Detecting Sybil Attack in Blockchain and Preventing through Universal Unique Identifier in Health Care Sector for privacy preservation

Main Article Content

Nidhi Raghav
Anoop Kumar Bhola

Abstract

Health care data requires data secrecy, confidentiality, and distribution through public networks. Blockchain is the latest and most secure framework through which health care data can be transferred on the public network. Blockchain has gained attention in recent year’s due to its decentralized, distributed, and immutable ledger framework. However, Blockchain is also susceptible to many attacks in the permission less network, one such attack is known as Sybil attack, where several malicious nodes are created by the single node and gain multiple undue advantages over the network. In this research work, the Blockchain network is created using the smart contract method which gets hampered due to Sybil attack. Thus, a novel method is proposed to prevent Sybil attack in the network for privacy preservation. Universal Unique Identifier code is used for identification and prevention of the Sybil attack in the self-created networks. Results depict that proposed method correctly identifies the chances of attack and the prevention from the attack. The approach has been evaluated on performance metrics namely, true positive rate and accuracy which were attained as 87.5 % and 91% respectively, in the small network. This demonstrates that the proposed work attains improved results as compared to other latest available methods.

Article Details

How to Cite
Raghav, N. ., & Bhola, A. K. . (2023). Detecting Sybil Attack in Blockchain and Preventing through Universal Unique Identifier in Health Care Sector for privacy preservation. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8), 276–284. https://doi.org/10.17762/ijritcc.v11i8.7955
Section
Articles

References

I. Mubashar, and R. Matulevi?ius. "Exploring sybil and double-spending risks in blockchain systems." IEEE Access 9, 2021, pp.76153-76177.

M. Iqbal and R. Matulevicius, ‘‘Comparison of blockchain-based solutions to mitigate data tampering security risk,’’ in Business Process Management: Blockchain and Central and Eastern Europe Forum. Cham, Switzerland: Springer, 2019, pp. 13–28.

M. Iqbal and R. Matulevicius, ‘‘Blockchain-based application security risks: A systematic literature review,’’ in Proc. Adv. Inf. Syst. Eng. Workshops, 2019, pp. 176–188.

J. R. Douceur. “The Sybil attack”, In Proceedings of the International Workshop on Peer to Peer Systems, 2002, pp. 251–260.

J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis and defences", In Proceedings of International Symposium on Information Processing in Sensor Networks,2004, pp. 259–268.

F. Anjam, P. Mouchtaris, “Security For Wireless Ad Hoc Networks”, Proc. Intersience Publishing, IEEE, 2007.

M. Rahbari and M. A. J. Jamali. "Efficient detection of Sybil attack based on cryptography in VANET.", 2011.

P. Swathi, C. Modi, and D. Patel. "Preventing sybil attack in blockchain using distributed behavior monitoring of miners." In 2019 10th International Conference on Computing, Communication and Networking Technologies,2019, pp. 1-6.

M. Conti, S. K. E, C. Lal, and S. Ruj, “A Survey on Security and Privacy Issues of Bitcoin,” in IEEE Communications Surveys & Tutorials, 2018. DOI: 10.1109/COMST.2018.2842460

I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable," Financial Cryptography, 2014, pp. 1-18.

Xiao Yue, H. W. “Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control”. Journal of medical systems, 2016, 218.

Allison Ackerman Shrier, A. C.-t. "Blockchain and Health IT: Algorithms, Privacy, and Data,", 2017.

Qi Xia, E. B. “BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments. Information, 2017.

Kevin Peterson, R. D. “A Blockchain-Based Approach to Health Information Exchange Networks”, 2016.

Abdullah Al Omar, M. S. “MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data”. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, 2017, pp. 534-543.

Yi Chen, S. D. “Blockchain-Based Medical Records Secure Storage and Medical Service Framework”. Journal of Medical Systems, 5, 2018.

Ahmed Faeq Hussein, A. N.-G. “A Medical Records Managing and Securing Blockchain Based System Supported by a Genetic Algorithm and Discrete Wavelet Transform”. Cognitive Systems Research, 2018, pp. 1-11.

