مجله انفورماتیک سلامت و زیست پزشکی (Mar 2021)

A Distributed Authentication Model for an E-Health Network Using Blockchain

  • Shahriar Mohammadi,
  • Nazanin Ghanbari

Journal volume & issue
Vol. 7, no. 4
pp. 413 – 424

Abstract

Read online

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environment between trusted parties is a challenge for e-health networks. Reviewing previous studies revealed that providing a comprehensive and efficient model for authentication and secure exchange of information with a distributed approach while avoiding the single point of failure, which can meet the various needs of the e-health network, was necessary to fill the gap. In this study, it was attempted to introduce a secure authentication model for the e-health network by overcoming the limitations of previous articles on authentication in the e-health network and using the benefits of authentication models in various fields. Method: In this study, a secure and distributed authentication model was designed for the health network with a combination of blockchain and public-key infrastructure and its usability was presented in the form of an applicable instance (electronic prescribing). Results: This model showed that combining public-key infrastructure with blockchain can provide a secure, two-way, scalable, and distributed authentication with avoiding a single point of failure for the e-Health network. Conclusion: It can be concluded that in order to meet the security requirements of the e-health network, it is necessary to use peer-to-peer authentication models which are not dependent on a central server and the proposed model indicated that combining public-key infrastructure with blockchain can bring benefits and fulfill security requirements.

Keywords