Sharifah Md Yasin’s research while affiliated with Universiti Putra Malaysia and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Figure 1. Proposed scheme architecture and system design.
Figure 2. Data block structure.
Figure 3. Workflow of generating the smart contract.
Figure 4. Verification results obtained from AVISPA: (a) on-the-fly model checker (OFMC) backend, (b) constraint logic-based attack searcher (CL-AtSe) backend.
Figure 5. Computation costs: (a) execution time for generating users' SK in the patient node (PN) node; (b) execution time for users to generate searchable ciphertext in the PN; (c) execution time for users in the HUN to create token search; (d) IPFS node to retrieve a requested ciphertext; (e) execution time in the decryption algorithm.

+11

Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage
  • Article
  • Full-text available

April 2021

·

192 Reads

·

47 Citations

Sensors

Hm Hussien

·

Sharifah Md Yasin

·

·

Blockchain technology provides a tremendous opportunity to transform current personal health record (PHR) systems into a decentralised network infrastructure. However, such technology possesses some drawbacks, such as issues in privacy and storage capacity. Given its transparency and decentralised features, medical data are visible to everyone on the network and are inappropriate for certain medical applications. By contrast, storing vast medical data, such as patient medical history, laboratory tests, X-rays, and MRIs, significantly affect the repository storage of blockchain. This study bridges the gap between PHRs and blockchain technology by offloading the vast medical data into the InterPlanetary File System (IPFS) storage and establishing an enforced cryptographic authorisation and access control scheme for outsourced encrypted medical data. The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). This newly cryptographic primitive is developed by extending ciphertext-policy attribute-based encryption (CP-ABE) and searchable symmetric encryption (SSE) and by leveraging the technology of smart contracts to achieve the following: (1) efficient and secure fine-grained access control of outsourced encrypted data, (2) confidentiality of data by eliminating trusted private key generators, and (3) multikeyword searchable mechanism. Based on decisional bilinear Diffie–Hellman hardness assumptions (DBDH) and discrete logarithm (DL) problems, the rigorous security indistinguishability analysis indicates that SC-ABSE is secure against the chosen-keyword attack (CKA) and keyword secrecy (KS) in the standard model. In addition, user collusion attacks are prevented, and the tamper-proof resistance of data is ensured. Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. The experimental analysis utilised real-world datasets to demonstrate the efficiency and utility of SC-ABSE in terms of computation overhead, storage cost and communication overhead. The proposed scheme is also designed and developed to evaluate throughput and latency transactions using a standard benchmark tool known as Caliper. Lastly, simulation results show that SC-ABSE has high throughput and low latency, with an ultimate increase in network life compared with traditional healthcare systems.

Download

Blockchain Technology in the Healthcare Industry: Trends and Opportunities

March 2021

·

632 Reads

·

207 Citations

Journal of Industrial Information Integration

Hm Hussien

·

Sharifah Md Yasin

·

·

[...]

·

The growth in the use of blockchain technology in healthcare is remarkable and has a significant impact on the healthcare industry. In this work, the gap between the healthcare industry and blockchain technologies was addressed by evaluating previous activities. Bibliometric analysis of dataset distribution, venues, keywords and citations was conducted to identify the trend of blockchain technology in healthcare. Case studies of telecare medicine information system and E-health were also reviewed and evaluated in terms of security and privacy. This study discussed potential future challenges such as scalability and storage capacity, blockchain size, universal interoperability and standardisation. This work highlighted the motivations of employing blockchain technology in the healthcare industry. Prospects in health data and sharing process, clinical trials, the pharmaceutical industry, big data, artificial intelligence, 5G ultrasonic device, security and privacy were highlighted.


A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction

September 2019

·

2,478 Reads

·

247 Citations

Journal of Medical Systems

Blockchain in healthcare applications requires robust security and privacy mechanism for high-level authentication, interoperability and medical records sharing to comply with the strict legal requirements of the Health Insurance Portability and Accountability Act of 1996. Blockchain technology in the healthcare industry has received considerable research attention in recent years. This study conducts a review to substantially analyse and map the research landscape of current technologies, mainly the use of blockchain in healthcare applications, into a coherent taxonomy. The present study systematically searches all relevant research articles on blockchain in healthcare applications in three accessible databases, namely, ScienceDirect, IEEE and Web of Science, by using the defined keywords ‘blockchain’, ‘healthcare’ and ‘electronic health records’ and their variations. The final set of collected articles related to the use of blockchain in healthcare application is divided into three categories. The first category includes articles (i.e. 43/58 scientific articles) that attempted to develop and design healthcare applications integrating blockchain, particularly those on new architecture, system designs, framework, scheme, model, platform, approach, protocol and algorithm. The second category includes studies (i.e., 6/58 scientific articles) that attempted to evaluate and analyse the adoption of blockchain in the healthcare system. Finally, the third category comprises review and survey articles (i.e., 6/58 scientific articles) related to the integration of blockchain into healthcare applications. The final articles for review are discussed on the basis of five aspects: (1) year of publication, (2) nationality of authors, (3) publishing house or journal, (4) purpose of using blockchain in health applications and the corresponding contributions and ⁽⁵⁾ problem types and proposed solutions. Additionally, this study provides identified motivations, open challenges and recommendations on the use of blockchain in healthcare applications. The current research contributes to the literature by providing a detailed review of feasible alternatives and identifying the research gaps. Accordingly, researchers and developers are provided with appealing opportunities to further develop decentralised healthcare applications through a comprehensive discussion of about the importance of blockchain and its integration into various healthcare applications.


