Block-Chain Based Multi-Layer Encryption Method for the Secure Storage of Healthcare Data in Cloud Environments
Block-Chain Based Multi-Layer Encryption Method for the Secure Storage of Healthcare Data in Cloud Environments |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-5 |
||
Year of Publication : 2025 | ||
Author : Suresh. R, T. R. Nisha Dayana |
||
DOI : 10.14445/22315381/IJETT-V73I5P115 |
How to Cite?
Suresh. R, T. R. Nisha Dayana, "Block-Chain Based Multi-Layer Encryption Method for the Secure Storage of Healthcare Data in Cloud Environments," International Journal of Engineering Trends and Technology, vol. 73, no. 5, pp.161-172, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I5P115
Abstract
Remote diagnostic processes in electronic healthcare require patient health information. Hospitals, healthcare facilities, and insurance companies must all securely exchange this medical data as the demand to fully utilize them develops. However, maintaining the ownership and integrity of this data is difficult due to third-party access and potential manipulation. Standard cryptography systems may handle a variety of issues, including multi-tenant setups, secure key management, and real-time data processing. By providing a multi-layered, machine learning (ML) based dynamic encryption solution intended for cloud environments, this contemporary cryptographic technique aims to overcome these issues. The proposed approach combines homomorphic encryption (HE), attribute-based encryption (ABE), and blockchain-assisted key management (BAKM) into a single framework. The framework utilizes digital contrasts to facilitate access control, and data can only be accessed and interpreted by authorized entities. The recommended method provides a complete solution for protecting medical data in cloud environments while permitting safe and easy data sharing between patients, researchers, and hospitals, notwithstanding the privacy trade-off. A secure and reliable digital healthcare environment is made possible by this strategy.
Keywords
Advanced Encryption Standard (AES), Attribute based Encryption (ABE), Blockchain (BC), Homomorphic Encryption (HE), Machine Learning (ML), Multi-layer Encryption..
References
[1] Reshma Siyal et al, “Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation,” Mathematics, vol. 12, no. 13, pp. 1-25, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Hemant B. Mahajan et al., RETRACTED ARTICLE: Integration of Healthcare 4.0 and Blockchain into Secure Cloud-Based Electronic Health Records Systems,” Applied Nanoscience, vol. 13, no. 3, pp. 2329-2342, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Harleen Kaur et al., “Securing and Managing Healthcare Data Generated by Intelligent Blockchain Systems on Cloud Networks through DNA Cryptography,” Journal of Enterprise Information Management, vol. 36, no. 4, pp. 861-878, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Hari Krishnan Andi, “Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security, Journal of Trends in Computer Science and Smart Technology, vol. 3, no. 4, pp. 305-313, 2021.
[Google Scholar] [Publisher Link]
[5] Gousia Habib et al., “Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing,” Future Internet, vol. 14, no. 11, pp. 1-22, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Amna Amanat et al., “Blockchain and Cloud Computing-Based Secure Electronic Healthcare Records Storage and Sharing,” Frontiers in Public Health, vol. 10, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Brahim Ferik et al., “A Multi-Layered Security Framework for Medical Imaging: Integrating Compressed Digital Watermarking and Blockchain,” IEEE Access, vol. 12, pp. 187604-187622, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] R.S. Kanakasabapathi, and J.E. Judith, “Enhancing Cloud Storage Security through Blockchain-Integrated Access Control and Optimized Cryptographic Techniques,” International Journal of Advanced Technology and Engineering Exploration, vol. 11, no. 117, pp. 1183-1197, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Parag Rastogi, Devendra Singh, and Sarabjeet Singh Bedi, “An Improved Blockchain Framework for ORAP Verification and Data Security in Healthcare,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, no. 6, pp. 2853-2868, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Sonali Shwetapadma Rath, and M.P. Prabhudev Jagadeesh, “Enhancing Data Security in SAP-Enabled Healthcare Systems with Cryptography and Digital Signatures using Blockchain Technology,” International Journal of Systematic Innovation, vol. 8, no. 1, pp. 36-47, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Garima Verma, “Blockchain-Based Privacy Preservation Framework for Healthcare Data in Cloud Environment,” Journal of Experimental & Theoretical Artificial Intelligence, vol. 36, no. 1, pp. 147-160, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Dinesh Reddy Chirra, “Secure Data Sharing in Multi-Cloud Environments: A Cryptographic Framework for Healthcare Systems,” Journal of Artificial Intelligence in Medicine, vol. 15, no. 1, pp. 821-843, 2024.
[Google Scholar] [Publisher Link]
[13] Guipeng Zhang, Zhenguo Yang, Wenyin Liu, “Blockchain-Based Privacy Preserving E-Health System for Healthcare Data in Cloud,” Computer Networks, vol. 203, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ashutosh Kumar Singh, and Rishabh Gupta, “A Privacy-Preserving Model based on Differential Approach for Sensitive Data in Cloud Environment,” Multimedia Tools and Applications, vol. 81, no. 23, pp. 33127-33150, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Rohit Ravindra Nikam, and Rekha Shahapurkar, Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data, Recent Trends in Intensive Computing, pp. 394-408, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Man-Jie Yuan, Zheng Zou, and Wei Gao, “Bi-Cryptonets: Leveraging Different-Level Privacy for Encrypted Inference,” Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, pp. 210-222, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ramalingam Praveen, and Parameswaran Pabitha, “Improved Gentry-Halevi's Fully Homomorphic Encryption‐Based Lightweight Privacy Preserving Scheme for Securing Medical Internet of Things,” Transactions on Emerging Telecommunications Technologies, vol. 34, no. 4, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ganesh Kumar Mahato, and Swarnendu Kumar Chakraborty, “A Comparative Review on Homomorphic Encryption for Cloud Security,” IETE Journal of Research, vol. 69, no. 8, pp. 5124-5133, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Victor Kadykov, Alla Levina, and Alexander Voznesensky, “Homomorphic Encryption within Lattice-Based Encryption System,” Procedia Computer Science, vol. 186, pp. 309-315, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Yang Li, Kee Siong Ng, and Michael Purcell, “A Tutorial Introduction to Lattice-based Cryptography and Homomorphic Encryption,” arXiv Preprint, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ibrar Yaqoob et al., “Blockchain for Healthcare Data Management: Opportunities, Challenges, and Future Recommendations,” Neural Computing and Applications, vol. 34, no. 14, pp. 11475-11490, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Bessem Zaabar et al., “HealthBlock: A Secure Blockchain-Based Healthcare Data Management System,” Computer Networks, vol. 200, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Muhammad Shahid Iqbal et al., “An Adaptive Ensemble Deep Learning Framework for Reliable Detection of Pandemic Patients,” Computers in Biology and Medicine, vol. 168, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Anum Farooq et al., “Towards the Design of New Cryptographic Algorithm and Performance Evaluation Measures,” Multimedia Tools and Applications, vol. 83, no. 4, pp. 9709-9759, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] M. Indrasena Reddy et al., “Encryption with Access Policy and Cloud Data Selection for Secure and Energy-Efficient Cloud Computing,” Multimedia Tools and Applications, vol. 83, no. 6, pp. 15649-15675, 2024.
[CrossRef] [Google Scholar] [Publisher Link]