A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology

Main Article Content

Aymen Mudheher Badr
https://orcid.org/0000-0002-1373-9950
Lamia Chaari Fourati
https://orcid.org/0000-0003-0401-5050
Samiha Ayed

Abstract

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.

Article Details

How to Cite
1.
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology. Baghdad Sci.J [Internet]. 2023 Dec. 5 [cited 2024 Apr. 27];20(6(Suppl.):2651. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9203
Section
article

How to Cite

1.
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology. Baghdad Sci.J [Internet]. 2023 Dec. 5 [cited 2024 Apr. 27];20(6(Suppl.):2651. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9203

References

Kadhim KT, Alsahlany AM, Wadi SM, Kadhum HT. An overview of patients’ health status monitoring system based on the Internet of Things (IoT). Wirel Pers Commun. 2020; 114(3): 2235-2262. https://doi.org/10.1007/s11277-020-07474-0

Chenthara S, Ahmed K, Wang H, Whittaker F, Chen Z Healthchain. A novel framework on privacy preservation of electronic health records using blockchain technology. PLoS One. 2020; 15(12): e0243043. https://doi.org/10.1371/journal.pone.0243043

Mohammed NS, Dawood OA, Sagheer AM, Nafea AA. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon. Baghdad Sci J. 2023. https://doi.org/10.21123/bsj.2023.8164

Seh A H, Zarour M, Alenezi M, Sarkar A K, Agrawal A, Kumar R, et al. Healthcare data breaches: insights and implications. Healthcare (Basel) 2020 May 13; 8 (2): 133. https://doi.org/10.3390/healthcare8020133

Chiadighikaobi IR, Katuk N. A scoping study on lightweight cryptography reviews in IoT. Baghdad Sci J. 2021; 18(2): 989-1000. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0989

Javaid M, Khan I. H. Internet of Things (IoT) enabled healthcare helps to take the challenges of the COVID-19 Pandemic. J Oral Biol Craniofacial Res. 2021; 11(2): 209-214. https://doi.org/10.1016/j.jobcr.2021.01.015

Shashi M. Leveraging Blockchain-Based Electronic Health Record Systems in Healthcare 4.0. Int J Innov Technol Explor Eng. 2022; 12(1): 1-5. https:// doi.org/10.35940/ijitee.A9359.1212122

Chelladurai U, Pandian S. A novel blockchain-based electronic health record automation system for healthcare. J Ambient Intell Humaniz Comput. 2022: 1-11. https://doi.org/10.1007/s12652-021-03163-3

Adere EM. Blockchain in healthcare and IoT: A systematic literature review. Array. 2022; 14: 100-139. https://doi.org/10.1016/j.array.2022.100139

Zhang J, Ji X, Wang J, Li J, Wang N. A differential fault attack on the security vehicle system applied SIMON block cipher. IEEE Trans Intell Transp Syst. 2022. https://doi.org/10.1109/TITS.2022.3157955

Rashidi B. High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. Int J circuit theory Appl. 2019; 47(8): 1254-1268. https://doi.org/10.1002/cta.2645

Liu J, Coomes D A, Gibson L, Hu G, Liu J, Luo Y, et al. Forest fragmentation in China and its effect on biodiversity. Biol Rev. 2019; 94(5): 1636-1657. https://doi.org/10.1111/brv.12519

Dhinakaran D, Prathap P M. Preserving data confidentiality in association rule mining using data share allocator algorithm. Intell Autom Soft Comput. 2022; 33(3): 1876-1892.‏https://doi.org/10.32604/iasc.2022.024509

Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J Netw Comput Appl. 2020; 167: 102710. https://doi.org/10.1016/j.jnca.2020.102710

Zhang G, Yang Z, Liu W. Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Networks. 2022; 203: 108586. https://doi.org/10.1016/j.comnet.2021.108586

Wu G, Wang S, Ning Z. Blockchain-enabled privacy-preserving access control for data publishing and sharing in the internet of medical things. IEEE Internet Things J. 2021; 9(11): 8091-8104. https://doi.org/10.1109/JIOT.2021.3138104

Dwivedi SK, Amin R, Vollala S. Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. J Inf Secur Appl. 2020; 54: 102554. https://doi.org/10.1016/j.jisa.2020.102554

Park YH, Kim Y, Lee SO, Ko K. Secure outsourced blockchain-based medical data sharing system using proxy re-encryption. Appl Sci. 2021; 11(20): 9422. https://doi.org/10.3390/app11209422

