A Distributed Authentication Model for an E-Health Network Using Blockchain
Authors
Abstract:
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environment between trusted parties is a challenge for e-health networks. Reviewing previous studies revealed that providing a comprehensive and efficient model for authentication and secure exchange of information with a distributed approach while avoiding the single point of failure, which can meet the various needs of the e-health network, was necessary to fill the gap. In this study, it was attempted to introduce a secure authentication model for the e-health network by overcoming the limitations of previous articles on authentication in the e-health network and using the benefits of authentication models in various fields. Method: In this study, a secure and distributed authentication model was designed for the health network with a combination of blockchain and public-key infrastructure and its usability was presented in the form of an applicable instance (electronic prescribing). Results: This model showed that combining public-key infrastructure with blockchain can provide a secure, two-way, scalable, and distributed authentication with avoiding a single point of failure for the e-Health network. Conclusion: It can be concluded that in order to meet the security requirements of the e-health network, it is necessary to use peer-to-peer authentication models which are not dependent on a central server and the proposed model indicated that combining public-key infrastructure with blockchain can bring benefits and fulfill security requirements.
similar resources
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
full textProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
full textproposing a distributed model for intrusion detection in mobile ad-hoc network using neural fuzzy interface
security term in mobile ad hoc networks has several aspects because of the special specification of these networks. in this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy ratiocination of fuzzy system as...
full textA Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology
Blockchain is a distributed, transactional database that is shared across all the nodes participating in the network. This is the main technical innovation of Bitcoin and it acts as a public ledger for the transactions. However, this technology lacks standardisation and uniform understanding. This is due to a few studies, that would provide a comprehensive model of the blockchain and the distri...
full textA Reference Model for Blockchain-Based Distributed Ledger Technology
Blockchain is a distributed, transactional database that is shared across all the nodes participating in the network. This is the main technical innovation of Bitcoin and it acts as a public ledger for the transactions. Every node in the system has a full copy of the current chain, which contains every transaction ever executed. Every block contains a hash of the previous block, linking these t...
full textMy Resources
Journal title
volume 7 issue 4
pages 413- 424
publication date 2021-03
By following a journal you will be notified via email when a new issue of this journal is published.
No Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023