counterparts.
Algorithm 1 Algorithm of BDSA-IoHT
if task(verify_rights)=true, Next
verify for the patient and physician
task(retrieve_address)
retrieve_address(𝑅P𝑡)
else
Close the transaction;
end if
Data Retrieve Module:
if task(smart_contract)=true, Next
retrieve_data — from the address(𝑅P𝑡)
return(𝑅P𝑡)
Send to the correct request_ID(𝑖P𝑛or𝑖P𝑡)
end if
Data Append Module:
if task(smart_contract)=true, Next
append_data to the particular 𝑅P𝑡
return(1)
end if
Change permission Module:
Task(msg.sender==patient)
The patient can modify the physician's particulars or attach.
end task
5. SECURITY ANALYSIS
Now we'll demonstrate how our suggested technique can provide strong security characteristics.
5.1 Confidentiality
Only the patients at any had given time and the physician for a predetermined duration, as indicated in the RC agreement, must be allowed to access the personal health information. The information on the BC is in the form (𝑖P𝑡, 𝑃𝑛𝐾𝑝r,𝑇𝑠, 𝑀, 𝐾𝑠, 𝐸𝑑𝑇1 ,𝐸𝑑𝑇2). First and foremost, due to ECDHP and ECDLP, this information is made so that only the doctor and patient can deduce the plaintext data. In this context, the physician's private key is ℎ(𝑃𝑛𝐾𝑝r,𝑇𝑠) 𝑃𝑡𝐾𝑝u , while the patient's key is 𝑃𝑡𝐾𝑝r R. Since the physician cannot keep all the varied random number of all interactions from multiple patients, we should utilize ℎ(𝑃𝑛𝐾𝑝r,𝑇𝑠) instead of m. Second, only a physician who meets the requirements of the established agreement recorded on the BC can create such a communication. The physician cannot reproduce the signing request to the patients at a later stage due to the inclusion of the timeframe within the encrypted message [36-40].
5.2 Integrity
This property ensures that nobody ever may alter personal health information without the patient's permission. In addition, the integrity of the ciphertext is assured since the patient signs it. Before even being saved, the BC verifies the signature's authenticity. In reality, anybody with access to the patient's public key can verify the signature's authenticity, a characteristic known as public verification. The signature scheme offered is modeled on the Schnorr signature technique.
5.3 Authentication
If the person claiming to deliver the communication is accurate, the system provides authenticity. This functionality is intrinsically offered in this situation, especially using a signature-based approach to the well-known Schnorr signature technique. As a result, no one else can do a man-in-the-middle or impersonating threat.
5.4 Security Attacks
5.4.1 Impersonating Attacks
In IoHT networks, impersonating or identity theft refers to identities that utilize a person's name, image, or other identifying characteristics, such as patients' names or hospitals' logos, for malicious purposes. They are distinct from other acceptable representations of a person or entity, like websites, spoofs, and fake profiles [41]. Attackers mostly impersonate users via bogus accounts, sites, programs, and email accounts. The best defense tactics include using AI, email security measures, and regularly probing and testing corporate systems.
As mentioned in the previous description, this gives insight into how our suggested approach provides secrecy, integrity, and authenticity. We maintain patient confidentiality, and all doctor-patient communications should be encrypted using the cryptography technique. In the suggested algorithm, the patient randomly modifies all the transaction data every time an authentication session takes place. Additionally, a doctor randomly examines them, which can prevent data alteration and secure against impersonation attacks.
5.4.2 Stolen Verifier Attacks
The authentication system often keeps the verifications of users' credentials instead of users' actual credentials to limit the threats after it's stolen. The opponent who has acquired the proof for a passcode can employ the stolen-verifier attack to pretend to be that client. The stolen-verifier operation can use the brute-force password if patients use insecure credentials. Robust access control protocols can defend against dictionary attacks, but they may sometimes be immune to attacks with stolen verifiers [42].
In reality, the patient may access multiple servers using the same key 𝑃𝑡𝐾𝑝r R for his convenience. If a remote system insider gets his hands on 𝑃𝑡𝐾𝑝r R, he might use the patient's login to access other servers. In our approach, the verifier instead gets ℎ(𝑃𝑛𝐾𝑝r ,𝑇𝑠) during the verification process rather than the patient disclosing 𝑃𝑡𝐾𝑝rR, to the remote system. However, it is challenging to deduce 𝑃𝑡𝐾𝑝rR, from its hash value. Furthermore, the remote system doesn't keep a verifier table that attackers may exploit to acquire the patient key. The suggested method can therefore withstand stolen verifier attacks.
