Skip to main content

Enabling Efficient Multi-keyword Search Over Fine-Grained Authorized Healthcare Blockchain System

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2020)

Abstract

As a new emerging technology, blockchain is attracting the attention from academic and industry and has been widely exploited to build the large-scale data sharing and management systems, such as healthcare database or bank distributed database system. The health records contain a lot of sensitive information, so putting these health records into blockchain can solve the security and privacy issues while uploading them to an untrustworthy network. In a typical health record management system, there are escalating demands for users including the patients and the doctors to execute multi-keyword search over the huge scale of healthcare records. In the meantime, they can authorize some part of their personal treatments to others according to personalized needs of the patients. In literatures, there is not an existing blockchain solution can satisfy these two requirements at the same time. These issues become prominent since it’s more inconvenient to adjust a blockchain-based system to support efficient multi-keyword search and fine-grained authorization comparing to traditional RDBMS. To overcome the two challenges, we propose a novel multi-keyword searching scheme by establishing a set of Bloom Filters within the health record blockchain system to accelerate the searching process on service provider (SP). Moreover, we reduce the overhead of key derivation by proposing a Healthcare Data Key Derivation Tree (HDKDT) stored locally on the user’s side. Putting our proposed scheme on the medical blockchain can speed up the multi-keyword search [3, 12] processes and reduce the key storage space to certain extent. At the end of this article, we formally prove the security of the proposed scheme and implement a prototype system to evaluate its performance. The experimental results validate our proposed scheme in this paper is a secure and efficient approach for the health record management scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fangquan, C., Zhiyong, P., Wei, S., Shulin, W., Yihui, C: Key management for access control in trusted cloud storages. J. Comput. Res. Dev. 50(8), 1613–1627 (2013)

    Google Scholar 

  2. Porat, A., Pratap, A., Shah, P., Adkar, V: Blockchain Consensus: An analysis of Proof-of-Work and its Applications

    Google Scholar 

  3. Song, W., et al.: A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J. Parallel Distrib. Comput. 99, 14–27 (2017)

    Article  Google Scholar 

  4. Jiang, S., et al.: Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain. In: Blockchain conference, pp. 405–410 (2019)

    Google Scholar 

  5. Xu, C., Zhang, C., Xu, J: vChain: enabling verifiable boolean range queries over blockchain databases. In: Proceedings of International Conference on Management of Data, Proceedings of SIGMOD Conference, pp. 141–158 (2019)

    Google Scholar 

  6. Bloom, B.: Space/time tradeoffs in in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)

    Article  Google Scholar 

  7. Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18, 143–154 (1979)

    Article  MathSciNet  Google Scholar 

  8. Ramakrishna, M.V.: Practical performance of Bloom filters and parallel free-text searching. Commun. ACM 32(10), 1237–1239 (1989)

    Article  Google Scholar 

  9. Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2–5. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39658-1_2

    Chapter  Google Scholar 

  10. Papamanthou, C., Tamassia, R., Triandopoulos, N.: Optimal verification of operations on dynamic sets. In: Rogaway, P. (ed.) Advances in Cryptology – CRYPTO 2011. CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 91–110. Springer, Berlin, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_6

    Chapter  Google Scholar 

  11. Clifton, C., Doan, A., Elmagarmid, A., Kantarcıoglu, M.: Gunther Schadow. Jaideep Vaidya, privacy-preserving data integration and sharing. DMKD, Dan Suciu (2004)

    Google Scholar 

  12. Song, W., Wang, B., Wang, Q., Shi, C., Lou, W., Peng, Z.: Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources. IEEE Trans. Inf. Forensic. Secur. 12(10), 2334–2347 (2017)

    Article  Google Scholar 

  13. Zhang, C., Xu, C., Xu, J., Tang, Y., Choi, B: GEM2-Tree: a gas efficient structure for authenticated range queries in blockchain. In: ICDE, pp. 842–853 (2019)

    Google Scholar 

  14. Hu, S., et al.: Searching an encrypted cloud meets blockchain: a decentralized reliable and fair realization. In: INFOCOM (2018)

    Google Scholar 

  15. Ruan, P., et al.: Fine-grained, secure and efficient data provenance on blockchain systems. Proc. VLDB Endow. 12(9), 975–988

    Google Scholar 

  16. Wang, S., Zhao, D., Zhang, Y.: Searchable attribute-based encryption scheme with revocation in cloud storage. PLOS One, pp. 210–223 (2018)

    Google Scholar 

  17. Niu, J., Li, X., Gao, J., Han, Y.: Blockchain-based anti-key-leakage key aggregation searchable encryption for IoT. Int. Things J. 7(2), 1502–1518 (2020)

    Article  Google Scholar 

  18. Siris, V.A., et al.: OAuth 2.0 meets blockchain for authorization in constrained IoT environments. In: Proceedings of IEEE World Forum on Internet of Things (3), pp. 64–367 (2019)

    Google Scholar 

  19. Zhang, A., Bai, X.: Decentralized authorization and authentication based on consortium blockchain. In: Zheng, Z., Dai, H.N., Tang, M., Chen, X. (eds.) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol. 1156, pp. 267–272. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-2777-7_22

    Chapter  Google Scholar 

  20. Rashid, M.A., Pajooh, H.H.: A security framework for IoT authentication and authorization based on blockchain technology. In: BigDataSE, pp. 264–271 (2019)

    Google Scholar 

  21. Yamauchi, R., Kamidoi, Y., Wakabayashi, S: A protocol for preventing transaction commitment without recipient’s authorization on blockchain. In: COMPSAC, pp. 934–935 (2019)

    Google Scholar 

  22. Widick, L., Ranasinghe, I., Dantu, R., Jonnada, S: Blockchain based authentication and authorization framework for remote collaboration systems. In: WOWMOM, pp. 1–7 (2019)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (No. 62072349, U1811263, 61572378), the major technical innovation project of Hubei Province (No. 2019AAA072), the Science and Technology Project of State Grid Corporation Of China (No. 5700-202072180A-0-0-00), the Teaching Research Project Of Wuhan University (No. 2018JG052), and the Natural Science Foundation Of Hubei Province (No. 2017CBF420).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ding, Y., Song, W., Shen, Y. (2020). Enabling Efficient Multi-keyword Search Over Fine-Grained Authorized Healthcare Blockchain System. In: Wang, X., Zhang, R., Lee, YK., Sun, L., Moon, YS. (eds) Web and Big Data. APWeb-WAIM 2020. Lecture Notes in Computer Science(), vol 12318. Springer, Cham. https://doi.org/10.1007/978-3-030-60290-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60290-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60289-5

  • Online ISBN: 978-3-030-60290-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics