Journal of Machine and Computing


Two Fish Encryption Based Blockchain Technology for Secured Data Storage



Journal of Machine and Computing

Received On : 25 November 2022

Revised On : 28 February 2023

Accepted On : 10 April 2023

Published On : 05 July 2023

Volume 03, Issue 03

Pages : 216-226


Abstract


Data security and sharing remains nuisance among many applications like business data, medical data, banking data etc. In this research, block chain technology is built with encryption algorithm for high level data security in cloud storage. Medical data security seems critical aspect due to sensitivity of patient’s information. Unauthorized access of medical data creates major issue to patients. This article proposed block chain with hybrid encryption technique for securing medical data stored in block chain model at cloud storage. New Two fish encryption model is implemented based on RSA Multiple Precision Arithmetic (MPA). MPA works by using library concept. The objective of using this methodology is to enhance security performance with less execution time. Patient data is processed by encryption algorithm and stored at blockchain infrastructure using encrypted key. Access permission allows user to read or write the medical data attached in block chain framework. The performance of traditional cryptographic techniques is very less in providing security infrastructure. Proposed blockchain based Two fish encryption technique provides high security in less encryption and decryption time.


Keywords


Data Security, Blockchain, Two Fish Encryption, Cloud Computing, Medical Data Security, RSA-Multiple Precision Arithmetic.


