Professional Documents
Culture Documents
CP-BDHCA: Blockchain-Based
Confidentiality-Privacy Preserving Big Data
Scheme for Healthcare Clouds and Applications
Hemant Ghayvat, Sharnil Pandya , Pronaya Bhattacharya, Mohd Zuhair , Mamoon Rashid ,
Saqib Hakak , and Kapal Dev , Member, IEEE
Abstract—Healthcare big data (HBD) allows medical We consider 10 BC nodes and create a real-world cus-
stakeholders to analyze, access, retrieve personal and elec- tomized dataset to be used with SEER dataset. The dataset
tronic health records (EHR) of patients. Mostly, the records has 30,000 patient profiles, with 1000 clinical accounts.
are stored on healthcare cloud and application (HCA) Based on the combined dataset the proposed scheme out-
servers, and thus, are subjected to end-user latency, exten- performs traditional schemes like AI4SAFE, TEE, Secret,
sive computations, single-point failures, and security and and IIoTEED, with a lower response time. For example, the
privacy risks. A joint solution is required to address the is- scheme has a very less response time of 300 ms in DDoS.
sues of responsive analytics, coupled with high data inges- The average signing cost of mined BC transactions is 3,34
tion in HBD and secure EHR access. Motivated from the re- seconds, and for 205 transactions, has a signing delay of
search gaps, the paper proposes a scheme, that integrates 1405 ms, with improved accuracy of ≈12% than conven-
blockchain (BC)-based confidentiality-privacy (CP) preserv- tional state-of-the-art approaches.
ing scheme, CP-BDHCA, that operates in two phases. In
the first phase, elliptic curve cryptographic (ECC)-based Index Terms—Blockchain, secure session key
digital signature framework, HCA-ECC is proposed to es- management, ECC signatures, pairing-based cryptography,
tablish a session key for secure communication among DoS and DDoS attacks, Healthcare Cloud and Applications,
different healthcare entities. Then, in the second phase, Big Data.
a two-step authentication framework is proposed that
integrates Rivest-Shamir-Adleman (RSA) and advanced en-
cryption standard (AES), named as HCA-RSAE that safe-
guards the ecosystem against possible attack vectors. CP-
I. INTRODUCTION
BDAHCA is compared against existing HCA cloud applica- N SMART healthcare ecosystems, embedded internet-of-
tions in terms of parameters like response time, average
delay, transaction and signing costs, signing and verifying
of mined blocks, and resistance to DoS and DDoS attacks.
I things (IoT) based body wearables generate enormous
healthcare big-data (HBD). The generated data is heterogeneous,
fragmented, and diverse, and is stored at multiple locations [1],
[2]. The HBD data is used for effective decision management
systems in the healthcare ecosystem. Moreover, it is essen-
Manuscript received February 24, 2021; revised May 4, 2021 and
June 10, 2021; accepted July 10, 2021. Date of publication July 14, tial for telehealthcare, as we witness rapid growth in remote
2021; date of current version May 5, 2022. (Corresponding author: telemedicine post-COVID-19 era.
Mamoon Rashid.) The personalized health records (PHR) and electronic health
Hemant Ghayvat is with the Department of Computer Science and
Media Technology, 35234, Sweden, with the eHealth Institute, Lin- records (EHR) are communicated are stored in healthcare clouds
naeus University, Vaxjo, Sweden Innovation Division, Denmark Fac- and are accessed through wireless open channels that are sub-
ulty of Technology, Technical University of Denmark, 101A, 2800 Kon- jected to limitations of centralized access, high end-user latency,
gens Lyngby, Denmark and also with the Building Realization, and
Robotics, Technical University of Munich, 80333 Munich, Germany (e- and security and privacy attacks from malicious entities [3], [4].
mail: hemant.ghayvat@lnu.se). Owing to the aforementioned limitations of responsive health-
Sharnil Pandya is with the Symbiosis Institute of Technology, Sym- care services, and the security and privacy of HBD, researchers
biosis International (Deemed) University, Pune 412115, India (e-mail:
sharnil.pandya84@gmail.com). globally have proposed smart fog and edge-based solutions
Pronaya Bhattacharya and Mohd Zuhair are with the De- for HBD. However, the trust among the distributed fog and
partment of Computer Science and Engineering, Institute of edge nodes is a prime concern among multiple heterogeneous
Technology, Nirma University, Ahmedabad 382481, India (e-mail:
pronoya.Bhattacharya@nirmauni.ac.in; mohd.zuhair@nirmauni.ac.in). healthcare stakeholders.
