{"title":"区块链集成安全医疗保健信息共享通过先进的Blowfish加密标准与最佳密钥生成","authors":"Jundale Poonam Abasaheb, Sujata V. Mallapur","doi":"10.1002/ett.70077","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <h3> Problem</h3>\n \n <p>There are serious worries about the security and privacy of sensitive patient data as a result of the growing digitization of healthcare systems, particularly when sharing data across platforms. Conventional data-sharing techniques frequently depend on centralized systems, which are susceptible to illegal access and data breaches. Existing encryption techniques, such as Blowfish, lack sufficient robustness and scalability for modern healthcare applications. Additionally, managing encryption keys securely across distributed systems remains a complex challenge.</p>\n </section>\n \n <section>\n \n <h3> Aim</h3>\n \n <p>This work proposes a blockchain-integrated technology with enhanced encryption and optimal key generation to address these gaps, ensuring secure, scalable, and efficient healthcare data sharing.</p>\n </section>\n \n <section>\n \n <h3> Methods</h3>\n \n <p>In the proposed model, data sharing initiates with partitioning the healthcare data into manageable blocks, followed by encryption using an enhanced version of the Blowfish algorithm. The Improved Blowfish algorithm incorporates bitwise operations and conditional transformations to strengthen data security and flexibility in handling encrypted data. Also, the proposed work implements the Improved Pelican Optimization Algorithm (IPOA) for optimal key generation. IPOA optimizes encryption keys based on the minimizing correlation between original and encrypted data, thereby ensuring robust data protection. A blockchain is used to store encrypted data and keys, taking use of its decentralized and unchangeable structure to guard against manipulation and unwanted changes. Furthermore, the proxy re-encryption technique is employed to securely manage and distribute decryption capabilities without exposing sensitive information.</p>\n </section>\n \n <section>\n \n <h3> Results</h3>\n \n <p>Finally, the comparative analyses highlight the superiority of the proposed approach in terms of security, efficiency, and scalability over existing methods. With a correlation coefficient of 0.203887, the Improved Blowfish approach exhibits the strongest resistance, demonstrating its resilience to Fault Injection Attack (FIA).</p>\n </section>\n \n <section>\n \n <h3> Conclusion</h3>\n \n <p>The suggested model's efficacy is confirmed, showing that it can improve data security, simplify access management, and reduce the hazards connected to conventional healthcare data-sharing procedures. Thus, the integration of blockchain, advanced encryption standards, and optimized key generation algorithms offers a comprehensive solution for secure healthcare information sharing.</p>\n </section>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain-Integrated Secure Healthcare Information Sharing via Advanced Blowfish Encryption Standard With Optimal Key Generation\",\"authors\":\"Jundale Poonam Abasaheb, Sujata V. Mallapur\",\"doi\":\"10.1002/ett.70077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n \\n <section>\\n \\n <h3> Problem</h3>\\n \\n <p>There are serious worries about the security and privacy of sensitive patient data as a result of the growing digitization of healthcare systems, particularly when sharing data across platforms. Conventional data-sharing techniques frequently depend on centralized systems, which are susceptible to illegal access and data breaches. Existing encryption techniques, such as Blowfish, lack sufficient robustness and scalability for modern healthcare applications. Additionally, managing encryption keys securely across distributed systems remains a complex challenge.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Aim</h3>\\n \\n <p>This work proposes a blockchain-integrated technology with enhanced encryption and optimal key generation to address these gaps, ensuring secure, scalable, and efficient healthcare data sharing.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Methods</h3>\\n \\n <p>In the proposed model, data sharing initiates with partitioning the healthcare data into manageable blocks, followed by encryption using an enhanced version of the Blowfish algorithm. The Improved Blowfish algorithm incorporates bitwise operations and conditional transformations to strengthen data security and flexibility in handling encrypted data. Also, the proposed work implements the Improved Pelican Optimization Algorithm (IPOA) for optimal key generation. IPOA optimizes encryption keys based on the minimizing correlation between original and encrypted data, thereby ensuring robust data protection. A blockchain is used to store encrypted data and keys, taking use of its decentralized and unchangeable structure to guard against manipulation and unwanted changes. Furthermore, the proxy re-encryption technique is employed to securely manage and distribute decryption capabilities without exposing sensitive information.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Results</h3>\\n \\n <p>Finally, the comparative analyses highlight the superiority of the proposed approach in terms of security, efficiency, and scalability over existing methods. With a correlation coefficient of 0.203887, the Improved Blowfish approach exhibits the strongest resistance, demonstrating its resilience to Fault Injection Attack (FIA).</p>\\n </section>\\n \\n <section>\\n \\n <h3> Conclusion</h3>\\n \\n <p>The suggested model's efficacy is confirmed, showing that it can improve data security, simplify access management, and reduce the hazards connected to conventional healthcare data-sharing procedures. Thus, the integration of blockchain, advanced encryption standards, and optimized key generation algorithms offers a comprehensive solution for secure healthcare information sharing.</p>\\n </section>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 3\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70077\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70077","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Blockchain-Integrated Secure Healthcare Information Sharing via Advanced Blowfish Encryption Standard With Optimal Key Generation
Problem
There are serious worries about the security and privacy of sensitive patient data as a result of the growing digitization of healthcare systems, particularly when sharing data across platforms. Conventional data-sharing techniques frequently depend on centralized systems, which are susceptible to illegal access and data breaches. Existing encryption techniques, such as Blowfish, lack sufficient robustness and scalability for modern healthcare applications. Additionally, managing encryption keys securely across distributed systems remains a complex challenge.
Aim
This work proposes a blockchain-integrated technology with enhanced encryption and optimal key generation to address these gaps, ensuring secure, scalable, and efficient healthcare data sharing.
Methods
In the proposed model, data sharing initiates with partitioning the healthcare data into manageable blocks, followed by encryption using an enhanced version of the Blowfish algorithm. The Improved Blowfish algorithm incorporates bitwise operations and conditional transformations to strengthen data security and flexibility in handling encrypted data. Also, the proposed work implements the Improved Pelican Optimization Algorithm (IPOA) for optimal key generation. IPOA optimizes encryption keys based on the minimizing correlation between original and encrypted data, thereby ensuring robust data protection. A blockchain is used to store encrypted data and keys, taking use of its decentralized and unchangeable structure to guard against manipulation and unwanted changes. Furthermore, the proxy re-encryption technique is employed to securely manage and distribute decryption capabilities without exposing sensitive information.
Results
Finally, the comparative analyses highlight the superiority of the proposed approach in terms of security, efficiency, and scalability over existing methods. With a correlation coefficient of 0.203887, the Improved Blowfish approach exhibits the strongest resistance, demonstrating its resilience to Fault Injection Attack (FIA).
Conclusion
The suggested model's efficacy is confirmed, showing that it can improve data security, simplify access management, and reduce the hazards connected to conventional healthcare data-sharing procedures. Thus, the integration of blockchain, advanced encryption standards, and optimized key generation algorithms offers a comprehensive solution for secure healthcare information sharing.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications