نظام جديد لتخزين البيانات الطبية السرية باستخدام تقنية تشفيرChaskey و Blockchain
محتوى المقالة الرئيسي
الملخص
يعد التخزين الآمن للمعلومات الطبية السرية أمرًا بالغ الأهمية لمنظمات الرعاية الصحية التي تسعى إلى حماية خصوصية المريض والامتثال للمتطلبات التنظيمية. في هذا البحث، نقدم نظامًا جديدًا للتخزين الآمن للبيانات الطبية باستخدام تقنية تشفير Chaskey و blockchain. يستخدم النظام تشفير Chaskey لضمان سرية وسلامة البيانات الطبية، وتكنولوجيا blockchain لتوفير حلول تخزين البيانات الطبية بحيث يكون قابل للتطوير ويتميز باللامركزية. يستخدم النظام أيضًا تقنيات Bflow للتجزئة ومنها التجزئة الرأسية لتعزيز قابلية التوسع وإدارة البيانات المخزنة. بالإضافة إلى ذلك، يستخدم النظام العقود الذكية لفرض سياسات التحكم في الوصول والتدابير الأمنية الأخرى. سنقدم وصف للنظام المقترح بالتفصيل ونقدم تحليلاً لخصائصه الأمنية والأداء. تظهر نتائجنا أن النظام يوفر حلاً آمنًا للغاية وقابل للتطوير لتخزين البيانات الطبية السرية، مع تطبيقات محتملة في مجموعة واسعة من إعدادات الرعاية الصحية.
Received 08/06/2023
Revised 08/09/2023
Accepted 10/09/2023
تفاصيل المقالة

هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.
كيفية الاقتباس
المراجع
Kadhim KT, Alsahlany AM, Wadi SM, Kadhum HT. An overview of patients’ health status monitoring system based on the Internet of Things (IoT). Wirel Pers Commun. 2020; 114(3): 2235-2262. https://doi.org/10.1007/s11277-020-07474-0
Chenthara S, Ahmed K, Wang H, Whittaker F, Chen Z Healthchain. A novel framework on privacy preservation of electronic health records using blockchain technology. PLoS One. 2020; 15(12): e0243043. https://doi.org/10.1371/journal.pone.0243043
Mohammed NS, Dawood OA, Sagheer AM, Nafea AA. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon. Baghdad Sci J. 2023. https://doi.org/10.21123/bsj.2023.8164
Seh A H, Zarour M, Alenezi M, Sarkar A K, Agrawal A, Kumar R, et al. Healthcare data breaches: insights and implications. Healthcare (Basel) 2020 May 13; 8 (2): 133. https://doi.org/10.3390/healthcare8020133
Chiadighikaobi IR, Katuk N. A scoping study on lightweight cryptography reviews in IoT. Baghdad Sci J. 2021; 18(2): 989-1000. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0989
Javaid M, Khan I. H. Internet of Things (IoT) enabled healthcare helps to take the challenges of the COVID-19 Pandemic. J Oral Biol Craniofacial Res. 2021; 11(2): 209-214. https://doi.org/10.1016/j.jobcr.2021.01.015
Shashi M. Leveraging Blockchain-Based Electronic Health Record Systems in Healthcare 4.0. Int J Innov Technol Explor Eng. 2022; 12(1): 1-5. https:// doi.org/10.35940/ijitee.A9359.1212122
Chelladurai U, Pandian S. A novel blockchain-based electronic health record automation system for healthcare. J Ambient Intell Humaniz Comput. 2022: 1-11. https://doi.org/10.1007/s12652-021-03163-3
Adere EM. Blockchain in healthcare and IoT: A systematic literature review. Array. 2022; 14: 100-139. https://doi.org/10.1016/j.array.2022.100139
Zhang J, Ji X, Wang J, Li J, Wang N. A differential fault attack on the security vehicle system applied SIMON block cipher. IEEE Trans Intell Transp Syst. 2022. https://doi.org/10.1109/TITS.2022.3157955
Rashidi B. High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. Int J circuit theory Appl. 2019; 47(8): 1254-1268. https://doi.org/10.1002/cta.2645
Liu J, Coomes D A, Gibson L, Hu G, Liu J, Luo Y, et al. Forest fragmentation in China and its effect on biodiversity. Biol Rev. 2019; 94(5): 1636-1657. https://doi.org/10.1111/brv.12519
Dhinakaran D, Prathap P M. Preserving data confidentiality in association rule mining using data share allocator algorithm. Intell Autom Soft Comput. 2022; 33(3): 1876-1892.https://doi.org/10.32604/iasc.2022.024509
Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J Netw Comput Appl. 2020; 167: 102710. https://doi.org/10.1016/j.jnca.2020.102710
Zhang G, Yang Z, Liu W. Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Networks. 2022; 203: 108586. https://doi.org/10.1016/j.comnet.2021.108586
Wu G, Wang S, Ning Z. Blockchain-enabled privacy-preserving access control for data publishing and sharing in the internet of medical things. IEEE Internet Things J. 2021; 9(11): 8091-8104. https://doi.org/10.1109/JIOT.2021.3138104
