| Literature DB >> 35808211 |
Pinky Bai1, Sushil Kumar1, Geetika Aggarwal2, Mufti Mahmud3,4,5, Omprakash Kaiwartya3,4, Jaime Lloret6.
Abstract
An identity management system is essential in any organisation to provide quality services to each authenticated user. The smart healthcare system should use reliable identity management to ensure timely service to authorised users. Traditional healthcare uses a paper-based identity system which is converted into centralised identity management in a smart healthcare system. Centralised identity management has security issues such as denial of service attacks, single-point failure, information breaches of patients, and many privacy issues. Decentralisedidentity management can be a robust solution to these security and privacy issues. We proposed a Self-Sovereign identity management system for the smart healthcare system (SSI-SHS), which manages the identity of each stakeholder, including medical devices or sensors, in a decentralisedmanner in the Internet of Medical Things (IoMT) Environment. The proposed system gives the user complete control of their data at each point. Further, we analysed the proposed identity management system against Allen and Cameron's identity management guidelines. We also present the performance analysis of SSI as compared to the state-of-the-art techniques.Entities:
Keywords: IoMT; blockchain; internet of things; privacy; security; self-sovereign identity
Mesh:
Year: 2022 PMID: 35808211 PMCID: PMC9269346 DOI: 10.3390/s22134714
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1IoT enabled healthcare system.
Figure 2SSI communication Sequence.
Principle of SSI.
| User’s Control | Security | Portability |
|---|---|---|
| Users must have control of their data like which information can be seen the other | Keep identity information secure | Users can move anywhere without being tied to a provider |
| Existence | Protection | Access |
| Control | Persistence | Transparency |
| Consent | Minimization | Interoperability |
| Persistence |
Figure 3SSI-SHS architecture.
Figure 4Authentication Process.
Figure 5SSI-SHS process flow scenario: The doctor access the IoMT data.
Figure 6(a) Registration and (b) authentication time of stakeholders and IoMT devices.
Figure 7(a) Registration time on network scale; (b) authentication time on network scale.
Figure 8Contract deployment analysis.
Figure 9Execution time analysis of off-chain storage.
Figure 10Performance comparison.