  1. E. R. Weitzman, L. Kaci, and K. D. Mandl, “Sharing Medical Data for Health Research: The Early Personal Health Record Experience,” Journal of Medical Internet Research, vol. 12, no. 2, p. e14, May 2010, doi: 10.2196/jmir.1356.
  2. D. B. Taichman et al., ``Sharing clinical trial data: A proposal from the international committee of medical journal editors free,'' PLoSMed.,vol. 13, no. 1, pp. 505-506, Apr. 2016.
  3. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du and M. Guizani, "MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain," in IEEE Access, vol. 5, pp. 14757-14767, 2017, doi: 10.1109/ACCESS.2017.2730843.
  4. Summary of the HIPAA Security Rule. [Online] ,2017 Available:https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/
  5. General Data Protection Regulation. [Online]. Available:https://eugdpr.org/the-regulation/, 2016.
  6. S. Nepal, R. Ranjan, and K.-K. R. Choo, ``Trustworthy processing of healthcare big data in hybrid clouds,'' IEEE Trans. Cloud Computer., vol. 2,no. 2, pp. 7884, Mar./Apr. 2015.
  7. Liang Huang and Hyung-Hyo Lee, ”A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing”, Wireless Communications and Mobile Computing Volume 2020, Article ID 8859961, 11 pageshttps://doi.org/10.1155/2020/8859961.
  8. Z. Wan, N. Xiong, N. Ghani, A. V. Vasilakos, and L. Zhou,“Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks,” Multimedia Tools and Applications, vol. 72, no. 1, pp. 541–571, 2014.
  9. Gregory Wang and David Steeg, “Open Source Network Optimization Tools for Edge Intelligence", vol.2, no.2, pp. 055-065, April 2022. doi: 10.53759/181X/JCNS202202009.
  10. Goodarzian, F.; Shishebori, D.; Nasseri, H.; Dadvar, F. A bi-objective production-distribution problem in a supply chain network under grey flexible conditions. RAIRO Oper. Res. 2021, 55, 1287.
  11. S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based electronic healthcare record system for healthcare 4.0 applications, “Journal of Information Security and Applications, vol. 50, no. 2, p. 102407, 2020.
  12. Fan, K., Wang, S., Ren, Y. et al. MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain. J Med Syst 42, 136 (2018). https://doi.org/10.1007/s10916-018-0993-7
  13. Zhang Y ,Xu C ,Li H ,Yang K ,Zhou J ,Lin X . Health Dep: an efficient and secure deduplication scheme for cloud-assisted eHealth systems. IEEE Trans. Ind. Inform. 2018.
  14. Miao Y, Tong Q, Choo K-KR, Liu X, Deng RH, Li H. Secure Online/offline data sharing framework for cloud-assisted industrial internet of things. IEEE Internet Things J. [Internet] 2019;6(5):8681–91. Available from: https://ieeexplore.ieee.org/document/8736869/
  15. Liang J ,Qin Z ,Xiao S ,Zhang J ,Yin H ,Li K . Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distributed Computer. 2020.
  16. Vazirani AA, O’Donoghue O, Brindley D, Meinert E. Blockchain vehicles for efficient medical record management. npj Digit Med [Internet]. 2020;3(1):1–5. Available from: http://dx.doi.org/10.1038/s41746- 019- 0211- 0
  17. Ivan D . Moving toward a blockchain-based method for the secure storage of patient records. NIST Work Blockchain Health. 2016.
  18. Haiping Huang, Peng Zhu, Fu Xiao , Xiang Sun , Qinglong Huang,” A blockchain-based scheme for privacy-preserving and secure sharing of medical data”, 2020 Elsevier Ltd.
  19. R. Guo, H. Shi, Q. Zhao, and D. Zheng, ``Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,'' IEEE Access, vol. 6, pp. 11676-11686, 2018.
  20. Zhang, Y., Qiu, M., Tsai, C., Hassan, M., and Alamri, A., Health- CPS: Healthcare-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data. IEEE Syst. J. 11:88–95, 2017. https://doi. org/10.1109/JSYST.2015.2460747.
  21. Bahga, A., and Madisetti, V., A Cloud-based Approach for Interoperable Electronic Health Records (EHRs). IEEE J Biomed Health 17:894–906, 2013. https://doi.org/10.1109/JBHI.2013. 2257818.
  22. Godinho, T., Viana-Ferreira, C., and Silva, L., A Routing Mechanism for Cloud Outsourcing of Medical Imaging Repositories. IEEE J Biomed Health 20:367–375, 2016. https:// doi.org/10.1109/JBHI.2014.2361633.
  23. He, C., Fan, X., and Li, Y., Toward Ubiquitous Healthcare Services with a Novel Efficient Cloud Platform. IEEE Bio-med Eng 60:230– 234, 2013. https://doi.org/10.1109/TBME.2012.2222404.
  24. Wang, H., Ding, S., Wu, D., Zhang, Y., and Yang, S., Smart connected electronic gastro scope system for gastric cancer screening using multi-column convolutional neural networks. Int. J. Prod. Res.:1–12, 2018. https://doi.org/10.1080/00207543.2018.1464232.
  25. Ding, S., Li, Y.,Wu, D., Zhang, Y., and Yang, S., Time-aware cloud service recommendation using similarity-enhanced collaborative filtering and ARIMA model. Decis. Support. Syst. 107:103–115, 2018. https://doi.org/10.1016/j.dss.2017.12.012.
  26. Ding, S., Wang, Z., Wu, D., and Olson, D. L., Utilizing customer satisfaction in ranking prediction for personalized cloud service selection. Decision Support. Syst. 93:1–10, 2017. https://doi.org/10. 1016/j.dss.2016.09.001.
  27. Yang, Y., Zheng, X., Guo, W., Liu, X., and Chang, V., Privacy preserving Smart IoT-based Healthcare Big Data Storage and Self-adaptive Access Control System. Inf. Sci.:1–26, 2018. https://doi.org/10.1016/j.ins.2018.02.005.
  28. Singh, K., and Batten, L., Aggregating Privatized Pedical Data for Secure Querying Applications. 72:250– 263, 2017. https://doi.org/10.1016/j.future.2016.11.028.
