Abstract
In the digital world, systems are usually distributed, where health data are fragmented across multiple healthcare providers’ data may be accidentally corrupted or intentionally tampered. A mechanism is important to verify the integrity of the content in the network to ensure the security. The main objective of this paper is to propose a Modified Merkle Tree (MMT) data structure for data storage and data authentication. In this paper, a new Modified Merkle Tree data structure that can ensure storage security with integrity management is proposed. The Merkle Tree data structure, utilized in Blockchain technology is modified in this work for the purpose of designing a new three-stage Modified Merkle Tree based on hashed transactions. The objective of the proposed hashed transaction is to verify the authenticity and integrity of the content. The use of the Modified Merkle Tree data structure is highlighted in designing a system that takes care of Data Authentication, Consistency Verification and Data Synchronization. The effectiveness of the proposed system has been experimented in the healthcare scenario and proved to store and verify the content integrity. The quantitative metrics of the proposed system have been evaluated and compared with the binary Merkle Tree data structure.
Similar content being viewed by others
Change history
31 May 2021
A Correction to this paper has been published: https://doi.org/10.1007/s12652-021-03300-y
References
Adhikari N, Bushra N, Ramkumar M (2018) Complete Merkle hash trees for large dynamic spatial data. In: 2019 International conference on computational science and computational intelligence (CSCI). IEEE, pp 1318–1324
Atighehchi K, Rolland R (2016) Optimization of tree modes for parallel hash functions: a case study. IEEE Trans Comput 7(21):1–16
Bosamia M, Patel D (2018) Current trends and future implementation possibilities of the Merkel tree. Int J Comput Sci Eng 8(8):247–267
Dhumwad S, Sukhadeve M, Naik C, Manjunath KN, Prabhu S (2017) A peer to peer money transfer using SHA256 and Merkle Tree. In: 2017 23rd annual conference on advanced computing and communications. IEEE, pp 1–4
Guo J, Sun J (2020) Secure and efficient nearest neighbor query for an outsourced database. IEEE Access 8(1):1–11
Heimbigner D (2011) A tamper-resistant programming language system. IEEE Trans Dependable Secure Comput 8(2):194–207
Kan J, Kim KS (2019) MTFS: Merkle-Tree-based file system networking and internet architechture. Crypt Netw Sec 2(14):41–47
Kiffer L, Rajaraman R, Shelat A (2018) A better method to analyze blockchain consistency. Session 4C, Blockchain1, CCS–18, Toronto, Canada, pp 15–19
Koo D et al (2017) An online data-oriented authentication based on Merkle tree with improved reliability. In: 2017 IEEE 24th international conference on web services, pp 840–844
Koo D et al (2018) Improving security and reliability in Merkle tree-based online data authentication with leakage resilience. MDPI J Appl Sci 8:25–32
Lu Z, Wng Q, Qu G (2019) A blockchain-based privacy-preserving authentication scheme for VANETs. IEEE Trans Very Large Scale Integr (VLSI) Syst 8(3):1–10
Moni N, Teague V (2001) Anti-persistence: history independent data structures. ACM, pp 492–592
Muñoz MC, Moh M, Moh T-S (2014) Improving smart grid authentication using Merkle Trees. IEEE, CNS, pp 1–6
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system, pp 1–7
Nguyen DM, Luu Q, Tuong NH, Pham H-A (2019) MB-PBA: leveraging merkle tree and blockchain to enhance user profile-based authentication in e-learning systems. In:19th International symposium on communications and information technologies (ISCIT). IEEE, pp 392–398
Paik H-Y, Xu X et al (2019) Analysis of data management in blockchain-based systems: from architecture to governance. IEEE Access 7:1–17
Ponnapalli S, Shah A et al (2019) Scalable and efficient data authentication for decentralized systems, pp 1–16. arXiv:1909.11590v1
Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur. https://doi.org/10.1007/s10207-014-0270-9
Qin B, Deng H, Wu Q, Domingo-Ferrer J, Naccache D, Zhou Y (2015) Flexible attribute-based encryption applicable to secure e-healthcare records. Int J Inf Secur. https://doi.org/10.1007/s10207-014-0272-7
Rongxing Lu, Lin X, Shen X (2013) SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans Parallel Distrib Syst 24(3):614–715
Sanchez-Guerrero R et al (2012) An event driven hybrid identity management approach to privacy enhanced e-health. Sensors 12:6129–6154
Scott A Crosby, Wallach DS (2014) Efficient data structures for tamper-evident logging, White paper, pp 1–9
Sharma B, Sekaran CN, Zuo F (2018) Merkle-tree based approach for ensuring integrity of electronic medical records. IEEE, pp 1–5
Shoufan A, Huber N (2010) A fast hash tree generator for Merkle signature scheme. IEEE, pp 3945–3950
Shwartz O, Birk Y (2018) Distributed Memory Integrity Trees. IEEE Trans Comput Architect, pp 1–4
Sookhak M, Yu FR, Zomaya AY (2018) Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distrib Syst 29(5):999–1014
Sánchez-Guerrero R et al (2017) Collaborative eHealth meets security: privacy-enhancing patient profile management. IEEE J Biometric Healthcare Inform 5(2):1–9
Tong Y et al (2014) Cloud-assisted mobile-access of health data with privacy and auditability. IEEE J Bio Med Health Inform 18(2):419–520
Usharani C, Seethalakshmi P (2021) A novel blockchain based electronic health record automation system for healthcare. J Ambient Intell Human Comput, pp 1–23
Weaknesses in Bitcoin’s Merkle Root Construction (2011) White paper
Xu C, Chen Q, Hu H, Xu J, Hei X (2017) Authenticating aggregate queries over set-valued data with confidentiality. IEEE Trans Data Knowl Eng, pp 4341–4347
Yang H-J, Costan V, Zeldovich N, Devadas S (2013) Authenticated storage using small trusted hardware CCSW’13. ACM, Berlin, Germany, pp 21
Yue C, Xie Z, Zhang M, Chen G, Ooi B, Wang S, Xiao X (2020) Analysis of indexing structures for immutable data, pp 1–17
Zhang R, Xue R (2019) Security and privacy on blockchain. ACM Comput Surv 1(1):1–35
Zou Y, Lin M (2019) FAST: a frequency-aware skewed Merkle tree for fpga-secured embedded systems. In: 2019 IEE computer society and annual symposium, 978-1-7281-3391-1/19, pp 326–332
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: “The accepted date has been corrected in original version”.
Rights and permissions
About this article
Cite this article
Chelladurai, U., Pandian, S. HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-021-03085-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-021-03085-0