Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption

2021 ◽  
Vol 11 (20) ◽  
pp. 9422
Author(s):  
Young-Hoon Park ◽  
Yejin Kim ◽  
Shin-Ok Lee ◽  
Kwangman Ko

The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been developed. However, owing to sharing and scalability issues, additional security technologies have been proposed. Nonetheless, these technologies cause other problems, such as efficiency issues. Blockchain-based EHR management systems have been proposed to overcome computational overhead. However, because most blockchain systems are installed by outsourcing companies, EHRs may be leaked to the company. Hence, we herein propose a blockchain-based EHR management scheme with proxy re-encryption. In this scheme, we set a proxy server that re-encrypts the ciphertext between file servers, thereby solving EHR sharing issues. Furthermore, because the server is separated from the blockchain system, the outsourcing company cannot manipulate the server or access the records. In addition, the blockchain assists in access control by using smart contracts, thereby enabling secure and efficient EHR sharing. By performing security analysis, we prove that our proposed scheme solves the aforementioned security problems. In addition, we experimentally demonstrate the efficient operation of the proposed system.

2020 ◽  
Vol 17 (1) ◽  
pp. 402-408
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

The Internet of Things (IoT) has ushered in numerous devices in many areas in our life and in industries. It could comprise devices with sensors to gather and broadcast data over the internet. As the devices are IP-based and the media are shared, any user in the network can have an access to the communication contents. The only way to impose access control in the sensor networks is through cryptography. A key is applied to encrypt the communication to prevent from unauthorized access to the network. Choosing a suitable key management scheme is very important in sensor networks as it should satisfy the constraints of the sensors. There are two indispensable public cryptosystems available in the literatures-RSA and Elliptic curve cryptography (ECC). ECC gives strong resistance to cryptanalytic attacks. So, it is used with smaller key sizes than RSA (Valenta, L., et al., 2018. In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), April; IEEE. pp.384–398). The most prettiness of using elliptic curve cryptography over other cryptosystems (i.e., RSA) is that it provides same security strength for a lesser key without breaching the system, thereby consuming less resources and ameliorating performances and fast data throughput of the devices. To choose a suitable public cryptosystem for use in IoT devices like sensor networks, elliptic curve cryptography and RSA are comparatively analyzed in this paper.


2013 ◽  
Vol 341-342 ◽  
pp. 1133-1137 ◽  
Author(s):  
Yong Lei Song ◽  
Shu Guo Cao

According to the existing problems in current key management strategy of wireless sensor networks, which have computation complexity, multi-memory space and inflexible management, this paper proposed a lightweight of cluster-based key management scheme for wireless sensor networks. Implementing the EBS(exclusive basis system) in the cluster heads communication, it could effectively enhance the ability of the resilience. Using Chinese remainder theorem in sensors communication, it will have less storage consumption, Lower communication and computational overhead. Under comparative analysis, it meets the needs of the WSNs key management and provides the better connectivity as well as the resilience compare to other key management schemes.


Wireless sensor networks (WSNs) are a promising technology for several industrial real-time and quotidian applications. Due to inherent limitations in WSN, security is a crucial issue. Cryptographic primitives are the fundamental components for designing security protocols to achieve security and privacy in WSN. Based on the review, it has been analyzed that the majority of security protocols for WSN are based on encryption and key distribution. The main open issue for these approaches concerns the establishment of security with an involvement of complex procedure, which presents considerable memory overheads, in contrast with the limited resources of sensor nodes. Therefore, the proposed work presents the modeling of an analytical approach for efficient encryption using temporal key management for robust security services to resists potential attacks and enables secure communication. The utilization of temporal-key mechanism in encryption operation offers additional support to routing operation in the network for secure data transmission with negligible computational overhead, thus preserving a higher level of energy savings in packet transmission operation. The validation of the proposed system performance is carried out a simulation study, which shows the effectiveness of the proposed system in terms of node remaining energy and processing time.


2021 ◽  
Author(s):  
Vinay Michael

Abstract Internet of Things (IoT) based applications and systems are gaining attention in the recent days because of their vast benefits such as efficient utilization of resources, enhanced data collection, improved security, lesser human efforts and reduced time. Security of sensitive data in IoT based fog environments is inevitable to prevent those data to be misused by the attackers. In this study, we present an improved hybrid algorithm termed as HQCP-ABE (Hybrid Quantum key Cipher text Policy Attribute based Encryption with Cipher text update) that integrates highly effective algorithms such as CP-ABE, Quantum key cryptography and cipher text update. The proposed algorithm eliminates the need of costly pairing during decryptions and efficiently performs data encryption, decryption and user authorization. The proposed protocol is demonstrated to be highly efficient in terms of encryption and decryption while compared to other existing methods. It also achieves lesser packet loss, reduced control overheads, reduced computational overhead during encryption and decryption processes, lesser delay, improved security, packet delivery ratio, throughput, network lifetime with limited bandwidth and user privacy. We further considered energy consumption in this study. The proposed HQCP-ABE method is demonstrated using ns3 simulation and compared with existing CP-ABE and PA-CPABE methods.


2013 ◽  
Vol 846-847 ◽  
pp. 864-868
Author(s):  
Abdoulaye Diop ◽  
Yue Qi ◽  
Qin Wang

WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks (NKMS). The security analysis demonstrates that NKMS is an effective solution to the key management of cluster based wireless sensor networks.


2015 ◽  
Vol 1 (2) ◽  
pp. 280
Author(s):  
Sufyan T. Al-Janabi ◽  
Ali J. Dawood ◽  
Ekram Habeeb Hassan

The design and deployment of Wireless Body Area Networks (WBANs) have recently resulted from the use of sensors to measure the biometrics and movements of the human body. The development of such networks is imperative for modern telemedicine and e-health. Since WBANs are dealing with very sensitive information (i.e., medical data which has a direct impact on human life), security is an essential part of WBANs design. Indeed, key management plays pivotal role in ensuring security requirements in WBAN. In this paper, an enhanced version of a biometric-based distributed key management scheme is introduced. This scheme is designed for use in WBAN scenarios. It makes use of key refreshment schedules and distributes key management responsibility among all nodes in a WBAN in a fair manner. The scheme supports the use of biometric measurements to generate symmetric keys in WBANs via facilitating the work of biometric random number generators that can extract a random bit sequence from biological data to generate symmetric keys. A general description of the development of this scheme is given along with all phases of its operation. Furthermore, simulation results are presented with security analysis related to the resistance of the proposed scheme against some possible attacks.


2013 ◽  
Vol 385-386 ◽  
pp. 1591-1594
Author(s):  
Qiu Na Niu

With the popularity of group-oriented applications, secure electronic communication among all group members has become a major issue. This paper proposes a distributed group-oriented key management scheme for secure electronic communication. The scheme deploys Elliptic Curve Diffie-Hellman (ECDH) which is more lightweight as compared to regular Diffie-Hellman. According to the security analysis, the proposed scheme provides a number of desirable security properties, including group key secrecy, forward secrecy and backward secrecy.


2014 ◽  
Vol 644-650 ◽  
pp. 1907-1910
Author(s):  
Wei Zhou Zhao ◽  
Hui Zhang ◽  
Hui Zhen Wang ◽  
Hui Li Jing

This paper presents an algorithm about key management including key generation and key recovery in cryptosystem based on fingerprint and fuzzy decision. Traditional key for the encryption and decryption is remembered by a trusted person, or stored in a safety location. The key may be lost or misused for the person’s self-ish desire. Sharing secret algorithm is used to prevent from misusing in a single management, and fuzzy vault scheme is used to avoid the disadvantage of numerical password. But the proposed method is not an easy combination of fuzzy vault and sharing secret. To keep from the collusion among some persons, a simple fuzzy decision is added in the proposed method. Security analysis and experimental results are given to show the proposed algorithm is feasible and safe for key management in cryptosystem.


2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

Sign in / Sign up

Export Citation Format

Share Document