5.4.3 Replay Attacks
The key to preventing replay attacks is using the proper encryption technique. When the "keys" in encrypted communications decipher at the closing of communication, they allow access to the content. Whether the person who intercepted the initial message can see or interpret the key is irrelevant in a replay attack. They only need to copy everything, including the statement and key, and transmit it again [43-45]. To prevent this from happening, the transmitter and the recipient should create a session key that is purely unpredictable and must be used once per operation. Another way by adding timing information to all communications is another defense against this attempt. It limits the time it takes for attackers to listen, extract data, and resent them by preventing hackers from retransmitting information conveyed more recently than a predetermined amount of time.
From an integrity standpoint, In our mechanism, every communication between patient and doctor has a timestamp and hashes for every other field it includes. In addition, all transactions are linked because every block has a hash connecting it to the block preceding it, preventing replay attacks.
6. Performance Analysis
6.1 Scalability
Because it is a personal blockchain, the entire procedure takes less time than the current network. It is measured based on transactional responsiveness. The average lifespan for creating the new block is roughly 10 seconds, which is also the case for smart contract transactions. It requires 32 seconds for verification, although this varies on the gas price. After validation, it takes 75-120 seconds to produce the following several blocks. It takes 60 seconds to retrieve the information and 1-2 minutes to update the information, depending on the information.
6.2 Access control
In the smart contract, the individual makes decisions about network access suggestions. If a third party or an unknown person attempts to enter the platform, the intelligent agreement will deny the transaction and end the scheme.
6.3 Integrity
Integrity is crucial between the patient and the smart agreement. Because the patient has previously signed the agreement, no one else can edit or alter the conformity. In our situation, the physician/3rd parties cannot update or modify the intelligent contract agreement. Table 2 compares the attributes of our current proposal to those of other blockchain-based health services now in use. In contrast, we have two assessment alternatives: A- Available (it is reliable and available) and UA- Unavailable (it does not have the functionality).
Table 2. A comparison between the suggested approach with different properties of existing systems
The suggested BDSA-IoHT technique, which uses blockchain mechanisms to efficiently share health records in storage servers, is presented in a tabular and graphical format. The proposed process evaluates how efficient it is to share patient records via an N2N network in a blockchain-connected cloud storage with various factors [46]. In addition, the suggested method compares throughput, service delay, and processing time with existing approaches.
6.4 Throughput
The absolute number of health information effectively communicated with the patient and physician in a given time is known as throughput (Th). Eq. 1 describes the suggested strategy as a mathematical equation for throughput. We compute throughput as follows:
\(\begin{aligned}\mathrm{T}^{h}=\frac{\sum_{r=0}^{n} R P_{t}(n) * \mathrm{~S}}{1000}\end{aligned}\) (1)
Where, 𝑅P𝑡(n) is the number of patient record shared securely and S is the Size of Record.
6.5Service Delay
Service delay is the difference between receiving a request and receiving a response during health information exchanges. In Eq. 2, the suggested method defines a computational formula for service delay. Service Delay(S𝑑) is measured as follows:
S𝑑 = Σn𝑟=0T𝑛𝑟(Req) - T𝑛𝑟(Rec) (2)
Where, T𝑛𝑟(Req)is the Transaction Request,T𝑛𝑟(Rec) is the Transaction received and r = 0….n.
6.6 Processing Time
The proposed method is described in Eq. 3 as a mathematical equation for processing time. We compute processing time by multiplying the number of patient records by the mean retrieval time for healthcare data. 𝑇rt𝑠 is the mean retrieval time for patient medical history, and 𝑅P𝑡(𝑛) is the total medical records. In a tabular manner, Table 3, 4 and 5 shows the simulation results of the SEHRTB algorithm and existing techniques.
P𝑇 = Σ𝑛𝑟=0𝑅P𝑡(𝑛) * 𝑇rt𝑠 (3)
Table 3. A Comparison of Throughput
Table 4. A Comparison of Service Delay
Table 5. A comparison of Processing Time
The comparison of other existing methods such as SEHRTB, MedBloc, and our technique BDSA-IoHT is in Fig. 4, 5 and 6.
