Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

09.11.2020

A Secure Online Treatment Blockchain Service

verfasst von: Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the telecare medicine information system (TMIS), to acquire the medical data, the patients need to log in to the remote medical server. Usually, each hospital has its server and they would not like to share the data with other hospitals. However, the patients are likely to upload their data to the different medical servers. In this case, since the patients have to register for these medical servers, they will need to save many keys for these servers. Hence, it is inconvenient for the patients to use these data. Moreover, the data may be tampered or deleted by an attacker or malicious staff in hospitals. To resolve these problems, we use blockchain to design a privacy-preserving scheme for TMIS. We integrate cryptography (broadcast encryption and Merkle tree) to construct our scheme. Moreover, we utilize the provable security theory to prove the security of our scheme. The security analysis indicates that the proposed scheme achieves privacy protection for the patients.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cisotto, G., Casarin, E., & Tomasin, S. (2020). Requirements and enablers of advanced healthcare services over future cellular systems. IEEE Communications Magazine, 58(3), 76–81. CrossRef Cisotto, G., Casarin, E., & Tomasin, S. (2020). Requirements and enablers of advanced healthcare services over future cellular systems. IEEE Communications Magazine, 58(3), 76–81. CrossRef
2.
Zurück zum Zitat Esmaeilzadeh, P. (2020). The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention. Computers & Security, 95, 101819. CrossRef Esmaeilzadeh, P. (2020). The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention. Computers & Security, 95, 101819. CrossRef
3.
Zurück zum Zitat Salem, F. M., & Amin, R. (2020). A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Information Sciences, 527, 382–393. MathSciNetCrossRef Salem, F. M., & Amin, R. (2020). A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Information Sciences, 527, 382–393. MathSciNetCrossRef
4.
Zurück zum Zitat Sureshkumar, V., Amin, R., Obaidat, M. S., & Karthikeyan, I. (2020). An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. Journal of Information Security and Applications, 53, 102539. CrossRef Sureshkumar, V., Amin, R., Obaidat, M. S., & Karthikeyan, I. (2020). An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. Journal of Information Security and Applications, 53, 102539. CrossRef
5.
Zurück zum Zitat Office for Civil Rights, Department of Health and Human Services. (2002). Standards for privacy of individually identifiable health information. Final rule. Federal Register, 67(157), 53182–53272. Office for Civil Rights, Department of Health and Human Services. (2002). Standards for privacy of individually identifiable health information. Final rule. Federal Register, 67(157), 53182–53272.
7.
Zurück zum Zitat Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., & Titouna, F. (2020). A privacy-preserving cryptosystem for IoT e-healthcare. Information Sciences, 527, 493–510. MathSciNetCrossRef Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., & Titouna, F. (2020). A privacy-preserving cryptosystem for IoT e-healthcare. Information Sciences, 527, 493–510. MathSciNetCrossRef
8.
Zurück zum Zitat Ermakova, T., Fabian, B., Kornacka, M., Thiebes, S., & Sunyaev, A. (2020). Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a Patient Perspective. ACM Transactions on Management Information Systems, 11(2), 6:1–6:29. CrossRef Ermakova, T., Fabian, B., Kornacka, M., Thiebes, S., & Sunyaev, A. (2020). Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a Patient Perspective. ACM Transactions on Management Information Systems, 11(2), 6:1–6:29. CrossRef
9.
Zurück zum Zitat Tang, F., Ma, S., Xiang, Y., & Lin, C. L. (2019). An efficient authentication scheme for blockchain-based electronic health records. IEEE Access, 7, 41678–41689. CrossRef Tang, F., Ma, S., Xiang, Y., & Lin, C. L. (2019). An efficient authentication scheme for blockchain-based electronic health records. IEEE Access, 7, 41678–41689. CrossRef
10.
Zurück zum Zitat Wang, H., & Song, Y. J. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 42(8), 152:1–152:9. MathSciNetCrossRef Wang, H., & Song, Y. J. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 42(8), 152:1–152:9. MathSciNetCrossRef
12.
