1. Introduction
In the contemporary healthcare sector, the security of patient data has emerged as a paramount concern due to the increasing digitization of health records and the inherent vulnerability of digital systems to cyber threats [1]. Safeguarding sensitive health information is not just a technological requirement but a fundamental patient right, crucial for maintaining trust between healthcare providers and patients [2].
Healthcare data encompass a wide range of information, from personal identification details to complex medical history and treatment plans. With the advent of electronic health records (EHRs), telemedicine, and mobile health applications, the volume of digital health data has surged exponentially [3]. While these advancements have significantly improved the efficiency and accessibility of healthcare services, they have also introduced new challenges in data security [4].
The risks associated with healthcare data breaches are profound. Unauthorized access to health records can lead to identity theft, financial fraud, and even medical fraud, where an individual’s health information is used to procure drugs or submit false claims [5]. Furthermore, the exposure of sensitive health details can result in social stigma and personal embarrassment, thereby violating patient privacy and confidentiality [6].
The increasing frequency and sophistication of cyberattacks targeting healthcare institutions underscore the urgent need for robust security measures. According to a report by IBM Security, the healthcare sector has consistently been one of the most targeted industries by cybercriminals, with the average cost of a data breach being higher than in any other industry [7]. This susceptibility is partly due to the high value of health records on the black market, where they can fetch prices significantly higher than credit card details [8].
The legal and regulatory landscape governing the protection of health information has also evolved [9]. Laws such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States mandate stringent protections for patient data. The HIPAA’s Privacy and Security Rules are designed to safeguard the confidentiality, integrity, and availability of protected health information (PHI) and impose significant penalties for non-compliance. Similarly, the General Data Protection Regulation (GDPR) in the European Union introduces rigorous data protection requirements for all entities handling the personal data of EU citizens, including health-related information [10,11,12].
To effectively combat the growing challenges of healthcare data security, healthcare organizations are adopting a multi-layered security strategy incorporating several key practices. Encryption is crucial, as it secures data at rest and in transit, ensuring the information remains unreadable to unauthorized parties even if intercepted. Access controls are also critical, as they employ stringent authentication measures to restrict access to sensitive data according to an individual’s role within the organization. Furthermore, healthcare providers increasingly focus on regular audits and penetration testing to proactively identify and address security vulnerabilities [13].
Data anonymization is another important practice [14]; it involves stripping personally identifiable information from data sets intended for research or other secondary purposes, thus safeguarding patient privacy. Employee training is also essential, equipping staff with the knowledge to recognize and respond to phishing attacks and other cyber threats. Lastly, secure software development practices ensure that software solutions developed or procured meet rigorous security standards, especially those managing protected health information (PHI). This comprehensive approach enhances the security of sensitive health data and builds a foundation of trust and compliance within the healthcare ecosystem [15].
As the healthcare industry continues to embrace digital transformation, the importance of implementing robust data security measures cannot be overstated [16]. Protecting sensitive health information is essential not only for compliance with regulatory requirements but also for maintaining patients’ trust and safeguarding the integrity of healthcare systems. By adopting comprehensive security strategies, healthcare organizations can significantly mitigate the risk of data breaches and build a more resilient healthcare infrastructure [17].
This framework introduces a novel integration of homomorphic encryption, blockchain-based data integrity, and secure multi-party computation (SMPC), specifically tailored for telehealth applications. Unlike existing models that often address these security and privacy components in isolation, our approach provides a comprehensive solution by enabling encrypted data computations, immutable data storage, and secure access control through smart contracts within a single framework. This ensures that patient data remain confidential throughout the data sharing and processing lifecycle, while also maintaining compliance with stringent healthcare regulations such as the HIPAA and the GDPR. Our work advances the state of the art by enabling collaborative, privacy-preserving data sharing among multiple healthcare entities without compromising data security, setting a new standard for secure, scalable telemedicine systems.
While blockchain technology and cryptographic methods like homomorphic encryption are well established, our framework integrates these technologies in a manner specifically tailored to telehealth applications, addressing unique challenges such as real-time data access and compliance with stringent healthcare regulations. We enhance the conventional use of these technologies by integrating secure multi-party computation (SMPC) to allow multiple healthcare entities to safely interact with data without compromising patient privacy. This novel integration creates a robust environment where data privacy is maintained even during complex data processing tasks, which is not extensively covered in the existing literature.