Mamoon Rashid is with the Department of Computer Engineer- In fog-based healthcare, patient EHR data is seamlessly
ing, Faculty of Science and Technology, Vishwakarma University, Pune migrated over multiple applications. Moreover, the interplay
411048, India (e-mail: mamoon873@gmail.com).
Saqib Hakak is with the Canadian Institute for Cybersecurity, among the edge and fog nodes improves the end-user latency
University of New Brunswick, Fredericton 4400, Canada (e-mail: and orchestrates smart business logistics. However, the level of
saqib.hakak@unb.ca). access to patient EHR depends on the underlying transparency
Kapal Dev is with the University of Johannesburg, Johannesburg
524, South Africa (e-mail: kapal.dev@ieee.org). of applications [5], [6]. Thus, to address the limitations of trust
Digital Object Identifier 10.1109/JBHI.2021.3097237 and transparency of EHR and PHR access, BC is found a suitable
2168-2194 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1938 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
choice [7]. Through BC, a distributed, chronological, auditable, behind using symmetric encryption to create ciphertext of large
and timestamped ledger is created among all stakeholders. Fake data files is performance. The size of keys used to encrypt in
or incorrect transactional updates can be held accountable and asymmetric cryptography (prime numbers in RSA) is much
can be traced back to the owner node that induces the change [8]. larger than symmetric key cryptography. Symmetric keys are
Thus, BC addresses the HCA limitations about agreements, proven to be much less a burden on computational resources
accountability, rights management, and data integrity in HBD. as compared to asymmetric cryptography. We have followed a
Fog nodes can address the issues of high latency and network well-established OpenPGP approach by encrypting secret keys
congestion, and provide a middleware interface layer to HCA used by symmetric cryptography with the receiver’s public key.
and IoT collection layers. Fog nodes extend the computational Thus, the proposed scheme CP-BDHCA combines the dual
capabilities of HCA at the edge and serve the purpose of resource benefits of security mechanisms and trust of BC to ensure safe
satisfaction to users. With BC, the fog nodes are interfaced as healthcare ecosystems. The proposed system CP-BDHCA is
gateway units, where the collected sensor data at HCA is sent for the healthcare data where the system users would-be doc-
to the fog layer, where they are analyzed through distributed tors, patients, pharmacists, laboratory technicians, caregivers,
analytics and results are stored as transactional entities in BC, insurance companies, nurses, and other relevant healthcare ser-
which can be accessed by HCA stakeholders. However, BC vice providers. So each stakeholder in the system has unique
suffers from inherent limitations of scalability of mined nodes, characteristics to contribute as well as access the healthcare
computational access, and effective key sharing ecosystems in system’s data. Based on their role in the system the authorization
resource-constrained IoT-based HBD ecosystems. The inherent level or priority has been set. Such as Doctor has the highest
limitation of BC scalability is addressed through the storage of level of authorization after the patient, whereas the laboratory
data in interplanetary file systems (IPFS), which is off-chain technician just needs to access to check the doctor’s prescription
storage. The EHR information is stored in IPFS and is hashed to of the respective patient online and upload the final report
generate an external inference key. The EHR records are stored there.
as index-key pair structures, where any authorized stakeholder
can reference the IPFS ledger through private key [9]. The hash
information is externally linked to the on-chain main structure A. Novelty
as transaction information. As the meta-information is of small The novelty of the work against existing schemes are as
size, with a fixed hash value, more transactions can be added per follows-
block, which is useful for high ingested data in HBD ecosystems. 1) A patient profile is secured via BC framework to leverage
Moreover, storage of data as IPFS ledgers maintains the scalabil- security and trust to the HCA servers.
ity and transactional throughput of BC-ecosystems in HBD [10]. 2) Along with the benchmark SEER dataset, we have cre-
However, in an EHR, if the issues of secure key establishment ated a customized dataset of more than 30000 patient
and signature mechanisms are not properly addressed, then the profiles, and 1000 clinician accounts for the conduction
confidence in collected EHR records, data fulfillment, and denial of the experiments. For the same, we have considered
of clarity is reduced [11]. 130 attributes such as patient ID, credentials, and contact
In BC leveraged HBD, the malicious attackers mainly target information. We have installed BC adapters with required
node alterations in the chain structure, and security flaws in touchpoints at various healthcare facility locations to form
wallet addresses. This leads to alterations in data input, instruc- patient profiling records.
