Abstract

A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required. Therefore, the security of data in transmission has been attracting increasing attention. In recent years, blockchain technology has also attracted more attention. Relevant research has been published at a high rate. Most methods of satisfying relevant security-related regulations use modular and exponential calculation. This study proposes a medical care information preservation mechanism that considers the entire process of data storage in devices from wearable devices to mobile devices to medical center servers. The entire process is protected and complies with HIPAA privacy and security regulations. The proposed scheme uses extended chaotic map technology to develop ID-based key negotiation for wearable devices, and thereby reduces the amount of computing that must be carried out by wearable devices and achieve lightness quantify. It also uses the non-tamperability of the blockchain to ensure that the data have not been tampered with, improving data security. The proposed mechanism can resist a variety of attacks and is computationally lighter than the elliptic curve point multiplication that has been used elsewhere, while retaining its security characteristics.

Highlights

  • Analysis of the security of the proposed scheme will be divided into a sensor data collection phase, a social network information transmission phase, and a Health Insurance Portability and Accountability Act (HIPAA) security regulation analysis phase for the purposes of discussion

  • Based on the assumption that A can correctly decrypt the encrypted data, the mutual authentication of devices A and B is successful; Impersonation Attack: Attackers, including internal legal users, cannot obtain the private key mk of the registration center (RC), the private key SKS and SKM of the wearable device and the mobile device, respectively, or the communication key keyMS between the wearable device and the mobile device. Such attackers cannot impersonate other wearable devices or mobile devices to send out messages; Known Key Security: If the communication key key = Tx (k ) mod p of both parties is leaked, the other communication key will not have been leaked because each communication generates a new random number x, where k is keyMS

  • The attacker wants to use known information to calculate the private key of the RC, and so faces the Extended Chaotic Map-Based Discrete Logarithm Problem (DLP)

Read more

Summary

Introduction

A healthcare information system allows patients and other users to login remotely to medical services to access health data through the Internet. Rapid technological development has made access to information part of our daily life, along with health care. In the field of personal health care, data sharing has become an important topic. The security of data in transmission is attracting increasing attention. Relevant research has been published at a high rate [1,2,3,4]. It draws on many fields, including medicine, leasehold, energy, and others. With respect to personal information privacy, most attempts to satisfy security-related regulations use modular and exponential calculation

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call