Fig. 4. Comparison of Throughput
Fig. 5. Comparison of Service Delay
Fig. 6. Comparison of Processing Time
Finally, based on an assessment of different metrics such as throughput (percent), service-delay(s), and processing-time(s) for clinical outcomes of different sized, our technique claims that the suggested BDSA-IoHT technique delivers the best result against previous approaches.
The preceding diagrams demonstrate that our BDSA-IoHT method efficiently maintains processing time. The BDSA-IoHT secures health record transactions and manages access to health records stored and processed on storage platforms. The BDSA-IoHT eliminates 2.01 seconds of service delay and 1.9 seconds of processing time and enhances efficiency by nearly 30%. Finally, our findings reveal that the proposed BDSA-IoHT method outperforms all other algorithms on all model checking and input datasets.
Our findings identified that our work is more robust than any other security method. Our security model met the confidentiality, authentication, and integrity, but we need to focus on various attacks like stolen-verifier attacks and replay attacks. We will do in our future work all these attack mitigations. Our entire model relies on intelligent agreement, and we use blockchain for communication with a data hashing method.
6. Conclusion and Future Enhancement
Incorporating blockchain technology into IoT is not a manageable undertaking, and such approaches face numerous challenges. As a result, the advantages of using blockchain-based IoT systems must be carefully considered and approached with prudence. Our suggested blockchain-based IoT paradigm eliminates these barriers. It addresses most security and privacy concerns while considering the resource limits that so many IoT devices face.
Blockchain in healthcare systems has created enormous advantages, not just in terms of secure and efficient data storage, exchange, and accessibility, but also in producing a great potential in the medical industry for many stakeholders. The main goal of this study is to use blockchain techniques to construct a secured data accessibility method for present medical systems. We also examined if our suggested approach can meet confidentiality, integrity, and authenticity conditions. We've also offered a possible intelligent contract arrangement in light of this healthcare circumstance. In the future, it would be fascinating seeing this concept evaluated in a controlled research context to assess the system's overall performance. We'll keep this in mind for future projects. The goal of this project was to see if we could use the method to quantify patient involvement. In addition, the project aims to plan the procedure within the same free and open-source platform for future evolution.
참고문헌
- R. Beck, "Beyond bitcoin: The rise of blockchain world," Computer, vol. 51, no. 2, pp. 54-58, February 2018. https://doi.org/10.1109/MC.2018.1451660
- N. Kshetri, "Can blockchain strengthen the internet of things?," IT Professional, vol. 19, no. 4, pp. 68-72, 2017. https://doi.org/10.1109/MITP.2017.3051335
- T. Aste, P. Tasca, and T. D. Matteo, "Blockchain technologies: The foreseeable impact on society and industry," Computer, vol. 50, no. 9, pp. 18-28, 2017. https://doi.org/10.1109/MC.2017.3571064
- Manzoor, Y. Hu, M. Liyanage, P. Ekparinya, K. Thilakarathna, G. Jourjon, A. Seneviratne, S. Kanhere, and M. E. Ylianttila, "Demo: A Delay-Tolerant Payment Scheme on the Ethereum Blockchain," in Proc. of 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2018), 2018.
- K. Abouelmehdi, A. Beni-Hssane, H. Khaloufi, and M. Saadi, "Big data security and privacy in healthcare: A review," Procedia Computer Science, vol. 113, pp. 73- 80, 2017. https://doi.org/10.1016/j.procs.2017.08.292
- M. Mettler, "Blockchain technology in healthcare: The revolution starts here," in Proc. of 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1-3, Sept 2016.
- A. M. Puppala, T. He, X. Yu, S. Chen, R. Ogunti, and S. T. C. Wong, "Data security and privacy management in healthcare applications and clinical data warehouse environment," in Proc. of 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), pp. 5-8, Feb 2016.
- M. Conoscenti, A. Vetro, and J. C. De Martin, "Blockchain for the internet of things: A systematic literature review," in Proc. of Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of, IEEE, pp. 1-6, 2016.
