A Privacy-Preserving Scheme For Managing Secure Data in Healthcare System
A Privacy-Preserving Scheme For Managing Secure Data in Healthcare System
Open Access
Iraqi Journal for Electrical and Electronic Engineering
Original Article
Correspondance
*Naba M.Hamed
Department of Computer science,
College of Computer Science and Information Technology,
University of Basrah, Basrah, Iraq.
Email: [email protected]
Abstract
In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the
establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare
has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic
health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment.
As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Several
remote user authentication methods have been suggested. In this research, we present a feasible patient EHR migration
solution for each patient. finally, each patient may securely delegate their current hospital’s information system to a
hospital certification authority in order to receive migration proof that can be used to transfer their EHR to a different
hospital. In addition, the proposed scheme is based on crypto-hash functions and asymmetric cryptosystems by using
homomorphic cryptography. The proposed scheme carried out two exhaustive formal security proofs for the work that
was provided. Using Scyther, a formal security tool, we present a secure user authentication technique in the proposed
healthcare scheme that ensures security and informal analysis.
Keywords
Electronic Health Records, Scyther, Migration Data, Asymmetric encryption, Homomorphic Cryptography.
The internet has become an indispensable part of everyday An Electronic Health Record (EHR) is a personal medical
life. Thanks to the fast progress of internet technology, we can record incorporated into health information systems [3]. Many
now deliver any service from anywhere and at any time [1]. countries create health information systems to help administer
Remote user authentication is becoming an increasingly sig- each patient’s activities and health monitoring. Consider the
nificant component of gaining access to valuable services or following scenario: A patient (let’s call her Alice) plans to
resources in the healthcare system, cloud applications, multi- see a doctor at a new hospital. If she visits a new hospital,
server configurations, and mobile devices. Remote user au- she may be required to disclose her personal medical infor-
thentication is an essential component of any security strategy. mation again. Furthermore, if her doctor needs her medical
In the absence of authentication, audit trails are opaque, and treatment history from other institutions, she must decide how
authorization grants identity-based privileges [2]. If we can- to securely communicate this information to her doctor. These
not distinguish between authorized and unauthorized parties, issues are very pressing. Our proposed approach guarantees
secrecy and privacy will be violated. In recent years, various that data access and data transfer are simple and secure. Each
This is an open-access article under the terms of the Creative Commons Attribution License,
which permits use, distribution, and reproduction in any medium, provided the original work is properly cited.
©2023 The Authors.
Published by Iraqi Journal for Electrical and Electronic Engineering | College of Engineering, University of Basrah.
https://doi.org/10.37917/ijeee.19.2.9 https://www.ijeee.edu.iq | 70
71 | Hamed & Yassin
user must be granted the proper access rights [4]. One of tified in previous studies. In practice, the Scyther security
the most straightforward and practical security solutions is proof was utilized to show the strong security and resistance
password-based authentication. Password-based authentica- of our strategy against hostile attacks. The suggested tech-
tion mechanisms are used in the healthcare system, e-business, nique strikes a good compromise between security complexity
database management systems, and smart card applications. and performance, and it may be used in healthcare systems.
Our method presents a feasible and verifiable patient EHR The remainder of the article is structured as follows. Sec-
fair exchange for health information systems. Patients must tion 2 reviews the related work. Section 3 focuses on the
not only delegate the transfer of their personal EHR from proposed scheme. Section 4 This section evaluates security
their current hospital health information system to the hospi- analysis of the proposed scheme in terms of formal and in-
tal system of their choice but also retain their privacy [4]. Our formal security analysis. Section 5 presents the performance
system ensures safe data storage and the secure transmission results. Finally, section 6 presents the conclusions.
