Blockchain-based approach for e-health data access management with privacy protection

被引:21
作者
Hirtan, Liviu [1 ]
Krawiec, Piotr [2 ]
Dobre, Ciprian [1 ]
Batalla, Jordi Mongay [2 ]
机构
[1] Univ Politehn Bucuresti, Bucharest, Romania
[2] Natl Inst Telecommun, Warsaw, Poland
来源
2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD) | 2019年
关键词
blockchain; e-health; data privacy; data access management;
D O I
10.1109/camad.2019.8858469
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain is a technology that offers the ability to create new business models and solves trust issues in a more efficient way. It can lead to many research opportunities and business innovations. Academia and industry proposed many blockchain based software solutions within a wide range of domains. In this paper we present a system design where blockchain technology is proposed to be used in the healthcare system, where the vital information regarding the medical analyses are shared between hospitals, medical clinics and research institutes based on access policies defined by the patients. In order to protect confidential data, our solution involves the use of two types of chains: a private one, the sidechain, which keeps information about real ID of the patients, and a public one, the mainchain, which stores information about patients' health data marked with a temporary ID. To test it, we developed the design using Hyperledger Fabric framework. Presented experimental results show good performance of the system in relation to the following metrics: 1) the time needed to identify the medical data for a particular patient, and 2) the mainchain propagation time of all the blocks within the peer to peer network.
引用
收藏
页数:7
相关论文
共 17 条
[1]  
Amofa S., 2018, 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom), Ostrava, P1, DOI DOI 10.1109/HEALTHCOM.2018.8531160
[2]  
[Anonymous], 2017, P AMIA 2017 AM MED I
[3]  
[Anonymous], 2016, IEEE OPEN BIG DATA C
[4]  
[Anonymous], OP SOURC BLOCKCH FRA
[5]  
[Anonymous], FHIRCHAIN APPL BLOCK
[6]  
[Anonymous], NIST SPECIAL PUBLICA, V800-57, DOI [10.6028/NIST.SP.800-57pt3r1, DOI 10.6028/NIST.SP.800-57PT3R1]
[7]   Two-tier anomaly detection based on traffic profiling of the home automation system [J].
Gajewski, Mariusz ;
Batalla, Jordi Mongay ;
Levi, Albert ;
Togay, Cengiz ;
Mavromoustakis, Constandinos X. ;
Mastorakis, George .
COMPUTER NETWORKS, 2019, 158 :46-60
[8]  
Guo Rui, 2018, IEEE ACCESS
[9]  
Liang J, 2017, IEEE INT CON AUTO SC, P1, DOI 10.1109/COASE.2017.8256067
[10]   Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm [J].
Markakis, Evangelos ;
Nikoloudakis, Yannis ;
Mastorakis, George ;
Mavromoustakis, Constandinos X. ;
Pallis, Evangelos ;
Sideris, Anargyros ;
Zotos, Nikolaos ;
Antic, Jan ;
Cernivec, Ales ;
Fejzic, Diana ;
Kulovic, Joze ;
Zara, Antonio ;
Drosou, Anastasios ;
Giannoutakis, Konstantinos ;
Tzovaras, Dimitrios .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (02) :41-47