Zurück zum Zitat Butpheng, C., Yeh, K. H., & Xiong, H. (2020). Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry, 12(7), 1191. CrossRef Butpheng, C., Yeh, K. H., & Xiong, H. (2020). Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry, 12(7), 1191. CrossRef
13.
Zurück zum Zitat Aguiar, E. J. D., Faiçal, B. S., Krishnamachari, B., & Ueyama, J. (2020). A survey of blockchain-based strategies for healthcare. ACM Computing Surveys, 53(2), 27:1–27:27. CrossRef Aguiar, E. J. D., Faiçal, B. S., Krishnamachari, B., & Ueyama, J. (2020). A survey of blockchain-based strategies for healthcare. ACM Computing Surveys, 53(2), 27:1–27:27. CrossRef
15.
Zurück zum Zitat Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., et al. (2014). Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE Symposium on Security and Privacy (pp. 459–474). Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., et al. (2014). Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE Symposium on Security and Privacy (pp. 459–474).
16.
Zurück zum Zitat Ruffing, T., Moreno-Sanchez, P., & Kate, A. (2014). CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security (pp. 345–364). Ruffing, T., Moreno-Sanchez, P., & Kate, A. (2014). CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security (pp. 345–364).
17.
Zurück zum Zitat Danezis, G., Fournet, C., Kohlweiss, M., & Parno, B. (2013) . Pinocchio coin: Building zerocoin from a succinct pairing-based proof system. In PETShop’13 Proceedings of the first ACM workshop on language support for privacy-enhancing technologies (pp. 27–30). Danezis, G., Fournet, C., Kohlweiss, M., & Parno, B. (2013) . Pinocchio coin: Building zerocoin from a succinct pairing-based proof system. In PETShop’13 Proceedings of the first ACM workshop on language support for privacy-enhancing technologies (pp. 27–30).
18.
Zurück zum Zitat Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858). Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858).
19.
Zurück zum Zitat Green, M., & M & Miers, I., (2017). Bolt: Anonymous payment channels for decentralized currencies. In ACM Sigsac Conference on Computer and Communications Security (pp. 473–489). Green, M., & M & Miers, I., (2017). Bolt: Anonymous payment channels for decentralized currencies. In ACM Sigsac Conference on Computer and Communications Security (pp. 473–489).
20.
Zurück zum Zitat Huang, K., Zhang, X. S., Mu, Y., Rezaeibagha, F., Du, X. J., & Guizani, N. (2020). Achieving intelligent trust-layer for Internet-of-Things via self-redactable blockchain. IEEE Transactions on Industrial Informatics, 16(4), 2677–2686. CrossRef Huang, K., Zhang, X. S., Mu, Y., Rezaeibagha, F., Du, X. J., & Guizani, N. (2020). Achieving intelligent trust-layer for Internet-of-Things via self-redactable blockchain. IEEE Transactions on Industrial Informatics, 16(4), 2677–2686. CrossRef
21.
Zurück zum Zitat Ge, C. P., Liu, Z., & Fang, L. M. (2020). A blockchain based decentralized data security mechanism for the Internet of Things. Journal of Parallel and Distributed Computing, 141, 1–9. CrossRef Ge, C. P., Liu, Z., & Fang, L. M. (2020). A blockchain based decentralized data security mechanism for the Internet of Things. Journal of Parallel and Distributed Computing, 141, 1–9. CrossRef
22.
Zurück zum Zitat Gai, K. K., Wu, Y. L., Zhu, L. H., Zhang, Z. J., & Qiu, M. K. (2020). Differential privacy-based blockchain for industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 16(6), 4156–4165. CrossRef Gai, K. K., Wu, Y. L., Zhu, L. H., Zhang, Z. J., & Qiu, M. K. (2020). Differential privacy-based blockchain for industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 16(6), 4156–4165. CrossRef
23.