Dwivedi SK, Amin R, Vollala S. Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. J Inf Secur Appl. 2020; 54: 102554. https://doi.org/10.1016/j.jisa.2020.102554
Park YH, Kim Y, Lee SO, Ko K. Secure outsourced blockchain-based medical data sharing system using proxy re-encryption. Appl Sci. 2021; 11(20): 9422. https://doi.org/10.3390/app11209422
Kraleva L, Ashur T, Rijmen V. Rotational cryptanalysis on MAC algorithm Chaskey. In: International Conference on Applied Cryptography and Network Security. Cham: Springer International Publishing, 2020; 153-168. https://doi.org/10.1007/978-3-030-57808-4
Hofmann AG, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics. 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397
Minderman M, Lantermans H C, Grüneberg L J, Cillessen S A, Bende R J, van Noesel, et al. MALT1-dependent cleavage of CYLD promotes NF-κB signaling and growth of aggressive B-cell receptor-dependent lymphomas. Blood Cancer J. 2023; 13(1): 37. https://doi.org/10.1038/s41408-023-00809-7
Okardi B, Asagba O. Overview of distributed database system. Int J Comput Tech. 2021; 8(1): 83-100. http://www.ijctjournal.org/volume8/issue1/ijct-v8i1p8.pdf
Liu X, Deng J, Sun Q, Xue C, Li S, Zhou Q, et al. Differentiation of intracranial solitary fibrous tumor/hemangiopericytoma from atypical meningioma using apparent diffusion coefficient histogram analysis. Neurosurg Rev. 2022; 45(3): 2449-2456. https://doi.org/10.1007/s10143-022-01771-x
Wang J, Zhang C, Chang M, He W, Lu X, Fei S, et al. Optimization of electronic nose sensor array for tea aroma detecting based on correlation coefficient and cluster analysis. Chemosensors. 2021; 9(9): 266. https://doi.org/10.3390/chemosensors9090266
Kim T, Oh J, Kim N, Cho S, Yun SY. Comparing kullback-leibler divergence and mean squared error loss in knowledge distillation. arXiv Prepr arXiv210508919. 2021. https://doi.org/10.48550/arXiv.2105.08919
Suriyan K, Ramaingam N, Rajagopal S, Sakkarai J, Asokan B, Alagarsamy M. Performance analysis of peak signal-to-noise ratio and multipath source routing using different denoising method. Bull Electr Eng Inform. 2022; 11(1): 286-292. https://doi.org/10.11591/eei.v11i1.3332
Setiadi DRIM. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl. 2021; 80(6): 8423-8444. https://doi.org/10.1007/s11042-020-10035-z
Sim K, Yang J, Lu W, Gao X. MaD-DLS: mean and deviation of deep and local similarity for image quality assessment. IEEE Trans Multimed. 2020; 23: 4037-4048. https://doi.org/10.1109/TMM.2020.3037482
Zhang X, Zhang W, Sun W, Sun X, Jha SK. A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection. Comput Syst Sci Eng. 2022; 41(3): 1043-1056. https://doi.org/10.32604/csse.2022.022305
Peng Y, Shi C, Zhu Y, Gu M, Zhuang S. Terahertz spectroscopy in biomedical field: a review on signal-to-noise ratio improvement. PhotoniX. 2020; 1: 1-18. https://doi.org/10.1186/s43074-020-00011-z
Trigui I, Agbogla EK, Benjillali M, Ajib W, Zhu WP. Bit error rate analysis for reconfigurable intelligent surfaces with phase errors. IEEE Commun Lett. 2021; 25(7): 2176-2180. https://doi.org/10.1109/LCOMM.2021.3071433
Ohyama Y, Naganuma H, Ishida H, Hoshino T. Portal vein gas in a patient with acute cholangitis: Report of a case with emphasis on B-flow imaging. J Med Ultrasound. 2022; 49(1): 107-108. https://doi.org/10.1007/s10396-021-01167-2
Hofmann A G, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics, 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397
Nazari H, Bidgoli M M, Ghasvari H. Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT. IET Image Proces. 2023; 17: 2984-3001. https://doi.org/10.1049/ipr2.12849
Wu Z, Zhang K, Ren Y, Li J, Sun J, Wan W. Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. Secur Commun Netw. 2021; 2021: 1-16. https://doi.org/10.1155/2021/6675354
Elkandoz M T, Alexan W, Hussein H H. Double-layer image security scheme with aggregated mathematical sequences. Int Conf Adv Commun Control Comput. Technol. (CommNet), Rabat, Morocco. 2019; 1-7. https://doi.org/10.1109/COMMNET.2019.8742370