Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain

被引:223
作者
Wang, Hao [1 ]
Song, Yujiao [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
EHR; Attribute-based cryptosystem; Blockchain; Cloud storage; ELECTRONIC HEALTH RECORDS; IDENTITY-BASED ENCRYPTION; SCHEME; HIBE;
D O I
10.1007/s10916-018-0994-6
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained access control, we propose a secure electronic health record (EHR) system based on attribute-based cryptosystem and blockchain technology. In our system, we use attribute-based encryption (ABE) and identity-based encryption (IBE) to encrypt medical data, and use identity-based signature (IBS) to implement digital signatures. To achieve different functions of ABE, IBE and IBS in one cryptosystem, we introduce a new cryptographic primitive, called combined attribute-based/identity-based encryption and signature (C-AB/IB-ES). This greatly facilitates the management of the system, and does not need to introduce different cryptographic systems for different security requirements. In addition, we use blockchain techniques to ensure the integrity and traceability of medical data. Finally, we give a demonstrating application for medical insurance scene.
引用
收藏
页数:9
相关论文
共 40 条
[1]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]  
Alshehri S., 2012, Proceedings of the 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), P143, DOI 10.1109/ICDEW.2012.68
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[6]  
Boyen X, 2010, INFORM SEC CRYPT TEX, P195, DOI 10.1007/978-3-540-89411-7_10
[7]  
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[8]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[9]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[10]   Community-wide Implementation of Health Information Technology: The Massachusetts eHealth Collaborative Experience [J].
Goroll, Allan H. ;
Simon, Steven R. ;
Tripathi, Micky ;
Ascenzo, Carl ;
Bates, David W. .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2009, 16 (01) :132-139