HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain

被引:13
作者
Li, Shiyu [1 ]
Zhang, Yuan [1 ,2 ]
Xu, Chunxiang [1 ,3 ]
Cheng, Nan
Liu, Zhi [4 ]
Du, Yicong [1 ]
Shen, Xuemin [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610056, Sichuan, Peoples R China
[2] Putian Univ, Fujian Key Lab Financial Informat Proc, Putian 351100, Peoples R China
[3] Univ Elect Sci & Technol China, Yangtze Delta Reg Inst Huzhou, Huzhou 610056, Peoples R China
[4] Xidian Univ, Dept Telecommun, Xian 710071, Peoples R China
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
国家重点研发计划;
关键词
Cloud-based eHealth system; EHR confidentiality; secure data provenance; blockchain; EFFICIENT; PRIVACY; KEY; AUTHENTICATION; DEDUPLICATION; MANAGEMENT; NETWORKS; SCHEME;
D O I
10.1109/TMC.2022.3199048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a servers-aided password-based subsequent-key-locked encryption mechanism to ensure the confidentiality of outsourced electronic health records (EHRs). The encryption mechanism achieves conditional forward transparency: a doctor can only access a patient's EHRs related to the current diagnosis with the patient's delegation. It also achieves portability: to delegate a doctor for accessing a specific part of EHRs, the patient only needs to send one key (at most 256 bits) in addition to the delegation information to the doctor; the patient does not need to maintain any secret in a local device. Then, we propose a blockchain-based secure EHR provenance mechanism, where a data structure of EHR provenance record is designed to precisely reflect the EHRs' provenance information; a smart contract on a public blockchain is deployed to secure both EHRs and the corresponding provenance records. Finally, we develop a cloud-based eHealth system, dubbed HealthFort, based on the two mechanisms. Security analysis and comprehensive performance evaluation are conducted to demonstrate that HealthFort is secure and efficient.
引用
收藏
页码:6508 / 6525
页数:18
相关论文
共 60 条
[1]  
Act A., 1996, Public Law, V104, P191
[2]   PASTA: PASsword-based Threshold Authentication [J].
Agrawal, Shashank ;
Miao, Peihan ;
Mohassel, Payman ;
Mukherjee, Pratyay .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2042-2059
[3]  
Asghar MR, 2012, LECT NOTES COMPUT SC, V7039, P145
[4]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[5]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[6]   Resource Sharing of a Computing Access Point for Multi-User Mobile Cloud Offloading with Delay Constraints [J].
Chen, Meng-Hsi ;
Dong, Min ;
Liang, Ben .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (12) :2868-2881
[7]   A Secure EHR System Based on Hybrid Clouds [J].
Chen, Yu-Yi ;
Lu, Jun-Chao ;
Jan, Jinn-Ke .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (05) :3375-3384
[8]   Dynamic secure cloud storage with provenance [J].
Chow, Sherman S.M. ;
Chu, Cheng-Kang ;
Huang, Xinyi ;
Zhou, Jianying ;
Deng, Robert H. .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 6805 LNCS :442-464
[9]  
Dworkin M. J., 2001, Advanced encryption standard (AES), DOI [DOI 10.6028/NIST.FIPS.197, 10.6028/NIST.FIPS.197]
[10]   A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks [J].
Guo, Linke ;
Zhang, Chi ;
Sun, Jinyuan ;
Fang, Yuguang .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (09) :1927-1941