Downloads: 0 | Views: 332
Student Project | Computer Science & Engineering | India | Volume 12 Issue 10, October 2023 | Popularity: 4.8 / 10
Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Abstract: Objective: Electronic health records possess the patient's medication details and their health history. The health records attract the attention of the attackers? as it possesses invaluable information. Loss of electronic health record leads to a wrong medication or surgery. Healthcare systems provide fewer security measures to secure the health records. In traditional electronic health records (EHRs), medical-related information is generally separately controlled by different hospitals and thus it leads to the inconvenience of information sharing. Cloud-based EHRs solve the problem of information sharing in the traditional EHRs. However, cloud- based EHRs suffer the centralized problem, i.e., cloud service center and key-generation center. Proposed work focus on creating a new EHRs paradigm which can help in dealing with the centralized problem of cloud - based EHRs. The solution is to make use of the emerging technology of blockchain to EHRs (denoted as blockchain-based EHRs for convenience). First, define the system model of blockchain-based EHRs in the setting of blockchain. In addition, the authentication issue is very important for EHRs. However, existing authentication schemes for blockchain-based EHRs have their own weak points. Here also propose an authentication scheme for blockchain-based EHRs. Our proposal is Role based signature scheme with multiple authorities which can resist collusion attack. Also implement cryptography methods for secure data storage and time based access control method to enhance the data access control. Furthermore, proposed scheme is provably secure in the random oracle model and has more efficient signing and verification algorithms than existing authentication schemes.
Keywords: blockchain, data privacy, decentralized access control, decentralized identifier, self sovereign identity
Edition: Volume 12 Issue 10, October 2023
Pages: 581 - 585
DOI: https://www.doi.org/10.21275/SR231006123601
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 718
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 698
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera