Volume 7, Issue 4 (3-2021)                   jhbmi 2021, 7(4): 413-424 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Mohammadi S, Ghanbari N. A Distributed Authentication Model for an E-Health Network Using Blockchain. jhbmi 2021; 7 (4) :413-424
URL: http://jhbmi.ir/article-1-505-en.html
Ph.D. in Information Technology, Associate professor, Information Technology Dept., Faculty of Industrial Engineering, K.N.Toosi University of Technology, Tehran, Iran
Abstract:   (3148 Views)
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environment between trusted parties is a challenge for e-health networks. Reviewing previous studies revealed that providing a comprehensive and efficient model for authentication and secure exchange of information with a distributed approach while avoiding the single point of failure, which can meet the various needs of the e-health network, was necessary to fill the gap. In this study, it was attempted to introduce a secure authentication model for the e-health network by overcoming the limitations of previous articles on authentication in the e-health network and using the benefits of authentication models in various fields.
Method: In this study, a secure and distributed authentication model was designed for the health network with a combination of blockchain and public-key infrastructure and its usability was presented in the form of an applicable instance (electronic prescribing).
Results: This model showed that combining public-key infrastructure with blockchain can provide a secure, two-way, scalable, and distributed authentication with avoiding a single point of failure for the e-Health network.
Conclusion: It can be concluded that in order to meet the security requirements of the e-health network, it is necessary to use peer-to-peer authentication models which are not dependent on a central server and the proposed model indicated that combining public-key infrastructure with blockchain can bring benefits and fulfill security requirements.
 
Full-Text [PDF 1258 kb]   (1191 Downloads)    
Type of Study: Original Article | Subject: Security, Confidentiality and Privacy of Health Information systems
Received: 2020/06/22 | Accepted: 2020/08/10

Audio File [M4A 3448 KB]  (82 Download)
Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2024 CC BY-NC 4.0 | Journal of Health and Biomedical Informatics

Designed & Developed by : Yektaweb