E-Health Privacy and Security through ECC, SHA-256, and Multi-Authority Approaches
DOI:
https://doi.org/10.48001/joitc.2023.119-13Keywords:
Ciphertext policy attribute-based encryption, Cloud computing, E-Health, ECC (Elliptic Curve Cryptography), Multi-authority, SHA-256Abstract
The rapid digitization of healthcare services has led to the proliferation of electronic health (E-Health) systems, providing convenience and improved patient care. However, the increasing use of E-Health platforms also raises concerns about the privacy and security of sensitive medical information. This review paper explores the challenges surrounding E-Health privacy and security and presents a comprehensive approach to addressing these concerns through the implementation of Elliptic Curve Cryptography (ECC), Secure Hash Algorithm 256 (SHA-256), and multi-authority schemes. The synergistic application of these cryptographic techniques not only fortifies the protection of patient data but also establishes a robust framework for secure data sharing and management in E-Health systems.
Downloads
References
Almulhim, M., & Zaman, N. (2018, February). Proposing secure and lightweight authentication scheme for IoT based E-health applications. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 481-487). IEEE.
https://doi.org/10.23919/ICACT.2018.8323802.
Bodeis, W., & Corser, G. P. (2021, March). Blockchain adoption, implementation and integration in healthcare application systems. In SoutheastCon 2021 (pp. 1-3). IEEE. https://doi.org/10.1109/SoutheastCon45413.2021.9401885.
Chakraborty, S., Aich, S., & Kim, H. C. (2019, February). A secure healthcare system design framework using blockchain technology. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 260-264). IEEE. https://doi.org/10.23919/ICACT.2019.8701983.
Fernandez-Aleman, J. L., Senor, I. C., Lozoya, P. A. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541-562. https://doi.org/10.1016/j.jbi.2012.12.003.
Gupta, R., Shukla, A., Mehta, P., Bhattacharya, P., Tanwar, S., Tyagi, S., & Kumar, N. (2020, July). VAHAK: A blockchain-based outdoor delivery scheme using UAV for healthcare 4.0 services. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 255-260). IEEE. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162738.
Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625-1647. https://doi.org/10.3390/s120201625.
Kumar, R., Marchang, N., & Tripathi, R. (2020, January). Distributed off-chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. In 2020 International Conference on Communication Systems & Networks (COMSNETS) (pp. 1-5). IEEE. https://doi.org/10.1109/COMSNETS48256.2020.9027313.
Lee, Y. S., Alasaarela, E., & Lee, H. (2014, February). Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. In The International Conference on Information Networking 2014 (ICOIN2014) (pp. 453-457). IEEE. https://doi.org/10.1109/ICOIN.2014.6799723.
Tsai, K. L., Leu, F. Y., & Tan, J. S. (2016). An ECC-based secure EMR transmission system with data leakage prevention scheme. International Journal of Computer Mathematics, 93(2), 367-383. https://doi.org/10.1080/00207160.2014.955482.
Wang, S., Wang, J., Wang, X., Qiu, T., Yuan, Y., Ouyang, L., ... & Wang, F. Y. (2018). Blockchain-powered parallel healthcare systems based on the ACP approach. IEEE Transactions on Computational Social Systems, 5(4), 942-950. https://doi.org/10.1109/TCSS.2018.2865526.