49
Views
0
CrossRef citations to date
0
Altmetric
Computers and Computing

Secure and Privacy in Healthcare Data Using Quaternion-based Neural Network Cryptography with the Blockchain Mechanism

&

References

  • R. Hamza, Z. Yan, K. Muhammad, P. Bellavista, and F. Titouna, “A privacy-preserving cryptosystem for IoT E-healthcare,” Inf. Sci., Vol. 527, pp. 493–510, 2020.
  • O.-A. Kwabena, Z. Qin, T. Zhuang, and Z. Qin, “MSCryptonet: multi-scheme privacy-preserving deep learning in cloud computing,” IEEE. Access., Vol. 7, pp. 29344–54, 2019.
  • B. Shen, J. Guo, and Y. Yang, “Medchain: efficient healthcare data sharing via blockchain,” Appl. Sci., Vol. 9, no. 6, pp. 1207, 2019.
  • A. D. Dwivedi, G. Srivastava, S. Dhar, and R. Singh, “A decentralized privacy-preserving healthcare blockchain for IoT,” Sensors, Vol. 19, no. 2, pp. 326, 2019.
  • A. A. Siyal, A. Z. Junejo, M. Zawish, K. Ahmed, A. Khalil, and G. Soursou, “Applications of blockchain technology in medicine and healthcare: challenges and future perspectives,” Cryptography, Vol. 3, no. 1, pp. 3, 2019.
  • Z. Wang, N. Luo, and P. Zhou, “Guardhealth: blockchain empowered secure data management and graph convolutional network enabled anomaly detection in smart healthcare,” J. Parallel. Distrib. Comput. 2020.
  • S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based electronic healthcare record system for healthcare 4.0 applications,” J. Inf. Sec. Appl., Vol. 50, pp. 102407, 2020.
  • Ü. Çavuşoğlu, S. Kaçar, I. Pehlivan, and A. Zengin, “Secure image encryption algorithm design using a novel chaos based S-box,” Chaos, Solitons Fractals, Vol. 95, pp. 92–101, 2017.
  • E. Yavuz, R. Yazıcı, M. C. Kasapbaşı, and E. Yamaç, “A chaos-based image encryption algorithm with simple logical functions,” Comput. Electr. Eng., Vol. 54, pp. 471–83, 2016.
  • K. Abbas, L. A. A. Tawalbeh, A. Rafiq, A. Muthanna, I. A. Elgendy, A. El-Latif, and A. Ahmed, “Convergence of blockchain and IoT for secure transportation systems in smart cities,” Sec. Commun. Netw., Vol. 2021, pp. 1–13, 2021.
  • G. Kaur, R. Agarwal, and V. Patidar, “Crypto-watermarking of images for secure transmission over cloud,” J. Inf. Optim. Sci. Vol. 41, no. 1, pp. 205–16, 2020.
  • X. Xie, Y. Fang, Z. Jian, Y. Lu, T. Li, and G. Wang, “Blockchain-driven anomaly detection framework on edge intelligence,” CCF Trans. Network, Vol. 3, no. 3, pp. 171–92, 2020.
  • H. R. Yassein, A. A. Abidalzahra, and N. M. Al-Saidi. “A new design of NTRU encryption with high security and performance level,” in AIP Conference Proceedings, 2021, AIP Publishing LLC, pp. 080005.
  • P. Mohit, R. Amin, A. Karati, G. Biswas, and M. K. Khan, “A standard mutual authentication protocol for cloud computing based health care system,” J. Med. Syst., Vol. 41, no. 4, pp. 50, 2017.
  • R. Charanya, S. Nithya, and N. Manikandan, “Attribute based encryption for secure sharing of E-health data,” IOP Conf. Ser. Mater. Sci. Eng., Vol. 263, pp. 042030, 2017.
  • K. B. Adedeji, N. I. Nwulu, C. Aigbavboa, and S. L. Gbadamosi. “Assessment of encryption and decryption schemes for secure data transmission in healthcare systems,” in 2019 IEEE AFRICON, 2019, IEEE, pp. 1–6.
  • W. Tang, J. Ren, K. Zhang, D. Zhang, Y. Zhang, and X. Shen, “Efficient and privacy-preserving fog-assisted health data sharing scheme,” ACM Trans. Intell. Syst. Technol., Vol. 10, no. 6, pp. 1–23, 2019.
  • K. Yaeger, M. Martini, J. Rasouli, and A. Costa, “Emerging blockchain technology solutions for modern healthcare infrastructure,” J. Sci. Innov. Med., Vol. 2, pp. 1, 2019.
  • C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.-K. R. Choo, “Blockchain: A panacea for healthcare cloud-based data security and privacy?,” IEEE Cloud Comput.., Vol. 5, no. 1, pp. 31–7, 2018.
  • J. Xu, K. Xue, S. Li, H. Tian, J. Hong, P. Hong, and N. Yu, “Healthchain: A blockchain-based privacy preserving scheme for large-scale health data,” IEEE Internet Things J., Vol. 6, no. 5, pp. 8770–81, 2019.
  • Y. Chen, H. Xie, K. Lv, S. Wei, and C. Hu, “DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks,” Inf. Sci., Vol. 501, pp. 100–17, 2019.
  • G. G. Dagher, J. Mohler, M. Milojkovic, and P. B. Marella, “Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology,” Sustain. Cities Soc., Vol. 39, pp. 283–97, 2018.
  • H. Jin, Y. Luo, P. Li, and J. Mathew, “A review of secure and privacy-preserving medical data sharing,” IEEE. Access., Vol. 7, pp. 61656–69, 2019.
  • A. Al Omar, M. S. Rahman, A. Basu, and S. Kiyomoto. “Medibchain: A blockchain based privacy preserving platform for healthcare data,” in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, 2017, Springer, pp. 534–43.
  • M. A. P. Chamikara, P. Bertók, D. Liu, S. Camtepe, and I. Khalil, “An efficient and scalable privacy preserving algorithm for big data and data streams,” Comput. Secur., Vol. 87, pp. 101570, 2019.
  • M. Ilokah. 2020. Design of a secure privacy preserving cloud based framework for sharing electronic health data.
  • V. S. V. Hema, and R. Kesavan, “ECC based secure sharing of healthcare data in the health cloud environment,” Wirel. Pers. Commun., Vol. 108, no. 2, pp. 1021–35, 2019.
  • J. Wang, X. Zhang, X. Tao, and J. Wang, “EPSLP: efficient and privacy-preserving single-layer perceptron learning in cloud computing,” J. High Speed Netw., Vol. 24, no. 3, pp. 259–79, 2018.
  • D. Asok, P. Chitra, and B. Muthurajan. Privacy preserving machine learning and deep learning techniques.
  • FÖ Çatak, and A. F. Mustacoglu, “CPP-ELM: Cryptographically privacy-preserving extreme learning machine for cloud systems,” Int. J. Comput. Intell. Syst., Vol. 11, no. 1, pp. 33–44, 2018.
  • T. Zhou, J. Shen, D. He, P. Vijayakumar, and N. Kumar, “Human-in-the-loop-aided privacy-preserving scheme for smart healthcare,” IEEE Trans. Emerg. Topics Comput. Intell., Vol. 6, no. 1, pp. 6–15, 2020.
  • S. A. Osia, et al., “A hybrid deep learning architecture for privacy-preserving mobile analytics,” IEEE Internet Things J., Vol. 7, no. 5, pp. 4505–18, 2020.
  • H. Cheng, C. Rong, M. Qian, and W. Wang, “Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption,” IEEE. Access., Vol. 6, pp. 37869–82, 2018.
  • S. Goyat, “Genetic key generation for public key cryptography,” Int. J. Soft Comput. Eng., Vol. 2, no. 3, pp. 231–3, 2012.
  • S. Mishra, and S. Bali, “Public key cryptography using genetic algorithm,” Int. J. Recent Technol. Eng., Vol. 2, no. 2, pp. 150–4, 2013.
  • A. Soni, and S. Agrawal, “Key generation using genetic algorithm for image encryption,” Int. J. Comput. Sci. Mobile Comput., Vol. 2, no. 6, pp. 376–83, 2013.
  • A. Shahnaz, U. Qamar, and A. Khalid, “Using blockchain for electronic health records,” IEEE. Access., Vol. 7, pp. 147782–95, 2019.
  • J. M. Roman-Belmonte, H. De la Corte-Rodriguez, and E. C. Rodriguez-Merchan, “How blockchain technology can change medicine,” Postgrad. Med., Vol. 130, no. 4, pp. 420–7, 2018.
  • M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Alresheedi, and Z. A. Abduljabbar, “An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier,” Human-centric Comput. Inf. Sci., Vol. 9, no. 1, pp. 1–29, 2019.
  • B. R. Begum, and P. Chitra, “ECC-CRT: An elliptical curve cryptographic encryption and Chinese remainder theorem based deduplication in cloud,” Wirel. Pers. Commun., Vol. 116, no. 3, pp. 1683–702, 2021.
  • S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems,” J. Ambient. Intell. Humaniz. Comput., Vol. 12, no. 2, pp. 2033–51, 2021.
  • R. Ali, and A. K. Pal, “An efficient three factor–based authentication scheme in multiserver environment using ECC,” Int. J. Commun Syst, Vol. 31, no. 4, pp. e3484, 2018.
  • F. Wang, G. Xu, C. Wang, and J. Peng, “A provably secure biometrics-based authentication scheme for multiserver environment,” Secur. Commun. Netw., Vol. 2019, 2019. DOI:10.1155/2019/2838615.
  • T.-Y. Wu, L. Yang, Z. Lee, C.-M. Chen, J.-S. Pan, and S. Islam, “Improved ECC-based three-factor multiserver authentication scheme,” Secur. Commun. Netw., Vol. 2021, 2021.
  • Y.-P. Liao, and C.-M. Hsiao, “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad. Hoc. Netw., Vol. 18, pp. 133–46, 2014.
  • Z. Zhao, “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” J. Med. Syst., Vol. 38, no. 5, pp. 1–7, 2014.
  • C. Jin, C. Xu, X. Zhang, and F. Li, “A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety,” J. Med. Syst., Vol. 40, no. 1, pp. 1–6, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.