Skip to main content

Advertisement

Log in

Design of a Secure Medical Data Sharing Scheme Based on Blockchain

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With the rapid development of technologies such as artificial intelligence, blockchain, cloud computing, and big data, Medical Cyber Physical Systems (MCPS) are increasingly demanding data security, while cloud storage solves the storage problem of complex medical data. However, it is difficult to realize data security sharing. The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process, and a network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, it can ensure that data can’t be tampered and untrackable. In the security authentication phase, bilinear mapping and intractable problems can be used to solve the security threat in the authentication process of medical data providers and users. It can avoid the credibility problem of the trusted third party, and also can realize the ?thyc=10?>two-way authentication between the hospital and blockchain node. Then, BAN logic is used to analyze security protocols, and formal analysis and comparison of security protocols are also made. The results show that the MCPS based on blockchain not only realizes medical treatment data sharing, but also meet the various security requirements in the security authentication phase. In addition, the storage and computing overhead costs is ideal. Therefore, the proposed scheme is more suitable for secure sharing of medical big data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lee, I., and Sokolsky, O., Medical cyber physical systems. In: IEEE International Conference and Workshops on Engineering of Computer Based Systems. IEEE, 2010, 743–748.

    Google Scholar 

  2. Haro, A., Flickner, M., and Essa, I., Detecting and tracking eyes by using their physiological properties, dynamics, and appearance. IEEE Conference on Computer Vision & Pattern Recognition. IEEE:163–168, 2010.

  3. Saltzer, J. H., and Schroeder, M. D., The protection of information in computer systems. IEEE Csit Newsletter 63(9):1278–1308, 2005.

    Google Scholar 

  4. Ouaddah, A., Mousannif, H., and Ouahman, A. A., Access control models in IoT: The road ahead. In: Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of. IEEE, 2015, 1–2.

    Google Scholar 

  5. Lee, E. A., Cyber physical systems: Design challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC). IEEE, 2008, 363–369.

    Google Scholar 

  6. Tu, H., Kumar, N., Chilamkurti, N. et al., An improved authentication protocol for session initiation protocol using smart card. Peer. Peer. Netw. Appl. 8(5):903–910, 2014.

    Article  Google Scholar 

  7. Xu, X., Zhu, P., Wen, Q. et al., A secure and efficient authentication and key agreement scheme based on ECC for Telecare medicine information systems. J. Med. Syst. 38(1):9994, 2014.

    Article  Google Scholar 

  8. Chaudhry, S. A., Naqvi, H., Shon, T. et al., Cryptanalysis and improvement of an improved two factor authentication protocol for Telecare medical information systems. J. Med. Syst. 39(6):1–11, 2015.

    Article  Google Scholar 

  9. Islam, S. K., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014.

    Article  Google Scholar 

  10. Zhang, F., Cecchetti, E., Croman, K. et al., Town crier: An authenticated data feed for smart contracts. In: The ACM Conference on Computer and Communications Security. ACM, 2016, 1–13.

    Google Scholar 

  11. Liu, J., Zhang, Z., Chen, X. et al., Certificateless remote anonymous authentication schemes for WirelessBody area networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2013.

    Article  Google Scholar 

  12. Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.

    Article  Google Scholar 

  13. Al-Bassam, M., SCPKI: A smart contract-based PKI and identity system. In: ACM Workshop on Blockchain, Cryptocurrencies and Contracts. ACM, 2017, 35–40.

    Chapter  Google Scholar 

  14. Alexopoulos, N., Daubert, J., Mühlhäuser, M. et al., Beyond the hype: On using Blockchains in Trust Management for Authentication.Trustcom/BigDataSE/ICESS, 2017 IEEE. In: IEEE, 2017, 546–553.

    Google Scholar 

  15. Pramuditha, P., and Patel, V. M., Face-based multiple user active authentication on mobile devices. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(5):1240–1250, 2019.

    Article  Google Scholar 

  16. Lin, C., He, D., Huang, X. et al., A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access 6:28203–28212, 2018.

    Article  Google Scholar 

  17. Kai, F., Shangyang, W., Yanhui, R. et al., MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 42(8):136–146, 2018.

    Article  Google Scholar 

  18. Hongyu, L., Liehuang, Z., Meng, S. et al., Blockchain-based data preservation system for medical data. J. Med. Syst. 42(8):141–153, 2018.

    Article  Google Scholar 

  19. Liang, X., Shetty, S., Tosh, D. et al., ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: IEEE/ACM International Symposium on Cluster, 2017, 468–477.

    Google Scholar 

  20. Yang, J. J., Li, J. Q., and Niu, Y., A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45):74–86, 2015.

    Article  Google Scholar 

  21. Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 23(5):1–13, 1989.

    Google Scholar 

  22. Kumar, P., and Lee, H. J., Cryptanalysis on two user authentication protocols using Smart card or wireless sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 2011, 241–245.

    Google Scholar 

  23. Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.

    Article  Google Scholar 

  24. Xiong, X., Wong, D., and Deng, T., TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Commun. Netw. Conf. (WCNC’10), 2010, 1–6.

    Google Scholar 

  25. Chen, F., Luo, Y., Zhang, J. et al., An infrastructure framework for privacy protection of community medical internet of things. World Wide Web 21(1):33–57, 2018.

    Article  Google Scholar 

Download references

Funding

This study was funded by the National Natural Science Foundation of China through the research projects (Grant No. 61972438).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fulong Chen.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, X., Chen, F., Xie, D. et al. Design of a Secure Medical Data Sharing Scheme Based on Blockchain. J Med Syst 44, 52 (2020). https://doi.org/10.1007/s10916-019-1468-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-019-1468-1

Keywords

Navigation