Gaby G. Daghera, J. M. Ancile, “Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology”, Sustainable Cities and Society, 2018, pp. 283-297.

Zhang, A. and Lin, X., "Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain," Journal of medical systems, vol.42, no.8, 2018, pp.140.

Tian, H., He, J. and Ding, Y., "Medical Data Management on Blockchain with Privacy," Journal of medical systems, vol.43, no.2, pp.26, 2019.

Zhu, L., Wu, Y., Gai, K. and Choo, K.K.R., "Controllable and trustworthy blockchain-based cloud data management," Future Generation Computer Systems, vol.91, pp.527-535, 2019.

J. Yun, and Mihui Kim. "SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing." Information 11, no. 4, 2020, pp. 198.

S. Friebe, M. Florian, and I. Baumgart. "Decentralized and sybil-resistant pseudonym registration using social graphs." In 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 121-128, 2016.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, “Sybilguard: Defending against sybil attacks via social networks,” SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 267–278, Aug. 2006.

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, “Sybillimit: A nearoptimal social network defense against sybil attacks,” in Proceedings of the 2008 IEEE Symposium on Security and Privacy, ser. SP ’08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 3–17.

N. Tran, J. Li, L. Subramanian, and S. S. Chow, “Optimal sybil-resilient node admission control,” in the 30th IEEE International Conference on Computer Communications, 4 2011.

P. Mittal, M. Caesar, and N. Borisov, “X-vine: Secure and pseudonymous routing in dhts using social networks,” in 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012.

A. Almogren, I. Mohiuddin, I. Ud Din, H. Almajed, and N. Guizani. "Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things." IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4485-4497, 2020.

J. Newsome, E. Shi, D. Song and A. Perrig, “The sybil attack in sensor networks: Analysis and defenses,” Proc. Int. Symp. Information Processing in Sensor Networks (IPSN), 2004, pp. 259- 268.

C. Yu , S. Gupta and A. Agrawal, “Location based Technique to prevent Sybil attack in wireless sensor networks,” International Journal of Reliable Information and Assurance, vol. 5, no. 1, 2017, pp. 1-8.

L. Xu, S. Chainan, H. Takizawa and H. Kobayashi, “Resisting Sybil Attack By Social Network and Network Clustering,” 10th IEEE/IPSJ International Symposium on Applications and the Internet, Seoul, 2010, pp. 15-21.

B. Triki, S. Rekhis, M. Chammem and N. Boudriga, “A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks,” 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Dubai, 2013, pp. 1-8.

G. Bissias, A. Pinar, O. Brian, N. Levine and M. Liberatore, "SybilResistant Mixing for Bitcoin,” Workshop of privacy in the electronic society, 2014, pp. 149-158.

S. J. Samuel and B. Dhivya, “An efficient technique to detect and prevent Sybil attacks in social network applications,” 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, 2015, pp. 1-3.

J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll and E. W. Felten, “Mixcoin: Anonymity for bitcoin with accountable mixes,” in 18th International Conference, FC 2014. Springer Berlin Heidelberg, 2014, pp. 486–504.

L. Valenta and B. Rowan, “Blindcoin: Blinded, accountable mixes for bitcoin,” in Financial Cryptography Workshops, 2015, pp. 112-126.

E. Heilman, L. Alshenibr, F. Baldimtsi, A. Scafuro and S. Goldberg, “Tumblebit: An untrusted bitcoin-compatible anonymous payment hub,” NDSS Symposium, 2017, pp. 1-36. http://eprint.iacr.org/2016/575.

M. Numan, F. Subhan, W. Z. Khan, S. Hakak, S. Haider, G. T. Reddy, A. Jolfaei, and M. Alazab, ‘‘A systematic review on clone node detection in static wireless sensor networks,’’ IEEE Access, vol. 8, pp. 65450–65461, 2020.

P. Winter, R. Ensafi, K. Loesing, and N. Feamster, “Identifying and characterizing Sybils in the Tor network,” 25th USENIX Security Symposium, 2016, pp. 1169-1185.