2. Literature Review
Iqbal et al. developed a novel encryption scheme to enhance the security of electronic health records (EHRs) within telehealth systems. The proposed model utilizes a unique patient ID to facilitate encryption and decryption, aiming to secure sensitive patient information effectively against unauthorized access. The research introduces an ECG signal-based random key generator, which strengthens the encryption process and ensures that each encryption key is distinct and tied to individual patient data, thereby enhancing privacy protections [18].
Bharathi Murthy et al. develop a robust framework for securely sharing personal health records (PHRs) in telemedicine using private permissioned blockchain technology. The authors implement this system on Hyperledger Fabric and integrate a Byzantine Fault Tolerance consensus mechanism to ensure data integrity and privacy. Their model utilizes the Interplanetary File System (IPFS) for efficient off-chain data storage, which helps reduce blockchain load while ensuring secure and quick data access. Additionally, they incorporate smart contracts to provide granular access control, allowing patients to manage access to their data effectively. The results demonstrate the potential of their architecture to enhance secure sharing and access control within telemedicine, offering a significant contribution to the management of sensitive healthcare data [19].
Sharma et al. [20] propose an innovative framework for managing healthcare data via a cloud-based multi-authority access control system utilizing attribute-based encryption (ABE). Their model emphasizes the need for flexible and secure data sharing among multiple user domains while preserving the privacy of both data and access policies. The proposed system stands out by integrating a strategy that ensures policy privacy by only revealing policy attributes and hiding their values, which is critical for preventing unauthorized data inference. Additionally, the model incorporates a robust encryption mechanism to secure electronic health records (EHRs) across various healthcare stakeholders, significantly enhancing the system’s capability to handle sensitive health data securely and efficiently. The study’s findings indicate the potential of this framework to provide a scalable and secure data sharing environment, supporting the demands of modern telemedicine applications.
Martin Baumgartner et al. develop an innovative infrastructure to enhance the secondary use of health data through privacy-preserving federated systems. Their study outlines the implementation of Health Data Space (HDS) nodes that facilitate the versatile use of health data across different systems while maintaining high data privacy and security standards. The model leverages a federated approach where data are pseudonymized and harmonized using the Observational Medical Outcomes Partnership (OMOP) Common Data Model, ensuring data remain secure and interoperable across various healthcare providers and researchers [21].
Qing Fan et al. propose [22] a robust framework to enhance data security in e-health systems. Their scheme integrates forward-secure signatures and time-lock puzzles to authenticate and maintain the privacy of transmitted health data. This method ensures that data remain secure during transmission and provides mechanisms for patients to deny data association, enhancing both privacy and compliance with regulatory standards. The efficacy of their approach is demonstrated through comprehensive security assessments and performance evaluations.
NIU Shufang et al. critically evaluate an existing authentication scheme designed for Telecare Medical Information Systems (TMISs). They identify several vulnerabilities, including susceptibility to impersonation, replay, and tracking attacks. The authors propose enhancements to the authentication and key agreement processes to overcome these issues, presenting an improved scheme that boosts security and computational efficiency. This research significantly advances secure communication within TMISs by addressing the identified gaps and suggesting robust solutions [23].
3. Method
The proposed algorithm employs blockchain technology and advanced cryptographic techniques to establish a secure and privacy-preserving framework for healthcare data management in telemedicine. Initially, the algorithm encrypts patient health data using homomorphic encryption, ensuring that only encrypted data are managed or accessed, which protects the data from unauthorized access. These encrypted data are then stored on a blockchain, providing a secure, immutable record that supports data integrity and auditability.
The system facilitates secure data access and sharing through secure multi-party computation (SMPC), allowing computations on encrypted data without revealing individual inputs, thus maintaining data confidentiality. Access control and permission management are implemented using smart contracts on the blockchain, which check and enforce the patient-set permissions before any operations are performed, ensuring compliance with patient preferences and legal standards. The framework includes mechanisms for data integrity auditing and compliance monitoring, where each transaction is verifiable against blockchain integrity checks and compliance with regulations like the HIPAA or the GDPR. This comprehensive approach demonstrates a robust system for managing sensitive health data, effectively balancing security, privacy, and regulatory compliance.
Homomorphic encryption (HE) is a form of encryption that allows computations to be performed on ciphertexts, generating an encrypted result that, when decrypted, matches the result of operations performed on the plaintext. This method is pivotal in our framework as it enables the performing of complex data analyses securely without exposing the underlying data. Specifically, our implementation uses a partially homomorphic encryption scheme, which supports both addition and multiplication on encrypted data but limits the depth of these operations to maintain manageable computation times.
Secure multi-party computation (SMPC) further enhances this by allowing multiple parties to jointly compute a function over their inputs while keeping those inputs private. In our framework, SMPC is implemented via a protocol that combines homomorphic encryption with threshold cryptography to ensure that no single party can access the full scope of the data or computation results. The process involves distributing decryption keys among a predefined number of parties, where a subset is required to collaborate to decrypt the result, thus ensuring data privacy and security throughout the computation process.
These technologies are integrated into our proposed framework using established cryptographic libraries that support scalability and efficiency, such as Microsoft SEAL for HE and MP-SPDZ for SMPC. By providing detailed descriptions and specific examples of these implementations, we aim to clarify their applications and operational frameworks within our proposed system, offering readers a clearer understanding of how privacy and data integrity are maintained.
Step 1: Data Encryption
Patients encrypt their data using their private key before they are shared or stored, ensuring that only encrypted data are handled by other parties
-
Equation: C = Ekp(D)
-
Explanation:
▪. D: original patient health data.
▪. kp: patient’s private key.
▪. C: encrypted data.
▪. E: encryption function using homomorphic encryption.
Step 2: Secure Data Storage
Encrypted data C are securely stored on the blockchain, providing a decentralized and immutable record.
-
Equation: B = append(C)
-
Explanation:
▪. B: blockchain storage.
▪. append: function to add encrypted data C to the blockchain.
Step 3: Data Access and Sharing using SMPC
SMPC protocols compute functions on encrypted data from multiple parties, ensuring that no party learns anything about the others’ inputs besides the final result.
-
Equation: R = f(C1, C2, …, Cn)
-
Explanation:
▪. Ci: encrypted input data from the i-th party.
▪. f: computation function that can be performed on encrypted data.
▪. R: encrypted result of the computation.
Step 4: Access Control and Permission Management
Using smart contracts on the blockchain, access permissions Pi are checked before any function f can be executed on data, enforcing strict compliance with the patient’s preferences
-
Equation: if (Pi) then execute (f)
-
Explanation:
▪. Pi: permission set by the patient.
▪. f: function or access request.
Step 5: Data Integrity and Auditing
Each transaction Bt on the blockchain is auditable, and its integrity can be verified, ensuring the data have not been tampered with, and access patterns are transparent.
-
Equation: verify(Bt)
-
Explanation:
▪. Bt: blockchain transaction.
▪. Verify: this function checks the integrity of blockchain transactions.
Step 6: Compliance and Reporting
Smart contracts can be programmed to automatically ensure that all transactions B comply with specified rules, such as the HIPAA or the GDPR, and can facilitate automated reporting to regulatory bodies.
-
Equation: comply(B, rules)
-
Explanation:
▪. B: entire blockchain ledger.
▪. rules: set of regulatory compliance rules.
Figure 1 illustrates the comprehensive algorithm for secure healthcare data management within telemedicine systems. This sequence diagram systematically maps out the interactions among various actors—patient, healthcare provider, blockchain, smart contract, SMPC Engine, Audit Module, Regulatory Body, and Compliance System. Each actor’s role is precisely defined, ensuring a seamless data flow and decision-making processes. The patient, as the primary data owner, initiates the sequence by encrypting their health information before sharing it with healthcare providers. This encryption ensures that the data remain protected at all stages of the interaction, maintaining privacy from the outset.
The healthcare provider is responsible for accessing and utilizing patient data within the constraints set by the patient and regulatory requirements. Data access is facilitated through smart contracts, which are deployed on the blockchain network. These smart contracts automate the enforcement of predefined rules for data access, ensuring that only authorized parties can retrieve and interact with sensitive information. The use of blockchain not only decentralizes data management but also adds a layer of immutability, ensuring that all transactions and modifications to the data are permanently recorded and can be traced back if necessary. This provides transparency, accountability, and trust in the system.
The SMPC (secure multi-party computation) Engine plays a critical role in allowing computations on encrypted data without revealing the underlying information. This enables various healthcare providers or researchers to collaborate on patient data analysis while maintaining the confidentiality of the patient’s personal health information (PHI). This is particularly important in research and diagnostic scenarios, where insights can be derived without violating privacy.
In addition to the core actors, the Audit Module continuously monitors the system’s transactions, verifying that all actions comply with the security protocols. This module conducts regular checks to ensure that all data exchanges and computations follow the required encryption standards and that no unauthorized access attempts occur. The auditing process is crucial for identifying any potential vulnerabilities or breaches early on, allowing healthcare providers to respond proactively. Moreover, it offers a way to document compliance with data protection laws, making it easier to demonstrate adherence to regulatory standards during audits by external bodies.