tion set, mined knowledge, mutual agreements, and physical 3) A concept of patient personalized segmentation is applied
storage elements of node structure [12]. Thus, to augment the that provides only the required information for the patient
confidentiality-privacy (CP) of EHR, secure session keys, and to the authorized stakeholders.
combined cryptographic primitives are required in shared EHR 4) Large-scale simulations are presented for the proposed
records [13]. scheme that evaluates the feasibility, stability, and robust-
Motivated from the aforementioned discussions, the paper ness of the presented scheme against existing state-of-the-
presents a scheme, CP-BDHCA, that proposes a BC-based art approaches.
secure key management and encryption scheme to handle
the CP and authentication of healthcare stakeholder identities.
The scheme proposed two novel frameworks as two phases. In B. Contributions
the first phase, a framework HCA-ECC is formulated that shares The following are the research contributions of the paper
the secured management of session keys through elliptic curve r A secure key exchange framework, HCA-ECC is proposed
cryptography (ECC). Through ECC, signature generation and that integrates ECC small key size, with secure session
verification are processed for accessing and retrieving EHR. management. In HCA-ECC, data collected through IoT
EHR updates are recorded and stored as transactional entries sensors are disseminated to web gateways, and fog-based
in BC. Then, based on ledger updates in BC, an extra layer of light-weight signatures are designed for bulk transactions.
security is induced through the proposed HCA-RSAE framework r Based on secure session keys, wallet identifiers are gen-
that combines rivest-Shamir-Adleman (RSA) and advanced en- erated, and stakeholders communicate through wallets. A
cryption standard (AES) to protect the identity authentication signed-key request is then generated for the user to access
and prevent the HCA servers against DDoS attacks. The reason EHR, based on RSA key generation.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
GHAYVAT et al.: CP-BDHCA: BLOCKCHAIN-BASED CONFIDENTIALITY-PRIVACY PRESERVING BIG DATA SCHEME 1939
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1940 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
TABLE I
NOTATIONS AND THEIR INTERPRETATION IN THE PROPOSED
CP-BDHCA SCHEME
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
GHAYVAT et al.: CP-BDHCA: BLOCKCHAIN-BASED CONFIDENTIALITY-PRIVACY PRESERVING BIG DATA SCHEME 1941
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1942 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
GHAYVAT et al.: CP-BDHCA: BLOCKCHAIN-BASED CONFIDENTIALITY-PRIVACY PRESERVING BIG DATA SCHEME 1943
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1944 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
TABLE II
A PATIENT PROFILING RECORD FORMAT
TABLE III
TRANSACTIONS OF BC-PROFILING FORMAT FOR CHOSEN
10 PATIENT PROFILES
TABLE IV
SIMULATION RESULTS FROM SEER AND PATIENT PROFILING DATASETS
B. Real-Time Data Generation: BC-Based
Patient Profiling
The attributes collected from the SEER dataset are stored in
the 10 BC nodes. Next, we present the patient-based person-
alized segmentation to present the contextual information. We
have also loaded the required touch-points with 10 blockchain
adapters as per the healthcare facility locations. We have selected
10 random patients, and provided them EHR access, along
with decryption keys. The touchpoints allow the selection of
healthcare records that are related to the patient visit without
an explicit linear search of the entire EHR. Based on the above
underlying assumptions, we present the patient profiling record
format in Table II. Based on the profiling information, the
patient information is stored in 10 BC nodes, with the details
of transaction history presented in Table III. attack a HCA-ECC based healthcare framework. Fig. 5 depicts
a comparison analysis of response time for DDoS scenarios.
C. A Comparison Analysis of HCA-ECC Security HCA-ECC algorithm outperforms all the existing methodologies
Framework Against DoS and DDoS Security Attacks and achieves very less response time around 300 milliseconds.
Thus, in DDoS scenarios, it is a complex task for attacker to gain
This section analyzes the comparative analysis of the
access. A comparative analysis of obtained results from SEER
proposed HCA-ECC security scheme with existing security
and profiling dataset is listed in Table IV.
methodologies concerning their response times in DoS and
DDoS attack scenarios [29]–[31].
