Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration
Abstract
:1. Introduction
- (1)
- Aiming at the authenticity and integrity issues of external data in the IoT smart medical system, the RIVMD-BO mechanism is proposed, which provides effective support for achieving secure and reliable data interoperability.
- (2)
- The verification process is optimized through the cuckoo filter, which significantly reduces the computational complexity and is suitable for the efficient cross-system transmission of medical data.
- (3)
- Through comprehensive security analysis and performance evaluation, the effectiveness of the mechanism and its potential for application in intelligent medical systems are verified.
2. Related Works
2.1. Traditional Healthcare Information System
2.2. Blockchain-Based Healthcare Systems
3. Proposed RIVMD-BO
3.1. System Model
- (1)
- Data Uploading and ProcessingMedical users process health check data such as EMR and RHM data into multiple data blocks and generate corresponding data labels for each data block. After encrypted processing, the data and labels are uploaded to a medical external data source through a secure channel. In addition, healthcare users share private keys for authentication with the smart healthcare Blockchain Oracle through the same secure channel. This process is designed to ensure the security of sensitive patient information and provide a solid foundation for subsequent data retrieval and validation.
- (2)
- Data RequestWhen doctors require access to specific medical data, they begin by submitting a data request to the medical blockchain network. Upon receiving this request, the network forwards a call request, including the identification details of the needed medical data, to the smart medical Blockchain Oracle. The oracle then formulates a retrieval request directed at an external medical data source, selecting the most reliable source based on the latest trust score to reduce the likelihood of data tampering or loss.
- (3)
- Data Retrieval and Proof GenerationAfter receiving the retrieval request, the medical external data source parses the data identification information in the request and begins to perform data retrieval operations to locate and retrieve the corresponding data blocks. Concurrently, it generates integrity verification certificates for these data blocks to confirm that the data are not tampered with and remain intact. The retrieved data and their integrity verification certificates are then sent to the smart healthcare Blockchain Oracle.
- (4)
- Verification and Point RewardsThe smart medical Blockchain Oracle performs data integrity validation immediately after receiving the retrieval results and validation proofs from the medical external data sources. The oracle rewards or penalizes the medical external data source based on the verification results and updates its trust points. This trust-based mechanism helps to build a reliable medical data ecosystem and guarantee the security and accuracy of subsequent data retrieval.
- (5)
- Data ReturnThe verified data are returned to the medical blockchain network by the smart medical Blockchain Oracle, and ultimately, the real medical data, which have been verified for retrieval integrity, are accessed by doctors through the blockchain network. These data provide strong support for clinical decision-making, treatment plan development, and patient management, ensuring the accuracy and reliability of medical services.
3.2. Security Model
- (1)
- Setup: Challenger inputs a security parameter and runs the algorithm, which sends the generated system parameter params as well as the public key pk to the adversary . Challenger keeps the private key .
- (2)
- QueryPhase1: Adversary adaptively selects a series of keyword sets at random and sends them one by one to challenger . Challenger executes the Trapdoor algorithm to generate the trapdoor corresponding to each keyword set and sends it back to adversary .
- (3)
- Challenge: Adversary selects a keyword set and sends it to challenger . Challenger selects a random keyword set . sets and and selects 1 random bit ; at the same time, to run the algorithm, it generates the corresponding index of the keyword set . After that, challenger sends the ternary to adversary .
- (4)
- QueryPhase2: Adversary then additionally adaptively selects a series of keyword sets , which cannot include or returned from the challenge phase. It sends these keyword sets in turn to challenger , who runs the Trapdoor algorithm to generate the corresponding trapdoor for each keyword set and send it back to . The number of queries by adversary is t in probabilistic polynomial time.
- (5)
- Guess: Adversary needs to output either or as a judgment on the random value chosen by . The adversary is required to output either or as a judgment. If , then wins the game, and if not, loses the game.
3.3. Construction of RIVMD-BO
- (1)
- System setup phase: The user initializes the system parameters. Input security parameters , and output system parameters , where , and are the three multiplicative cyclic groups of prime q, e is the bilinear pairwise mapping, and , are the generators of the groups , . h is the global hash function, and is a pseudo-randomized permutation controlled by .The user chooses a random number as their private key and puts as the public key , where , to obtain the public–private key pair . Subsequently, the public key is made public and the private key is shared with the blockchain oracle.