The Regulatory Body plays a key oversight role by periodically reviewing the system’s operations to ensure compliance with healthcare regulations such as the HIPAA, the GDPR, and other jurisdiction-specific laws. This includes validating that smart contracts are properly configured to enforce data access rights according to legal mandates, and that the encryption and anonymization techniques employed are sufficient to meet the legal requirements for protecting patient data.
Our framework is designed with the flexibility to adapt to a variety of international privacy laws and regulations, including the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in the European Union. By implementing configurable smart contracts and dynamic consent management processes, the framework can enforce specific regulatory requirements automatically, ensuring compliance across different jurisdictions. Further discussion will include detailed strategies for aligning with other regional regulations, showcasing the framework’s global applicability and its ability to seamlessly integrate into diverse legal environments.
The security of patient private keys is paramount, managed through advanced cryptographic storage solutions such as Hardware Security Modules (HSMs) and secure enclave technology. These technologies provide a fortified environment for key storage, ensuring that private keys are not exposed to the operating system or application software. This level of security prevents unauthorized access and the use of the keys, significantly enhancing the overall security posture of our telehealth framework.
Finally, the Compliance System serves as an automated enforcement mechanism that ensures all aspects of the data management process align with regulatory requirements. This includes monitoring data retention policies, ensuring data minimization principles are followed, and confirming that patients’ rights to access and modify their data are upheld. In cases where regulatory violations are detected, the Compliance System flags these issues, triggering remediation processes such as tightening access controls or conducting additional audits.
Overall, this framework presents a robust solution to the complex challenges of telemedicine data management. By integrating blockchain and cryptographic techniques with automated smart contracts and SMPC, the system achieves a high level of security and privacy while also ensuring operational efficiency and regulatory compliance. The interaction between the various components—encryption, secure data access, computation, auditing, and compliance—forms a comprehensive, scalable solution capable of adapting to evolving cybersecurity threats and regulatory landscapes.
4. Analysis and Evaluation
This section will explain the analysis and evaluation of the proposed algorithm, focusing on assessing its effectiveness and efficiency in enhancing the security of telemedicine systems. It will detail the methodologies used for testing the algorithm against various cybersecurity threats and discuss the results obtained from these evaluations. This analysis aims to demonstrate the algorithm’s superior performance in securing sensitive healthcare data compared to that of existing solutions. It provides a thorough understanding of its advantages and potential areas for further improvement.
Homomorphic encryption uniquely allows for direct computations on encrypted data without the need for decryption. This capability is instrumental in our framework, enabling updates or changes to patient data while maintaining its encrypted state. For example, if an update to a patient’s record is necessary, operations like addition or multiplication can be directly applied to the ciphertext. This process leverages the algebraic properties of the encryption scheme to ensure that the integrity and confidentiality of the data are preserved, even when modifications are made.
Every transaction on our blockchain incorporates a cryptographic hash function, which is crucial for maintaining data integrity. When changes are made to the blockchain, a new hash is created that includes the previous block’s hash, effectively linking the blocks securely. This chaining of hashes ensures that any alteration of transaction data can be detected, as it would invalidate the hash sequence. This method provides a robust mechanism for verifying the integrity and non-repudiation of stored data.
Smart contracts play a crucial role in our framework by automating the enforcement of access policies and patient consent. These contracts are programmed to execute predefined rules automatically when certain conditions are met, ensuring compliance and facilitating trustless interactions between parties. The formation of these contracts involves defining clear and concise logic that is deployed on the blockchain, where they operate autonomously to manage permissions and regulate access to encrypted data based on patient preferences.
Achieving an optimal balance between data privacy and processing efficiency remains a critical challenge in the design of telehealth systems. Our framework employs techniques such as lightweight homomorphic encryption and optimized SMPC protocols that are designed to minimize computational overhead while maximizing data security. These methods ensure that privacy-preserving computations are performed with minimal impact on system performance. Future iterations of the framework will explore adaptive encryption methods that adjust the level of security based on real-time assessments of data sensitivity and threat levels, potentially enhancing system efficiency without compromising privacy.
To demonstrate the practical effectiveness of our framework, we present a case study involving a telehealth service provider implementing our privacy-preserving techniques. This example details the encryption of patient data for a teleconsultation scenario, showcasing how different healthcare providers can securely access and compute on patient data to provide timely and efficient care without compromising privacy. We compare this implementation with traditional methods, highlighting improvements in data security, access time, and compliance with the HIPAA and the GDPR.
