5 CONCLUSION
The integration of Blowfish encryption with
blockchain technology, coupled with secure indexing
and identity management, provides a robust solution
for securely managing and sharing sensitive medical
data. The use of Blowfish encryption ensures that
medical data remains confidential even in the case of
unauthorized access, while blockchain technology
guarantees data integrity by providing a tamper-proof
ledger of transactions and access requests. The
implementation of secure indexing enables efficient
and privacy-preserving keyword searches on
encrypted data, maintaining the confidentiality of
sensitive information. Furthermore, the key
verification process and access control mechanisms
add an extra layer of security by preventing
unauthorized access and notifying data owners of any
suspicious activities. This approach successfully
balances data protection with usability, ensuring that
authorized users can retrieve necessary information
without compromising privacy. The proposed method
offers an effective and secure solution for cloud-
based medical data management, addressing both
data privacy concerns and the need for efficient data
retrieval, making it a valuable tool in safeguarding
sensitive healthcare data in today's digital age.
REFERENCES
Huang, Y., Song, X., Ye, F., Yang, Y. and Li, X., 2019.
“Fair and efficient caching algorithms and strategies for
peer data sharing in pervasive edge computing
environments”. IEEE Transactions on Mobile
Computing, 19(4), pp.852-864.
Wang, C., Yang, Y. and Zhou, P., 2020. Towards efficient
scheduling of federated mobile devices under
computational and statistical heterogeneity. IEEE
Transactions on Parallel and Distributed
Systems, 32(2), pp.394-410.
Xu, G., Li, H., Ren, H., Lin, X. and Shen, X., 2020. DNA
similarity search with access control over encrypted
cloud data. IEEE Transactions on Cloud
Computing, 10(2), pp.1233-1252.
Miao, Y., Liu, X., Choo, K.K.R., Deng, R.H., Li, J., Li, H.
and Ma, J., 2019. Privacy-preserving attribute-based
keyword search in shared multi-owner setting. IEEE
Transactions on Dependable and Secure
Computing, 18(3), pp.1080-1094.
Li, Z. and Yang, Y., 2018. RRect: A novel server-centric
data center network with high power efficiency and
availability. IEEE Transactions on Cloud
Computing, 8(3), pp.914-927.
Qiu, S., Wang, B., Li, M., Liu, J. and Shi, Y., 2017. Toward
practical privacy-preserving frequent itemset mining on
encrypted cloud data. IEEE Transactions on Cloud
Computing, 8(1), pp.312-323.
Chaudhari, P. and Das, M.L., 2019. Privacy preserving
searchable encryption with fine-grained access
control. IEEE Transactions on Cloud Computing, 9(2),
pp.753-762.
Li, P., Guo, S., Yu, S. and Zhuang, W., 2015. Cross-cloud
mapreduce for big data. IEEE Transactions on Cloud
Computing, 8(2), pp.375-386.
Miao, Y., Ma, J., Liu, X., Li, X., Jiang, Q. and Zhang, J.,
2017. Attribute-based keyword search over hierarchical
data in cloud computing. IEEE Transactions on
Services Computing, 13(6), pp.985-998.
He, K., Guo, J., Weng, J., Weng, J., Liu, J.K. and Yi, X.,
2018. Attribute-based hybrid boolean keyword search
over outsourced encrypted data. IEEE Transactions on
Dependable and Secure Computing, 17(6), pp.1207-
1217.
Wang, H., Ning, J., Huang, X., Wei, G., Poh, G.S. and Liu,
X., 2019. Secure fine-grained encrypted keyword
search for e-healthcare cloud. IEEE Transactions on
Dependable and Secure Computing, 18(3), pp.1307-
1319.
Shu, J., Jia, X., Yang, K. and Wang, H., 2018. Privacy-
preserving task recommendation services for
crowdsourcing. IEEE Transactions on Services
Computing, 14(1), pp.235-247.
Ma, R. and Du, L., 2022. Attribute-based blind signature
scheme based on elliptic curve cryptography. IEEE
Access, 10, pp.34221-34227.
Bhatt, S., Pham, T.K., Gupta, M., Benson, J., Park, J. and
Sandhu, R., 2021. Attribute-based access control for
AWS internet of things and secure industries of the
future. IEEE Access, 9, pp.107200-107223.
Fugkeaw, S., 2021. A lightweight policy update scheme for
outsourced personal health records sharing. IEEE
Access, 9, pp.54862-54871.
Khan, S., Khan, S., Zareei, M., Alanazi, F., Kama, N.,
Alam, M. and Anjum, A., 2021. ABKS-PBM:
Attribute-based keyword search with partial bilinear
map. IEEE Access, 9, pp.46313-46324.
Ra, G., Kim, D., Seo, D. and Lee, I., 2021. A federated
framework for fine-grained cloud access control for
intelligent big data analytic by service providers. IEEE
Access, 9, pp.47084-47095.
Zhao, J., Zeng, P. and Choo, K.K.R., 2021. An efficient
access control scheme with outsourcing and attribute
revocation for fog-enabled E-health. IEEE Access, 9,
pp.13789-13799.
Sahi, A., Lai, D. and Li, Y., 2021. A Review of the State of
the Art in Privacy and Security in the eHealth
Cloud. Ieee Access, 9, pp.104127-104141.
Khan, A.W., Khan, M.U., Khan, J.A., Ahmad, A., Khan,
K., Zamir, M., Kim, W. and Ijaz, M.F., 2021. Analyzing
and evaluating critical challenges and practices for
software vendor organizations to secure big data on
cloud computing: An AHP-based systematic
approach. IEEE Access, 9, pp.107309-107332.
Maalini, D. and Balraj, E., 2018. Secured and Energy
Efficient Packet Transmission in Wireless Sensor