- (2)
- Data Preparation Phase: Assume that the data owner wants to upload a relational database to an external data source; for each data tuple to be uploaded, construct it as , where . Note that each attribute in the database discussed in this paper is the keyword entered during the search operation.Cuckoo filter is an efficient data structure used to determine whether data exist in a set. It uses two hash functions to calculate two possible storage locations for each data item and can rearrange existing data items when conflicts occur, thereby achieving efficient storage and search.Create the initial filter structure: Each cuckoo filter consists of two hash buckets, each of which can hold multiple fingerprints. The size and number of hash buckets are set in advance to ensure the success rate of data insertion and reduce conflicts.Calculate data item positions and generate fingerprints: For each data item, we generate two bucket positions through a hash function. First, the hash function is applied to generate the first position, and then the second position is generated through an XOR operation so that two positions are obtained for insertion selection. In addition, in order to save storage space and ensure the uniqueness of verification, a fixed-length fingerprint is generated for the data item. The fingerprint is a hashed simplified identifier that can reduce storage requirements while ensuring data accuracy.Insert data items and resolve conflicts: When inserting data, the fingerprint is first stored in the first available bucket position. If both bucket positions are occupied, the cuckoo filter performs a kick-out operation; that is, it randomly replaces the existing fingerprint, makes room for the new fingerprint, and finds a new position for the replaced fingerprint. This ensures a high insertion success rate and can handle a large number of data items even under high load. In order to avoid loops that may be caused by insertion conflicts, the cuckoo filter is designed with a limited retry mechanism. Once the limit is exceeded, the filter capacity is expanded to ensure that the insertion process proceeds smoothly.For any value in tuple , compute and encrypt as . For any value in tuple , compute , , and the corresponding labeled attribute value as . For each tuple , record its ciphertext tuple as and generate the signature .The user then needs to construct the Merkle hash accumulator with the signature set as the leaf node. For each attribute , construct the cuckoo filter ; first create an empty hash table, and then construct the corresponding two buckets for each attribute , and then, according to Equation (1)’s insertion algorithm, to compute the position of all the nodes, construct the cuckoo filter .Finally, the ciphertext tuple and the metadata consisting of the signature , the cuckoo filter , and the Merkle accumulator are sent to the external data source.
- (3)
- Data retrieval phase: the Blockchain Oracle submits a retrieval request to an external data source, assuming that the blockchain network wants to search for all tuples whose value in attribute is (denoted as ). The user generates a retrieval request T based on the keyword w that it wishes to retrieve and the key K as input, where , and then sends T sent to the external data source.After receiving the retrieval request T, the external data source checks the label corresponding to the attribute element by element to verify whether holds. All tuples of ciphertexts for which satisfies the condition are . Generate the corresponding aggregated signature , where is a random element . The external data source generates a proof where . Finally, the corresponding result and proof are sent to the blockchain oracle.
