4.6 Article

Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain

Journal

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
Volume 24, Issue 8, Pages 2146-2156

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JBHI.2020.2969648

Keywords

Hospitals; Blockchain; Authentication; Computer architecture; IEEE Senior Members; Blockchain; decentralized authentication; IoT; healthcare; health big data; security

Ask authors/readers for more resources

In any interconnected healthcare system (e.g., those that are part of a smart city), interactions between patients, medical doctors, nurses and other healthcare practitioners need to be secure and efficient. For example, all members must be authenticated and securely interconnected to minimize security and privacy breaches from within a given network. However, introducing security and privacy-preserving solutions can also incur delays in processing and other related services, potentially threatening patients lives in critical situations. A considerable number of authentication and security systems presented in the literature are centralized, and frequently need to rely on some secure and trusted third-party entity to facilitate secure communications. This, in turn, increases the time required for authentication and decreases throughput due to known overhead, for patients and inter-hospital communications. In this paper, we propose a novel decentralized authentication of patients in a distributed hospital network, by leveraging blockchain. Our notion of a healthcare setting includes patients and allied health professionals (medical doctors, nurses, technicians, etc), and the health information of patients. Findings from our in-depth simulations demonstrate the potential utility of the proposed architecture. For example, it is shown that the proposed architecture's decentralized authentication among a distributed affiliated hospital network does not require re-authentication. This improvement will have a considerable impact on increasing throughput, reducing overhead, improving response time, and decreasing energy consumption in the network. We also provide a comparative analysis of our model in relation to a base model of the network without blockchain to show the overall effectiveness of our proposed solution.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. H. Deng

Summary: In this paper, a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA) is proposed to address the challenges of achieving result verification and adaptive security in privacy-preserving fuzzy multi-keyword search. VFSA utilizes locality sensitive hashing, twin Bloom filters, and a graph-based keyword partition algorithm to achieve adaptive sublinear retrieval. The Merkle hash tree structure and adapted multiset accumulator are used to check the correctness and completeness of search results.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Artificial Intelligence

ShareChain: Blockchain-enabled model for sharing patient data using federated learning and differential privacy

Laraib Javed, Adeel Anjum, Bello Musa Yakubu, Majid Iqbal, Syed Atif Moqurrab, Gautam Srivastava

Summary: In our technologically advanced world, data security is crucial for every individual, especially in the exchange of medical information. Existing techniques for preserving data security have limitations, but this work proposes a secure architecture and semantic approach based on blockchain, local differential privacy, and federated learning. The proposed framework addresses the vulnerabilities of current solutions and provides a trustless environment for data sharing.

EXPERT SYSTEMS (2023)

Article Computer Science, Information Systems

Edge resource slicing approaches for latency optimization in AI-edge orchestration

P. Keerthi Chandrika, M. S. Mekala, Gautam Srivastava

Summary: This article discusses the importance of edge service computing and analyzes the impact of reinforcement learning-based edge resource consolidation models on corresponding orchestrations. The article also highlights the unresolved challenges for further research on MEC orchestration.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Interdisciplinary Applications

Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks

Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Hadis Karimipour

Summary: Integrating blockchain into the Internet of Things (IoT) for security is a new development, but it also brings more vulnerabilities and security threats. Although blockchain has potential security benefits, new cyberattacks have emerged that make it insufficient to deal with threats and attacks in IoT networks. Therefore, better security approaches are needed, such as efficient threat detection against network attacks in blockchain-based IoT environments.

COMPUTERS IN INDUSTRY (2023)

Article Computer Science, Theory & Methods

A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs

Jiayan Shen, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li

Summary: Electronic health records (EHRs) are stored, shared, and analyzed on cloud servers. A certificateless provable data possession (PDP) scheme is proposed for cloud-based EHRs, distributing multiple copies across different servers to ensure recoverability and resist copy-summation attack. EHRs are stored in ciphertext form to ensure authorized access, and a new data structure called map version marker table (MVMT) is designed for dynamic operations and traceability. Security and performance analyses confirm the practicality and security of the proposed scheme, assuming the intractability of the computational Diffie-Hellman problem.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Green & Sustainable Science & Technology

Federated learning for smart cities: A comprehensive survey

Sharnil Pandya, Gautam Srivastava, Rutvij Jhaveri, M. Rajasekhara Babu, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Spyridon Mastorakis, Md. Jalil Piran, Thippa Reddy Gadekallu

Summary: With the emergence of new technologies such as AIoT, big data, fog computing, and edge computing, smart city applications face challenges related to the leakage of confidential and sensitive information. To address this, integrating federated learning (FL) with smart city applications can ensure privacy preservation and sensitive information protection. This paper provides an overview of current and future developments of FL for smart cities, highlighting the societal, industrial, and technological trends driving its implementation. It discusses the concept of FL for smart cities and explores various FL integrated smart city applications, including transportation, healthcare, governance, disaster management, industries, and UAV monitoring. The paper also outlines research challenges and prospects for FL's development in smart cities.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2023)