As shown in Fig. 4, HCS-ECC security scheme outperforms D. A Comparison Analysis of HCA-RSAE
Security Framework
all the existing schemes such as AI4SAFE, TEE, Secret, and
IIoTEED in terms of response time in the case of DoS attack This section analyzes the comparative analysis of the pro-
scenarios. The response time achieved is around 310 millisec- posed HCA-RSAE security framework with existing security
onds as compared to all the existing methodologies. Due to less methodologies concerning their response times. Furthermore,
response time, it would be very challenging for an attacker to we have also demonstrated the simulation results of the signing
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
GHAYVAT et al.: CP-BDHCA: BLOCKCHAIN-BASED CONFIDENTIALITY-PRIVACY PRESERVING BIG DATA SCHEME 1945
Fig. 7. Comparison of HCA-RSAE with average delay and response Fig. 9. Average Delay and Response Time of RSA and AES.
time using AES security algorithm (in ns).
and verifying costs in BC, and compared the schemes with the cost decreases and thus more users can access the patient
conventional approaches. EHR through the signed SK key. Next, we present the efficacy
1) Security Evaluation: Fig. 6 and Fig. 7 represents a com- of the generated signature schemes. We have compared the
parative analysis of the proposed HCA-RSAE security scheme signing delay of HCA-RSAE against existing schemes by Dorri
with average delay and response time using RSA and AES et al. [32], and Zhang et al. [33]. The results are shown in
security algorithm (in ns). Fig. 8(b). At n = 205 transactions, the proposed framework has
2) HCA-RSAE Analysis Against DoS and DDoS Attack Vec- a signing delay of 1405 ms, compared to 1489 ms in [33], and
tors: We evaluate the performance comparison of HCA-RSAE 1612 ms in [32]. As the signature operations are the proposed
based on different parameters like the number of exchanged mes- scheme has a signing delay of 1397 ms, compared to proposed
sages, time of evaluation of records, MQTT subscriber time, and schemes, Zhang et al. [33] with a signing delay of 1489 ms,
MQTT publisher time. In total, we consider 26 time-instances and Dorri et al. [32] with a delay of 1612 ms. As signature
for evaluation and plot the DoS attack densities on the above operations are validated through sig(N ot), based on master key
parameters on the MQTT cloud broker. Similarly, the perfor- M K, run-time hash computations are reduced, and thus signing
mance comparison is replicated with the same set of parameters latency decreases.
in DDoS attacks. The proposed HCA-RSAE framework has high 4) Comparison of HCA-RSAE With Existing Schemes:
resistance against both DoS and DDoS-based attacks, with low Fig. 9 represents a comparative analysis of the proposed HCA-
success probability by the malicious intruder to gain access to RSAE security scheme with average delay and response time
working keys in the healthcare ecosystem. using both RSA and AES security algorithms (in ns). Fig. 10 de-
3) Evaluation of Signing Delay and Transaction Costs in BC: picts a comparison analysis of response time for DDoS scenarios
We next present the computational analysis of the proposed with an MQTT cloud broker architecture. HCA-RSAE algorithm
HCA-RSAE framework in terms signature generation and verifi- outperforms all the existing methodologies such as AI4SAFE,
cation costs. For this, we compute the delay analysis of mining TEE, Secret, and IIoTEED, and achieves a very less response
transactions through EMn in BC. Fig. 8(a) depicts the signing time of around 520 milliseconds. In DDoS scenarios, it would be
and verifying costs of mined transactions in BC through HCS. a complex task for any attackers to access an HCA-RSAE-based
The average signing cost is 3343.24 ms, and the verifying cost healthcare ecosystems.
is 7023.15 ms. As the user wallets Wn are mapped to HCS,
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1946 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
GHAYVAT et al.: CP-BDHCA: BLOCKCHAIN-BASED CONFIDENTIALITY-PRIVACY PRESERVING BIG DATA SCHEME 1947
VI. CONCLUSION
In HBD applications, medical records are shared among dif-
ferent stakeholders through public open channels. Thus, privacy
and secure access to shared medical records are prime concerns.
The paper proposes a scheme, CP-BDHCA, that addresses the
security, and trust-based concerns of shared EHR and PHR
through the integration of BC at HCA nodes, that maintains
Esym : Symmetric encryption cost; Tappend : Transaction append cost; Eexp : Modular
a trusted and chronological ledger among different stakehold-
exponentiation cost; Easym : Asymmetric encryption cost; Hm : Hash output cost; Wsig : ers. Through BC, a combined CP scheme is proposed, and
Wallet signature cost; Sgen : Signature generation cost; Sver : Signature verification cost; two frameworks are proposed as part of the overall scheme.
