| Literature DB >> 35573029 |
Punam Prabha1, Kakali Chatterjee1.
Abstract
Nowadays, blockchain is emerging as a worthwhile technology for managing sensitive data in electronic healthcare system. It plays an important role in healthcare, medical research and insurance sectors. The consensus algorithms used in blockchain technology for the selection of a new block, provide high-level of security to IoT devices. However, the reliability problem still exists. In the present paper, a blockchain based hybrid consensus mechanism (HCM) is implemented in electronic healthcare system (EHS) to overcome trustworthiness issues. The aim of the proposed HCM is to maintain reputation module on the basis of the block activities. In this context, EHS is designed in four layers namely: system layer, inter-network layer, blockchain layer, and cloud layer. Moreover, HCM consists of five algorithms for creation, validation, fork handling (if any), Merkle tree construction and reward/punishment module respectively. Dev C++ software platform is used for the simulation of the above mentioned HCM algorithms excluding Merkle tree construction which is simulated using conditional contrast high itemset tree. It is observed that all the blocks use same methodology to be the part of a new blockchain network. Moreover, the CPU and memory consumption in the implementation of HCM is always below two percent and about fifty percent respectively as shown in the latency graph. The basic security goal (confidentiality, integrity and availability) is guaranteed with the help of the height of the Merkel tree as well. The performances of the proposed HCM and Proof of X-repute (PoXR) blockchain consensus algorithms are compared with respect to various parameters such as final difficulty, reward and punishment provisions etc. HCM shows superior performance as the final earned reputation is calculated for each block along with the reward and punishment modules during the deployment of blockchain network. In addition, a simple concept of Merkle-tree is opted for providing reward and punishment rather than a set of complex mathematical equations as used in PoXR consensus algorithm.Entities:
Keywords: Blockchain; Consensus; Electronic healthcare system (EHS); Punishment; Reputation; Reward
Year: 2022 PMID: 35573029 PMCID: PMC9091142 DOI: 10.1007/s41870-022-00880-6
Source DB: PubMed Journal: Int J Inf Technol ISSN: 2511-2104
Assessment of different consensus algorithms
| S.N | Name | References | Advantage | Disadvantage |
|---|---|---|---|---|
| 1 | PoW | [ | Nodes having high computation power will be selected as miner | It suffers from 51% attack |
| 2 | PoS | [ | Nodes having lots of money will be selected as miner | Miners have to gather 10% coins of blockchain network |
| 3 | DPoS | [ | Nodes having huge number of votes by delegates will be selected as miner | Probability of getting selected as miner will be more if delegates are convinced for voting in their favor by providing currencies, gadgets etc |
| 4 | PBFT | [ | Block created by different clients will be attached or not in the blockchain network is instantly finalized | It suffers from Sybil attack |
| 5 | PoB | [ | Nodes burn more coins from existing coin so that the chances of being a miner in the later cycles is more | Miner has to suffer from loss of position if the value of the exchanged digital currency falls down suddenly |
| 6 | PoXR | [ | Reward or punishment module is implemented on the basis of behavior observed during deployment of blockchain network | Huge number of parameters are required to implement reward or punishment module |
Literature survey on IoT, Blockchain and EHS
| S.N | Reference | Year | Topic | Advantage | Disadvantage |
|---|---|---|---|---|---|
| 1 | Guo et al. [ | 2014 | EHS | Preserves patient identity while providing e-healthcare or m-healthcare services | Security supervision by an EHS is not discussed to hide identity of patient among group of people |
| 2 | Jesus et al. [ | 2018 | IoT | Provides security and privacy in IoT. Prevention of selfish miner (Stalker Attack) | Security of personnel identity is not considered |
| 3 | Dai et al. [ | 2019 | IoT and Blockchain | A survey of blockchain and IoT applied for industries | Not suitable for 5G based applications |
| 4 | Shahnaz et al. [ | 2019 | EHS | Solves data security, integrity and key management problems | Reward module is not used for appreciation |
| 5 | Ismail et al. [ | 2019 | Blockchain | Temporal evolution of the different blockchain architectures and consensus protocol | Security of the data and the privacy of the user’s identity are issues of high relevance |
| 6 | Prabha et al. [ | 2019 | Frequent Pattern Mining | Useful for construction of tree based on transaction record | Tree is constructed for finding high utility based frequent pattern by satisfying condition of Growth and Ratio values |
| 7 | Makhdoom et al. [ | 2020 | Blockchain | System of reward in the form of a digital token. Users share their data with stakeholders | Punishment mechanism is not discussed in case of misbehavior |
| 8 | Tanwar et al. [ | 2020 | Blockchain | Automated data collection and verification processes, which are immutable, tamper resistant and secure | Chances of cyber-crime |
| 9 | Zheng et al. [ | 2020 | Blockchain | Blockchain based transaction system with organization level provide stronger anonymity by using group-signature | Uses old method of consensus algorithm |