The application of blockchain technology in healthcare data management involves careful consideration of performance and security. While blockchain provides a high degree of security and immutability, it can introduce latency in transaction processing. To address potential efficiency losses, we optimize transaction validation processes and block generation intervals. Additionally, the use of two-factor authentication, including biometrics, is justified by the need for stringent security measures that go beyond traditional password-based systems, providing a necessary layer of security to protect sensitive health information.
Encryption Method: The proposed model uses homomorphic encryption to ensure that patient data remain encrypted both at rest and during computations. This allows for secure data processing without decrypting the sensitive information, maintaining confidentiality. Homomorphic encryption enables various mathematical operations on encrypted data, preserving privacy even when data are processed or analyzed. This method significantly improves data security in comparison to traditional encryption schemes, which require data to be decrypted before use.
Data Integrity: Ensuring data integrity is crucial for maintaining trust in telemedicine systems. The proposed model achieves this by leveraging blockchain technology, which provides an immutable ledger for storing encrypted data. Each transaction on the blockchain is verified through cryptographic hashing, ensuring that any unauthorized modifications to patient data are immediately detected. This approach offers a transparent and verifiable method for maintaining the integrity of sensitive healthcare records, making it resistant to tampering or unauthorized changes.
Access Control: Access control in the proposed model is implemented through the use of smart contracts on the blockchain. These smart contracts automatically enforce patient-defined permissions before granting access to any data, ensuring that only authorized parties can view or modify the information. This approach enables precise control over data sharing, complying with regulatory requirements like the HIPAA and the GDPR. By automating access control through smart contracts, the model minimizes the risk of unauthorized access while maintaining flexibility in managing data permissions.
Scalability: The proposed model addresses scalability challenges by incorporating secure multi-party computation (SMPC) to enable computations on encrypted data. SMPC allows multiple parties to collaborate on data analysis without exposing individual inputs, making it suitable for large-scale applications in telemedicine. Additionally, by using blockchain technology, the system can efficiently manage increasing data volumes without compromising security, ensuring that it remains adaptable to the needs of expanding healthcare networks and larger user bases.
User Anonymity: To preserve user anonymity, the proposed model utilizes encryption and pseudonymization techniques, ensuring that personal identifiers are not directly linked to health data. This approach ensures that even if the encrypted data are accessed, the user’s identity remains protected. By dissociating personal details from medical records, the model enhances privacy, making it compliant with stringent data protection regulations and minimizing the risk of identity theft.
Authentication Method: The model integrates a dual-layer authentication mechanism combining biometric verification with traditional credentials. This ensures that only authorized users can access sensitive medical data, significantly reducing the risk of unauthorized access. Biometric authentication, such as fingerprint or facial recognition, adds a robust security layer, making it difficult for attackers to impersonate legitimate users. This dual approach enhances the overall security of the telemedicine system.
Threats Addressed: The proposed model is designed to counter a wide range of cybersecurity threats, from impersonation attacks to data breaches. It employs advanced cryptographic techniques and blockchain-based auditing to protect against unauthorized access. By addressing various attack vectors, such as replay attacks and MITM (Man-In-The-Middle) attacks, the model ensures secure communication and data integrity. This comprehensive threat management strategy makes it a reliable solution for safeguarding sensitive healthcare information.
Innovative Aspect: The innovation of the proposed model lies in its integration of homomorphic encryption with secure multi-party computation (SMPC) and blockchain technology. This combination allows secure data sharing and analysis while maintaining the privacy of patient information. Unlike traditional models, the proposed solution enables computations on encrypted data without compromising confidentiality. This unique approach allows for collaborative research and analysis without exposing individual patient records, making it a forward-thinking solution in the telemedicine landscape.
The integration of homomorphic encryption with blockchain technology represents a significant scientific advancement in securing telehealth data. This approach not only ensures data privacy but also enables a transparent and verifiable means of managing health records. In the comparative analysis, we will assess the efficiency, durability against quantum threats, and energy consumption of our framework compared to those of traditional systems. This analysis will highlight the practicality and future readiness of our approach, considering the evolving landscape of cyber threats and computing capabilities.
Performance in Real World: The real-world applicability of the proposed model is demonstrated by its ability to securely manage patient data in telemedicine systems, ensuring compliance with regulations such as the HIPAA. Its use of blockchain and SMPC allows it to handle large volumes of encrypted data efficiently, making it suitable for diverse healthcare environments, from small clinics to large hospital networks. The model’s performance in securing data transmission and providing detailed access control has proven effective in maintaining trust between patients and healthcare providers, offering a scalable and secure solution for modern telehealth services.
