Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain

被引:4
作者
Hu, Mingqi [1 ]
Ren, Yanli [1 ]
Chen, Cien [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 05期
基金
上海市自然科学基金;
关键词
blockchain; medical data sharing; power supervision; access control; HEALTH-CARE; KEY DISTRIBUTION; USAGE;
D O I
10.3390/sym15051010
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Nowadays, data between hospitals are usually not interoperable, which brings great inconvenience to medical data sharing and patients' medical treatment. In addition, patients do not want their medical data to be leaked during the sharing process. Researchers have employed blockchain to build data-sharing systems to address these issues. However, current systems do not restrict the power of participants, nor do they prevent visitors from sharing the obtained data to unauthorized parties. To address these issues, we propose a private data-sharing system with symmetric encryption for the medical industry that implements power restriction and access control, and prevents the leakage of private data. To be specific, firstly, symmetric encryption algorithm is utilized to encrypt medical data to protect the privacy of data owner. Secondly, our proposed system is built on a new blockchain framework, in which only visitors with permission can access the medical data. Thirdly, we employ chameleon signature to prevent visitors from sharing data with other parties without permission. Finally, we make the power of participants in the system revocable to prevent them from abusing their power. Our proposed system has been proven to be secure through security analysis and can protect the privacy of patients. In addition, the experimental results show that our system has excellent performance in terms of time overhead compared to other systems.
引用
收藏
页数:19
相关论文
共 41 条
[1]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[2]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures [J].
Camenisch, Jan ;
Derler, David ;
Krenn, Stephan ;
Pohls, Henrich C. ;
Samelin, Kai ;
Slamanig, Daniel .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 :152-182
[5]  
Chen XF, 2004, LECT NOTES COMPUT SC, V3225, P87
[6]   A critical review on blockchain assessment initiatives: A technology evolution viewpoint [J].
Colomo-Palacios, Ricardo ;
Sanchez-Gordon, Mary ;
Arias-Aranda, Daniel .
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2020, 32 (11)
[7]   iGeneration's social media usage in retrieving information related to healthcare education: a web-based survey among Italian and Romanian undergraduate medical students [J].
Cordos, Ariana-Anamaria ;
Bolboaca, Sorana D. ;
Prato, Rosa ;
Fortunato, Francesca .
ANNALI DELL ISTITUTO SUPERIORE DI SANITA, 2019, 55 (01) :34-40
[8]  
Costan Victor., Intel SGX explained
[9]   An Optimized Consortium Blockchain for Medical Information Sharing [J].
Du, Mingxiao ;
Chen, Qijun ;
Chen, Jieying ;
Ma, Xiaofeng .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2021, 68 (06) :1677-1689
[10]  
Engelhardt MA, 2017, TECHNOL INNOV MANAG, V7, P22, DOI 10.22215/timreview/1111