Skip to main content
Erschienen in: Journal of Medical Systems 2/2020

01.02.2020 | Systems-Level Quality Improvement

Design of a Secure Medical Data Sharing Scheme Based on Blockchain

verfasst von: Xu Cheng, Fulong Chen, Dong Xie, Hui Sun, Cheng Huang

Erschienen in: Journal of Medical Systems | Ausgabe 2/2020

Einloggen, um Zugang zu erhalten

Abstract

With the rapid development of technologies such as artificial intelligence, blockchain, cloud computing, and big data, Medical Cyber Physical Systems (MCPS) are increasingly demanding data security, while cloud storage solves the storage problem of complex medical data. However, it is difficult to realize data security sharing. The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process, and a network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, it can ensure that data can’t be tampered and untrackable. In the security authentication phase, bilinear mapping and intractable problems can be used to solve the security threat in the authentication process of medical data providers and users. It can avoid the credibility problem of the trusted third party, and also can realize the ?thyc=10?>two-way authentication between the hospital and blockchain node. Then, BAN logic is used to analyze security protocols, and formal analysis and comparison of security protocols are also made. The results show that the MCPS based on blockchain not only realizes medical treatment data sharing, but also meet the various security requirements in the security authentication phase. In addition, the storage and computing overhead costs is ideal. Therefore, the proposed scheme is more suitable for secure sharing of medical big data.
Literatur
1.
Zurück zum Zitat Lee, I., and Sokolsky, O., Medical cyber physical systems. In: IEEE International Conference and Workshops on Engineering of Computer Based Systems. IEEE, 2010, 743–748. Lee, I., and Sokolsky, O., Medical cyber physical systems. In: IEEE International Conference and Workshops on Engineering of Computer Based Systems. IEEE, 2010, 743–748.
2.
Zurück zum Zitat Haro, A., Flickner, M., and Essa, I., Detecting and tracking eyes by using their physiological properties, dynamics, and appearance. IEEE Conference on Computer Vision & Pattern Recognition. IEEE:163–168, 2010. Haro, A., Flickner, M., and Essa, I., Detecting and tracking eyes by using their physiological properties, dynamics, and appearance. IEEE Conference on Computer Vision & Pattern Recognition. IEEE:163–168, 2010.
3.
Zurück zum Zitat Saltzer, J. H., and Schroeder, M. D., The protection of information in computer systems. IEEE Csit Newsletter 63(9):1278–1308, 2005. Saltzer, J. H., and Schroeder, M. D., The protection of information in computer systems. IEEE Csit Newsletter 63(9):1278–1308, 2005.
4.
Zurück zum Zitat Ouaddah, A., Mousannif, H., and Ouahman, A. A., Access control models in IoT: The road ahead. In: Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of. IEEE, 2015, 1–2. Ouaddah, A., Mousannif, H., and Ouahman, A. A., Access control models in IoT: The road ahead. In: Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of. IEEE, 2015, 1–2.
5.
Zurück zum Zitat Lee, E. A., Cyber physical systems: Design challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC). IEEE, 2008, 363–369. Lee, E. A., Cyber physical systems: Design challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC). IEEE, 2008, 363–369.
6.
Zurück zum Zitat Tu, H., Kumar, N., Chilamkurti, N. et al., An improved authentication protocol for session initiation protocol using smart card. Peer. Peer. Netw. Appl. 8(5):903–910, 2014.CrossRef Tu, H., Kumar, N., Chilamkurti, N. et al., An improved authentication protocol for session initiation protocol using smart card. Peer. Peer. Netw. Appl. 8(5):903–910, 2014.CrossRef
7.
Zurück zum Zitat Xu, X., Zhu, P., Wen, Q. et al., A secure and efficient authentication and key agreement scheme based on ECC for Telecare medicine information systems. J. Med. Syst. 38(1):9994, 2014.CrossRef Xu, X., Zhu, P., Wen, Q. et al., A secure and efficient authentication and key agreement scheme based on ECC for Telecare medicine information systems. J. Med. Syst. 38(1):9994, 2014.CrossRef
8.
Zurück zum Zitat Chaudhry, S. A., Naqvi, H., Shon, T. et al., Cryptanalysis and improvement of an improved two factor authentication protocol for Telecare medical information systems. J. Med. Syst. 39(6):1–11, 2015.CrossRef Chaudhry, S. A., Naqvi, H., Shon, T. et al., Cryptanalysis and improvement of an improved two factor authentication protocol for Telecare medical information systems. J. Med. Syst. 39(6):1–11, 2015.CrossRef
9.
Zurück zum Zitat Islam, S. K., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014.CrossRef Islam, S. K., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014.CrossRef
10.