of permitted information to a specified place. We propose a
high-level, realistic, and demonstrable patient EHR fair ex- II. R ELATED W ORK
change model with key agreements for health information
systems. A patient can not only delegate the current hospital’s A. Centralized Identity Management for Entity Authentica-
health information systems to migrate their personal EHR to tion
the chosen hospital system but also maintain their privacy [5]. As part of a centralized identity management system, a cen-
tralized identity distribution point (IDP) will be responsible
In India, EHR guidelines advocate for the safe sharing for issuing an identity (email ID, phone number, government
of health information with minimal disclosure of personal identification code, patient identification code), as well as
identification. The majority of identity-related breaches are for maintaining the trust factor associated with those iden-
triggered by the leak of sensitive information associated with tities. Credential-based authentication is a well-established
identifiers, as well as the vast data collection and tracking initial line of defense in any identification scheme. As the pri-
permitted by service providers [6]. The General Data Pro- vacy and security of patient data records are critical in EHRs,
tection Regulation encourages entity-controlled identifiers credential-based protection is a relatively simple and adapt-
and limited information collection to preserve privacy. Many able first-hand solution that is able to identity theft, spoofing
countries have laws in place to protect patients’ privacy, such attacks, data loss, and other types of privacy violations. It
as the Health Insurance Portability and Accountability Act is possible to add an extra layer of protection to the current
(HIPAA)in the United States. Confidentiality in telecare ser- credentials-based authentication by including secondary fac-
vices has become a key problem, especially how to ensure tors such as OTP, captchas, patterns, or biometrics in addition
patient data security and privacy while transmitting over a to the credentials-based authentication [11]. Many studies on
public channel [7] [8]. User authentication is the first step in two-factor authentication [12] and three-factor authentication
ensuring that only authorized users have access to protected [13] have been conducted for the purpose of validating medi-
data. Although password-based user authentication is the most cal records [12]. Although it adds an extra layer of protection,
convenient approach, it is prone to numerous attacks and may multifactor authentication is vulnerable to attacks such as
pose a threat to data security. Multifactor authentication is a identity theft, replay attacks, phishing attacks, and denial of
recommended strategy in which any user is granted access to service attacks, among others. The authentication of entities
specified data after verifying two or more pieces of evidence can be achieved by binding centralized identifiers to crypto-
[9] [10] perform poorly or have serious security flaws in the graphically generated keys, signatures, and certificates with
context of tele-health services. Our system stores data and the help of public key infrastructure (PKI).
securely transfers approved information to defined places. In
this paper, we offer a safe technique for authenticating EHR B. Decentralized identity management for entity authenti-
patients and the Healthcare Center Server using real mem- cation
ber IDs and verification codes. To provide robust security The whole concept of decentralization is founded on the basic
while maintaining good performance. The proposed work assumption that a transaction for the transfer of a commodity
employs, based on multi-factor authentication, a lightweight or asset between two parties is accepted by the participating
crypto-hash function for the generation of One-Time Pass- nodes through the use of a consensus mechanism. This trans-
words (OTP) and symmetric key encryption (CTR mode) and action is recorded in an immutable distributed ledger as part
an asymmetric key of homomorphic encryption Damgoard, of the transaction log. Blockchain is a practical distributed
Geisler and Kroigaard (DGK) to offer strong security per- ledger technology, and it was this protocol that introduced
formance. The primary goal of this research is to provide a the concept of decentralization into the settlement of finan-
robust authentication mechanism to address difficulties iden- cial transactions. Later, the framework was generalized in
72 | Hamed & Yassin
the healthcare ecosystem by introducing programming capa- professional duties, such as physicians, nurses, and medical
bilities using smart contracts. were the first to propose the researchers, make up the user data. In practice, user data
use of blockchain technology in the design of healthcare or might be assigned to a separate sector of society, such as
the purpose of decentralized identity management. MedRec healthcare. It also includes users who are intimately con-
[14], was the first functioning prototype of a blockchain-based nected to a data owner (for example, family members or close
system for accessing health records that is built on Ethereum friends), and have access to EHRs based on access privi-
smart contracts. Additionally, a solution for identity manage- leges granted by the EHR’s owner. The architecture is made
ment and verification that uses blockchain technology was up of four parts: EHR owner (EHRWi ), EHR user (EHRU j ),
created [15]. The system aims to enable greater flexibility Cloud Health Server (CHS(CHSk )), a hospital certification
in health record access while simultaneously increasing pa- authority HCA assists a patient (EHRU j ) in generating the
tient data privacy. Furthermore, an efficient authentication patient’s migration permit signature to another hospital or
mechanism for a hospital network based on blockchain was medical center in the public key infrastructure (PKI); where
proposed [16] for the identification of distributed patients (1 ≤ i ≤ N),(1 ≤ j ≤ M),(1 ≤ k ≤ Z); each of N, M, Z repre-
among others. Additionally, [17] presented a group authenti- sent the number of patient EHRW , users (EHRU ), healthcare
cation approach that would allow authorized group members centers (CHS), respectively. The EHRWi is the individual
to access sensitive health information in the context of a re- whose medical information is contained in the record, and
mote medical monitoring system. Moreover, using blockchain he has full access to that data. The owner might share his
technology, [18] created a multi-identity verification system information with friends, physicians, or nurses to seek clinical
for a secure medical data sharing paradigm, preventing depen- advice. The EHRU j may be in the public or private sectors,
dence on a third party [19] which allows signers to update their and their rights are determined by their roles with the EHR
certificates without having to sign again. Furthermore, a de- owner. A user can be a healthcare professional such as a
centralized, secure, and lightweight certificate-less signature doctor, a friend, a family member, or emergency personnel.
