Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain

被引:145
作者
Cao, Sheng [1 ,2 ]
Zhang, Gexiang [3 ]
Liu, Pengfei [4 ]
Zhang, Xiaosong [2 ,4 ]
Neri, Ferrante [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[3] Southwest Jiaotong Univ, Sch Elect Engn, Chengdu 610031, Sichuan, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[5] De Montfort Univ, Inst Artificial Intelligence, Sch Comp Sci & Informat, Leicester, Leics, England
基金
中国国家自然科学基金;
关键词
Blockchain; eHealth systems; Electronic health record; KEY MANAGEMENT SCHEME; ENCRYPTION; EFFICIENT; PRIVACY; DEDUPLICATION;
D O I
10.1016/j.ins.2019.02.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide deployment of cloud-assisted electronic health (eHealth) systems has already shown great benefits in managing electronic health records (EHRs) for both medical institutions and patients. However, it also causes critical security concerns. Since once a medical institution generates and outsources the patients' EHRs to cloud servers, patients would not physically own their EHRs but the medical institution can access the EHRs as needed for diagnosing, it makes the EHRs integrity protection a formidable task, especially in the case that a medical malpractice occurs, where the medical institution may collude with the cloud server to tamper with the outsourced EHRs to hide the medical malpractice. Traditional cryptographic primitives for the purpose of data integrity protection cannot be directly adopted because they cannot ensure the security in the case of collusion between the cloud server and medical institution. In this paper, a secure cloud-assisted eHealth system is proposed to protect outsourced EHRs from illegal modification by using the blockchain technology (blockchain-based currencies, e.g., Ethereum). The key idea is that the EHRs only can be outsourced by authenticated participants and each operation on outsourcing EHRs is integrated into the public blockchain as a transaction. Since the blockchain-based currencies provide a tamper-proofing way to conduct transactions without a central authority, the EHRs cannot be modified after the corresponding transaction is recorded into the blockchain. Therefore, given outsourced EHRs, any participant can check their integrity by checking the corresponding transaction. Security analysis and performance evaluation demonstrate that the proposed system can provide a strong security guarantee with a high efficiency. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:427 / 440
页数:14
相关论文
共 46 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
[2]   A novel algorithm to detect glaucoma risk using texton and local configuration pattern features extracted from fundus images [J].
Acharya, U. Rajendra ;
Bhat, Shreya ;
Koh, Joel E. W. ;
Bhandary, Sulatha V. ;
Adeli, Hojjat .
COMPUTERS IN BIOLOGY AND MEDICINE, 2017, 88 :72-83
[3]  
[Anonymous], 2018, SOFT COMPUT
[4]   Outsourced Proofs of Retrievability [J].
Armknecht, Frederik ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Liu, Zongren ;
Reuter, Christian A. .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :831-843
[5]   MedRec: Using Blockchain for Medical Data Access and Permission Management [J].
Azaria, Asaph ;
Ekblaw, Ariel ;
Vieira, Thiago ;
Lippman, Andrew .
PROCEEDINGS 2016 2ND INTERNATIONAL CONFERENCE ON OPEN AND BIG DATA - OBD 2016, 2016, :25-30
[6]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration [J].
Cai, X. T. ;
Wang, S. ;
Lu, X. ;
Li, W. D. ;
Liang, Y. W. .
INTEGRATED COMPUTER-AIDED ENGINEERING, 2017, 24 (02) :129-142
[10]   Efficient design assessment in the railway electric infrastructure domain using cloud computing [J].
Caino-Lores, Silvina ;
Garcia, Alberto ;
Garcia-Carballeira, Felix ;
Carretero, Jesus .
INTEGRATED COMPUTER-AIDED ENGINEERING, 2017, 24 (01) :57-72