- A. Yksel, A. Kp, and znur zkasap, "Research issues for privacy and security of electronic health services," Future Generation Computer Systems, vol. 68, pp. 1 - 13, 2017. https://doi.org/10.1016/j.future.2016.08.011
- A. Reyna, C. Mart'in, J. Chen, E. Soler, and M. D'iaz, "On blockchain and its integration with iot. challenges and opportunities," Future Generation Computer Systems, vol. 88, pp. 173-190, 2018. https://doi.org/10.1016/j.future.2018.05.046
- S. B. Baker, W. Xiang, and I. Atkinson, "Internet of things for smart healthcare: Technologies, challenges, and opportunities," IEEE Access, vol. 5, pp. 26 521-26 544, 2017. https://doi.org/10.1109/ACCESS.2017.2775180
- A. D. Dwivedi, P. Morawiecki, and G. Srivastava, "Differential cryptanalysis of round-reduced speck suitable for internet of things devices," IEEE Access, vol. 7, pp. 16 476-16 486, 2019. https://doi.org/10.1109/ACCESS.2019.2894337
- A. Azeta, D. O. A. Iboroma, V. I. Azeta, E. O. Igbekele, D. O. Fatinikun, and E. Ekpunobi, "Implementing a medical record system with biometrics authentication in e-health," in Proc. of 2017 IEEE AFRICON, pp. 979-983, Sept 2017.
- D. Dwivedi, G. Srivastava, S. Dhar, and R. Singh, "A decentralized privacy-preserving healthcare blockchain for iot," Sensors, vol. 19, no. 2, 2019.
- Rodrigues, T. Bocek, A. Lareida, D. Hausheer, S. Rafati, and B. Stiller, "A blockchain-based architecture for collaborative ddos mitigation with smart contracts," in Proc. of IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 16-29, 2017.
- S. Huh, S. Cho, and S. Kim, "Managing iot devices using blockchain platform," in Proc. of Advanced Communication Technology (ICACT), 2017 19th International Conference on, IEEE, pp. 464-467, 2017.
- W. Liu, S. Zhu, T. Mundie, and U. Krieger, "Advanced blockchain architecture for e-health systems," in Proc. of e-Health Networking, Applications and Services (Healthcom), 2017 IEEE 19th International Conference on, IEEE, pp. 1-6, 2017.
- Y. Hanada, L. Hsiao, and P. Levis, "Smart contracts for machine-tomachine communication: Possibilities and limitations," in Proc. of 2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), IEEE, pp. 130-136, 2018.
- N. Kahani, K. Elgazzar, and J. R. Cordy, "Authentication and access control in e-health systems in the cloud," in Proc. of 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 13-23, April 2016.
- S. De Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone, "Pbft vs proof-of-authority: applying the cap theorem to permissioned blockchain," 2018.
- T. Kumar, A. Braeken, M. Liyanage, and M. Ylianttila, "Identity privacy preserving biometric based authentication scheme for naked healthcare environment," in Proc. of 2017 IEEE International Conference on Communications (ICC), pp. 1-7, May 2017.
- A. Kousaridas, S. Falangitis, P. Magdalinos, N. Alonistioti, and M. Dillinger, "Systas: Density-based algorithm for clusters discovery in wireless networks," in Proc. of 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp. 2126-2131, 2015.
- Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, "Blockchain for iot security and privacy: The case study of a smart home," in Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on, IEEE, pp. 618-623, 2017.
- A. Dorri, S. S. Kanhere, and R. Jurdak, "Towards an optimized blockchain for iot," in Proc. of the Second International Conference on Internet-of-Things Design and Implementation, ACM, pp. 173-178, 2017.
- Jabeen, Z. Hamid, A. Akhunzada, W. Abdul, and S. Ghouzali, "Trust and reputation management in healthcare systems: Taxonomy, requirements and open issues," IEEE Access, vol. 6, pp. 17 246-17 263, 2018. https://doi.org/10.1109/ACCESS.2018.2810337
- A. Esposito, A. D. Santis, G. Tortora, H. Chang, and K. K. R. Choo, "Blockchain: A panacea for healthcare cloud-based data security and privacy?," IEEE Cloud Computing, vol. 5, no. 1, pp. 31-37, Jan 2018. https://doi.org/10.1109/MCC.2018.011791712
- P. Zhang, J. White, D. C. Schmidt, and G. Lenz, "Applying software patterns to address interoperability in blockchainbased healthcare apps," arXiv preprint arXiv:1706.03700, 2017.