Kraleva L, Ashur T, Rijmen V. Rotational cryptanalysis on MAC algorithm Chaskey. In: International Conference on Applied Cryptography and Network Security. Cham: Springer International Publishing, 2020; 153-168.‏ https://doi.org/10.1007/978-3-030-57808-4

Hofmann AG, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics. 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397

Minderman M, Lantermans H C, Grüneberg L J, Cillessen S A, Bende R J, van Noesel, et al. MALT1-dependent cleavage of CYLD promotes NF-κB signaling and growth of aggressive B-cell receptor-dependent lymphomas. Blood Cancer J. 2023; 13(1): 37. https://doi.org/10.1038/s41408-023-00809-7

Okardi B, Asagba O. Overview of distributed database system. Int J Comput Tech. 2021; 8(1): 83-100. http://www.ijctjournal.org/volume8/issue1/ijct-v8i1p8.pdf

Liu X, Deng J, Sun Q, Xue C, Li S, Zhou Q, et al. Differentiation of intracranial solitary fibrous tumor/hemangiopericytoma from atypical meningioma using apparent diffusion coefficient histogram analysis. Neurosurg Rev. 2022; 45(3): 2449-2456. https://doi.org/10.1007/s10143-022-01771-x

Wang J, Zhang C, Chang M, He W, Lu X, Fei S, et al. Optimization of electronic nose sensor array for tea aroma detecting based on correlation coefficient and cluster analysis. Chemosensors. 2021; 9(9): 266. https://doi.org/10.3390/chemosensors9090266

Kim T, Oh J, Kim N, Cho S, Yun SY. Comparing kullback-leibler divergence and mean squared error loss in knowledge distillation. arXiv Prepr arXiv210508919. 2021. https://doi.org/10.48550/arXiv.2105.08919

Suriyan K, Ramaingam N, Rajagopal S, Sakkarai J, Asokan B, Alagarsamy M. Performance analysis of peak signal-to-noise ratio and multipath source routing using different denoising method. Bull Electr Eng Inform. 2022; 11(1): 286-292. https://doi.org/10.11591/eei.v11i1.3332

Setiadi DRIM. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl. 2021; 80(6): 8423-8444. https://doi.org/10.1007/s11042-020-10035-z

Sim K, Yang J, Lu W, Gao X. MaD-DLS: mean and deviation of deep and local similarity for image quality assessment. IEEE Trans Multimed. 2020; 23: 4037-4048. https://doi.org/10.1109/TMM.2020.3037482

Zhang X, Zhang W, Sun W, Sun X, Jha SK. A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection. Comput Syst Sci Eng. 2022; 41(3): 1043-1056. https://doi.org/10.32604/csse.2022.022305

Peng Y, Shi C, Zhu Y, Gu M, Zhuang S. Terahertz spectroscopy in biomedical field: a review on signal-to-noise ratio improvement. PhotoniX. 2020; 1: 1-18. https://doi.org/10.1186/s43074-020-00011-z

Trigui I, Agbogla EK, Benjillali M, Ajib W, Zhu WP. Bit error rate analysis for reconfigurable intelligent surfaces with phase errors. IEEE Commun Lett. 2021; 25(7): 2176-2180. https://doi.org/10.1109/LCOMM.2021.3071433

Ohyama Y, Naganuma H, Ishida H, Hoshino T. Portal vein gas in a patient with acute cholangitis: Report of a case with emphasis on B-flow imaging. J Med Ultrasound. 2022; 49(1): 107-108.‏ https://doi.org/10.1007/s10396-021-01167-2

Hofmann A G, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics, 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397

Nazari H, Bidgoli M M, Ghasvari H. Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT. IET Image Proces. 2023; 17: 2984-3001. https://doi.org/10.1049/ipr2.12849

Wu Z, Zhang K, Ren Y, Li J, Sun J, Wan W. Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. Secur Commun Netw. 2021; 2021: 1-16.‏ https://doi.org/10.1155/2021/6675354

Elkandoz M T, Alexan W, Hussein H H. Double-layer image security scheme with aggregated mathematical sequences. Int Conf Adv Commun Control Comput. Technol. (CommNet), Rabat, Morocco. 2019; 1-7. https://doi.org/10.1109/COMMNET.2019.8742370

Similar Articles

You may also start an advanced similarity search for this article.