A blockchain-based framework for electronic medical records sharing with fine-grained access control

被引:32
作者
Sun, Jin [1 ]
Ren, Lili [1 ]
Wang, Shangping [1 ]
Yao, Xiaomin [1 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian, Shaanxi, Peoples R China
来源
PLOS ONE | 2020年 / 15卷 / 10期
基金
中国国家自然科学基金;
关键词
SERVICE; SECURE;
D O I
10.1371/journal.pone.0239946
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the medical system, the verification, preservation and synchronization of electronic medical records has always been a difficult problem, and the random dissemination of patient records will bring various risks to patient privacy. Therefore, how to achieve secure data sharing on the basis of ensuring users' personal privacy becomes the key. In recent years, blockchain has been proposed to be a promising solution to achieve data sharing with security and privacy preservation due to its advantages of immutability. So, a distributed electronic medical records searchable scheme was proposed by leveraging blockchain and smart contract technology. Firstly, we perform a hash calculation on the electronic medical data and store the corresponding value on the blockchain to ensure its integrity and authenticity. Then, we encrypt the electronic medical data and store it in the interplanetary file system which is a distributed storage protocol. These operations not only can solve centralized data store of servers of several medical institutions, but also be good at lowering stress from data store and high-frequency access to blockchain. Secondly, the encrypted keyword index information of electronic medical records was stored on the Ethereum blockchain, meanwhile a smart contract deployed in the Ethereum blockchain is used to realize keyword search instead of depending on a centralized third party. Furthermore, we use attribute-based encryption scheme to ensure that only the attributes meeting the access policy can decrypt the encrypted electronic medical records. Finally, our performance analysis and security analysis show that the scheme is secure and efficient.
引用
收藏
页数:23
相关论文
共 32 条
  • [1] Adi S, 1985, IDENTITY BASED CRYPT, P47
  • [2] [Anonymous], 2017, NATURE COMMUNICATION, V8, P1, DOI 10.4172/2155-9929.S2-026
  • [3] [Anonymous], 2005, MATH IISC ERNET, DOI DOI 10.1109/ISCC.2011.5983948
  • [4] [Anonymous], 2017, SEARCHABLE SYMMETRIC
  • [5] Au M H, 2017, J COMPUTER SYSTEM SC, pS0022000017300296
  • [6] Danan T, 2014, SECURE MULTIPARTY DA, P224
  • [7] Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
    Dong, Xin
    Yu, Jiadi
    Luo, Yuan
    Chen, Yingying
    Xue, Guangtao
    Li, Minglu
    [J]. COMPUTERS & SECURITY, 2014, 42 : 151 - 164
  • [8] Fernandez-Carames T. M., 2018, IEEE Access
  • [9] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [10] Guy Z, 2015, DECENTRALIZING PRIVA, P180