Automatic Security Evaluation of SPN-structured Block Cipher Against Related-key Differential Attacks Using Mixed Integer Linear Programming

April 2019

·

239 Reads

Journal of Theoretical and Applied Information Technology

Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. Currently, the automatic computer tools are not applicable to estimate the immunity against related-key differential attacks for SPN block ciphers structure. We present a searching strategy that determines the lower bounds of SPN block ciphers structure against RDC using the Mixed Integer Linear Programming (MILP). This study also aims to demonstrate the applicability and the efficiency of the MILP technique by examining the security of Rijndael block cipher in RDC attack. We prove this technique through calculate the number of activation S-boxes into Rijndael block cipher. The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. Overall, it is applicable to an extensive variety of block cipher algorithm that makes it an adaptable tool for industrial purposes and scholarly research.


Figure 2: Illustration of the Two Encryption Rounds of the Rijndael 128-bit (Lars & Matthew, 2011).
Figure 2 depicts every input difference Δ i ∈ F 2 w of the entire S − box, S issued in the operation Rijndael algorithm cipher. The present study presents a new 0-1 variable A i in or corresponding S-boxes, be it in active or inactive state. For instance, let A i = 1 or A i = 0 or Δ i = 0. Additionally, the full number of active S-boxes ∑ A i i
Figur e 1. The Intern al Struct ure of
Results of related-key differential analysis
NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS

June 2018

·

109 Reads

·

4 Citations

Journal of Information and Communication Technology

A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key model attacks. Rijndael is the most common block cipher, and it was adopted by the National Institute of Standards and Technology, USA in 2001 as an Advance Encryption Standard. However, a few studies on cryptanalysis revealed that a security weakness of Rijndael refers to its vulnerability to related-key differential attack as well as the related-key boomerang attack, which is mainly caused by the lack of nonlinearity in the key schedule of Rijndael. In relation to this, constructing a key schedule that is both efficient and provably secure has been an ongoing open problem. Hence, this paper presents a method to improve the key schedule of Rijndael 128-bit for the purpose of making it more resistance to the related-key differential and boomerang attacks. In this study, two statistical tests, namely the Frequency test and the Strict Avalanche Criterion test were employed to respectively evaluate the properties of bit confusion and bit diffusion. The results showed that the proposed key expansion function has excellent statistical properties and agrees with the concept of Shannon’s diffusion and confusion bits. Meanwhile, the Mixed Integer Linear Programming based approach was adopted to evaluate the resistance of the proposed approach towards the related-key differential and boomerang attacks. The proposed approach was also found to be resistant against the two attacks discovered in the original Rijndael. Overall, these results proved that the proposed approach is able to perform better compared to the original Rijndael key expansion function and that of the previous research.

Citations (4)


... Hussein et al. [34] discussed an existing gap between PHRs and blockchain, and they stated it is feasible to resolve this gap by encrypting medical data and outsourcing it to InterPlanetary File System (IPFS) storage. They called it "smart contract-based attributebased searchable encryption (SC-ABSE)", and it has been made by combining ciphertextpolicy attribute-based encryption (CP-ABE), searchable symmetric encryption (SSE), smart contracts, and IPFS storage. ...

Reference:

From Data Silos to Health Records Without Borders: A Systematic Survey on Patient-Centered Data Interoperability
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage

Sensors

... In the healthcare industry, blockchain technology's potential to enhance the handling of data, confidentiality, and privacy [23] has garnered a lot of interest. Still, there are several barriers to its adoption. ...

Blockchain Technology in the Healthcare Industry: Trends and Opportunities
  • Citing Article
  • March 2021

Journal of Industrial Information Integration

... In 2018, [16] designed a key schedule algorithm that optimized the number of its active S-boxes. [17] improved Rijndael's key schedule to make it resistant to cryptanalytic attacks. [18] derived the round keys from a short secret key with its similar round functions. ...

NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS

Journal of Information and Communication Technology

... All data in BC is available to all users on the network, and any user on the network can check or copy this data at any time [41] but cannot modify or delete it [42]. In other words, BC is an immutable gateway that can be shared among all nodes in the system [43]. However, they can be verified and managed using automation and sharing protocols [42]. ...

A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction

Journal of Medical Systems