Skip to main content
Log in

A novel two-level secure access control approach for blockchain platform in healthcare

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The advent of blockchain technology has ushered a paradigm shift in storage of healthcare data from conventional to online mode. As public ledgers, blockchain platforms provide verifiability of data by all nodes on blockchain. This in turn requires the transactions to be visible to all by default which results in privacy concerns for medical data as they contain sensitive and person-identifiable information that should not be disclosed to everyone. As a result, an access control mechanism is required to maintain regulatory controls over the release and access of medical information to certain entities on blockchain. In this work, we address this issue by proposing a two-level access control technique. We incorporate Ciphertext Policy Attribute-based encryption to provide authorization privileges for various parties involved. After that, Proxy Re-encryption is used to attain secure data transfer and anonymity to the requester only. The data owner is not required to provide the requester with the decryption key and decryption will still be done successfully. This property has not been achieved in previous works. The proposed framework’s security is thoroughly examined. The widely established Burrows–Abadi–Needham (BAN) logic is employed to demonstrate the correctness of the proposed framework’s functionality. We show that our framework provides many new security features compared to its peer proposed models. We use the OMNET++ software to simulate our proposed framework and analyze its storage and computation costs in order to determine its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Research Data Policy and Data Availability Statements

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Notes

  1. https://omnetpp.org/.

Abbreviations

PoW:

Proof of work

PoS:

Proof of stake

PoB:

Proof of burn

PoET:

Proof of elapsed time

BFT:

Byzantine fault tolerance

PBFT:

Practical Byzantine fault tolerance

BAN Logic:

Burrows–Abadi–Needham logic

OMNET++:

Objective modular network Testbed in C++

ABE:

Attribute-based encryption

KP-ABE:

Key policy attribute-based encryption

CP-ABE:

Ciphertext Policy attribute-based encryption

PRE:

Proxy re-encryption

CB-PRE:

Certificate-based proxy re-encryption

CA:

Certificate authority

NED:

NEtwork description files

References

  1. Chen, Y., Ding, S., Xu, Z., Zheng, H., Yang, S.: Blockchain-based medical records secure storage and medical service framework. J. Med. Syst. 43, 1–9 (2018). https://doi.org/10.1007/s10916-018-1121-4

    Article  Google Scholar 

  2. Tanwar, S., Parekh, K., Evans, R.: Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 50, 102407 (2020). https://doi.org/10.1016/j.jisa.2019.102407

    Article  Google Scholar 

  3. Zhiqiang, G., Lingsong, H., Hang, T., Cong, L.: A cloud computing based mobile healthcare service system. In: 2015 IEEE 3rd International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA), Kuala Lumpur, Malaysia, pp. 1–6 (2015). https://doi.org/10.1109/ICSIMA.2015.7559009.

  4. Sultan, N.: Making use of cloud computing for healthcare provision: opportunities and challenges. Int. J. Inf. Manag. 34, 177–184 (2014). https://doi.org/10.1016/j.ijinfomgt.2013.12.011

    Article  Google Scholar 

  5. Esposito, C., De Santis, A., Tortora, G., Chang, H., Choo, K.R.: Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5(1), 31–37 (2018). https://doi.org/10.1109/MCC.2018.011791712

    Article  Google Scholar 

  6. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies, 1st edn. O’Reilly Media, Inc., Sebastopol (2014)

    Google Scholar 

  7. Mittal, S., Ghosh, M.: Secure and scalable attribute based access control scheme for healthcare data on blockchain platform. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds.) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol. 481. Springer, Singapore (2022)

  8. Pournaghi, S.M., Bayat, M., Farjami, Y.: MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J. Ambient Intell. Hum. Comput. 11, 4613–4641 (2020). https://doi.org/10.1007/s12652-020-01710-y

    Article  Google Scholar 

  9. Ahuja, R., Mohanty, S.K., Sakurai, K.: A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57, 241–256 (2016). https://doi.org/10.1016/j.compeleceng.2016.11.028

    Article  Google Scholar 

  10. Ahuja, R., Mohanty, S.K.: A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans. Cloud Comput. 8(1), 32–44 (2020). https://doi.org/10.1109/TCC.2017.2751471

    Article  Google Scholar 

  11. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg K. (eds) Advances in Cryptology—EUROCRYPT’98. EUROCRYPT 1998. Lecture Notes in Computer Science, vol .1403. Springer, Berlin (1998)