Table 1 emphasizes different aspects of each work, such as encryption methods, access control, scalability, and their unique contributions to the field. It offers a broader perspective on how these models compare to our proposed solution, showcasing the strengths and focus areas of each approach. Our proposed model, as highlighted, offers a balance of encryption, scalability, and comprehensive threat defense.
5. Conclusions and Future Work
The proposed security algorithm for telemedicine systems offers a comprehensive protection suite, significantly improving existing methodologies for securing sensitive healthcare data. By integrating advanced cryptographic techniques and leveraging a multi-layered security approach, the algorithm efficiently addresses various cybersecurity threats, from impersonation and insider attacks to data breaches and DoS attacks. This model ensures the confidentiality and integrity of data and upholds user anonymity and robust access control, which are critical for maintaining trust in digital healthcare environments. The algorithm’s efficacy is further underscored by the comparative analysis presented in this study, which shows its superior performance in handling diverse security challenges compared to that of other contemporary systems.
However, the algorithm has certain limitations. One major limitation is the computational overhead of advanced cryptographic techniques and multi-layered security measures, which can increase processing times and consume more system resources. This may limit the algorithm’s efficiency, particularly in environments with limited computational power, such as mobile devices or IoT systems commonly used in telemedicine. Another limitation is the potential scalability challenges as the algorithm relies heavily on secure multi-party computation (SMPC) and blockchain technologies, which can become less efficient as the number of participants or the volume of data increases. This could result in higher latency and bandwidth consumption, especially in large-scale healthcare networks with numerous simultaneous users. Additionally, while the algorithm ensures a high level of security against existing threats, it may be vulnerable to emerging threats, such as quantum computing attacks, unless further developments in quantum-resistant cryptographic methods are incorporated.
Future research could further enhance the model’s scalability and adaptability to accommodate the rapidly evolving landscape of telemedicine and e-health services. One potential area for development is integrating AI-driven threat detection systems, which could provide dynamic and proactive security measures. Additionally, incorporating quantum-resistant cryptographic techniques could future-proof the model against emerging computational threats. As telemedicine expands its reach, the ongoing development and refinement of security measures will be crucial in ensuring the safety and privacy of patient data, fostering continued trust and reliance on these essential digital health services.
Conceptualization, A.O. and E.A.; data collection, A.O.; analysis and interpretation of results, A.O., E.A. and W.S.; draft manuscript preparation, E.A. and W.S. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.
The authors sincerely acknowledge the Princess Sumaya University for Technology for supporting steps of this work.
The author declares that there are no conflicts of interest to report regarding the present study.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Security features of different schemes.
Security Feature | Iqbal et al. [ | Bharathi Murthy et al. [ | Sharma et al. [ | Martin Baumgartner et al. [ | Qing Fan et al. [ | NIU Shufang et al. [ | Proposed Model |
---|---|---|---|---|---|---|---|
Encryption Method | Unique patient ID with ECG-based random key generator | Private permissioned blockchain with Hyperledger Fabric | Attribute-based encryption (ABE) with policy privacy | Federated systems with pseudonymization and OMOP model | Forward-secure signatures and time-lock puzzles | Improved authentication and key agreement | Homomorphic encryption with blockchain integration |
Data Integrity | Ensures unique keys for each patient | Byzantine Fault Tolerance for Consistency | Focuses on flexible data sharing with encryption | Data harmonization for secondary use | Comprehensive assessments for data transmission | Addresses vulnerabilities in existing TMISs | Blockchain-based auditing and verification mechanisms |
