A Decentralized Privacy-Preserving Healthcare Blockchain for IoT

Published on Jan 15, 2019in Sensors3.275
· DOI :10.3390/S19020326
Ashutosh Dhar Dwivedi9
Estimated H-index: 9
(PAN: Polish Academy of Sciences),
Gautam Srivastava26
Estimated H-index: 26
(Brandon University)
+ 1 AuthorsRajani Singh7
Estimated H-index: 7
(PAN: Polish Academy of Sciences)
Medical care has become one of the most indispensable parts of human lives, leading to a dramatic increase in medical big data. To streamline the diagnosis and treatment process, healthcare professionals are now adopting Internet of Things (IoT)-based wearable technology. Recent years have witnessed billions of sensors, devices, and vehicles being connected through the Internet. One such technology—remote patient monitoring—is common nowadays for the treatment and care of patients. However, these technologies also pose grave privacy risks and security concerns about the data transfer and the logging of data transactions. These security and privacy problems of medical data could result from a delay in treatment progress, even endangering the patient’s life. We propose the use of a blockchain to provide secure management and analysis of healthcare big data. However, blockchains are computationally expensive, demand high bandwidth and extra computational power, and are therefore not completely suitable for most resource-constrained IoT devices meant for smart cities. In this work, we try to resolve the above-mentioned issues of using blockchain with IoT devices. We propose a novel framework of modified blockchain models suitable for IoT devices that rely on their distributed nature and other additional privacy and security properties of the network. These additional privacy and security properties in our model are based on advanced cryptographic primitives. The solutions given here make IoT application data and transactions more secure and anonymous over a blockchain-based network.
Figures & Tables
📖 Papers frequently viewed together
260 Citations
152 Citations
2017BigData Congress: International Congress on Big Data
5 Authors (Zibin Zheng, ..., Huaimin Wang)
1,195 Citations
#1Jun Wu (SJTU: Shanghai Jiao Tong University)H-Index: 22
#2Mianxiong Dong (MuIT: Muroran Institute of Technology)H-Index: 49
Last. Zhitao Guan (NCEPU: North China Electric Power University)H-Index: 14
view all 5 authors...
Social networks are very important social cyberspaces for the human being to establish efficient relations and collaborations for life and production. Currently, information-centric networks (ICN) are main trend of next generation networks, which promote traditional social networks to information-centric social networks (IC-SN). Because of the complexity and openness of social networks, it is a very key issue to filter security services for users. However, existing scheme were proposed just for ...
82 CitationsSource
#1Xiaoyang Zhu (Lyon College)H-Index: 5
#2Youakim Badr (PSU: Pennsylvania State University)H-Index: 17
The Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly ide...
43 CitationsSource
#1Ashutosh Dhar Dwivedi (PAN: Polish Academy of Sciences)H-Index: 9
#2Gautam Srivastava (Brandon University)H-Index: 26
In this paper, we focus on the differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Search algorithm to find a differential path in ARX ciphers. We apply our algorithm to a round reduced variant of the block cipher LEA. For small blocks of ARX ciphers, our algorithm works perfectly and in an extremely concise time. Taking into account that our algorithm takes longer for bigger blo...
11 CitationsSource
#1Chao Qu (DGUT: Dongguan University of Technology)H-Index: 6
#2Ming Tao (DGUT: Dongguan University of Technology)H-Index: 14
Last. Ruifen Yuan (DGUT: Dongguan University of Technology)H-Index: 2
view all 3 authors...
: With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective ...
31 CitationsSource
#1Alfonso PanarelloH-Index: 6
#2Nachiket TapasH-Index: 5
Last. Antonio PuliafitoH-Index: 48
view all 5 authors...
: The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and make intelligent decisions. However, a lack of intrinsic security measures makes IoT vulnerable to privacy and security threats. With its "security by design," Blockchain (BC) can help in addressing major security requirements in IoT. BC capabilities like immutability, transparency, auditability, data encryption and operational resilience can help solve most architectural shortcomings of IoT. This a...
246 CitationsSource
#1Ashutosh Dhar Dwivedi (PAN: Polish Academy of Sciences)H-Index: 9
#2Pawel Morawiecki (PAN: Polish Academy of Sciences)H-Index: 10
Last. Shalini Dhar (H.I., S.I.: University of Agriculture, Faisalabad)H-Index: 5
view all 4 authors...
Abstract We have analysed tweakable block cipher Scream which is used by cipher SCREAM, with the techniques linear cryptanalysis, differential cryptanalysis and related key cryptanalysis. Tweakable block cipher Scream is already analysed with linear, differential-linear and impossible differential cryptanalysis in our previous paper. In this paper we extend our work by adding related key attack along with the differential-linear attack.
