Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator

Azath Mubarakali,A. Alavudeen Basha
DOI: https://doi.org/10.1007/s12083-024-01789-6
IF: 3.488
2024-10-12
Peer-to-Peer Networking and Applications
Abstract:Security and privacy concerns have emerged as significant challenges for enhancing Electronic Health Records (EHR) system for cloud settings. Even though cloud storage offers benefits such as scalability and accessibility, it has risks to the confidentiality and integrity of patients' medical information. Some encryption algorithms are proposed to secure EHR data in cloud, but its efficiency is low. Therefore, the Cryptographic Hash Generator based Blockchain Technology for Secure Electronic Healthcare Record in Cloud (SEHR-BC-CHG) is proposed in this manuscript to maximize the security and secrecy of EHRs. Initially, the data is gathered from the health care centre, which is separated as sensitive and insensitive. To validate transaction authentication, the block chain system employs Cryptographic hash algorithm (CHG) and sensitive medical data is encrypted using the Discrete Shearlet Transform (DST) to enhance security. At Block Chain scheme, the user must submit a request to the CHG for obtaining data from healthcare application. To request verification, the request is distributed from the queue and Hybrid Chaotic Atom Search Optimization Algorithm based tree seed algorithm with Levy flight optimization (HCASOA-TSA-LF) is used to find optimum request that derives via unanimity node to begin the verification procedure. The experimental outcomes shows that the SEHR-BC-CHG method achieves 16.38%, 27.28% and 20.21% lesser encryption time when analyzed with existing models, like Safety enhancement with blockchain based modified infinite chaotic elliptic cryptography in cloud (SEHR-BC-MICEC), Secure clinical data sharing depending on traceable ring signature and blockchain (SEHR-BC-TRSA), a blockchain based privacy aware medical data sharing utilizing smart contract with encryption scheme (SEHR-BC-LFCA) respectively.
computer science, information systems,telecommunications
What problem does this paper attempt to address?