protocol was proposed by transforming the logic of the key A CHSk is a storage facility that houses and manipulates sen-
generation center (KGC) into smart contract code, which can sitive health data. Maintaining data privacy and accuracy of
withstand KGC compromised attacks and distributed denial of patients necessitates a higher level of vigilance. The EHR
service attacks [20]. However, none of the above-mentioned owner relies on the cloud server for remote data storage and
approaches takes into account the integration of authentication record maintenance, alleviating the burden of establishing
with access control to increase the overall system efficiency. and maintaining local storage infrastructure. Most cloud data
Consequently, the fundamental purpose of this research is storage services also offer benefits such as availability, scala-
to provide a robust authentication technique based on cryp- bility, low cost, and on-demand data sharing among a group of
tosystem tools to solve issues highlighted in previous studies trusted users, such as physicians, insurance companies, emer-
and provide an efficient, verifiable, and practical EHR fair gency personnel, family and friends in a collaboration team,
exchange method, allowing each patient to safely transfer or employees in an enterprise organization. Because the data
their own EHR from one institution to another. The proposed owner no longer has physical control over the data, it is vital
approach may also provide ease, speed, and integrity. We built to allow the data owner to check that his data is being saved
a high-level, realistic, and verifiable EHR fair exchange plan and maintained appropriately in the cloud. The registration
with essential agreement for the health information system. A phase, the EHR migration phase, and the data exchange phase
patient could not only delegate the current hospital’s health in- comprise the four steps of our proposed scheme.
formation systems to move their personal EHR to the chosen
hospital system but also maintain their privacy. We demon- A. Registration Phase
strated the security of our protocol using security analysis and In this phase, hospital certification authority (HCA) is respon-
the Scyther tool in the security analysis discussed in the fol- sible to distributes the key parameters and certificate between
lowing section. The performance comparison and efficiency main components.
analysis findings show that the proposed approach delivers
a greater level of security while maintaining computational
1) Cloud Health Server Side
economy.
Each health establishment (Cloud Health Server (CHSk ))
should be identified as a health mother institution (hospital
III. P ROPOSED S CHEME certification authority (HCA)) for the purpose of achieving,
The major purpose of the proposed scheme is to enable safe distributing, and exchanging data among different patients
patient-centric EHR access while also providing efficient data belonging to different establishments. HCA applies the fol-
security and administration. Users with access based on their lowing steps for each CHSk .
73 | Hamed & Yassin
• Step3. Wi sends his login request < ID′AWi , EH(Wi ) , EWi >
to CHSk .
number by decrypting ri′ = DecSKUi (EUi ). (c) He sends the tuple < ECertUi ,CHUi > to CHSk .
75 | Hamed & Yassin
• Step4. Upon receiving the information in Step 3, CHSk returns the result R to the server CHSK′ using the fol-
computes CHU′ i = H(CertUi ⊕ VCUi ) and compare be- lowing function.
? (
tween CHUi = CHU′ i . If so, CHSk accepts the user’s (H (rWi′ CertWi )) if Wi is registered
L
login request and allows him to use the resources and R=
(H (rWi′ 0))
L
if Wi isnot registered
services of system based on his privileges. Then, CHSk
computes SKUi = SKUi ⊕ VCUi and decrypts CertU′ i = As a result, HCA detects Wi ’s institution CHSk based
DecSKU′′ (ECertUi ) . Otherwise, he rejects the current on his certificate CertWi . It sends (R, IDCHSk ) to CHSK′ .
i
phase. • Step6. CHSK′ receives this message challenge, it can
verify the patient by comparing HrWi ⊕CertWi with R.
Note: Now the user can work according to the his privi-
When the above parameters are not valid, CHSK′ notifies
leges granted to him from administor (doctor, administrator).
the patient to register at a public healthcare center or
C. EHR Migration Phase checks his authority with his medical institution CHSk
In this phase, the patient wishes to receive medical treatment (see Fig. 4).
in a certain institution CHSK′ , which does not necessarily be
the same institution that registered her/him previously. D. Treatment and Exchanging Phase
• Step1. Wi computes a random value rWi with a random In this phase, Wi can do many medical treatments such as
number ri ∈ Zn∗ , where rWi = ri ⊕ HWi . After correctly tests of blood diseases, blood pressure, diabetes, Covid-19
calculating the foregoing, he sends his request to the infection, CT-Scan, MRI in the CHSK′ .
CHSk in an anomaly and freshness message style. The (a) The results report (RRWi ) should be added to the EHRWi
message request includes (CertWi , ID′AWi , EAWi ), which existing in the original patient’s institution CHSk where
is computed from (ID′AWi = IDAWi ⊕ rWi ) and encrypted he belongs in the registration phase. Therefore, CHSK′
main parameter via his shared key EAWi = EncSKWi (rWi ). computes AE p k2 = AEncPUCHS (CertWi , RRWi ) based on
k
CertWi ,D′AW ,EAWi the identification of patient’s institution detected previ-
i
Wi −→ CHSk ously in Step3.2. Finally, CHSK′ sends message tuple
(IDCHSK′ , IDCHSk , AE p k2) to HCA.
• Step2. Following the receipt of this message by CHSk ,
it can check the CertWi with his index file; if it is found (b) The server HCA will behave according to the delegated
then go to step 3. Otherwise, go to the Step4. message tuple (IDCHSK′ , IDCHSk , AE p k2) , and will ex-
• Step3. Wi performs the main medical treatment in his change secure data of medical institutions (CHSk ,CHSK′ )
institution, the results report (RRWi ) should be added by forwarding patient’s data (IDH CA, AE p k2) to CHSk .
to the EHRWi by EHRU j directly and apply the same
functions in the upgrading phase. E. Upgrading Phase
When CHSk receives (IDH CA, AE p k2), it decrypts AE p k2
• Step4. This case means that the patient wishes to do with PrCHSk . If it is valid, it can obtain RRWi , CertWi and
some medical treatments outside of his healthcare cen- upgrade the information of EHRWi by adding the new status
ter. The new institution CHSK′ is used public key of of the patient Wi relied on RRWi . The upgrade process will be
HCA to encrypt AE pk1 = AEncPUHCA ((CertWi , ID′AWi , performed by EHR user (EHRU j ) working as an employee
EAWi )), and sends (IDCHSK′ , AE p k1) to HCA for ensur- who has privileges that allow him to upgrade to the EHRWi .
ing from the validity of the patient and his institution. Additionally, these privileges gained by the Administrator
(ADM), represent the role of U j . Now, the EHRWi contains
• Step5. This message tuple IDCHSK′ , AE p k1 is delivered the last update of the patient’s case. In an emergency patient’s
to HCA. When HCA has received this message with case, EHRU j can tell the family member about the patient’s
IDCHSK′ , it can decrypt AE p k1 based on PrH CA in or- case by sending SMS-Emergency to the patient’s family mem-
der to restore all parameters using ADecPrH CA (AE p k1). ber (see Fig. 5).
First, it can fetch the random value rWi′ = DecSKWi (EAWi ),
we notice this step also verifies certificate of Wi relied
on his shared key SKWi and CertWi . Second, it compares
IV. S ECURITY A NALYSIS
′ ′
between IDAWi and IDAWi ⊕ rWi , if they are matched, This section evaluates security analysis of the proposed scheme
it ensures from the authority of Wi and saves current in terms of formal and informal security analysis as the fol-
parameters for usage in the next steps. Finally, HCA lows:
76 | Hamed & Yassin
Fig. 7.
eavesdropping these parameters, the attacker will fail to enter • If the patient wishes to have medical treatments outside
the system. of his healthcare center, the new institution CHSK′ sends
(IDCHSK′ , AE p k1) to HCA , where AE pk1 = AEncPUHCA
• Ui sends (ID′AUi , EH(Ui ) , EUi ) to CHSk .
(CertWi ), IDAWi′ , EAWi .
• CHSk sends QRU i to Ui .
• When HCA has received this message with IDCHSK′ , it
• Ui sends (ECertUi ,CHU itoCHSk ). can decrypt AE p k1 based on PrH CA to restore all pa-
rameters using (ADecPrH CA AE p k1). First, it can fetch
Note: parameters are generated once for each admin’s
the random value rWi′ = DecSKWi (EAWi ). Second, it
login request. Accordingly, the proposed scheme is resistant
to eavesdropping. compares ID′AWi and (IDAWi ⊕ rWi′ ), and if they are
Proposition 8. Our proposed scheme can withstand an matched, it ensures from the authority of Wi and saves
insider attack. the current parameters for usage in the next steps. Fi-
Proof. In our proposed scheme, when Ui wishes to reg- nally, HCA sends (R, IDCHSk ) to CHSK′ , where
ister with a cloud health server, he sends ID′AUi , EH(Ui ) in- H rW′i CertWi
L
if Wi is registered
R=
stead of IDUi , PWUi . Due to the utilization of the one-way (H (rW′i ⊕ 0)) if Wi is not registered
hash function h(), it is difficult for the attacker to extract
the password of the user from the hashed value. In addi- • CHSK′ receives this message challenge, and it can ver-
tion, when the attacker wants to impersonate the valid user, ify the patient by comparing H(rWi ⊕ CertWi ) with R.
he needs to forge a legal login request parameter (ID′AUi , When the above parameters are not valid, CHSK′ notifies
EH(Ui ) , EUi ), in which ID′AUi = H(IDUi ), EHUi = HEncSKUi the patient to register at a public healthcare center or
′ ) = g( PW ′ )hri modN, E i = Enc checks his authority with his medical institution CHSk .
(PWAU i AUi U SKUi (ri ). However,
the attacker will be unable to obtain the SKUi of the user and
will fail to forge such parameters. V. P ERFORMANCE A NALYSIS
Proposition 9. Our proposed scheme provides key man-
A. Computational Cost
agement.
The computational cost is used to calculate the proposed
Proof. The primary parties have agreed to produce a
scheme’s temporal complexity. Table I compares the compu-
shared key for each login request based on (SKUi , ri ). When
tational costs of the most significant similar schemes with that
the patient successfully logs in, the primary parties (Ui ,CHSk )
of our technique and compares our technique with other rele-
execute the following steps to implement this phase:
vant research. Table II compares important security features
• The user (Ui ) computes SKUi = SKUi ⊕ ri . of the proposed approach with earlier efforts. Furthermore,
depending on [22], the processing times for the fundamen-
• The (CHSk ) side computes SKUi = SKUi ⊕ ri′ .
tal functions are roughly as follows applying the following
Therefore, we notice that our work has key management rules(see Fig. 10).
metric.
Proposition 10. Our proposed scheme provides EHR
migration phase in secure manner.
Proof. In this phase, the patient wishes to obtain medical
care in a given institution CHSK′ , which will not necessarily
be the same institution that enrolled them earlier. In this paper
as following steps:
• Wi who possesses the secret factors can successfully
bring the factors sends (CertWi , ID′AWi , EAWi ) to CHSk ,
where rWi = ri ⊕ H(IDWi ), (ID′AWi = IDAWi ⊕ rWi ) and
the encrypted main parameter via his shared key EAWi =
EncSKWi (rWi ).
• CHSk checks the CertWi with his index file; if it is found,
Wi performs the main medical treatment in his institu-
tion, the results report (RRWi ) should be added to the
EHRWi by EHRU j directly. Fig. 10. Computation cost comparison.
80 | Hamed & Yassin
TABLE I.
C OMPUTATION COST COMPARISON WITH OTHER RELATED WORKS .
Term Meaning Time needed
Th The time allotted to the crypto hash function. 0.0023 ms
T⊕ The processing time for the XOR operation. Negligible
TE nc The processing time for a symmetric encryption function. 0.0046 ms
T|| The processing time for the Concatenation operation. Negligible
TABLE II.
C OMPARING OF THE COMPUTATIONAL COST.
Scheme Registration Phase Login and Authentication Phases Total Cost
Wu et al. [21] 8Th + 3T⊕ + 7TII 35Th + 11T⊕ + 30TII + 1TDec + 1TEnc 43Th + 14T⊕ + 37TII + 1TDec + 1TEnc ≈ 0.1081
Taher et al. [22] 10Th + 10T⊕ + 9TII 21Th + 32T⊕ + 19TII 31Th + 42T⊕ + 28TII ≈ 0.0713
Yassin et al. [23] 5Th + 2T⊕ + 1TII 13Th + 12T⊕ + 6TII + 2TDec + 2TEnc 18Th + 14T⊕ + 7TII + 2TDec + 2TEnc ≈ 0.0598
Chatterjee et al. [24] 6Th + 3T⊕ + 15TII 2TDec + 2TEnc + 22Th + 5T⊕ + 88TII 28Th + 8T⊕ + 103TII + 2TDec + 2TEnc ≈ 0.0828
Our Scheme 2Th 8Th + 4TEnc + 3TDec + 6T⊕ 10Th + 4TEnc + 3TDec + 6T⊕ ≈ 0.0552