MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic

Recently, an infectious disease, coronavirus disease 2019 (COVID-19), has been reported in Wuhan, China, and spread worldwide within a couple of months. There have been seen an outbreak of COVID-19 in many countries, where the infected patients' rate overwhelmed the inadequate medical services....

Full description

Saved in:
Bibliographic Details
Published inJournal of network and computer applications Vol. 179; p. 102975
Main Authors Kumar, Mahender, Chand, Satish
Format Journal Article
LanguageEnglish
Published England Elsevier Ltd 01.04.2021
Published by Elsevier Ltd
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Recently, an infectious disease, coronavirus disease 2019 (COVID-19), has been reported in Wuhan, China, and spread worldwide within a couple of months. There have been seen an outbreak of COVID-19 in many countries, where the infected patients' rate overwhelmed the inadequate medical services. The push of patient-centered interoperability (PCI) from medical institution-centered interoperability may defeat the current and post resultant disease of the COVID-19 pandemic. This paper proposes a state-of-the-art privacy-preserving medical data sharing system based on Hyperledger Fabric (MedHypChain), where each transaction is secured via an Identity-based broadcast group signcryption scheme. We proved that MedHypChain achieves confidentiality, anonymity, traceability, and unforgeability. Besides, we regularize the MedHypChain to implement the PCI healthcare system, where the patient manages its health-related information in the blockchain that can be accessible to the authorized entity. We also use the Hyperledger caliber as a benchmark tool to analyze the performance of MedHypChain in three metrics (latency time, execution time, and throughput) for up to 20 permissioned nodes. Finally, we compare MedHypChain with related blockchain-based healthcare systems and found that the proposed scheme needs the least computation cost and communication cost and achieves all security features, such as authenticity, scalability, and access control.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1084-8045
1095-8592
1084-8045
DOI:10.1016/j.jnca.2021.102975