- (4)
- Data verification phase: the Blockchain Oracle performs integrity verification of the results received from the external data sources by verifying the completeness and correctness of the checking results through the cuckoo filter.Data retrieval integrity verification aims to ensure the accuracy of data during transmission and use. In the verification phase, the cuckoo filter is used to quickly check whether the data have been tampered with and to achieve efficient authenticity verification by verifying whether each data item matches the hash position in the filter.Lookup operation and fingerprint comparison: When receiving the data item to be verified, the oracle will calculate the two positions of the item through the hash function and generate the corresponding fingerprint. Then, it will check whether the two bucket positions of the filter contain the fingerprint. If a matching fingerprint is found, it means that the data item has been successfully recorded when it was uploaded and meets the integrity requirements.Measures for verification failure: If no fingerprint match is found in either position, the system determines that the data item may be lost or tampered with. At this time, the oracle will record the abnormal situation and issue an alarm and consider whether the data item fails to pass the verification for other reasons, so as to take further processing measures. This design ensures the consistent verification of data items and improves the fault tolerance of the oracle to abnormal data.Firstly, the correctness of the result is verified by verifying the validity of Equation (2). Then, after determining the validity of the signatures, the oracle performs a cuckoo filter lookup operation based on Equation (3) to check whether all the signatures exist in the cuckoo filter. If all signatures exist in the cuckoo filter, the retrieval integrity verification passes; otherwise, the retrieved data are compromised.As illustrated in Figure 3, once the Blockchain Oracle receives the retrieval results and verification proofs from the external data source, it begins the process of data integrity verification. Depending on the outcome of this verification, the Blockchain Oracle uses Algorithm 1 to either reward or penalize the external data source, adjusting the associated trust points accordingly. The algorithm dynamically adjusts the trust points by considering the current service quality, historical performance, and behavioral stability of the data source and combines them with a delayed punishment mechanism to ensure the security and accuracy of data transmission in the system.First, if the data source provides correct data, the trust integral will be positively updated according to the preset speed factor . Conversely, if the data source provides incorrect or malicious data, will be negatively adjusted according to the same . Meanwhile, the latency will be updated according to the verification results, and correct data sources will decrease the delay according to the delayed update speed factor , while incorrect data sources will increase . In order to further adjust the trust scores, the algorithm introduces the historical quality of service weight , the historical quality of service h, and the behavioral fluctuation factor . h affects the the magnitude of the adjustment of the trust score, and is used to penalize data sources whose historical performance differs significantly from the current performance, thus ensuring that the stability of the data source is reflected in the trust score. Finally, the algorithm sets a boundary condition for the trust integral to ensure that it is always in the range . If the trust integral falls below a specific threshold , the delay penalty is further increased to prevent unreliable data sources from continuing to occupy system resources. The trust integral and delay after these adjustments are used as the final output to guide the subsequent data retrieval and verification process.
Algorithm 1 Trust score update - 1:
- Input:
- 2:
- Output:
- 3:
- if verify() = 1 then
- 4:
- 5:
- 6:
- else
- 7:
- 8:
- 9:
- end if
- 10:
- 11:
- 12:
- if then
- 13:
- 14:
- end if
- 15:
- Return:
In addition, this scheme designs a dynamic trust score protection algorithm to ensure that the system’s trust score can remain robust and reliable even if the oracle is attacked or tampered with. In Algorithm 2, first, the data source scoring of each round is monitored, the trust score increment and delay increment of the current round are calculated, and the historical average increment and are calculated based on the rolling window. Then, the set thresholds and are used to determine whether there is an anomaly. When an anomaly is detected, the current trust score and delay are dynamically adjusted according to the factor to prevent the abnormal change from having too much impact on the overall system. Finally, the updated trust score and delay value will be used for the next round of scoring and protection evaluation to form a dynamic protection cycle.Algorithm 2 Dynamic trust score protection - 1:
- Input:
- 2:
- Output:
- 3:
- ▹ Average recent change in trust score
- 4:
- ▹ Average recent change in delay
- 5:
- ifthen
- 6:
- 7:
- else
- 8:
- 9:
- end if
- 10:
- ifthen
- 11:
- 12:
- else
- 13:
- 14:
- end if
- 15:
- Return:
4. Security Analysis
5. Results and Discussion
5.1. Computational Cost Analysis and Comparison
- Advantages: Compared with other methods, RIVMD-BO performs well in storage and processing performance. Through the efficient storage and fast query capabilities of cuckoo filters, the storage overhead and query verification time are significantly reduced. Especially when processing large-scale medical data, the linear time complexity of this solution ensures good scalability, enabling it to support smart medical scenarios with high concurrency and large amounts of data.
- Disadvantages: When the RIVMD-BO mechanism introduces cuckoo filter technology, it relies on high-quality hash functions and filter parameter settings to ensure a low false positive rate and optimal performance. This mechanism is more sensitive to the selection of filter parameters. If the dataset is frequently updated or the size increases significantly, the filter may face potential problems with an increased false positive rate. In addition, due to the design of the filter, this mechanism still has some room for improvement in terms of real-time processing capabilities compared with multi-keyword matching schemes.
5.2. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Wang, J.; Chen, J.; Ren, Y.; Sharma, P.K.; Alfarraj, O.; Tolba, A. Data security storage mechanism based on blockchain industrial Internet of Things. Comput. Ind. Eng. 2022, 164, 107903. [Google Scholar] [CrossRef]
- Sun, L.; Wang, Y.; Ren, Y.; Xia, F. Path signature-based xai-enabled network time series classification. Sci. China Inf. Sci. 2024, 67, 170305. [Google Scholar] [CrossRef]
- Tariq, N.; Qamar, A.; Asim, M.; Khan, F.A. Blockchain and smart healthcare security: A survey. Procedia Comput. Sci. 2020, 175, 615–620. [Google Scholar] [CrossRef]
- Egala, B.S.; Pradhan, A.K.; Dey, P.; Badarla, V.; Mohanty, S.P. Fortified-Chain 2.0: Intelligent Blockchain for Decentralized Smart Healthcare System. IEEE Internet Things J. 2023, 10, 12308–12321. [Google Scholar] [CrossRef]
- Ren, Y.; Leng, Y.; Cheng, Y.; Wang, J. Secure data storage based on blockchain and coding in edge computing. Math. Biosci. Eng 2019, 16, 1874–1892. [Google Scholar] [CrossRef] [PubMed]
- Ren, Y.; Leng, Y.; Qi, J.; Sharma, P.K.; Wang, J.; Almakhadmeh, Z.; Tolba, A. Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener. Comput. Syst. 2021, 115, 304–313. [Google Scholar] [CrossRef]
- Wang, J.; Chen, W.; Ren, Y.; Alfarraj, O.; Wang, L. Blockchain based data storage mechanism in cyber physical system. J. Internet Technol. 2020, 21, 1681–1689. [Google Scholar]
- Vazirani, A.A.; O’Donoghue, O.; Brindley, D.; Meinert, E. Blockchain vehicles for efficient medical record management. NPJ Digit. Med. 2020, 3, 1. [Google Scholar] [CrossRef]
- Fang, G.; Sun, Y.; Almutiq, M.; Zhou, W.; Zhao, Y.; Ren, Y. Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services. IEEE J. Biomed. Health Inform. 2023, 28, 6298–6307. [Google Scholar] [CrossRef]
- Ren, Y.; Lv, Z.; Xiong, N.N.; Wang, J. HCNCT: A cross-chain interaction scheme for the blockchain-based metaverse. ACM Trans. Multimed. Comput. Commun. Appl. 2024, 20, 1–23. [Google Scholar] [CrossRef]
- Zhao, Z.; Li, X.; Luan, B.; Jiang, W.; Gao, W.; Neelakandan, S. Secure Internet of Things (IoT) using a novel brooks Iyengar quantum byzantine agreement-centered blockchain networking (BIQBA-BCN) model in smart healthcare. Inf. Sci. 2023, 629, 440–455. [Google Scholar] [CrossRef]
- Su, Y.; Wang, Y.; Li, J.; Su, Z.; Pedrycz, W.; Hu, Q. Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme. IEEE Trans. Sustain. Comput. 2024, 9, 602–614. [Google Scholar] [CrossRef]
- Liu, G.; Xie, H.; Wang, W.; Huang, H. A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. J. Cloud Comput. 2024, 13, 44. [Google Scholar] [CrossRef]
- Xu, J.; Xue, K.; Li, S.; Tian, H.; Hong, J.; Hong, P.; Yu, N. Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data. IEEE Internet Things J. 2019, 6, 8770–8781. [Google Scholar] [CrossRef]
- Wang, J.; Chen, W.; Wang, L.; Sherratt, R.S.; Alfarraj, O.; Tolba, A. Data secure storage mechanism of sensor networks based on blockchain. Comput. Mater. Contin. 2020, 65, 2365–2384. [Google Scholar] [CrossRef]
- Dubovitskaya, A.; Baig, F.; Xu, Z.; Shukla, R.; Zambani, P.S.; Swaminathan, A.; Jahangir, M.M.; Chowdhry, K.; Lachhani, R.; Idnani, N.; et al. ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care. J. Med. Internet Res. 2020, 22, e13598. [Google Scholar] [CrossRef]
- Daraghmi, E.Y.; Daraghmi, Y.A.; Yuan, S.M. MedChain: A Design of Blockchain-Based System for Medical Records Access and Permissions Management. IEEE Access 2019, 7, 164595–164613. [Google Scholar] [CrossRef]