Access Control | Facilitated through patient-specific keys | Smart contracts enable granular access control | Multi-authority access control | Uses federated approach with node-based control | Mechanisms for patients to deny data association | Enhanced access control in TMISs | Smart contracts enforce patient-set permissions |
Scalability | Limited by unique key generation process | Scalable through private blockchain and IPFS | Supports multiple domains with ABE | Facilitates data sharing across different systems | Emphasizes secure data transmission | Focus on improved efficiency within TMISs | Uses SMPC for scalability with encrypted data computations |
User Anonymity | Not specifically addressed | Provides user anonymity with blockchain | Maintains policy privacy through hidden attribute values | Pseudonymization for privacy-preserving data use | Uses anonymity for transmitted health data | Enhancements to preserve user privacy | Achieved using pseudonyms and encryption for anonymity |
Authentication Method | Unique IDs combined with encryption | Blockchain with smart contracts for access control | Multi-authority role-based authentication | Authentication through federated nodes | Time-lock puzzles for secure authentication | Improvements over previous TMIS authentication schemes | Combines biometric verification with traditional credentials |
Threats Addressed | Focuses on impersonation and data security | Robust against DoS, replay, and insider threats | Designed for flexibility against multi-user threats | Emphasizes privacy and secure data interoperability | Aims to secure transmission and compliance | Targets replay, impersonation, and tracking attack issues | Comprehensive defense against a range of attacks |
Innovative Aspect | Random key generation tied to ECG signals | Integration of IPFS and Hyperledger with smart contracts | Policy privacy with hidden attribute values | Federated system with data harmonization | Use of forward-secure and time-lock mechanisms | Vulnerability assessment and improvements to existing systems | Integration of homomorphic encryption with SMPC for privacy |
Performance in Real World | Effective for small-scale systems with individual encryption keys | Scalable solution with proven efficiency in blockchain applications | Focused on secure data sharing within cloud environments | Suitable for research and multi-institutional data analysis | Validated through security and performance evaluations | Demonstrated enhanced security and efficiency in TMISs | Superior performance in telemedicine with encryption and SMPC |
References
1. Masood, I.; Daud, A.; Wang, Y.; Banjar, A.; Alharbey, R. A blockchain-based system for patient data privacy and security. Multimed. Tools Appl.; 2024; 83, pp. 60443-60467. [DOI: https://dx.doi.org/10.1007/s11042-023-17941-y]
2. Vats, T.; Kumar, S.; Singh, S.K.; Madan, U.; Preet, M.; Arya, V.; Bansal, R.; Almomani, A. Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings. Cyber Secur. Appl.; 2024; 2, 100046. [DOI: https://dx.doi.org/10.1016/j.csa.2024.100046]
3. Ogundipe, D.O. The impact of big data on healthcare product development: A theoretical and analytical review. Int. Med. Sci. Res. J.; 2024; 4, pp. 341-360. [DOI: https://dx.doi.org/10.51594/imsrj.v4i3.932]
4. Ibeh, C.V.; Elufioye, O.A.; Olorunsogo, T.; Asuzu, O.F.; Nduubuisi, N.L.; Daraojimba, A.I. Data analytics in healthcare: A review of patient-centric approaches and healthcare delivery. World J. Adv. Res. Rev.; 2024; 21, pp. 1750-1760. [DOI: https://dx.doi.org/10.30574/wjarr.2024.21.2.0246]
5. Sharma, P.; Barua, S. From data breach to data shield: The crucial role of big data analytics in modern cybersecurity strategies. Int. J. Inf. Cybersecur.; 2023; 7, pp. 31-59.
6. Pool, J.; Akhlaghpour, S.; Fatehi, F.; Burton-Jones, A. A systematic analysis of failures in protecting personal health data: A scoping review. Int. J. Inf. Manag.; 2024; 74, 102719. [DOI: https://dx.doi.org/10.1016/j.ijinfomgt.2023.102719]
7. Zhang, L.; Miranskyy, A.; Rjaibi, W.; Stager, G.; Gray, M.; Peck, J. Making existing software quantum safe: A case study on IBM Db2. Inf. Softw. Technol.; 2023; 161, 107249. [DOI: https://dx.doi.org/10.1016/j.infsof.2023.107249]
8. Singh, D.; Singh, S. Study of the Dark Web With Reference to the Indian Banking System and Black Market and Fraud Scenarios. Social Capital in the Age of Online Networking: Genesis, Manifestations, and Implications; IGI Global: Hershey, PA, USA, 2023; pp. 211-229.
9. Brown, S.; Desai, A. Legal and regulatory issues related to the use of clinical software in healthcare delivery. Clinical Decision Support and Beyond; Elsevier: Amsterdam, The Netherlands, 2023; pp. 651-692.
