Secure Blockchain-Based Tracking Storage and Permission Verification of Electronic Health Records
Theyazn H. H. Aldhyani ;
Mohamed Chahine Ghanem ;
Mohammad Almaayah
Published: 2025/08/12
Abstract
Blockchains provide a unique approach to storing healthcare data, conducting healthcare transactions, and proving the trustworthiness of healthcare data in the context of a decentralized and open healthcare network ecosystem. Blockchain technology for healthcare businesses, whether for internal operations or collaborative research, is causing continuing debate regarding the potential risks to user data security and privacy. Despite considerable interest and attention from the corporate, government, and academic sectors, blockchain technology deployment in the healthcare business is still in its early stages. Blockchain technology has the potential to greatly boost patient data security in the healthcare industry. We not only understand the problems and expectations associated with security and privacy, but we also provide effective ways and procedures for overcoming these concerns via the use of technology. The first stage in using blockchains in the healthcare business is determining what features and standards are required to ensure the secure and effective transfer of electronic health information. Then we look at the technologies that may be utilized to offer the essential security and privacy aspects for each of the three potential blockchain uses in the healthcare business. In terms of the sharing of electronic medical records, blockchain technology has three potential uses blockchain technology to validate a patient's identity is standard. The previous work highlighted numerous potential uses of blockchain technology in healthcare. Many various types of information will be exchanged, including ideas, risks, requirements, development tools, system designs, and deployment strategies. Based on the findings of our poll, we were able to make some plausible assumptions regarding the problem.
Keywords
Secure Blockchain-Based Tracking Storage and Permission Verification of Electronic Health Records is licensed under CC BY 4.0
References
- Engelhardt, M. A. (2017). Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector. Technology Innovation Management Review, 7, 22–34.
- Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
- Zhang, R., & Liu, L. (2010). Security models and requirements for healthcare application clouds. In Proceedings of the IEEE 3rd International Conference on Cloud Computing (pp. 268–275). IEEE.
- Kashyap, R. (2019). Security, reliability, and performance assessment for healthcare biometrics. In Advances in Medical Technologies and Clinical Practice (pp. 29–54).
- Mohanakurup, V., Parambil Gangadharan, S. M., Goel, P., Verma, D., Alshehri, S., Kashyap, R., & Malakhil, B. (2022). Breast cancer detection on histopathological images using a composite dilated backbone network. Computational Intelligence and Neuroscience, 2022, 1–10.
- Nair, R., Vishwakarma, S., Soni, M., Patel, T., & Joshi, S. (2021). Detection of COVID-19 cases through X-ray images using hybrid deep neural network. World Journal of Engineering, 19(1), 33–39.
- Nair, R., Alhudhaif, A., Koundal, D., Doewes, R. I., & Sharma, P. (2021). Deep learning-based COVID-19 detection system using pulmonary CT scans. Turkish Journal of Electrical Engineering & Computer Sciences, 29(SI-1), 2716–2727.
- Nair, R., Singh, D. K., Ashu, Yadav, S., & Bakshi, S. (2020). Hand gesture recognition system for physically challenged people using IoT. In 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE.
- Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.
- Bellare, M., Canetti, R., & Krawczyk, H. (1996). Keying hash functions for message authentication. In Annual International Cryptology Conference (pp. 1–15). Springer.
- Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231–235.
- Gope, P., & Hwang, T. (2016). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal, 10(4), 1370–1379.
- Ni, J., Zhang, K., Lin, X., Yang, H., & Shen, X. S. (2016). AMA: Anonymous mutual authentication with traceability in carpooling systems. In IEEE International Conference on Communications (pp. 1–6). IEEE.
- Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168–174.
- Yang, Q., Xue, K., Xu, J., Wang, J., Li, F., & Yu, N. (2019). AnFRA: Anonymous and fast roaming authentication for space information network. IEEE Transactions on Information Forensics and Security, 14(2), 486–497.
- Djellalbia, A., Badache, N., Benmeziane, S., & Bensimessaoud, S. (2016). Anonymous authentication scheme in e-health cloud environment. In 11th International Conference on Internet Technology and Secured Transactions (pp. 47–52). IEEE.
- Huang, H., Zhu, P., Xiao, F., Sun, X., & Huang, Q. (2020). A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Computers & Security, 99, 102–109.
- Rivest, R. L., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 552–565). Springer.
- Kashyap, R., Nair, R., Gangadharan, S. M. P., Botto-Tobar, M., Farooq, S., & Rizwan, A. (2022). Glaucoma detection and classification using improved U-Net deep learning model. Healthcare, 10(12), 2497.
- Lewko, A., & Waters, B. (2011). Decentralizing attribute-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 568–588). Springer.
- Sun, Y., Zhang, R., Wang, X., Gao, K., & Liu, L. (2018). A decentralizing attribute-based signature for healthcare blockchain. In 27th International Conference on Computer Communication and Networks (pp. 1–9). IEEE.
- Choudhury, O., Fairoza, N., Sylla, I., & Das, A. (2019). A blockchain framework for managing and monitoring data in multi-site clinical trials. arXiv preprint arXiv:1904.12654.
- Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407.
- Cheng, R., et al. (2018). Ekiden: A platform for confidentiality-preserving trustworthy and performant smart contract execution. arXiv preprint arXiv:1804.05141.
- Egorov, M., Nuñez, D., & Wilkison, M. (2018). NuCypher: A proxy re-encryption network to empower privacy in decentralized systems. San Francisco, CA, USA.
- Manzoor, A., Liyanage, M., Braeken, A., Kanhere, S. S., & Ylianttila, M. (2018). Blockchain based proxy re-encryption scheme for secure IoT data sharing. Future Generation Computer Systems, 102, 579–590.
- Chen, X., Liu, Y., Li, Y., & Lin, C. (2018). Threshold proxy re-encryption and its application in blockchain. In International Conference on Cloud Computing and Security (pp. 16–25). Springer.
- Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Bünzli, F., & Vechev, M. (2018). Securify: Practical security analysis of smart contracts. In ACM SIGSAC Conference on Computer and Communications Security (pp. 67–82).
- Abdellatif, T., & Brousmiche, K. (2018). Formal verification of smart contracts based on users and blockchain behaviors models. In 9th IFIP International Conference on New Technologies, Mobility and Security (pp. 1–5). IEEE.
- Kalra, S., Goel, S., Dhawan, M., & Sharma, S. (2018). ZEUS: Analyzing safety of smart contracts. In Network and Distributed Systems Security Symposium (NDSS).