Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach

被引:140
作者
Tan, Liang [1 ,2 ]
Yu, Keping [3 ]
Shi, Na [1 ]
Yang, Caixia [1 ]
Wei, Wei [4 ]
Lu, Huimin [5 ]
机构
[1] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610101, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[3] Waseda Univ, Global Informat & Telecommun Inst, Tokyo 1698555, Japan
[4] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
[5] Kyushu Inst Technol, Kitakyushu, Fukuoka 8048550, Japan
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2022年 / 9卷 / 01期
基金
中国国家自然科学基金; 日本学术振兴会;
关键词
COVID-19; Blockchains; Encryption; Privacy; Hospitals; Outsourcing; Authorization; Blockchain; security and privacy protection; traceable and revocation; electronic medical records; ATTRIBUTE-BASED ENCRYPTION; ACCESS-CONTROL; LIGHTWEIGHT; REVOCATION; SCHEME;
D O I
10.1109/TNSE.2021.3101842
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
COVID-19 is currently a major global public health challenge. In the battle against the outbreak of COVID-19, how to manage and share the COVID-19 Electric Medical Records (CEMRs) safely and effectively in the world, prevent malicious users from tampering with CEMRs, and protect the privacy of patients are very worthy of attention. In particular, the semi-trusted medical cloud platform has become the primary means of hospital medical data management and information services. Security and privacy issues in the medical cloud platform are more prominent and should be addressed with priority. To address these issues, on the basis of ciphertext policy attribute-based encryption, we propose a blockchain-empowered security and privacy protection scheme with traceable and direct revocation for COVID-19 medical records. In this scheme, we perform the blockchain for uniform identity authentication and all public keys, revocation lists, etc are stored on a blockchain. The system manager server is responsible for generating the system parameters and publishes the private keys for the COVID-19 medical practitioners and users. The cloud service provider (CSP) stores the CEMRs and generates the intermediate decryption parameters using policy matching. The user can calculate the decryption key if the user has private keys and intermediate decrypt parameters. Only when attributes are satisfied access policy and the user's identity is out of the revocation list, the user can get the intermediate parameters by CSP. The malicious users may track according to the tracking list and can be directly revoked. The security analysis demonstrates that the proposed scheme is indicated to be safe under the Decision Bilinear Diffie-Hellman (DBDH) assumption and can resist many attacks. The simulation experiment demonstrates that the communication and storage overhead is less than other schemes in the public-private key generation, CEMRs encryption, and decryption stages. Besides, we also verify that the proposed scheme works well in the blockchain in terms of both throughput and delay.
引用
收藏
页码:271 / 281
页数:11
相关论文
共 41 条
  • [1] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [2] [Anonymous], 2011, DATACLOUD 11 PROC 2
  • [3] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
  • [4] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
  • [5] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    [J]. International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Bresnahan T, 2010, HBK ECON, V2, P761, DOI 10.1016/S0169-7218(10)02002-2
  • [8] Burniske C., 2016, BLOCKCHAIN TECHNOLOG
  • [9] MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain
    Fan, Kai
    Wang, Shangyang
    Ren, Yanhui
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (08)
  • [10] Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach
    Feng, Chaosheng
    Yu, Keping
    Bashir, Ali Kashif
    Al-Otaibi, Yasser D.
    Lu, Yang
    Chen, Shengbo
    Zhang, Di
    [J]. IEEE NETWORK, 2021, 35 (01): : 130 - 137