Zurück zum Zitat Zhang, F., Cecchetti, E., Croman, K. et al., Town crier: An authenticated data feed for smart contracts. In: The ACM Conference on Computer and Communications Security. ACM, 2016, 1–13. Zhang, F., Cecchetti, E., Croman, K. et al., Town crier: An authenticated data feed for smart contracts. In: The ACM Conference on Computer and Communications Security. ACM, 2016, 1–13.
11.
Zurück zum Zitat Liu, J., Zhang, Z., Chen, X. et al., Certificateless remote anonymous authentication schemes for WirelessBody area networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2013.CrossRef Liu, J., Zhang, Z., Chen, X. et al., Certificateless remote anonymous authentication schemes for WirelessBody area networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2013.CrossRef
12.
Zurück zum Zitat Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.CrossRef Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.CrossRef
13.
Zurück zum Zitat Al-Bassam, M., SCPKI: A smart contract-based PKI and identity system. In: ACM Workshop on Blockchain, Cryptocurrencies and Contracts. ACM, 2017, 35–40.CrossRef Al-Bassam, M., SCPKI: A smart contract-based PKI and identity system. In: ACM Workshop on Blockchain, Cryptocurrencies and Contracts. ACM, 2017, 35–40.CrossRef
14.
Zurück zum Zitat Alexopoulos, N., Daubert, J., Mühlhäuser, M. et al., Beyond the hype: On using Blockchains in Trust Management for Authentication.Trustcom/BigDataSE/ICESS, 2017 IEEE. In: IEEE, 2017, 546–553. Alexopoulos, N., Daubert, J., Mühlhäuser, M. et al., Beyond the hype: On using Blockchains in Trust Management for Authentication.Trustcom/BigDataSE/ICESS, 2017 IEEE. In: IEEE, 2017, 546–553.
15.
Zurück zum Zitat Pramuditha, P., and Patel, V. M., Face-based multiple user active authentication on mobile devices. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(5):1240–1250, 2019.CrossRef Pramuditha, P., and Patel, V. M., Face-based multiple user active authentication on mobile devices. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(5):1240–1250, 2019.CrossRef
16.
Zurück zum Zitat Lin, C., He, D., Huang, X. et al., A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access 6:28203–28212, 2018.CrossRef Lin, C., He, D., Huang, X. et al., A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access 6:28203–28212, 2018.CrossRef
17.
Zurück zum Zitat Kai, F., Shangyang, W., Yanhui, R. et al., MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 42(8):136–146, 2018.CrossRef Kai, F., Shangyang, W., Yanhui, R. et al., MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 42(8):136–146, 2018.CrossRef
18.
Zurück zum Zitat Hongyu, L., Liehuang, Z., Meng, S. et al., Blockchain-based data preservation system for medical data. J. Med. Syst. 42(8):141–153, 2018.CrossRef Hongyu, L., Liehuang, Z., Meng, S. et al., Blockchain-based data preservation system for medical data. J. Med. Syst. 42(8):141–153, 2018.CrossRef
19.
Zurück zum Zitat Liang, X., Shetty, S., Tosh, D. et al., ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: IEEE/ACM International Symposium on Cluster, 2017, 468–477. Liang, X., Shetty, S., Tosh, D. et al., ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: IEEE/ACM International Symposium on Cluster, 2017, 468–477.
20.
Zurück zum Zitat Yang, J. J., Li, J. Q., and Niu, Y., A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45):74–86, 2015.CrossRef Yang, J. J., Li, J. Q., and Niu, Y., A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45):74–86, 2015.CrossRef
21.
Zurück zum Zitat Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 23(5):1–13, 1989. Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 23(5):1–13, 1989.
22.
Zurück zum Zitat Kumar, P., and Lee, H. J., Cryptanalysis on two user authentication protocols using Smart card or wireless sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 2011, 241–245. Kumar, P., and Lee, H. J., Cryptanalysis on two user authentication protocols using Smart card or wireless sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 2011, 241–245.
23.
Zurück zum Zitat Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.CrossRef Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.CrossRef
24.
Zurück zum Zitat Xiong, X., Wong, D., and Deng, T., TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Commun. Netw. Conf. (WCNC’10), 2010, 1–6. Xiong, X., Wong, D., and Deng, T., TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Commun. Netw. Conf. (WCNC’10), 2010, 1–6.
25.
Zurück zum Zitat Chen, F., Luo, Y., Zhang, J. et al., An infrastructure framework for privacy protection of community medical internet of things. World Wide Web 21(1):33–57, 2018.CrossRef Chen, F., Luo, Y., Zhang, J. et al., An infrastructure framework for privacy protection of community medical internet of things. World Wide Web 21(1):33–57, 2018.CrossRef
Metadaten
Titel
Design of a Secure Medical Data Sharing Scheme Based on Blockchain
verfasst von
Xu Cheng
Fulong Chen
Dong Xie
Hui Sun
Cheng Huang
Publikationsdatum
01.02.2020
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 2/2020
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-019-1468-1

Weitere Artikel der Ausgabe 2/2020

Journal of Medical Systems 2/2020 Zur Ausgabe