Einv : Modular inverse cost; Tpair : Bilinear pairing cost; Tecm : ECC multiplication cost;
Tf : Modular function cost; Teca : ECC addition cost;
Firstly, HCA-ECC framework is proposed that forms a secured
ecosystem for key exchange among HCA servers, gateways,
and client nodes. Then, through the HCA-RSAE framework,
sources, the cloud and fog nodes often face bottlenecks. the dual benefits of RSA and AES are combined to ensure au-
The aggregated data at fog and cloud gateways have to thorization and identity management. The scheme is compared
deploy uniform standards and communication protocols against conventional schemes like AI4SAFE, TEE, IIoTEED,
to address varied data storage formats. Moreover, the and Secret, and the efficacy of the scheme is proposed for
gateways have to ensure that responsive and robust rout- diverse set of parameters. The proposed system has limitations in
ing protocols are set up at aggregator nodes to meet the healthcare information exchange, related to access management
application service latency. and auditing of EHR files. In the future, the authors would
b) Privilege-based attacks: The data exchanges are recorded propose a generalized security algorithm that can be fine-tuned
through BC in the proposed scheme, but an adversary to support access management, EHR audits, and also propose
can form privilege escalation attacks prior to transaction secure physical channel access and inter-networking, secured
record in BC [40]. For this, the adversary would require radio communication, and homogeneous fog-edge interplay in
high computational resources, and once available, the resource-constrained ecosystems.
attack is highly possible. Hence, a proper user access
control matrix is required to be designed to ensure CP
of the stored data at remote servers. REFERENCES
c) Unified interfaces and programming platforms: As fog [1] Y. L. Kanth, B. R. Singh, S. Sunanda, and M. Sangeetha, “A secure frame-
nodes are near to client device, they deploy different inter- work for mollifying attacks in cloud,” Int. J. Comput. Trends Technol.,
face standards, and to program these interfaces, a unified vol. 16, no. 5, pp. 204–207, 2014.
[2] M. A. Jan et al., “A lightweight mutual authentication and privacy-
application framework is required. However, to date, for preservation scheme for intelligent wearable devices in industrial-CPS,”
fog computing, proprietary solutions are only available, IEEE Trans. Ind. Informat., vol. 17, no. 8, pp. 5829–5839, Aug. 2021.
and the lack of common programming standards restricts [3] N. Sharma, I. Kaushik, V. K. Agarwal, B. Bhushan, and A. Khamparia,
Attacks and Security Measures in Wireless Sensor Network, Hoboken, NJ,
a common development framework. Fog nodes are fur- USA: Wiley, 2021, pp. 237–268.
ther challenged through dynamic links, where the nodes [4] B. Bhushan and G. Sahoo, “Recent advances in attacks, technical chal-
are free to join and leave the network frequently, and lenges, vulnerabilities and their countermeasures in wireless sensor net-
works,” Wireless Pers. Commun., vol. 98, no. 2, pp. 2037–2077, 2018.
thus big-data streaming and data-processing engines are [5] D. Sangita, C. Ankita, and P. Reshamlal, “A review on issues and chal-
challenged through operational flexibility and scalabil- lenges of cloud computing,” Int. J. Innovations Advance. Comput. Sci.,
ity issues, mainly due to static orchestration of wireless vol. 4, no. 1, pp. 81–88, 2015.
[6] X. Liu, P. Zhou, T. Qiu, and D. O. Wu, “Blockchain-enabled contextual
links. Thus, the design of standard and unified application online learning under local differential privacy for coronary heart disease
frameworks, with lightweight exchange formats is an diagnosis in mobile edge computing,” IEEE J. Biomed. Health Informat.,
emerging scope. vol. 24, no. 8, pp. 2177–2188, Aug. 2020.
[7] A. P. Singh et al., “A novel patient-centric architectural framework for
d) Cloud-fog interplay: In healthcare applications, design blockchain-enabled healthcare applications,” IEEE Trans. Ind. Informat.,
of proper data movement, and shift of resources be- vol. 17, no. 8, pp. 5779–5789, Aug. 2021.
tween cloud-to-fog, and subsequently, from fog-to-cloud [8] B. Bhushan, C. Sahoo, P. Sinha, and A. Khamparia, “Unification of
blockchain and internet of things (BioT): Requirements, working model,
raises network and compute orchestration challenges at challenges and future directions,” Wireless Netw., vol. 27, no. 1, pp. 55–90,
the networked nodes. This also requires multi-level data 2021.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.