| 10 | Wang et al. [ | 2020 | Blockchain | On the basis of reputation, trust is managed in PoXR consensus protocol. Satisfactory behavior is encouraged and bad behavior is punished to provide credibility of block in the blockchain network | Suffers from anonymization problems |
| 11 | Mayuranathan et al. [ | 2020 | Blockchain | Provides security on personal information and customer daily activities stored on cloud during data transmission in entire world | Provides security against Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack only |
| 12 | Prabha et al. [ | 2020 | EHS, Blockchain | Health Insurance Policy is provided for security in EHS with the help of insurance company | Reward or punishment module is not discussed for appreciation or discourage based on activity |
| 13 | Cha et al. [ | 2021 | Blockchain | Due to faster transaction speed, data is easily accessed from storage devices | Maintaining high security in distributed framework is a challenging task |
| 14 | Singh et al. [ | 2021 | EHS | Valuable patient information is secured by introducing Privacy-Preserving Searchable Encryption technique | Same PHI is not maintained by every member of EHS |
| 15 | Aman et al. [ | 2021 | EHS | Internet of Medical Things is deployed to decrease the clinical cases arise from COVID-19 pandemic | Higher degree of safety and security for medical data is still questionable |
Fig. 1Basic architecture of the proposed blockchain based EHS
The notations used in the proposed model
| Notation | Meaning |
|---|---|
| Defined difficulty | |
| Initial reputation value of patients | |
| Final difficulty for creation of block | |
| Time spends by patient during online accessing of E-healthcare system | |
| Time spends by patient during offline visiting of E-healthcare system | |
| Counting of online accessing of E-healthcare system by patient | |
| Counting of offline visiting of E-healthcare system by patient | |
| Reputation earned from software or CPU | |
| Reputation earned by hardware or user | |
| List of patient client | |
| Selected list of patient client | |
| Choice list | |
| List of blocks | |
| Name of client or patient | |
| Name of block | |
| List for blockchain | |
| Root node of Merkle tree | |
| Child node of Merkle tree | |
| Transaction list | |
| Name of transaction | |
| Confidential detail of block | |
| Record stored on cloud server | |
| Height of Merkle tree | |
| Final earned reputation |
Creation of block
Validation of block
Fork handling mechanism
Merkle tree creation
Reward/punishment calculation
Fig. 2Flow diagram of proposed EHS
Fig. 3Sequential flow of proposed framework
Hypothesis for initial reputation of patients
| S.N | Patient | Hypothesis | Initial reputation, |
|---|---|---|---|
| 1 | suffering from cold, fever, TB etc | 1 | |
| 2 | suffering from those diseases whose experts are available in sister hospital | 2 | |
| 3 | suffering from those diseases whose experts are available | 3 | |
| 4 | physically disabled (PD) | 4 | |
| 5 | highly recommended by healthcare stakeholder | 5 |
Record
accessed from blocks and cloud server
| S.N | Block | Confidential transactions ( | General transactions ( |
|---|---|---|---|
| 1 | |||
| 2 | |||
| 3 | |||
| 4 | |||
| 5 |
Fig. 7Merkle tree for secret transaction having height = 5 a Block I, b Block II, c Block III, d Block IV
Fig. 8Merkle tree for general transaction where height = 5 a Block I, b Block II, c Block III, d Block IV
Fig. 9Merkle tree used for punishment scheme done by new block having height 4 and 6 respectively. a Secret transaction, b general transaction
Fig. 5Resource consumed by proposed HCM during implementation of a Algorithm 1, b Algorithm 2, c Algorithm 3 and d Algorithm 5 respectively
Fig. 6Comparison chart among reputation value earned via online, offline mode and final difficulty
Final difficulty along with reward and punishment for creation and validation of block in PoXR scheme
| S.N | Client | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 0.25 | 1.00 | 1 | 1 | 1.00 | 1 | 1 | 1.0367 | 1 | |
| 2 | 0.50 | 2.00 | 2 | 3 | 1.414 | 2 | 0.242 | 2.025 | 1.454 | |
| 3 | 0.75 | 3.00 | 3 | 5 | 1.316 | 3 | -5.42 | 3.015 | 1.908 | |
| 4 | 1.00 | 4.00 | 4 | 7 | 1 | 4 | -17 | 4.0067 | 2.362 | |
| 5 | 1.25 | 5.00 | 5 | 9 | 0.6687 | 5 | -33.98 | 5 | 2.816 |
Comparison between PoXR and proposed HCM protocol
| S.N | Parameter | PoXR | Proposed HCM protocol |
|---|---|---|---|
| 1 | Final difficulty ( | Exponentially decreasing pattern | Exponentially increasing pattern |
| 2 | Merkle-tree construction | Not used | Constructed using CCHIT [ |
| 3 | Height of transaction | Increases with the increment in reputation | Depends on Merkle-tree height |
| 4 | Reward and punishment module | Calculated using complex equations which require more parameters. Hence, more sensitive against parameter variations | Simply measured by comparing the height of Merkle-tree which is constructed using internal and external transaction parameters |
| 5 | Reward and punishment rate | Assigned in continuous manner | Assigned in discrete manner. Here, |
| 6 | Final earned reputation | Reward and punishment credit based final earned reputation is not calculated | Final reputation is calculated for each block along with reward and punishment module |
Final difficulty for creation and validation of block
| S.N | Client | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| 1 | 0.25 | 1.00 | 1 | 1 | 1.00 | 1 | 2.00 | False | |
| 2 | 0.50 | 2.00 | 2 | 3 | 2.83 | 6 | 20.8284 | False | |
| 3 | 0.75 | 3.00 | 3 | 5 | 6.84 | 375 | 381.84 | False | |
| 4 | 1.00 | 4.00 | 4 | 7 | 16.00 | 9604 | 9620.00 | True | |
| 5 | 1.25 | 5.00 | 5 | 9 | 37.38 | 295,245 | 295,282.38 | True |