2022
DOI: 10.1109/access.2022.3193238
|View full text |Cite
|
Sign up to set email alerts
|

DDMIA: Distributed Dynamic Mutual Identity Authentication for Referrals in Blockchain-Based Health Care Networks

Abstract: Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The distributed health data and the decentralized health care system structure make it ideal for blockchain-based health information systems. The authors consider the referral use case; for instance, a patient goes to his primary health Centre (PHC) for treatment and is referred to a hospital. Authentication is usually done using certificates or key cryptography, which could become cumber… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…To alleviate the computational burden on users, the system employs a strategy that primarily performs decryption and encryption computations, and the results are transmitted to the user side. Compared with existing schemes such as [11], [38], and [39], the proposed scheme in this paper demonstrates certain advantages in terms of decryption and encryption time. Furthermore, the user side's decryption and encryption computation overhead does not significantly increase, as depicted in Figures 10 and 11.…”
Section: Computational Overheadmentioning
confidence: 95%
“…To alleviate the computational burden on users, the system employs a strategy that primarily performs decryption and encryption computations, and the results are transmitted to the user side. Compared with existing schemes such as [11], [38], and [39], the proposed scheme in this paper demonstrates certain advantages in terms of decryption and encryption time. Furthermore, the user side's decryption and encryption computation overhead does not significantly increase, as depicted in Figures 10 and 11.…”
Section: Computational Overheadmentioning
confidence: 95%
“…In the realm of ransomware analysis [6] , researchers have provided a variety of insights, tools, and methods to detect ransomware activities, such as monitoring filesystem activities and leveraging application programming interface (API) hooking. It's worth noting that while traditional methods like static analysis, especially signature-based detection, remain popular for general malware detection, they aren't as prevalent for ransomware detection.…”
Section: Related Workmentioning
confidence: 99%
“…Simulation outcomes indicate that the RBEF can reduce operational setback by four to ten minutes and cut processing expenses by ten percent for healthcare data, outperforming existing blockchain healthcare systems in terms of efficiency. Several research works [4] , [6] , [8] delve into the security aspects of blockchain and the capabilities of artificial intelligence (AI) in enhancing proficient healthcare. They also explore distributed vigorous reciprocal identity verification within referral-centric healthcare systems.…”
Section: Related Workmentioning
confidence: 99%
“…An authentication scheme is required for nodes to prevent unauthorized access to data from external attackers. We employed BAN logic authentication owing to its lightweight nature and suitability for resource-constrained IoT devices [3], [23]. Furthermore, low block overhead and trustworthiness of validator nodes are essential to ensure high data integrity in blockchain-IoT environments.…”
Section: A Motivationmentioning
confidence: 99%