1948 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 26, NO. 5, MAY 2022
[9] J. Tang, T. Jia, H. Chen, and C. Wei, “Research on big data storage method [25] Q. Su, R. Zhang, R. Xue, and P. Li, “Revocable attribute-based signature
based on ipfs and blockchain,” in Proc. 2nd Int. Conf. Video, Signal Image for blockchain-based healthcare system,” IEEE Access, vol. 8, no. 1,
Process., Jakarta, Indonesia, 2020, pp. 55–60. pp. 127884–127896, 2020.
[10] S. Saxena, B. Bhushan, and M. A. Ahad, “Blockchain based solutions to [26] W. Yánez, R. Mahmud, R. Bahsoon, Y. Zhang, and R. Buyya, “Data
secure iot: Background, integration trends and a way forward,” J. Netw. allocation mechanism for Internet-of-Things systems with blockchain,”
Comput. Appl., vol. 181, no. 1, pp. 103050–103092, 2021. IEEE Internet Things J., vol. 7, no. 4, pp. 3509–3522, Apr. 2020.
[11] G. Tripathi, M. A. Ahad, and S. Paiva, “S2HS- a blockchain based [27] M. Chen, Y. Ma, Y. Li, D. Wu, Y. Zhang, and C.-H. Youn, “Wearable 2.0:
approach for smart healthcare system,” Healthcare, vol. 8, no. 1, pp. Enabling human-cloud integration in next generation healthcare systems,”
100391–100402, 2020. IEEE Commun. Mag., vol. 55, no. 1, pp. 54–61, Jan. 2017.
[12] J. Fu, N. Wang, and Y. Cai, “Privacy-preserving in healthcare blockchain [28] P. Bhattacharya, S. Tanwar, U. Bodke, S. Tyagi, and N. Kumar,
systems based on lightweight message sharing,” Sensors, vol. 20, no. 7, “Bindaas: Blockchain-based deep-learning as-a-service in healthcare 4.0
pp. 1898–1913, 2020. applications,” IEEE Trans. Netw. Sci. Eng., vol. 8, no. 2, pp. 1242–1255,
[13] V. Suneetha, S. Suresh, and V. Jhananie, “A novel framework using apache Apr.–Jun. 2021.
spark for privacy preservation of healthcare big data,” in Proc. IEEE 2nd [29] S. Pinto, T. Gomes, J. Pereira, J. Cabral, and A. Tavares, “IIoTEED: An
Int. Conf. Innov. Mechanisms Ind. Appl., Bangalore, India, 2020, pp. 743– enhanced, trusted execution environment for industrial IoT edge devices,”
749. IEEE Internet Comput., vol. 21, no. 1, pp. 40–47, Jan./Feb. 2017.
[14] C. Guo, P. Tian, and K.-K. R. Choo, “Enabling privacy-assured fog-based [30] J. S. Jang, S. Kong, M. Kim, D. Kim, and B. B. Kang, “SeCReT: Se-
data aggregation in e-healthcare systems,” IEEE Trans. Ind. Informat., cure channel between rich execution environment and trusted execution
vol. 17, no. 3, pp. 1948–1957, Mar. 2021. environment,” in Proc. Netw. Distrib. Syst. Secur. Symp., 2015.
[15] R. Qiao, X.-Y. Luo, S.-F. Zhu, A.-D. Liu, X.-Q. Yan, and Q.-X. Wang, “Dy- [31] W. Dai et al., “TEE: A virtual DRTM based execution environment for
namic autonomous cross consortium chain mechanism in e-healthcare,” secure cloud-end computing,” Future Gener. Comput. Syst., vol. 49, no. 2,
IEEE J. Biomed. Health Informat., vol. 24, no. 8, pp. 2157–2168, pp. 47–57, 2015.
Aug. 2020. [32] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A
[16] M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A critical analysis lightweight scalable blockchain for IoT security and anonymity,” J. Par-
on the security concerns of Internet of Things (IoT),” Int. J. Comput. Appl., allel Distrib. Comput., vol. 134, no. 1, pp. 180–197, 2019.
vol. 111, no. 7, pp. 1–6, 2015. [33] W. Zhang, Z. Wu, G. Han, Y. Feng, and L. Shu, “LDC: A lightweight dada
[17] S. Goyal, N. Sharma, I. Kaushik, and B. Bhushan, “Chapter 10 - blockchain consensus algorithm based on the blockchain for the industrial internet of
as a solution for security attacks in named data networking of things,” in things for smart city applications,” Future Gener. Comput. Syst., vol. 108,
Proc. Secur. Privacy Issues IoT Devices Sensor Netw. S. K. Sharma, B. no. 2, pp- 574–582, 2020.
