نظام جديد لتخزين البيانات الطبية السرية باستخدام تقنية تشفيرChaskey و Blockchain

محتوى المقالة الرئيسي

Aymen Mudheher Badr
https://orcid.org/0000-0002-1373-9950
Lamia Chaari Fourati
https://orcid.org/0000-0003-0401-5050
Samiha Ayed

الملخص

يعد التخزين الآمن للمعلومات الطبية السرية أمرًا بالغ الأهمية لمنظمات الرعاية الصحية التي تسعى إلى حماية خصوصية المريض والامتثال للمتطلبات التنظيمية. في هذا البحث، نقدم نظامًا جديدًا للتخزين الآمن للبيانات الطبية باستخدام تقنية تشفير Chaskey و blockchain. يستخدم النظام تشفير Chaskey لضمان سرية وسلامة البيانات الطبية، وتكنولوجيا blockchain لتوفير حلول تخزين البيانات الطبية بحيث يكون قابل للتطوير ويتميز باللامركزية. يستخدم النظام أيضًا تقنيات Bflow للتجزئة ومنها التجزئة الرأسية لتعزيز قابلية التوسع وإدارة البيانات المخزنة. بالإضافة إلى ذلك، يستخدم النظام العقود الذكية لفرض سياسات التحكم في الوصول والتدابير الأمنية الأخرى. سنقدم وصف للنظام المقترح بالتفصيل ونقدم تحليلاً لخصائصه الأمنية والأداء. تظهر نتائجنا أن النظام يوفر حلاً آمنًا للغاية وقابل للتطوير لتخزين البيانات الطبية السرية، مع تطبيقات محتملة في مجموعة واسعة من إعدادات الرعاية الصحية.

تفاصيل المقالة

كيفية الاقتباس
1.
نظام جديد لتخزين البيانات الطبية السرية باستخدام تقنية تشفيرChaskey و Blockchain . Baghdad Sci.J [انترنت]. 5 ديسمبر، 2023 [وثق 20 مايو، 2024];20(6(Suppl.):2651. موجود في: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9203
القسم
article

كيفية الاقتباس

1.
نظام جديد لتخزين البيانات الطبية السرية باستخدام تقنية تشفيرChaskey و Blockchain . Baghdad Sci.J [انترنت]. 5 ديسمبر، 2023 [وثق 20 مايو، 2024];20(6(Suppl.):2651. موجود في: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9203

المراجع

Kadhim KT, Alsahlany AM, Wadi SM, Kadhum HT. An overview of patients’ health status monitoring system based on the Internet of Things (IoT). Wirel Pers Commun. 2020; 114(3): 2235-2262. https://doi.org/10.1007/s11277-020-07474-0

Chenthara S, Ahmed K, Wang H, Whittaker F, Chen Z Healthchain. A novel framework on privacy preservation of electronic health records using blockchain technology. PLoS One. 2020; 15(12): e0243043. https://doi.org/10.1371/journal.pone.0243043

Mohammed NS, Dawood OA, Sagheer AM, Nafea AA. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon. Baghdad Sci J. 2023. https://doi.org/10.21123/bsj.2023.8164

Seh A H, Zarour M, Alenezi M, Sarkar A K, Agrawal A, Kumar R, et al. Healthcare data breaches: insights and implications. Healthcare (Basel) 2020 May 13; 8 (2): 133. https://doi.org/10.3390/healthcare8020133

Chiadighikaobi IR, Katuk N. A scoping study on lightweight cryptography reviews in IoT. Baghdad Sci J. 2021; 18(2): 989-1000. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0989

Javaid M, Khan I. H. Internet of Things (IoT) enabled healthcare helps to take the challenges of the COVID-19 Pandemic. J Oral Biol Craniofacial Res. 2021; 11(2): 209-214. https://doi.org/10.1016/j.jobcr.2021.01.015

Shashi M. Leveraging Blockchain-Based Electronic Health Record Systems in Healthcare 4.0. Int J Innov Technol Explor Eng. 2022; 12(1): 1-5. https:// doi.org/10.35940/ijitee.A9359.1212122

Chelladurai U, Pandian S. A novel blockchain-based electronic health record automation system for healthcare. J Ambient Intell Humaniz Comput. 2022: 1-11. https://doi.org/10.1007/s12652-021-03163-3

Adere EM. Blockchain in healthcare and IoT: A systematic literature review. Array. 2022; 14: 100-139. https://doi.org/10.1016/j.array.2022.100139

Zhang J, Ji X, Wang J, Li J, Wang N. A differential fault attack on the security vehicle system applied SIMON block cipher. IEEE Trans Intell Transp Syst. 2022. https://doi.org/10.1109/TITS.2022.3157955

Rashidi B. High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. Int J circuit theory Appl. 2019; 47(8): 1254-1268. https://doi.org/10.1002/cta.2645

Liu J, Coomes D A, Gibson L, Hu G, Liu J, Luo Y, et al. Forest fragmentation in China and its effect on biodiversity. Biol Rev. 2019; 94(5): 1636-1657. https://doi.org/10.1111/brv.12519

Dhinakaran D, Prathap P M. Preserving data confidentiality in association rule mining using data share allocator algorithm. Intell Autom Soft Comput. 2022; 33(3): 1876-1892.‏https://doi.org/10.32604/iasc.2022.024509

Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J Netw Comput Appl. 2020; 167: 102710. https://doi.org/10.1016/j.jnca.2020.102710

Zhang G, Yang Z, Liu W. Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Networks. 2022; 203: 108586. https://doi.org/10.1016/j.comnet.2021.108586

Wu G, Wang S, Ning Z. Blockchain-enabled privacy-preserving access control for data publishing and sharing in the internet of medical things. IEEE Internet Things J. 2021; 9(11): 8091-8104. https://doi.org/10.1109/JIOT.2021.3138104

Dwivedi SK, Amin R, Vollala S. Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. J Inf Secur Appl. 2020; 54: 102554. https://doi.org/10.1016/j.jisa.2020.102554

Park YH, Kim Y, Lee SO, Ko K. Secure outsourced blockchain-based medical data sharing system using proxy re-encryption. Appl Sci. 2021; 11(20): 9422. https://doi.org/10.3390/app11209422

Kraleva L, Ashur T, Rijmen V. Rotational cryptanalysis on MAC algorithm Chaskey. In: International Conference on Applied Cryptography and Network Security. Cham: Springer International Publishing, 2020; 153-168.‏ https://doi.org/10.1007/978-3-030-57808-4

Hofmann AG, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics. 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397

Minderman M, Lantermans H C, Grüneberg L J, Cillessen S A, Bende R J, van Noesel, et al. MALT1-dependent cleavage of CYLD promotes NF-κB signaling and growth of aggressive B-cell receptor-dependent lymphomas. Blood Cancer J. 2023; 13(1): 37. https://doi.org/10.1038/s41408-023-00809-7

Okardi B, Asagba O. Overview of distributed database system. Int J Comput Tech. 2021; 8(1): 83-100. http://www.ijctjournal.org/volume8/issue1/ijct-v8i1p8.pdf

Liu X, Deng J, Sun Q, Xue C, Li S, Zhou Q, et al. Differentiation of intracranial solitary fibrous tumor/hemangiopericytoma from atypical meningioma using apparent diffusion coefficient histogram analysis. Neurosurg Rev. 2022; 45(3): 2449-2456. https://doi.org/10.1007/s10143-022-01771-x

Wang J, Zhang C, Chang M, He W, Lu X, Fei S, et al. Optimization of electronic nose sensor array for tea aroma detecting based on correlation coefficient and cluster analysis. Chemosensors. 2021; 9(9): 266. https://doi.org/10.3390/chemosensors9090266

Kim T, Oh J, Kim N, Cho S, Yun SY. Comparing kullback-leibler divergence and mean squared error loss in knowledge distillation. arXiv Prepr arXiv210508919. 2021. https://doi.org/10.48550/arXiv.2105.08919

Suriyan K, Ramaingam N, Rajagopal S, Sakkarai J, Asokan B, Alagarsamy M. Performance analysis of peak signal-to-noise ratio and multipath source routing using different denoising method. Bull Electr Eng Inform. 2022; 11(1): 286-292. https://doi.org/10.11591/eei.v11i1.3332

Setiadi DRIM. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl. 2021; 80(6): 8423-8444. https://doi.org/10.1007/s11042-020-10035-z

Sim K, Yang J, Lu W, Gao X. MaD-DLS: mean and deviation of deep and local similarity for image quality assessment. IEEE Trans Multimed. 2020; 23: 4037-4048. https://doi.org/10.1109/TMM.2020.3037482

Zhang X, Zhang W, Sun W, Sun X, Jha SK. A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection. Comput Syst Sci Eng. 2022; 41(3): 1043-1056. https://doi.org/10.32604/csse.2022.022305

Peng Y, Shi C, Zhu Y, Gu M, Zhuang S. Terahertz spectroscopy in biomedical field: a review on signal-to-noise ratio improvement. PhotoniX. 2020; 1: 1-18. https://doi.org/10.1186/s43074-020-00011-z

Trigui I, Agbogla EK, Benjillali M, Ajib W, Zhu WP. Bit error rate analysis for reconfigurable intelligent surfaces with phase errors. IEEE Commun Lett. 2021; 25(7): 2176-2180. https://doi.org/10.1109/LCOMM.2021.3071433

Ohyama Y, Naganuma H, Ishida H, Hoshino T. Portal vein gas in a patient with acute cholangitis: Report of a case with emphasis on B-flow imaging. J Med Ultrasound. 2022; 49(1): 107-108.‏ https://doi.org/10.1007/s10396-021-01167-2

Hofmann A G, Mlekusch I, Wickenhauser G, Assadian A, Taher F. Clinical Applications of B-Flow Ultrasound: A Scoping Review of the Literature. Diagnostics, 2023; 13(3): 397. https://doi.org/10.3390/diagnostics13030397

Nazari H, Bidgoli M M, Ghasvari H. Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT. IET Image Proces. 2023; 17: 2984-3001. https://doi.org/10.1049/ipr2.12849

Wu Z, Zhang K, Ren Y, Li J, Sun J, Wan W. Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. Secur Commun Netw. 2021; 2021: 1-16.‏ https://doi.org/10.1155/2021/6675354

Elkandoz M T, Alexan W, Hussein H H. Double-layer image security scheme with aggregated mathematical sequences. Int Conf Adv Commun Control Comput. Technol. (CommNet), Rabat, Morocco. 2019; 1-7. https://doi.org/10.1109/COMMNET.2019.8742370

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.