  12. Manzoor, A., Braeken, A., Kanhere, S.S., Ylianttila, M., Liyanage, M.: Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Netw. Comput. Appl. 176, 102917 (2021). https://doi.org/10.1016/j.jnca.2020.102917

    Article  Google Scholar 

  13. Zuo, Y., Kang, Z., Xu, J., Chen, Z.: BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int. J. Distrib. Sens. Netw. 17, 155014772199961 (2021)

    Article  Google Scholar 

  14. Malamas, V., Kotzanikolaou, P., Dasaklis, T.K., Burmester, M.: A hierarchical multi blockchain for fine grained access to medical data. IEEE Access 8, 134393–134412 (2020). https://doi.org/10.1109/ACCESS.2020.3011201

    Article  Google Scholar 

  15. Manzoor, A., Liyanage, M., Braeke, A., Kanhere, S.S., Ylianttila, M.: Blockchain based proxy re-encryption scheme for secure IoT data sharing. IEEE Int. Conf. Blockchain Cryptocurrency (ICBC) 2019, 99–103 (2019). https://doi.org/10.1109/BLOC.2019.8751336

    Article  Google Scholar 

  16. Zhang, A., Lin, X.: Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 42, 140 (2018). https://doi.org/10.1007/s10916-018-0995-5

    Article  Google Scholar 

  17. Li, H., Zhu, L., Shen, M., et al.: Blockchain-based data preservation system for medical data. J. Med. Syst. 42, 141 (2018). https://doi.org/10.1007/s10916-018-0997-3

    Article  Google Scholar 

  18. Patel, V.: A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inf. J. 25, 146045821876969 (2018). https://doi.org/10.1177/1460458218769699

    Article  Google Scholar 

  19. Ali, O., Shrestha, A., Soar, J., Wamba, S.F.: Cloud computing-enabled healthcare opportunities, issues, and applications: a systematic review. Int. J. Inf. Manag. 43, 146–158 (2018). https://doi.org/10.1016/j.ijinfomgt.2018.07.009

    Article  Google Scholar 

  20. Kuo et al. M.: A cloud computing based platform for sharing healthcare research information. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, pp. 504–508 (2012). https://doi.org/10.1109/CTS.2012.6261097

  21. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25–30 (2016). https://doi.org/10.1109/OBD.2016.11

  22. Qin, Q., Jin, B., Liu, Y.: A Secure storage and sharing scheme of stroke electronic medical records based on consortium blockchain. BioMed Res. Int., 2021, Article ID 6676171, 14 pages (2021)

  23. Deepa, N., Pandiaraja, P.: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption. J. Ambient Intell. Hum. Comput. 12, 4877–4887 (2021). https://doi.org/10.1007/s12652-020-01911-5

    Article  Google Scholar 

  24. Lee, T.-F., Li, H.-Z., Hsieh, Y.-P.: A blockchain-based medical data preservation scheme for telecare medical information systems. Int. J. Inf. Secur. (2020). https://doi.org/10.1007/s10207-020-00521-8

    Article  Google Scholar 

  25. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP ’07), pp. 321–334 (2007). https://doi.org/10.1109/SP.2007.11

  26. Kryszczuk, K., Richiardi, J.: Springer Encyclopedia of Cryptography and Security (2011)

  27. Burrows, M., Abadi, M., Michael, N.R.: A logic of authentication. Proc. R. Soc. Lond. A426, 233–271 (1989)

    MathSciNet  MATH  Google Scholar 

  28. Sierra, J.M., Hernáández, J.C., Alcaide, A., Torres, J.: Validating the use of BAN LOGIC. In: Laganáá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohona Ghosh.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests that are relevant to the content of this article.

Human participants

This article does not contain any studies involving human participants performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Acronyms and Synonyms used in the paper: Table 1 contains the list of abbreviations used throughout the paper. Also, medical data, medical record and healthcare data have been used interchangeably. Similarly, model and framework keywords have been used interchangeably. However, they mean the same.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mittal, S., Ghosh, M. A novel two-level secure access control approach for blockchain platform in healthcare. Int. J. Inf. Secur. 22, 799–817 (2023). https://doi.org/10.1007/s10207-023-00664-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00664-4

Keywords

Navigation