Next Article in Journal
A Novel Autocorrelation Combined MM-CDR Time-Interleaved ADC Timing Calibration in 28 nm CMOS Technology
Next Article in Special Issue
Cloud-Based, Expandable—Reconfigurable Remote Laboratory for Electronic Engineering Experiments
Previous Article in Journal
A Rumor Detection Method Based on Multimodal Feature Fusion by a Joining Aggregation Structure
Previous Article in Special Issue
Leveraging Machine Learning for Fault-Tolerant Air Pollutants Monitoring for a Smart City Design
 
 
Article
Peer-Review Record

A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption

Electronics 2022, 11(19), 3199; https://doi.org/10.3390/electronics11193199
by Jihyeon Oh 1, JoonYoung Lee 1, MyeongHyun Kim 1, Youngho Park 1,2,*, KiSung Park 3 and SungKee Noh 3
Reviewer 1:
Reviewer 2:
Reviewer 3:
Electronics 2022, 11(19), 3199; https://doi.org/10.3390/electronics11193199
Submission received: 7 September 2022 / Revised: 29 September 2022 / Accepted: 30 September 2022 / Published: 6 October 2022
(This article belongs to the Special Issue Feature Papers in Computer Science & Engineering)

Round 1

Reviewer 1 Report

In this paper, authors proposed a secure PHR sharing system by applying blockchain and IPFS to ensure integrity and solve the single point of failure problem. The idea is interested in a paper and well presented. I feel it is good paper and give some minor corrections to improve the paper.
1-Try to condense the abstract by keeping the main contributions and achievements of the study. (Purpose, Methodology, Findings, Originality/Value)

2-More explain Fiqure 1.

3- The proof of Theorem 1 must be presented carefully with details.
4-What effect is the use of the proposed model in achieving the objectives of the research? It is suggested that the results of the proposed model are stated in the conclusion with full detail.
5- In addition to expressing the superiority of the proposed method, its challenges need to be addressed.
6-In the research methodology section, explain why this idea was proposed and what is its superiority over other methods?

Author Response

Please find the attached file.

Author Response File: Author Response.pdf

Reviewer 2 Report

In this manuscript, a method for personal health record is given. My comments are given as follows.

(1) In the result patr, data to be encrypted is not shown.

(2) The results in this manuscript are simple. And the advantage of this work is unclear.

(3) The examples for applications are not addressed.

From the viewpoints mentioned above, I cannot recommend to publish this paper.

Author Response

Please find the attached file.

Author Response File: Author Response.pdf

Reviewer 3 Report

The authors present a manuscript detailing their proposed scheme for a secure Personal Health Record system. The proposed system uses IPFS as a storage layer and blockchain plus smart contracts as an operational layer. They argue that their system provides several security guarantees and also manages to keep computational costs down compared to other systems.

 

This work is timely and interesting and seems well grounded, still, I have a crucial question to which I could not find the answer in the manuscript. 

 

How does the Data Owner verify the Data Users' credentials (step 4 of the communication flow)?

The only reference I can find is the mutual authentication depicted in section 4.4 and proved in section 6.2. But this only achieves mutual authentication, there's no identity verification in the process. The authors did address impersonation attacks (section 5.1), but this only assumes an attacker trying to impersonate a particular DU, not the initial relationship between DO and DUs.

 

Maybe this is beside the scope of this work, but if so it should be stated.

 

A part from this, the manuscript should be proofread as there are too many English issues. Here are a few examples:

 

[line 34] "will be threatened the life" should probably be "live will be threatened"

[line 43] "was proposed that" -> "was proposed to"

[line 46] "that is" -> "that has"

[line 64] "usually does not be" -> "usually is not"

[line 300] "If there is no A can decide" -> "If there is no way that A can decide"

[line 476] "utilized it" -> "used"

[line 638] "ensure many security" -> "ensure more security"

Author Response

Please find the attached file.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

The author's research results in the manuscript are insufficient. I suggest rejecting the manuscript or the author adds more research results.

Back to TopTop