Article Computer Science, Cybernetics

CDRec-CAS: Cross-Domain Recommendation Using Context-Aware Sequences

Taushif Anwar, V Uma, Gautam Srivastava

Summary: This article addresses two research topics in recommender systems (RSs), namely cross-domain RSs (CDRSs) and context-aware RSs (CARSs). CDRSs aim to improve recommendation quality in a target domain by utilizing source domain information, while also combating the spread of fake information. CARSs utilize contextual information to recommend items that align with user interests as they change with context.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things

Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo

Summary: In this paper, we propose an Efficient and Privacy-preserving Real-time Incentive system for CrowdsEnsing (EPRICE), designed to estimate the reliability of sensing data in a privacy-preserving setting. The theoretical analysis demonstrates that our proposed system achieves a high level of privacy-preserving for real-time reward distribution and supports practical privacy-preserving properties. The experimental findings show that our proposed EPRICE system significantly decreases the computation costs by three orders of magnitude compared with other competing schemes.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Engineering, Civil

Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective

Weizheng Wang, Gautam Srivastava, Jerry Chun-Wei Lin, Yaoqi Yang, Mamoun Alazab, Thippa Reddy Gadekallu

Summary: This paper investigates the application of Unmanned Aerial Vehicles (UAV) in Mobile Edge Computing Networks (MECN) and considers security issues. By adopting a game theory viewpoint, two algorithms are proposed to optimize UAV's channel access strategies for minimizing the age of information.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

A Secure Intelligent System for Internet of Vehicles: Case Study on Traffic Forecasting

Youcef Djenouri, Asma Belhadi, Djamel Djenouri, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: In this paper, a new system called Secure and Intelligent System for the Internet of Vehicles (SISIV) is developed, which addresses the limitations of current IoV solutions by implementing a deep learning architecture based on graph convolutional networks and an attention mechanism, as well as using blockchain technology for secure data transmission. The hyperparameters of the deep learning model are intelligently selected using a branch-and-bound technique. Experimental results demonstrate the superiority of SISIV over baseline systems in terms of forecasting rate, F-measure, and attack detection, and its ability to efficiently and reliably predict traffic flow in an IoV context.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble

Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin, Yue Zhao

Summary: Currently, there is a significant risk to Android applications from malware activities, which can result in the theft of important information and disruption to the economy, social structure, and financial sector. To address this, a network-based approach called NMal-Droid is developed, which includes a packet parser algorithm, a fine-tune embedding approach, Convolutional Neural Network (CNN), and Bi-directional Gated Recurrent Unit (Bi-GRU) neural network. The proposed approach is evaluated and outperforms state-of-the-art methods in terms of malware classification and detection.

WIRELESS NETWORKS (2023)

Article Engineering, Multidisciplinary

ASTREAM: Data-Stream-Driven Scalable Anomaly Detection With Accuracy Guarantee in IIoT Environment

Yihong Yang, Xuan Yang, Mohsen Heidari, Mohammad Ayoub Khan, Gautam Srivastava, Mohammad R. Khosravi, Lianyong Qi

Summary: This study proposes a novel anomaly detection approach called ASTREAM, which is based on data streams. In contrast to current approaches, ASTREAM effectively addresses issues related to infiniteness, correlations, and data distribution change. It achieves accurate and efficient anomaly detection with better scalability, as demonstrated through comprehensive experiments on the KDDCUP99 dataset.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography

Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang

Summary: This article proposes a joint distortion-based non-additive cost assignment method to reduce distortion drift and improve security in video steganography. Extensive experiments show that the proposed method achieves enhanced security and visual stego video quality.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Telecommunications

Accurate threat hunting in industrial internet of things edge devices

Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi

Summary: Threat hunting for anomalies in the behavior of edge devices is crucial in industrial IoT systems, as malicious functions from these devices can compromise the security of the entire system and potentially allow malicious software to penetrate the network.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Hardware & Architecture

A survey on network simulators, emulators, and testbeds used for research and education

Jose Gomez, Elie F. Kfoury, Jorge Crichigno, Gautam Srivastava

Summary: Network operators and researchers need to evaluate and test new system deployments and research ideas, but they often face challenges in choosing the right platform to validate their performance advantages and limitations. Over the past decades, the networking community has developed platforms for testing new ideas and large-scale deployments, providing realism and scale for networking instruction. This article discusses the classification, challenges, and future directions of network experimentation platforms, aiming to assist experimenters and educators in selecting the most suitable platform for their needs.

COMPUTER NETWORKS (2023)

No Data Available