10. Marks, M.; Haupt, C.E. AI chatbots, health privacy, and challenges to HIPAA compliance. JAMA; 2023; 330, pp. 309-310. [DOI: https://dx.doi.org/10.1001/jama.2023.9458]
11. Fard Bahreini, A. Which information locations in covered entities under HIPAA must be secured first? A multi-criteria decision-making approach. J. Healthc. Risk Manag.; 2023; 43, pp. 27-36. [DOI: https://dx.doi.org/10.1002/jhrm.21555]
12. Sadri, M. HIPAA: A Demand to Modernize Health Legislation. Undergrad. Law Rev. UC San Diego; 2024; 2, [DOI: https://dx.doi.org/10.5070/LR3.21252]
13. Thantilage, R.D.; Le-Khac, N.-A.; Kechadi, M.-T. Healthcare data security and privacy in Data Warehouse architectures. Inform. Med. Unlocked; 2023; 39, 101270. [DOI: https://dx.doi.org/10.1016/j.imu.2023.101270]
14. Sampaio, S.; Sousa, P.R.; Martins, C.; Ferreira, A.; Antunes, L.; Cruz-Correia, R. Collecting, processing and secondary using personal and (pseudo) anonymized data in smart cities. Appl. Sci.; 2023; 13, 3830. [DOI: https://dx.doi.org/10.3390/app13063830]
15. Martinez, D.; Herrera, S. Examining the Ethical and Legal Challenges of Anonymized Data Sharing in the Era of Big Data Analytics. J. Sustain. Technol. Infrastruct. Plan.; 2023; 7, pp. 59-77.
16. Ullagaddi, P. Digital transformation strategies to strengthen quality and data integrity in pharma. Int. J. Bus. Manag.; 2024; 19, pp. 16-26. [DOI: https://dx.doi.org/10.5539/ijbm.v19n5p16]
17. Massaro, M. Digital transformation in the healthcare sector through blockchain technology. Insights from academic research and business developments. Technovation; 2023; 120, 102386. [DOI: https://dx.doi.org/10.1016/j.technovation.2021.102386]
18. Iqbal, J.; Waheed, A.; Zareei, M.; Umar, A.I.; Amin, N.U.; Aldosary, A.; Mohamed, E.M. A lightweight and secure attribute-based multi receiver generalized signcryption scheme for body sensor networks. IEEE Access; 2020; 8, pp. 200283-200304. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.3035324]
19. Murthy, C.V.B.; Shri, M.L. Secure Sharing Architecture of Personal Healthcare Data Using Private Permissioned Blockchain for Telemedicine. IEEE Access; 2024; 12, pp. 106645-106657. [DOI: https://dx.doi.org/10.1109/ACCESS.2024.3436075]
20. Sharma, A.; Singh, A.; Gupta, V.; Arya, S. Advancements and future prospects of wearable sensing technology for healthcare applications. Sens. Diagn.; 2022; 1, pp. 387-404. [DOI: https://dx.doi.org/10.1039/D2SD00005A]
21. Baumgartner, M.; Kreiner, K.; Lauschensky, A.; Jammerbund, B.; Donsa, K.; Hayn, D.; Wiesmüller, F.; Demelius, L.; Modre-Osprian, R.; Neururer, S. Health data space nodes for privacy-preserving linkage of medical data to support collaborative secondary analyses. Front. Med.; 2024; 11, 1301660. [DOI: https://dx.doi.org/10.3389/fmed.2024.1301660]
22. Fan, Q.; Xie, Y.; Zhang, C.; Liu, X.; Zhu, L. An Authentic and Privacy-Preserving Scheme Towards E-Health Data Transmission Service. IEEE Trans. Serv. Comput.; 2024; 17, pp. 1969-1982. [DOI: https://dx.doi.org/10.1109/TSC.2024.3451145]
23. Shufang, N.; Baoyuan, K.; Anqian, L.; Yuyan, H.; Xinyu, Z. Analysis and Improvement of a Privacy-Preserving Authentication Scheme for Telecare Medical Information System Environment. Wuhan Univ. J. Nat. Sci.; 2023; 28, pp. 531-540.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy and security. This paper proposes a privacy-preserving framework for secure data sharing within telehealth services, employing blockchain technology and advanced cryptographic techniques. The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. Secure multi-party computation (SMPC) is integrated for encrypted data computations, maintaining data confidentiality even during operations. Smart contracts enforce access control, ensuring that patient preferences and regulatory requirements such as the HIPAA and the GDPR are met. Furthermore, the framework includes auditing and verifying data integrity mechanisms, making it resilient against cyber threats such as impersonation, replay, and Man-In-The-Middle attacks. The analysis demonstrates the framework’s superior performance in addressing these challenges compared to that of existing systems. Future work suggests integrating AI-driven threat detection and quantum-resistant cryptographic techniques to enhance security further and adapt to the evolving telehealth landscape.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 Computer Science Department, King Hussein School of Computing Sciences, Princess Sumaya University of Technology, Amman 11941, Jordan;
2 School of Computer Science & Engineering, Sacred Heart University, Fairfield, CT 06825, USA;