  29. Alshagathrh, F., Khan, S., Alothmany, N., Al-Rawashdeh, N., and Househ, M., Building a Cloud-based Data Sharing Model for the Saudi National Registry for Implantable Medical Devices: Results of a Readiness Assessment. Int. J. Med. Inform. 118:113–119, 2018. https://doi.org/10.1016/j.ijmedinf.2018.08.005.
  30. Yang, J., Li, J., and Niu, Y., A Hybrid Solution for Privacy Preserving Medical Data Sharing in the Cloud Environment. Future General 43-44:74–86, 2015. https://doi.org/10. 1016/j.future.2014.06.004.
  31. Xia, C., Meloni, S., Perc, M., and Moreno, Y., Dynamic instability of cooperation due to diverse activity patterns in evolutionary social dilemmas. EPL 109:58002, 2015. https://doi.org/10.1209/0295-5075/109/58002.
  32. Jabeen, F., Hamid, Z., and Abdul, W., Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment. IEEE Access 5:13308–13326, 2017. https://doi.org/10.1109/ACCESS.2017.2707584.
  33. Al, H. H., Rahman, S., and Hossain, M., A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-based Cryptography. IEEE Access 5:22313–22328, 2017. https://doi.org/10.1109/ ACCESS.2017.2757844.
  34. Solanas, A., Martínez-Ballesté, A., and Mateo-Sanz, J., Distributed Architecture with Double-phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health. IEEE 8:901–910, 2013. https://doi.org/10.1109/TIFS.2013.2248728.
  35. Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., and Hayajneh, T., Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring. J. Med. Syst. 42:130, 2018. https://doi.org/10.1007/s10916-018-0982-x.
  36. Lin, C., He, D., Huang, X., Choo, K.-K. R., and Vasilakos, A. V., BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Network. Computer Appl. 116:42–52, 2018. https://doi.org/10.1016/J. JNCA.2018.05.005.
  37. Lin, C., He, D., Huang, X., Khan, M., and Choo, K., A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203–28212, 2018. https://doi.org/10.1109/ACCESS.2018. 2837650.
  38. Fimiani G. Supporting privacy in a cloud-based health information system by means of fuzzy conditional identity-based proxy re-encryption (FCI-PRE). In: Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. 2018.
  39. Li X ,Mei Y . A Blockchain Privacy Protection Scheme Based on Ring Signature. IEEE Access 2020; 8:76765–72 . 2020
  40. Zheng X ,Mukkamala RR ,Vatrapu R ,Ordieres-Mere J .,” Blockchain-based personal health data sharing system using cloud storage”, In: 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services, Healthcom 2018.
  41. Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., Du, X., and Guizani, M., MeD Share: trust less medical data sharing among cloud service providers via blockchain. IEEE Access PP(99):1–1,2017.
  42. Omar, A. A., Rahman, M. S., Basu, A., and Kiyomoto, S.,MediBchain: a blockchain based privacy preserving platform for Healthcare Data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 534–543, 2017.
  43. S. Ferdous, A. Margheri, F. Paci, and V. Sassone, ``Decentralised runtime monitoring for access control systems in cloud federations,'' in Proc. IEEE Int. Conf. Distributed Computer, Jun. 2017, pp. 1-11.
  44. R. Guo, H. Shi, Q. Zhao, and D. Zheng, ``Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,'' IEEE Access, vol. 6, pp. 11676-11686, 2018.
  45. G. Zyskind, O. Nathan, and A. Pentland. (2015). ``Enigma: Decentralized computation platform with guaranteed privacy.'' [Online]. Available: https://arxiv.org/abs/1506.03471
  46. Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W., Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10):1–8, 2016.
  47. Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., and Wang,F., Secure and trustable electronic medical records sharing using Blockchain, preprint arXiv:1709.06528, 2017.
  48. Azaria, A., Ekblaw, A., Vieira, T., and Lippman, A., Med Rec:using blockchain for medical data access and permission management. In: International Conference on Open and Big Data,pp. 25–30, 2016.
  49. Yang, J. J., Li, J. Q., and Niu, Y., A hybrid solution for privacypreserving medical data sharing in the cloud environment. FutureGener. Computer. Syst. 43-44(45):74–86, 2015.
  50. Anandakumar Haldorai, Shrinand Anandakumar, “An Design of Software Defined Networks and Possibilities of Network Attacks", vol.2, no.3, pp. 088-097, July 2022. doi: 10.53759/181X/JCNS202202012.
  51. Z. Liu, B. Hu, B. Huang, L. Lang, H. Guo, and Y. Zhao, “Strategies of Haze Risk Reduction Using the Tripartite Game Model,” Complexity, vol. 2020, Article ID 2145951, 11 pages, 2020.
  52. E. Jintcharadze and M. Iavich, "Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems," 2020 IEEE East-West Design & Test Symposium (EWDTS), 2020, pp. 1-5, doi: 10.1109/EWDTS50664.2020.9224901
  53. Yi Chen & Shuai Ding & Zheng Xu &Handong Zheng & Shanlin Yang,” Blockchain-Based Medical Records Secure Storage and Medical Service Framework”, Journal of Medical Systems (2019) 43: 5https://doi.org/10.1007/s10916-018-1121-4

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Dinesh Kumar K and Duraimutharasan N, “Two Fish Encryption Based Blockchain Technology for Secured Data Storage, Journal of Machine and Computing, vol.3, no.3, pp. 216-226, July 2023. doi: 10.53759/7669/jmc202303020.


Copyright


© 2023 Dinesh Kumar K and Duraimutharasan N. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.