- Dhinakaran, D., Prathap, P.M.J, "Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining," The Journal of Supercomputing, 78(16), 17559-17593, 2022. https://doi.org/10.1007/s11227-022-04517-0
- G. Gomathy, P. Kalaiselvi, D. Selvaraj, D. Dhinakaran, A. T. P and D. Arul Kumar, "Automatic Waste Management based on IoT using a Wireless Sensor Network," in Proc. of 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 629-634, 2022.
- M. Wohrer and U. Zdun, "Smart contracts: security patterns in the ethereum ecosystem and solidity," in Proc. of Blockchain Oriented Software Engineering (IWBOSE), 2018 International Workshop on, IEEE, pp. 2-8, 2018.
- Jena Catherine Bel D, Esther C, Zionna Sen G B,Tamizhmalar D, Dhinakaran D, Anish T. P, "Trustworthy Cloud Storage Data Protection based on Blockchain Technology," in Proc. of 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 538-543, 2022.
- B. Murugeshwari, D. Selvaraj, K. Sudharson and S. Radhika, "Data mining with privacy protection using precise elliptical curve cryptography," Intelligent Automation & Soft Computing, vol. 35, no.1, pp. 839-851, 2023. https://doi.org/10.32604/iasc.2023.028548
- Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, "Bbds: Blockchain-based data sharing for electronic medical records in cloud environments," Information, vol. 8, no. 2, p. 44, 2017.
- D. Dhinakaran, and P. M. Joe Prathap, "Preserving data confidentiality in association rule mining using data share allocator algorithm," Intelligent Automation & Soft Computing, vol. 33, no. 3, pp. 1877-1892, 2022. https://doi.org/10.32604/iasc.2022.024509
- R. Zhang, R. Xue and L. Liu, "Security and Privacy for Healthcare Blockchains," IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3668-3686, 2022. https://doi.org/10.1109/TSC.2021.3085913
- K. Sudharson, A. M. Sermakani, V. Parthipan, D. Dhinakaran, G. Eswari Petchiammal and N. S. Usha, "Hybrid Deep Learning Neural System for Brain Tumor Detection," in Proc. of 2022 2nd International Conference on Intelligent Technologies (CONIT), pp. 1-6, 2022.
- Dhinakaran, D., Selvaraj, D., Udhaya Sankar, S.M., Pavithra, S., Boomika, R., "Assistive System for the Blind with Voice Output Based on Optical Character Recognition," in Proc. of International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, pp. 1-8, 2023.
- Jin, H., Xu, C., Luo, Y., Li, P, "Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration," in Proc. of ICA3PP 2020 Algorithms and Architectures for Parallel Processing, pp. 93-109, 2020.
- D. Dhinakaran, M. R. Khanna, S. P. Panimalar, A. T. P, S. P. Kumar and K. Sudharson, "Secure Android Location Tracking Application with Privacy Enhanced Technique," in Proc. of 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp. 223-229, 2022.
- P. Zhang, M. A. Walker, J. White, D. C. Schmidt, and G. Lenz, "Metrics for assessing blockchain-based healthcare decentralized apps," in Proc. of 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1-4, Oct 2017.
- K. Sudharson and S. Arun, "Security protocol function using quantum elliptic curve cryptography algorithm," Intelligent Automation & Soft Computing, vol. 34, no.3, pp. 1769-1784, 2022. https://doi.org/10.32604/iasc.2022.026483
- S.M. Udhaya Sankar, D. Dhinakaran, C. Cathrin Deboral, M. Ramakrishnan, "Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 219-231, 2022. https://doi.org/10.14445/22315381/IJETT-V70I11P224
- Mubarakali, A., Bose, S.C., Srinivasan, K. et al., "Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain," J Ambient Intell Human Comput, 2019.
- Chukwu and L. Garg, "A Systematic Review of Blockchain in Healthcare: Frameworks, Prototypes, and Implementations," IEEE Access, vol. 8, pp. 21196-21214, 2020. https://doi.org/10.1109/ACCESS.2020.2969881
- Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D and Murugeshwari B, "Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. https://doi.org/10.14445/22315381/IJETT-V70I3P232
- Huang, J., Qi, Y.W., Asghar, M.R., Meads, A., Tu, Y.-C., "Sharing medical data using a blockchain-based secure EHR system for New Zealand," IET Blockchain, 2, 13- 28, 2022. https://doi.org/10.1049/blc2.12012