Abstract
Health data collected from IoT devices can be utilised for predicting various medical information. The information collected is stored in centralised server and can be shared among various branches of the cooperative hospital network for analysis purposes. However, these communications are wireless which leads to various security threats like unauthorized access by intruders and misuse of health data. The existing work provides an authentication scheme that depends on trusted third party and centralised storage. This increases the computational burden and latency at the centralised server and may lead to a single-point failure. To solve this issue, a Blockchain-based authentication and key agreement scheme is proposed for sharing health data. The proposed scheme incorporates the concept of Blockchain that makes the system distributed, immutable, and transparent. An Elliptic Curve Cryptography based authentication scheme is proposed where all the information is stored in the Blockchain. In addition, a secret key is established to provide secure communication among patients, Hospital servers, and IoT devices. Hyperledger Fabric platform is used for Blockchain implementation that supports channel communication. There is a formal analysis using the ROR model that proves the security of the session key. The formal simulation using the Scyther tool shows that there is no attack within bound. Moreover, the informal analysis proves that the proposed work is resistant to various attacks and satisfies the security goals. The comparative study demonstrates that the proposed work is more effective as compared to others. The proposed work involves implementing a system of cooperative hospital servers that communicate through a shared channel. Hospital servers belonging to the same channel will be able to communicate securely and privately. This setup also facilitates the efficient transfer of health data among various hospital servers, eliminating the need for redundant computations during registration and authentication processes on each server. Additionally, the use of Blockchain reduces dependency on third party, makes the system distributed, provides immutable storage and increases confidentiality among members by using channel communication.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05577-6/MediaObjects/11227_2023_5577_Fig9_HTML.png)
Similar content being viewed by others
Data availability
This declaration is “not applicable”.
References
Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121, pp. 323–343. Elsevier
Alyahya S, Khan WU, Ahmed S, Marwat SNK, Habib S (2022) Cyber secure framework for smart agriculture: Robust and tamper-resistant authentication scheme for iot devices. Electronics 11(6):963
Amin R, Lohani P, Ekka M, Chourasia S, Vollala S (2020) An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput Electric Eng 82:106554
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
Anuradha M, Jayasankar T, Prakash N, Sikkandar MY, Hemalakshmi G, Bharatiraja C, Britto ASF (2021) Iot enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess Microsyst 80:103301
Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electric Eng 69:534–554
Cheng X, Chen F, **e D, Sun H, Huang C, Qi Z (2019) Blockchain-based secure authentication scheme for medical data sharing. In: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I, pp. 396–411. Springer
Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services: authorized access to healthcare services. J Med Syst 44:1–9
Du M, Chen Q, Chen J, Ma X (2020) An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manag 68(6):1677–1689
Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netw 33(2):44–49
Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449
Hathaliya JJ, Tanwar S, Tyagi S, Kumar N (2019) Securing electronics healthcare records in healthcare 40: A biometric-based approach. Comput Electric Eng 76:398–410
He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37
Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IOT healthcare system. Wireless Networks 25(8):4737–4750
Jiang Q, Zhang N, Ni J, Ma J, Ma X, Choo KKR (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390–9401
Khadem B, Suteh AM, Ahmad M, Alkhayyat A, Farash MS, Khalifa HS (2021) An improved WBSN key-agreement protocol based on static parameters and hash functions. IEEE Access 9:78463–78473
Khan WU, Marwat SNK, Ahmed S (2022) Cyber secure framework for smart containers based on novel hybrid DTLS protocol. Comput Syst Sci Eng 43(3)
Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652
Lei CL, Chuang YH (2019) Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme. IEEE Access 7:186480–186490
Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075
Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78:15255–15273
Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Internet Things J 9(4):2649–2656
Miller A (2019) Permissioned and permissionless blockchains. Blockchain for distributed systems security pp. 193–204
Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385–175397
Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IOT communication using elliptic curve cryptography. J Supercomput 77:1114–1151
Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using IOT enabled devices. J Ambient Intell Humaniz Comput 12(1):1419–1434
Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU (2022) Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(13):4926
Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IOT networks. In: 2022 2nd international conference on artificial intelligence (ICAI), pp. 46–51. IEEE
Servati MR, Safkhani M (2023) ECCBAS: an ECC based authentication scheme for healthcare IOT systems. Pervasive Mob Comput 90:101753
Soni M, Singh DK (2021) Privacy-preserving authentication and key-management protocol for health information systems. In: Data Protection and Privacy in Healthcare, pp. 37–50. CRC Press
Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761
Swan M (2015) Blockchain: Blueprint for a new economy. “O’Reilly Media, Inc.”
Tan TL, Salam I, Singh M (2022) Blockchain-based healthcare management system with two-side verifiability. Plos one 17(4):e0266916
Tang F, Ma S, **ang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678–41689
Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008–23021
Wang P, Li B, Shi H, Shen Y, Wang D (2019) Revisiting anonymous two-factor authentication schemes for iot-enabled devices in cloud computing environments. Security and Communication Networks 2019
Wang W, Hoang DT, Hu P, **ong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access 7:22328–22370
Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
**ang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access 8:171771–171783
Zhao X, Li D, Li H (2022) Practical three-factor authentication protocol based on elliptic curve cryptography for industrial internet of things. Sensors 22(19):7510
Funding
This declaration is “not applicable”.
Author information
Authors and Affiliations
Contributions
Conceptualization: [Divya Rani]; Methodology: [Divya Rani]; Formal analysis and investigation: [Divya Rani]; Writing-original draft preparation: [Divya Rani]; Writing-review and editing: [Sachin Tripathi]; Supervision: [Sachin Tripathi].
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding authors declare that they have no known competing interests that are directly or indirectly related to the work submitted for publication.
Ethical Approval
This declaration is “not applicable”.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rani, D., Tripathi, S. Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. J Supercomput 80, 2681–2717 (2024). https://doi.org/10.1007/s11227-023-05577-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05577-6