2023
DOI: 10.1109/tnsm.2022.3186006
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms

Abstract: This paper presents a hybrid blockchain-edge architecture for managing Electronic Health Records (EHRs) with attribute-based cryptographic mechanisms. The architecture introduces a novel attribute-based signature aggregation (ABSA) scheme and multi-authority attribute-based encryption (MA-ABE) integrated with Paillier homomorphic encryption (HE) to protect patients' anonymity and safeguard their EHRs. All the EHR activities and access control events are recorded permanently as blockchain transactions. We devel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 44 publications
0
10
0
Order By: Relevance
“…The novel concept enabled application scripts in terms of their deployment and execution in a safe environment named the Ethereum Virtual Machine (EVM) on distributed nodes in the form of decentralized applications (DApps). In the Cloud domain, smart contracts became extremely popular as a tool to improve existing environments [ 7 , 8 , 9 ] and even addressed different requirements such as privacy-preserving data sharing [ 10 ]. With the introduction of dedicated optimized variations of Ethereum (e.g., BNB chain ( (accessed on 3 October 2022)), Polygon ( (accessed on 7 October 2022)), Optimism ( (accessed on 9 October 2022)), and many others) using the same EVM core engine, the sustainability of the smart contract use case increased.…”
Section: Related Workmentioning
confidence: 99%
“…The novel concept enabled application scripts in terms of their deployment and execution in a safe environment named the Ethereum Virtual Machine (EVM) on distributed nodes in the form of decentralized applications (DApps). In the Cloud domain, smart contracts became extremely popular as a tool to improve existing environments [ 7 , 8 , 9 ] and even addressed different requirements such as privacy-preserving data sharing [ 10 ]. With the introduction of dedicated optimized variations of Ethereum (e.g., BNB chain ( (accessed on 3 October 2022)), Polygon ( (accessed on 7 October 2022)), Optimism ( (accessed on 9 October 2022)), and many others) using the same EVM core engine, the sustainability of the smart contract use case increased.…”
Section: Related Workmentioning
confidence: 99%
“…The aggregated ZKP scheme is programmed by using the Hyperledger Ursa library 7 . The blockchain network is developed on the Hyperledger Fabric platform 8 and tested using the Hyperledger Caliper benchmark tool 9 . We then instantiate multiple participants in the blockchain network, including different autonomous trucks and companies, and perform a variety of experiments having varying endorsement policies and transaction send rates.…”
Section: A Implementationmentioning
confidence: 99%
“…As a fault tolerant and decentralized network technology, blockchain has become a hot research topic since its initial deployment in the Bitcoin protocol for use as a distributed digital currency ledger [7]. Lately, many research studies have highlighted the applicability of blockchain technology to a wide array of subject areas outside of cryptocurrency, such as healthcare [8]- [10], smart cities [11]- [13] and intelligent transportation systems (ITS) [14]- [16]. Specifically, there are two distinct forms of blockchain technology: permissionless and permissioned.…”
Section: Introductionmentioning
confidence: 99%
“…To address these existing drawbacks, homomorphic encryption [8] could be a potential solution. Compared to other cryptography techniques, homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without decrypting it [8], [9]. Homomorphic encryption can be used for privacy-preserving outsourced storage and computation [9].…”
Section: Introductionmentioning
confidence: 99%
“…Compared to other cryptography techniques, homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without decrypting it [8], [9]. Homomorphic encryption can be used for privacy-preserving outsourced storage and computation [9]. It allows data to be encrypted and outsourced to a federated learning server or other computing devices.…”
Section: Introductionmentioning
confidence: 99%