Skip to main content
Erschienen in: Journal of Medical Systems 8/2018

01.08.2018 | Systems-Level Quality Improvement

Blockchain-Based Data Preservation System for Medical Data

verfasst von: Hongyu Li, Liehuang Zhu, Meng Shen, Feng Gao, Xiaoling Tao, Sheng Liu

Erschienen in: Journal of Medical Systems | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Abstract

Medical care has become an indispensable part of people’s lives, with a dramatic increase in the volume of medical data (e.g., diagnosis certificates and medical records). Medical data, however, is easily stolen, tampered with, or even completely deleted. If the above occurs, medical data cannot be recorded or retrieved in a reliable manner, resulting in delay treatment progress, even endanger the patient’s life. In this paper, we propose a novel blockchain-based data preservation system (DPS) for medical data. To provide a reliable storage solution to ensure the primitiveness and verifiability of stored data while preserving privacy for users, we leverage the blockchain framework. With the proposed DPS, users can preserve important data in perpetuity, and the originality of the data can be verified if tampering is suspected. In addition, we use prudent data storage strategies and a variety of cryptographic algorithms to guarantee user privacy; e.g., an adversary is unable to read the plain text even if the data are stolen. We implement a prototype of the DPS based on the real world blockchain-based platform Ethereum. Performance evaluation results demonstrate the effectiveness and efficiency of the proposed system.
Literatur
4.
Zurück zum Zitat Miller, A., Juels, A., Shi, E., Parno, B., and Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy, pp. 475–490, 2014. Miller, A., Juels, A., Shi, E., Parno, B., and Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy, pp. 475–490, 2014.
5.
Zurück zum Zitat Swan, M., Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015. Swan, M., Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015.
6.
Zurück zum Zitat Wijaya, D. A.: Extending asset management system functionality in bitcoin platform. In: 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 97–101, 2016. Wijaya, D. A.: Extending asset management system functionality in bitcoin platform. In: 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 97–101, 2016.
7.
Zurück zum Zitat Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, 2008 Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, 2008
8.
Zurück zum Zitat Raghav, S., and Saxena, A. K.: Mobile forensics: Guidelines and challenges in data preservation and acquisition. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 5–8, 2009. Raghav, S., and Saxena, A. K.: Mobile forensics: Guidelines and challenges in data preservation and acquisition. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 5–8, 2009.
9.
Zurück zum Zitat Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., and Felten, E. W.: Research perspectives and challenges for bitcoin and cryptocurrencies, vol. to appear, pp. 104–121, 2015 Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., and Felten, E. W.: Research perspectives and challenges for bitcoin and cryptocurrencies, vol. to appear, pp. 104–121, 2015
11.
Zurück zum Zitat Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’16. https://doi.org/10.1145/2976749.2978341, pp. 3–16. ACM, New York, 2016. Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’16. https://​doi.​org/​10.​1145/​2976749.​2978341, pp. 3–16. ACM, New York, 2016.
12.
Zurück zum Zitat Back, A.: Hashcash - a denial of service counter-measure. In: USENIX Technical Conference, Conference Proceedings, 2002 Back, A.: Hashcash - a denial of service counter-measure. In: USENIX Technical Conference, Conference Proceedings, 2002
15.
Zurück zum Zitat Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858, 2016. Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858, 2016.
17.
Zurück zum Zitat Wood, G., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32, 2014. Wood, G., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32, 2014.
18.
Zurück zum Zitat Christidis, K., and Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303, 2016.CrossRef Christidis, K., and Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303, 2016.CrossRef
20.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. https://doi.org/10.1145/1315245.1315318, pp. 598–609. ACM, New York, 2007. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. https://​doi.​org/​10.​1145/​1315245.​1315318, pp. 598–609. ACM, New York, 2007.
21.
Zurück zum Zitat Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., and Hu, J., Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940–953, 2018.CrossRef Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., and Hu, J., Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940–953, 2018.CrossRef
22.
Zurück zum Zitat Zhu, L., Tang, X., Shen, M., Du, X., and Guizani, M., Privacy-preserving ddos attack detection using cross-domain traffic in software defined networks. IEEE J. Sel. Areas Commun. 36(3):628–643, 2018.CrossRef Zhu, L., Tang, X., Shen, M., Du, X., and Guizani, M., Privacy-preserving ddos attack detection using cross-domain traffic in software defined networks. IEEE J. Sel. Areas Commun. 36(3):628–643, 2018.CrossRef
23.
Zurück zum Zitat Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8):1830–1843, 2017.CrossRef Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8):1830–1843, 2017.CrossRef
25.
Zurück zum Zitat Cheng, H., Rong, C., Hwang, K., Wang, W., and Li, Y., Secure big data storage and sharing scheme for cloud tenants. China Communications 12(6):106–115, 2015.CrossRef Cheng, H., Rong, C., Hwang, K., Wang, W., and Li, Y., Secure big data storage and sharing scheme for cloud tenants. China Communications 12(6):106–115, 2015.CrossRef
26.
Zurück zum Zitat McConaghy, T., Marques, R., and Müller, A.: Bigchaindb: A scalable blockchain database, 2016 McConaghy, T., Marques, R., and Müller, A.: Bigchaindb: A scalable blockchain database, 2016
27.
Zurück zum Zitat Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments, 2017 Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments, 2017
29.
Zurück zum Zitat Bengtsson, S., and Solheim, B., Enforcement of data protection, privacy and security in medical informatics. MEDINFO 92:6–10, 1992. Bengtsson, S., and Solheim, B., Enforcement of data protection, privacy and security in medical informatics. MEDINFO 92:6–10, 1992.
33.
Zurück zum Zitat Arent, L. M., Brownstone, R. D., and Fenwick, W. A., Ediscovery: Preserving, requesting & producing electronic information. Santa Clara Computer & High Tech. LJ 19:131, 2002. Arent, L. M., Brownstone, R. D., and Fenwick, W. A., Ediscovery: Preserving, requesting & producing electronic information. Santa Clara Computer & High Tech. LJ 19:131, 2002.
34.
Zurück zum Zitat Cooper, B. F., and Garcia-Molina, H.: Bidding for storage space in a peer-to-peer data preservation system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 372–381, 2002. Cooper, B. F., and Garcia-Molina, H.: Bidding for storage space in a peer-to-peer data preservation system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 372–381, 2002.
35.
Zurück zum Zitat Wang, H., He, D., and Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Futur. Gener. Comput. Syst., 2017 Wang, H., He, D., and Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Futur. Gener. Comput. Syst., 2017
Metadaten
Titel
Blockchain-Based Data Preservation System for Medical Data
verfasst von
Hongyu Li
Liehuang Zhu
Meng Shen
Feng Gao
Xiaoling Tao
Sheng Liu
Publikationsdatum
01.08.2018
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 8/2018
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-018-0997-3

Weitere Artikel der Ausgabe 8/2018

Journal of Medical Systems 8/2018 Zur Ausgabe