Zurück zum Zitat Wilkinson, S., Boshevski, T., Brandoff, T., & Buterin, V., (2014). Storj: a peer-to- peer cloud storage network, The whitepaper is Storj Labs, Atlanta, GA, USA, Tech. Rep., Accessed 10 Jan 2019. [Online]. Available: https://​storj.​io/​storj.​pdf. Wilkinson, S., Boshevski, T., Brandoff, T., & Buterin, V., (2014). Storj: a peer-to- peer cloud storage network, The whitepaper is Storj Labs, Atlanta, GA, USA, Tech. Rep., Accessed 10 Jan 2019. [Online]. Available: https://​storj.​io/​storj.​pdf.
24.
Zurück zum Zitat McGhin, T., Choo, K. K. R., Liu, C. Z., & He, D. B. (2019). Blockchain in healthcare applications: Research challenges and opportunities. Journal of Network and Computer Applications, 135, 62–75. CrossRef McGhin, T., Choo, K. K. R., Liu, C. Z., & He, D. B. (2019). Blockchain in healthcare applications: Research challenges and opportunities. Journal of Network and Computer Applications, 135, 62–75. CrossRef
25.
Zurück zum Zitat Miller, A., Juels, A., Shi, E., Parno, B., & Katz, J. (2014). Permacoin: Repurposing Bitcoin work for data preservation. In IEEE Symposium on Security and Privacy (pp. 475–490). Miller, A., Juels, A., Shi, E., Parno, B., & Katz, J. (2014). Permacoin: Repurposing Bitcoin work for data preservation. In IEEE Symposium on Security and Privacy (pp. 475–490).
26.
Zurück zum Zitat Boneh, D., Gentry, C., & Waters, B. (2005). Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO (pp. 258–275). Boneh, D., Gentry, C., & Waters, B. (2005). Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO (pp. 258–275).
27.
Zurück zum Zitat Gentry, C., & Waters, B. (2009). Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology-EUROCRYPT (pp. 171–188). Gentry, C., & Waters, B. (2009). Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology-EUROCRYPT (pp. 171–188).
28.
Zurück zum Zitat Kim, J., Susilo, W., Au, M. H., & Seberry, J. (2015). Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10(3), 679–693. CrossRef Kim, J., Susilo, W., Au, M. H., & Seberry, J. (2015). Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10(3), 679–693. CrossRef
29.
Zurück zum Zitat Guo, D. L., Wen, Q. Y., Li, W. M., Zhang, H., & Jin, Z. P. (2016). Adaptively secure broadcast encryption with constant ciphertexts. IEEE Transactions on Broadcasting, 62(3), 709–715. CrossRef Guo, D. L., Wen, Q. Y., Li, W. M., Zhang, H., & Jin, Z. P. (2016). Adaptively secure broadcast encryption with constant ciphertexts. IEEE Transactions on Broadcasting, 62(3), 709–715. CrossRef
30.
Zurück zum Zitat Merkle, R. C. (1980). Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy (pp. 122–134). Merkle, R. C. (1980). Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy (pp. 122–134).
31.
Zurück zum Zitat Sander, T., & Ta-Shma, A. (1999). Auditable, anonymous electronic cash. In Advances in Cryptology-CRYPTO (pp. 555–572). Sander, T., & Ta-Shma, A. (1999). Auditable, anonymous electronic cash. In Advances in Cryptology-CRYPTO (pp. 555–572).
32.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM (pp. 1–9). Wang, C., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM (pp. 1–9).
33.
Zurück zum Zitat Zhou, L. J., Wang, L. C., & Sun, Y. R. (2018). MIStore: A blockchain-based medical insurance storage system. Journal of Medical Systems, 42(8), 149:1–149:17. CrossRef Zhou, L. J., Wang, L. C., & Sun, Y. R. (2018). MIStore: A blockchain-based medical insurance storage system. Journal of Medical Systems, 42(8), 149:1–149:17. CrossRef
Metadaten
Titel
A Secure Online Treatment Blockchain Service
verfasst von
Hao Lin
Hua Zhang
Hanbing Yan
Huawei Wang
Yijie Shi
Fei Gao
Qiaoyan Wen
Publikationsdatum
09.11.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07945-4

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe