1,307
Views
0
CrossRef citations to date
0
Altmetric
ORIGINAL ARTICLE

A combined Blockchain and zero-knowledge model for healthcare B2B and B2C data sharing

ORCID Icon, , , ORCID Icon &
Pages 179-196 | Received 24 Dec 2021, Accepted 04 Mar 2023, Published online: 29 Mar 2023

References

  • Abdallah, S., & Nizamuddin, N. (2023). Blockchain based solution for pharma supply chain industry. Computers & Industrial Engineering, 177, 108997.
  • Abrams, M. D., Jajodia, S. G., & Podell, H. J. (Eds.). (1995). Information security: An integrated collection of essays (1st ed.). Los Alamitos, CA, USA: IEEE Computer Society Press.
  • Aidos, E., Ezzahra, F., Kassab, M., Benamar, N., & Falah, B. (2022). A comprehensive survey on blockchain-based solutions to combat COVID-19 pandemic. International Journal of Computing and Digital Systems, 11(1), 873–892.
  • Al-Abbasi, L., & El-Medany, W. (2019). Blockchain security architecture: A review technology platform, security strength and weakness.
  • Al-Aswad, H., El-Medany, W. M., Balakrishna, C., Ababneh, N., & Curran, K. (2021). BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation. Arab Journal of Basic and Applied Sciences, 28(1), 154–171.
  • Al-Aswad, H., Hasan, H., Elmedany, W., Ali, M., & Balakrishna, C. (2019). Towards a blockchain-based zero-knowledge model for secure data sharing and access. In 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 76–81). IEEE.
  • Al-Jeshi, S., Tarfa, A., Al-Aswad, H., Elmedany, W., & Balakrishna, C. (2022). A blockchain enabled system for enhancing fintech industry of the core banking systems. In 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (pp. 209–213). IEEE.
  • Alharam, A. K., & El-Madany, W. (2017). Complexity of cyber security architecture for IoT healthcare industry: A comparative study. In 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 246–250). IEEE.
  • Ali, S., Anwar, W., Salem, B. J., A., & Dhuhlia, M. (2022). Tracing pharmaceutical products utilizing blockchain technologies. International Journal of Computing and Digital Systems, 12(1), 1173–1181.
  • Alromaihi, S., Elmedany, W., & Balakrishna, C. (2018). Cyber security challenges of deploying IoT in smart cities for healthcare applications. In 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 140–145). IEEE.
  • Alzuabi, W., Ismail, Y., & Elmedany, W. (2022). Privacy and security issues in blockchain based IoT systems: Challenges and opportunities. In 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (pp. 258–265). IEEE.
  • Amann, B., Sommer, R., Vallentin, M., & Hall, S. (2013). No attack necessary: The surprising dynamics of SSL trust relationships. In Proceedings of the 29th Annual Computer Security Applications Conference (pp. 179–188). ACM.
  • Attaran, M. (2022). Blockchain technology in healthcare: Challenges and opportunities. International Journal of Healthcare Management, 15(1), 70–83.
  • Bai, T., Hu, Y., He, J., Fan, H., & A., Z. (2022). Health-zkIDM: A healthcare identity system based on fabric blockchain and zero-knowledge proof. Sensors, 22(20), 7716.
  • Baizal, Z., Tarwidi, D., Wijaya, B. (2021). Tourism destination recommendation using ontology-based conversational recommender system. International Journal of Computing and Digital Systems, 10(1), 829–838.
  • Baliga, A. (2017). Understanding blockchain consensus models. Persistent, 4(1), 14.
  • Banerjee, A. (2018). Chapter three – Blockchain technology: Supply chain insights from ERP. In Raj, P. & Deka, G. C (Eds.), Blockchain technology: Platforms, tools and use cases (Vol. 111, pp. 69–98). Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S0065245818300202
  • Barros, M. D. V., Schardong, F., & Custódio, R. F. (2022). Leveraging self-sovereign identity, blockchain, and zero-knowledge proof to build a privacy-preserving vaccination pass. arXiv preprint arXiv:2202.09207
  • Bendovschi, A. (2015). Cyber-attacks – Trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24–31.
  • Blobel, B., Pharow, P., Engel, K., Spiegel, V., & Krohn, R. (1999). Communication security in open health care networks. Studies in Health Technology and Informatics, 68, 291–296.
  • Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical it systems. Technovation, 34(7), 342–353.
  • Calder, A. (2013). ISO27001/ISO27002: A pocket guide. UK: IT Governance Publishing. https://books.google.com.bh/books?hl=en&lr=&id=uFObBAAAQBAJ&oi=fnd&pg=PA5&dq=ISO27001/ISO27002:+A+pocket+guide.&ots=bVgpnln4Xq&sig=4BOg-pSIkRVXZ_Amc0X1dcHnmTY&redir_esc=y#v=onepage&q=ISO27001%2FISO27002%3A%20A%20pocket%20guide.&f=false
  • Daneshgar, F., Ameri Sianaki, O., Guruwacharya, P., L., Takizawa, M., Xhafa, F., & Enokido, T. (2019). Blockchain: A research framework for data security and privacy. In Barolli (Ed.), Web, artificial intelligence and network applications (pp. 966–974). Cham: Springer International Publishing.
  • De Aguiar, E. J., Faiçal, B. S., Krishnamachari, B., & Ueyama, J. (2020). A survey of blockchain-based strategies for healthcare. ACM Computing Surveys (CSUR), 53(2), 1–27.
  • de Vasconcelos Barros, M., Schardong, F., & Felipe Custódio, R. (2022). Leveraging self-sovereign identity, blockchain, and zero-knowledge proof to build a privacy-preserving vaccination pass. Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass.
  • Dosdale, T. (1994). Security in EDIFACT systems. Computer Communications, 17(7), 532–537.
  • Farouk, A., Alahmadi, A., Ghose, S., & Mashatan, A. (2020). Blockchain platform for industrial healthcare: Vision and future opportunities. Computer Communications.
  • Feng, X., Shen, J., & Fan, Y. (2009). Rest: An alternative to RPC for web services architecture. In 2009 First International Conference on Future Information Networks (pp. 7–10). IEEE.
  • Fu, J., Wang, N., & Cai, Y. (2020). Privacy-preserving in healthcare blockchain systems based on lightweight message sharing. Sensors, 20(7), 1898.
  • Graham, I. (1995). The dynamics of EDI standards development. Technology Analysis & Strategic Management, 7(1), 3–20.
  • Gullkvist, B. (2002). Towards paperless accounting and auditing. Finland: Citeseer.
  • Gunasekaran, S., Shanmugam, S., Rajan, D. P., & Rontala, P. (2023). Blockchain technology-enabled healthcare IoT to increase security and privacy using fog computing. In Machine Learning, Blockchain, and Cyber Security in Smart Environments (pp. 127–144). Chapman and Hall/CRC.
  • Hill, N. C., & Ferguson, D. M. (1989). Electronic data interchange: A definition and perspective.
  • Ingham, M., Marchang, J., & Bhowmik, D. (2020). IoT security vulnerabilities and predictive signal jamming attack analysis in lorawan. IET Information Security.
  • Jamil, F., Ahmad, S., Iqbal, N., & Kim, D.-H. (2020). Towards a remote monitoring of patient vital signs based on IoT-based blockchain integrity management platforms in smart hospitals. Sensors, 20(8), 2195.
  • Kim, M., Yu, S., Lee, J., Park, Y., & Park, Y. (2020). Design of secure protocol for cloud-assisted electronic health record system using blockchain. Sensors, 20(10), 2913.
  • Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., Islam, A. N., & Shorfuzzaman, M. (2022). Permissioned blockchain and deep learning for secure and efficient data sharing in industrial healthcare systems. IEEE Transactions on Industrial Informatics, 18(11), 8065–8073.
  • Lee, H., & Whang, S. (2000). Information sharing in a supply chain. International Journal of Technology Management, 20, 373–387.
  • Lee, S. L., Ainin, S., Dezdar, S., & Mallasi, H. (2015). Electronic data interchange adoption from technological, organisational and environmental perspectives. International Journal of Business Information Systems, 18(3), 299–320.
  • Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain systems. Future Generation Computer Systems.
  • Matullo, K. S., Amato, C. A., & Burskii, P. (2023). Use of blockchain technology for implantable medical device tracking. In Blockchain in Healthcare: From Disruption to Integration (pp. 201–214). Cham: Springer.
  • Miller, J. F. (2013). Supply chain attack framework and attack patterns. The Mitre Corporation.
  • Morkel, T., & Eloff, J. (2004). Encryption techniques: A timeline approach. In Information and Computer Security Architecture (ICSA). South Africa: Research Group, University of Pretoria.
  • Mozumdar, M., Aliasgari, M., Venkata, S. M. V., & Renduchintala, S. S. (2016). Ensuring authentication and security using zero knowledge protocol for wireless sensor network applications. International Journal of Computing and Digital Systems, 5(3), 225–234.
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
  • Narayanan, S., Marucheck, A. S., & Handfield, R. B. (2009). Electronic data interchange: Research review and future directions. Decision Sciences, 40(1), 121–163.
  • Ni, W., Huang, X., Zhang, J., & Yu, R. (2019). Healchain: A decentralized data management system for mobile healthcare using consortium blockchain. In 2019 Chinese Control Conference (CCC) (pp. 6333–6338). IEEE.
  • Ølnes, S., Ubacht, J., & Janssen, M. (2017). Blockchain in government: Benefits and implications of distributed ledger technology for information sharing.
  • Ouaddah, A., Elkalam, A. A., & Ouahman, A. A. (2017). Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Rocha, Á., Serrhini, M., and Felgueiras, C. (Eds.), Europe and MENA cooperation advances in information and communication technologies (pp. 523–533). Cham: Springer International Publishing.
  • Rahulamathavan, Y., Phan, R. C., Rajarajan, M., Misra, S., & Kondoz, A. (2017). Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1–6).
  • Ratnasingham, P. (1998). Edi security: The influences of trust on EDI risks. Computers & Security, 17(4), 313–324.
  • Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research, 57(7), 2117–2135.
  • Salminen, A. (1994). Reflections on EDIFACT: Seven issues for the future international EDI message standardization. In ECIS, 631–642.
  • Serme, G., de Oliveira, A. S., Massiera, J., & Roudier, Y. (2012). Enabling message security for Conference on Web restful services. In 2012 IEEE 19th International Services (pp. 114–121). IEEE.
  • Shahzad, S., & Heindel, E. (2012). What is EDI and how does it work. Hochschule Furtwangen University.
  • Shen, B., Guo, J., & Yang, Y. (2019). Medchain: Efficient healthcare data sharing via blockchain. Applied Sciences, 9(6), 1207.
  • Shi, S., He, D., Li, L., Kumar, N., Khan, M. K., & Choo, K.-K. R. (2020). Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security, 97, 101966.
  • Sousa, J., Bessani, A., & Vukolic, M. (2018). A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. In 2018 48th annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp.51–58). IEEE.
  • Srivastava, G., Parizi, R. M., & Dehghantanha, A. (2020). The future of blockchain technology in healthcare internet of things security. In Blockchain Cybersecurity, Trust and Privacy (pp. 61–184). Springer, Cham: Springer.
  • Su, Q., Zhang, R., Xue, R., & Li, P. (2020). Revocable attribute-based signature for blockchain-based healthcare system. USA: IEEE Access.
  • Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media. https://www.oreilly.com/about/contact.html
  • Swan, M. (2018). Blockchain economics: Ripple for ERP. European Finance Review, 1, 24–27.
  • Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407.
  • Thorud, G. (1994). Message handling systems. TELEKTRONIKK, 90, 86–86.
  • Tripathi, G., Ahad, M. A., & Paiva, S. (2020). S2hs-a blockchain based approach for smart healthcare system. In Healthcare (Vol. 8, pp. 100391). Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S2213076419302532
  • Truong, N. B., Sun, K., & Guo, Y. (2019). Blockchain-based personal data management: From fiction to solution. In 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) (pp.1–8).
  • Truong, N. B., Sun, K., Lee, G. M., & Guo, Y. (2020). GDPR-compliant personal data management: A blockchain-based solution. IEEE Transactions on Information Forensics and Security, 15, 1746–1761.
  • Turi, B. B. D. (1993). Security for EDIFACT messages. Computers & Security, 12(5), 447–455.
  • Vasudevan, V. (2008). Application security in the ISO27001 environment. UK: IT Governance. https://www.itgovernancepublishing.co.uk/
  • Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on blockchain technology?—A systematic review. PLoS One, 11, 1–27.
  • Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (pp. 557–564). BigData Congress.
  • Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352–375.
  • Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180–184).