Bhushan, and N. C. Debnath, Eds, Adv. Ubiquitous Sens. Appl. Healthcare, [34] J. Srinivas, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues, “Cloud centric
Academic Press, 2021, pp. 211–243. authentication for wearable healthcare monitoring system,” IEEE Trans.
[18] S. Tuli et al., “Next generation technologies for smart healthcare: Chal- Dependable Secure Comput., vol. 17, no. 5, pp. 942–956, Sep./Oct. 2020.
lenges, vision, model, trends and future directions,” Internet Technol. Lett., [35] V. Odelu, A. K. Das, M. Wazid, and M. Conti, “Provably secure authen-
vol. 3, no. 2, pp. 145–151, 2020. ticated key agreement scheme for smart grid,” IEEE Trans. Smart Grid,
[19] A. Sharma, Sarishma, R. Tomar, N. Chilamkurti, and B.-G. Kim, vol. 9, no. 3, pp. 1900–1910, May 2018.
“Blockchain based smart contracts for internet of medical things in e- [36] N. Kabra, P. Bhattacharya, S. Tanwar, and S. Tyagi, “MudraChain:
healthcare,” Electron., vol. 9, no. 10, pp. 1609–1622, 2020. Blockchain-based framework for automated cheque clearance in financial
[20] Y. Liu et al., “A novel cloud-based framework for the elderly healthcare institutions,” Future Gener. Comput. Syst., vol. 102, no. 1, pp. 574–587,
services using digital twin,” IEEE Access, vol. 7, no. 1, pp. 49088–49101, 2020.
2019. [37] Y. Chen, J.-F. Martínez, P. Castillejo, and L. López, “A bilinear map pairing
[21] K. Fan, S. Zhu, K. Zhang, H. Li, and Y. Yang, “A lightweight authentication based authentication scheme for smart grid communications: Pauth,” IEEE
scheme for cloud-based RFID healthcare systems,” IEEE Netw., vol. 33, Access, vol. 7, no. 3, pp. 22633–22643, 2019.
no. 2, pp. 44–49, Mar./Apr. 2019. [38] S. Banerjee, V. Odelu, A. K. Das, S. Chattopadhyay, and D. Giri, “Anony-
[22] A. Sunyaev, D. Chornyi, C. Mauro, and H. Krcmar, “Evaluation framework mous fine-grained user access control scheme for Internet of Things
for personal health records: Microsoft HealthVault vs. Google Health,” in architecture,” in Proc. 15th Int. Conf. Math. Comput. D. Giri, A. T. S.
Proc. IEEE 43rd Hawaii Int. Conf. Syst. Sci., Honolulu, HI, USA, 2010, Ho, S. Ponnusamy, and N.-W. Lo, Eds., Singapore: Springer, 2021, pp.
pp. 1–10. 47–66.
[23] C. Patel and N. p. Doshi, “Secure lightweight key exchange using ECC [39] A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, “Fog computing for
for user-gateway paradigm,” IEEE Trans. Comput., pp. 1–1, 2020, doi: healthcare 4.0 environment: Opportunities and challenges,” Comput. Elect.
10.1109/TC.2020.3026027. Eng., vol. 72, no. 2, pp. 1–13, 2018.
[24] M. Fotouhi, M. Bayat, A. K. Das, H. A. N. Far, S. M. Pournaghi, and [40] D. Prashar, N. Jha, M. Shafiq, N. Ahmad, M. Rashid, S. A. Banday, H. U.
M. Doostari, “A lightweight and secure two-factor authentication scheme Khan, “Blockchain-based automated system for identification and storage
for wireless body area networks in health-care IoT,” Comput. Netw., of networks,” Security and Communication Networks, vol. 2021, pp. 1–7,
vol. 177, no. 4, pp. 107333–107345, 2020. Article ID 6694281, 2021, doi: 10.1155/2021/6694281.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on January 10,2023 at 09:18:00 UTC from IEEE Xplore. Restrictions apply.