scholarly journals Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology

2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.

2020 ◽  
Author(s):  
Suresh Kondeti ◽  
Siva Kumar

With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client's body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients' therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.


2020 ◽  
Vol 5 (2) ◽  
Author(s):  
Tod D. Yates

Blockchain, the foundation of many cryptocurrencies, also can be useful for many other industries such as healthcare. Blockchain can enforce immutability and non-repudiation for information stored on it. Although some say the technology is not yet mature enough, others are putting blockchain to the test with programs and pilots. Examining these efforts and dissecting the detail allows us to look at blockchain’s qualities and pitfalls to allow data sharing efforts with medical records.It is widely agreed that sharing medical data outside of the silos where it is captured or created will benefit the individual’s care and outcomes. Regulation and personal humility often stand in the way of this sharing. Blockchain is offering new and novel ways to share data properly and securely with only the providers or researchers who are supposed to receive it. Blockchain is also allowing the patient to take control of their health data and in some cases, even profit from it. This is the concept behind a proposal by the author to allow a patient to share all or part of their data for research and to be justly compensated for that sharing.


2021 ◽  
Vol 44 (1) ◽  
pp. 76-96
Author(s):  
Weronika Wojturska ◽  

The paper assesses the security of medical data processing in the standardization of e-Health solutions in the European Union. First, the main cyber risks are identified, and then the effectiveness of health data protection and its interoperability between ICT systems is analysed in terms of strategy and regulatory support provided by the EU. The study indicates that the provisions of the GDPR seem to enhance processing of technological standardisation of e-Health solutions to follow the principle of technological neutrality when defining the required security measures.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 164
Author(s):  
Syed. Karimunnisa ◽  
K Suma Anusha

With the development of clouds and cloudlet technology along with wearable devices, the need for providing security to medical data can be increased. Medical data includes data collection, data storage and data sharing, etc. Traditional healthcare system transmits the medical data to the cloud using sensitive information which causes communication energy consumption. Practically, sharing medical data is a challenging task. Thus in this paper, we propose a novel healthcare system by using the flexibility of cloudlet. The operations of cloudlet include privacy protection, data sharing and intrusion detection. In data collection stage, First, the data collected by wearable devices is encrypted using Number Theory Research Unit (NTRU) method and that encrypted data can be transfered to nearby cloudlet. Secondly, we develop a new trust model to help users to select trustable similar patients who want to share stored data in the cloudlet and to communicate with each other about their diseases. Thirdly, we divide users’ medical data into three parts and give them security which is stored in remote cloud of hospital. Finally, to protect the healthcare system from malicious attacks, we implement a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, Our experiments proves the effectiveness of the proposed scheme.  


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselbergs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


Author(s):  
Brian Tuan Khieu ◽  
Melody Moh

A cloud-based public key infrastructure (PKI) utilizing blockchain technology is proposed. Big data ecosystems have scalable and resilient needs that current PKI cannot satisfy. Enhancements include using blockchains to establish persistent access to certificate data and certificate revocation lists, decoupling of data from certificate authority, and hosting it on a cloud provider to tap into its traffic security measures. Instead of holding data within the transaction data fields, certificate data and status were embedded into smart contracts. The tests revealed a significant performance increase over that of both traditional and the version that stored data within blocks. The proposed method reduced the mining data size, and lowered the mining time to 6.6% of the time used for the block data storage method. Also, the mining gas cost per certificate was consequently cut by 87%. In summary, completely decoupling the certificate authority portion of a PKI and storing certificate data inside smart contracts yields a sizable performance boost while decreasing the attack surface.


Author(s):  
Sagar Shankar Rajebhosale ◽  
Mohan Chandrabhan Nikam

A log is a record of events that happens within an organization containing systems and networks. These logs are very important for any organization, because a log file will able to record all user activities. Due to this, log files play a vital role and contain sensitive information, and therefore security should be a high priority. It is very important to the proper functioning of any organization, to securely maintain log records over an extended period of time. So, management and maintenance of logs is a very difficult task. However, deploying such a system for high security and privacy of log records may be overhead for an organization and require additional costs. Many techniques have been designed for security of log records. The alternative solution for maintaining log records is using Blockchain technology. A blockchain will provide security of the log files. Log files over a Blockchain environment leads to challenges with a decentralized storage of log files. This article proposes a secured log management over Blockchain and the use of cryptographic algorithms for dealing the issues to access a data storage. This proposed technology may be one complete solution to the secure log management problem.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


10.2196/16887 ◽  
2020 ◽  
Vol 22 (6) ◽  
pp. e16887
Author(s):  
Anjum Khurshid ◽  
Vivian Rajeswaren ◽  
Steven Andrews

Background In the homeless population, barriers to housing and supportive services include a lack of control or access to data. Disparate data formats and storage across multiple organizations hinder up-to-date intersystem access to records and a unified view of an individual’s health and documentation history. The utility of blockchain to solve interoperability in health care is supported in recent literature, but the technology has yet to be tested in real-life conditions encompassing the complex regulatory standards in the health sector. Objective This study aimed to test the feasibility and performance of a blockchain system in a homeless community to securely store and share data across a system of providers in the health care ecosystem. Methods We performed a series of platform demonstrations and open-ended qualitative feedback interviews to determine the key needs and barriers to user and stakeholder adoption. Account creation and data transactions promoting organizational efficiency and improved health outcomes in this population were tested with homeless users and service providers. Results Persons experiencing homelessness and care organizations could successfully create accounts, grant and revoke data sharing permissions, and transmit documents across a distributed network of providers. However, there were issues regarding the security of shared data, user experience and adoption, and organizational preparedness for service providers as end users. We tested a set of assumptions related to these problems within the project time frame and contractual obligations with an existing blockchain-based platform. Conclusions Blockchain technology provides decentralized data sharing, validation, immutability, traceability, and integration. These core features enable a secure system for the management and distribution of sensitive information. This study presents a concrete evaluation of the effectiveness of blockchain through an existing platform while revealing limitations from the perspectives of user adoption, cost-effectiveness, scalability, and regulatory frameworks.


Sign in / Sign up

Export Citation Format

Share Document