Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023;13(3):2329-2342.
doi: 10.1007/s13204-021-02164-0. Epub 2022 Feb 4.

Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems

Affiliations

Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems

Hemant B Mahajan et al. Appl Nanosci. 2023.

Abstract

Since the last decade, cloud-based electronic health records (EHRs) have gained significant attention to enable remote patient monitoring. The recent development of Healthcare 4.0 using the Internet of Things (IoT) components and cloud computing to access medical operations remotely has gained the researcher's attention from a smart city perspective. Healthcare 4.0 mainly consisted of periodic medical data sensing, aggregation, data transmission, data sharing, and data storage. The sensitive and personal data of patients lead to several challenges while protecting it from hackers. Therefore storing, accessing, and sharing the patient medical information on the cloud needs security attention that data should not be compromised by the authorized user's components of E-healthcare systems. To achieve secure medical data storage, sharing, and accessing in cloud service provider, several cryptography algorithms are designed so far. However, such conventional solutions failed to achieve the trade-off between the requirements of EHR security solutions such as computational efficiency, service side verification, user side verifications, without the trusted third party, and strong security. Blockchain-based security solutions gained significant attention in the recent past due to the ability to provide strong security for data storage and sharing with the minimum computation efforts. The blockchain made focused on bitcoin technology among the researchers. Utilizing the blockchain which secure healthcare records management has been of recent interest. This paper presents the systematic study of modern blockchain-based solutions for securing medical data with or without cloud computing. We implement and evaluate the different methods using blockchain in this paper. According to the research studies, the research gaps, challenges, and future roadmap are the outcomes of this paper that boost emerging Healthcare 4.0 technology.

Keywords: Bitcoin; Blockchain; Cloud service provider; Data sharing; Data storage; Electronic heath records; Healthcare 4.0; Medical data; Security.

PubMed Disclaimer

Conflict of interest statement

Conflict of interestAll authors declares that they have no conflict of interest.

Figures

Fig. 1
Fig. 1
Design of cloud-based healthcare system in Healthcare 4.0
Fig. 2
Fig. 2
Step-by-step blockchain working
Fig. 3
Fig. 3
Structure of blockchain technology
Fig. 4
Fig. 4
Public vs. Private blockchain
Fig. 5
Fig. 5
Proposed architecture of Healthcare 4.0 enabled secured medical data storage and sharing
Fig. 6
Fig. 6
Average encryption time analysis for varying data size scenario
Fig. 7
Fig. 7
Average decryption time analysis for varying data size scenario
Fig. 8
Fig. 8
Overall encryption and decryption time for varying data size scenario

References

    1. Abu-Rumman A (2021) Transformational leadership and human capital within the disruptive business environment of academia. World J Educ Technol 13(2):178–187. 10.18844/wjet.v13i2.5652
    1. Abu-Rumman A, Al Shraah A, Al-Madi F, et al. Entrepreneurial networks, entrepreneurial orientation, and performance of small and medium enterprises: are dynamic capabilities the missing link? J Innov Entrep. 2021;10:29. doi: 10.1186/s13731-021-00170-8. - DOI
    1. Aceto G, Botta A, de Donato W, Pescapè A. Cloud monitoring: a survey. Comput Netw. 2013;57(9):2093–2115. doi: 10.1016/j.comnet.2013.04.001. - DOI
    1. Alam Q, Malik SUR, Akhunzada A, Choo K-KR, Tabbasum S, Alam M. A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans Inf Forensics Secur. 2017;12(6):1259–1268. doi: 10.1109/tifs.2016.2646639. - DOI
    1. Aldiabat K, Kwekha Rashid AS, Talafha H, Karajeh A. The extent of smartphones users to adopt the use of cloud storage. J Comput Sci. 2018;14(12):1588–1598. doi: 10.3844/jcssp.2018.1588.1598. - DOI

LinkOut - more resources