- Yang, X.; Li, T.; Pei, X.; Wen, L.; Wang, C. Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology. IEEE Access 2020, 8, 45468–45476. [Google Scholar] [CrossRef]
- Sun, L.; Li, C.; Ren, Y.; Zhang, Y. A Multitask Dynamic Graph Attention Autoencoder for Imbalanced Multilabel Time Series Classification. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 11829–11842. [Google Scholar] [CrossRef]
- Chenthara, S.; Ahmed, K.; Wang, H.; Whittaker, F. Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing. IEEE Access 2019, 7, 74361–74382. [Google Scholar] [CrossRef]
- Zhang, Y.; Qiu, M.; Tsai, C.W.; Hassan, M.M.; Alamri, A. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data. IEEE Syst. J. 2017, 11, 88–95. [Google Scholar] [CrossRef]
- Yang, K.; Zhang, K.; Jia, X.; Hasan, M.A.; Shen, X.S. Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 2017, 387, 116–131. [Google Scholar] [CrossRef]
- Xhafa, F.; Feng, J.; Zhang, Y.; Chen, X.; Li, J. Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 2015, 71, 1607–1619. [Google Scholar] [CrossRef]
- Sahi, A.; Lai, D.; Li, Y. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput. Biol. Med. 2016, 78, 1–8. [Google Scholar] [CrossRef]
- Cao, S.; Zhang, G.; Liu, P.; Zhang, X.; Neri, F. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 2019, 485, 427–440. [Google Scholar] [CrossRef]
- Yu, X.; Zhu, S.; Ren, Y. Continuous trajectory similarity search with result diversification. Future Gener. Comput. Syst. 2023, 143, 392–400. [Google Scholar] [CrossRef]
- Zou, R.; Lv, X.; Zhao, J. SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system. Inf. Process. Manag. 2021, 58, 102604. [Google Scholar] [CrossRef]
- Liu, J.; Fan, Y.; Sun, R.; Liu, L.; Wu, C.; Mumtaz, S. Blockchain-Aided Privacy-Preserving Medical Data Sharing Scheme for E-Healthcare System. IEEE Internet Things J. 2023, 10, 21377–21388. [Google Scholar] [CrossRef]
- Gao, H.; Huang, H.; Xue, L.; Xiao, F.; Li, Q. Blockchain-Enabled Fine-Grained Searchable Encryption with Cloud–Edge Computing for Electronic Health Records Sharing. IEEE Internet Things J. 2023, 10, 18414–18425. [Google Scholar] [CrossRef]
- Madine, M.M.; Battah, A.A.; Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y.; Pesic, S.; Ellahham, S. Blockchain for Giving Patients Control Over Their Medical Records. IEEE Access 2020, 8, 193102–193115. [Google Scholar] [CrossRef]
- Chen, Y.; Meng, L.; Zhou, H.; Xue, G. A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection. Wirel. Commun. Mob. Comput. 2021, 2021, 6685762. [Google Scholar] [CrossRef]
- Zhou, H.; Ouyang, X.; Ren, Z.; Su, J.; de Laat, C.; Zhao, Z. A blockchain based witness model for trustworthy cloud service level agreement enforcement. In Proceedings of the IEEE INFOCOM 2019-IEEE conference on computer Communications, Paris, France, 29 April–2 May 2019; pp. 1567–1575. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, Z.; Chen, L.; Zhao, Y.; Yang, X.; Han, Z.; He, Z. Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration. Sensors 2024, 24, 7487. https://doi.org/10.3390/s24237487
Zhou Z, Chen L, Zhao Y, Yang X, Han Z, He Z. Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration. Sensors. 2024; 24(23):7487. https://doi.org/10.3390/s24237487
Chicago/Turabian StyleZhou, Ziyuan, Long Chen, Yekang Zhao, Xinyi Yang, Zhaoyang Han, and Zheng He. 2024. "Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration" Sensors 24, no. 23: 7487. https://doi.org/10.3390/s24237487
APA StyleZhou, Z., Chen, L., Zhao, Y., Yang, X., Han, Z., & He, Z. (2024). Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration. Sensors, 24(23), 7487. https://doi.org/10.3390/s24237487