6 CitationsSource
#1Jun Wu (SJTU: Shanghai Jiao Tong University)H-Index: 22
#2Mianxiong Dong (MuIT: Muroran Institute of Technology)H-Index: 49
Last. Zhitao Guan (NCEPU: North China Electric Power University)H-Index: 14
view all 5 authors...
In software-defined networks (SDNs), the abstracted control plane is its symbolic characteristic, whose core component is the software-based controller. The control plane is logically centralized, but the controllers can be physically distributed and composed of multiple nodes. To meet the service management requirements of large-scale network scenarios, the control plane is usually implemented in the form of distributed controller clusters. Cluster management technology monitors all types of ev...
95 CitationsSource
#1Lukas Malina (Brno University of Technology)H-Index: 12
#2Jan Hajny (Brno University of Technology)H-Index: 11
Last. Sara RicciH-Index: 5
view all 4 authors...
2 CitationsSource
#1Longhua Guo (SJTU: Shanghai Jiao Tong University)H-Index: 8
#2Mianxiong Dong (MuIT: Muroran Institute of Technology)H-Index: 49
Last. Jianhua Li (SJTU: Shanghai Jiao Tong University)H-Index: 24
view all 7 authors...
As an extension for Internet of Things (IoT), Internet of Vehicles (IoV) achieves unified management in smart transportation area. With the development of IoV, an increasing number of vehicles are connected to the network. Large scale IoV collects data from different places and various attributes, which conform with heterogeneous nature of big data in size, volume, and dimensionality. Big data collection between vehicle and application platform becomes more and more frequent through various comm...
72 CitationsSource
Mar 13, 2017 in PerCom (IEEE International Conference on Pervasive Computing and Communications)
#1Ali Dorri (UNSW: University of New South Wales)H-Index: 15
#2Salil S. Kanhere (UNSW: University of New South Wales)H-Index: 52
Last. Praveen Gauravaram (Tata Consultancy Services)H-Index: 14
view all 4 authors...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight instantiation of a BC particularly geared for use in IoT by eliminating the Proof of Work (POW) and ...
774 CitationsSource
Cited By234
view all 0 authors...
#1Soumyashree S. Panda (International Institute of Information Technology)H-Index: 6
#2Debasish Jena (International Institute of Information Technology)H-Index: 14
Last. Priti DasH-Index: 2
view all 0 authors...
#2Lianhai Wang (Qilu University of Technology)H-Index: 6
#2Lianhai Wang (Qilu University of Technology)H-Index: 8
#1Rui Zhang (UF: University of Florida)
#2Mingcong Song (UF: University of Florida)H-Index: 11
Last. Gang Wang (NKU: Nankai University)H-Index: 45
view all 7 authors...
Abstract null null Recently, the trending 5G technology encourages extensive applications of on-device machine learning, which collects user data for model training. This requires cost-effective techniques to preserve the privacy and the security of model training within the resource-constrained environment. Traditional learning methods rely on the trust among the system for privacy and security. However, with the increase of the learning scale, maintaining every edge device’s trustworthiness co...
#1Jorge Calvillo-Arbizu (University of Seville)H-Index: 3
#2Isabel Roman-Martinez (University of Seville)H-Index: 3
Last. Javier Reina-Tosina (University of Seville)H-Index: 19
view all 3 authors...
Abstract null null Background and Objectives null : The Internet of Things (IoT) paradigm has been extensively applied to several sectors in the last years, ranging from industry to smart cities. In the health domain, IoT makes possible new scenarios of healthcare delivery as well as collecting and processing health data in real time from sensors in order to make informed decisions. However, this domain is complex and presents several technological challenges. Despite the extensive literature ab...
#1Saurabh Shukla (National University of Ireland, Galway)H-Index: 3
#2Subhasis Thakur (National University of Ireland, Galway)H-Index: 6
Last. Syed Muslim JameelH-Index: 4
view all 5 authors...
Abstract null null The healthcare Internet-of-Things (IoT) offers many benefits including data transmission in real-time mode, the ability to monitor the physiological state of the patient in a different interval of time. Devices such as blood-pressure monitors, glucose meters, heart monitoring implants, Electroencephalography (EEG), Electrocardiogram (ECG), and Electromyography (EMG) wearable devices allow health providers to collect the patient health information locally and make a real-time d...
#2Hasliza A. RahimH-Index: 13
Last. Mohammed BazH-Index: 3
view all 0 authors...
According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system....
#1Aashima Sharma (Thapar University)
#2Sanmeet Kaur (Thapar University)H-Index: 7
Last. Maninder Singh (Thapar University)H-Index: 13
view all 3 authors...