Abstract:
6G (sixth-generation wireless), the successor to 5G cellular technology, operates at higher frequencies than its predecessor and supports significantly greater capacity a...Show MoreMetadata
Abstract:
6G (sixth-generation wireless), the successor to 5G cellular technology, operates at higher frequencies than its predecessor and supports significantly greater capacity and markedly reduced latency. Healthcare is treated as a complex system with various stakeholders, like doctors, patients, hospitals, pharmaceutical companies as well as healthcare decision-makers. The innovations in the Internet of Things (IoT) and incorporating emerging technology in the healthcare systems provide the quality of services to the people and save millions of lives. However, patient privacy and secure interchange of medical data from various healthcare providers need to be adequately addressed. Furthermore, incorporating blockchain in the healthcare system helps to make the system more transparent and secure due to inherent properties of the blockchain. In addition, Big Data analytics helps in analyzing large datasets from hundreds of patients, and then in identifying various clusters and correlation among datasets, and also in developing predictive models. In this paper, we aim to propose a new smart contract-based access control for 6G-enabled blockchain assisted in the healthcare system (in short, we call it as SACS). SACS provides a patient to communicate with its healthcare management authority securely and helps to interchange his/her medical information across healthcare providers. A detailed security analysis, experimental results and comparative study assure that the proposed SACS is secure by preventing possible active and passive attacks, andrequires less computational and communication costs as compared to those for other relevant competing schemes.
Published in: IEEE Transactions on Consumer Electronics ( Volume: 70, Issue: 4, November 2024)
Funding Agency:
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
School of Electronics Engineering, Kyungpook National University, Daegu, South Korea
Electrical Engineering Department, École de technologie supérieure, Montréal, QC, Canada
Centre for Research Impact & Outcome, Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
School of Electronics Engineering, Kyungpook National University, Daegu, South Korea
Electrical Engineering Department, École de technologie supérieure, Montréal, QC, Canada
Centre for Research Impact & Outcome, Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia