Log in

Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Health data collected from IoT devices can be utilised for predicting various medical information. The information collected is stored in centralised server and can be shared among various branches of the cooperative hospital network for analysis purposes. However, these communications are wireless which leads to various security threats like unauthorized access by intruders and misuse of health data. The existing work provides an authentication scheme that depends on trusted third party and centralised storage. This increases the computational burden and latency at the centralised server and may lead to a single-point failure. To solve this issue, a Blockchain-based authentication and key agreement scheme is proposed for sharing health data. The proposed scheme incorporates the concept of Blockchain that makes the system distributed, immutable, and transparent. An Elliptic Curve Cryptography based authentication scheme is proposed where all the information is stored in the Blockchain. In addition, a secret key is established to provide secure communication among patients, Hospital servers, and IoT devices. Hyperledger Fabric platform is used for Blockchain implementation that supports channel communication. There is a formal analysis using the ROR model that proves the security of the session key. The formal simulation using the Scyther tool shows that there is no attack within bound. Moreover, the informal analysis proves that the proposed work is resistant to various attacks and satisfies the security goals. The comparative study demonstrates that the proposed work is more effective as compared to others. The proposed work involves implementing a system of cooperative hospital servers that communicate through a shared channel. Hospital servers belonging to the same channel will be able to communicate securely and privately. This setup also facilitates the efficient transfer of health data among various hospital servers, eliminating the need for redundant computations during registration and authentication processes on each server. Additionally, the use of Blockchain reduces dependency on third party, makes the system distributed, provides immutable storage and increases confidentiality among members by using channel communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

This declaration is “not applicable”.

References

  1. Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier

  2. Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963

    Article  Google Scholar 

  3. Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554

    Article  Google Scholar 

  4. Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15

  5. Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301

    Article  Google Scholar 

  6. Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554

    Article  Google Scholar 

  7. Cheng X, Chen F, **e D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer

  8. Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9

    Article  Google Scholar 

  9. Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689

    Article  Google Scholar 

  10. Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49

    Article  Google Scholar 

  11. Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449

    Article  Google Scholar 

  12. Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410

    Article  Google Scholar 

  13. He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37

    Article  Google Scholar 

  14. Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750

    Article  Google Scholar 

  15. Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401

    Article  Google Scholar 

  16. Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473

    Article  Google Scholar 

  17. Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3)

  18. Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652

    Article  Google Scholar 

  19. Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490

    Article  Google Scholar 

  20. Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075

    Article  Google Scholar 

  21. Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273

    Article  Google Scholar 

  22. Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656

    Article  Google Scholar 

  23. Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204

  24. Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397

    Article  Google Scholar 

  25. Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151

    Article  Google Scholar 

  26. Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434

    Article  Google Scholar 

  27. Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926

    Article  Google Scholar 

  28. Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE

  29. Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753

    Article  Google Scholar 

  30. Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press

  31. Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761

    Google Scholar 

  32. Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.”

  33. Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916

    Article  Google Scholar 

  34. Tang F, Ma S, **ang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689

    Article  Google Scholar 

  35. Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021

    Article  Google Scholar 

  36. Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019

  37. Wang W, Hoang DT, Hu P, **ong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370

    Article  Google Scholar 

  38. Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32

    Google Scholar 

  39. **ang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783

    Article  Google Scholar 

  40. Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510

    Article  Google Scholar 

Download references

Funding

This declaration is “not applicable”.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization: [Divya Rani]; Methodology: [Divya Rani]; Formal analysis and investigation: [Divya Rani]; Writing-original draft preparation: [Divya Rani]; Writing-review and editing: [Sachin Tripathi]; Supervision: [Sachin Tripathi].

Corresponding author

Correspondence to Divya Rani.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding authors declare that they have no known competing interests that are directly or indirectly related to the work submitted for publication.

Ethical Approval

This declaration is “not applicable”.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rani, D., Tripathi, S. Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. J Supercomput 80, 2681–2717 (2024). https://doi.org/10.1007/s11227-023-05577-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05577-6

Keywords

Navigation