Abstract
With the advancement of modern medicine, human whole genome sequencing technology has become more and more efficient and accurate. Genomic data are characterized by large data volume, privacy, and ease of being tampered with. Genomic data are usually stored in different data centers, and it is not easy to share the data. We propose a blockchain-based dual-verifiable cloud storage solution BBAC with the features of traceability and non-comparability of blockchain. First, we use homomorphic encryption technology to encrypt data and upload it to the cloud to ensure transmission security and data privacy protection. At the same time, the aggregated ciphertext and uploader information is stored on the blockchain to avoid the risk of data tampering by illegal users effectively and enable the traceability of malicious users, realizing double verification of data integrity in the cloud. Security analysis proves BBAC is more secure and reliable than similar schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akavia, A., Leibovich, M., Resheff, Y.S., Ron, R., Shahar, M., Vald, M.: Privacy-preserving decision trees training and prediction. ACM Trans. Priv. Secur. 25, 1–30 (2022)
Bai, J., Song, X., Cui, S., Chang, E.C., Russello, G.: Scalable private decision tree evaluation with sublinear communication. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (2022)
Barhoun, R.: A trust and activity based access control model for preserving privacy and sensitive data in a distributed and collaborative system: application to a healthcare system. Int. Rev. Comput. Softw. (IRECOS) (2021)
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Range query integrity in cloud data streams with efficient insertion. In: Cryptology and Network Security (2016)
Chen, Y.C., Chang, C.C., Hung, C.C., Lin, J.F., Hsu, S.Y.: SecDT: privacy-preserving outsourced decision tree classification without polynomial forms in edge-cloud computing. IEEE Trans. Signal Inf. Process. Netw. 8, 1037–1048 (2022)
Davis, S., et al.: Standardized health data and research exchange (share): promoting a learning health system. JAMIA Open 5 (2022)
Dimitriou, T.: Efficient, coercion-free and universally verifiable blockchain-based voting. IACR Cryptol. ePrint Arch. 2019, 1406 (2020)
Ding, Y., Sato, H.: Derepo: a distributed privacy-preserving data repository with decentralized access control for smart health. In: 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 29–35 (2020)
Gan, Q., Wang, X., Li, J., Yan, J., Li, S.: Enabling online/offline remote data auditing for secure cloud storage. Clust. Comput. 24, 3027–3041 (2021)
Iezzi, M.: Practical privacy-preserving data science with homomorphic encryption: an overview. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 3979–3988 (2020)
Kim, D., Kim, K.S.: Privacy-preserving public auditing for shared cloud data with secure group management. IEEE Access PP, 1 (2022)
Li, X., Zhou, R., Zhou, T., Liu, L., Yu, K.: Connectivity probability analysis for green cooperative cognitive vehicular networks. IEEE Trans. Green Commun. Netw. 6, 1553–1563 (2022)
Jie Lu, W., Huang, Z., Hong, C., Ma, Y., Qu, H.: PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1057–1073 (2021)
Müller, S.: Is there a civic duty to support medical AI development by sharing electronic health records? BMC Med. Ethics 23 (2022)
Pankhurst, T., et al.: Introducing SNOMED-CT* coding into an electronic health record: Impact on clinicians, data sharing and research potential *systemised nomenclature of medicine clinical terminology (preprint) (2021)
Song, B.K., Yoo, J.S., Hong, M., Yoon, J.W.: A bitwise design and implementation for privacy-preserving data mining: from atomic operations to advanced algorithms. Secur. Commun. Netw. 2019, 3648671:1–3648671:14 (2019)
Subbayamma, M.S.S.: The secured client-side encrypted data with public auditing in cloud storage (2021)
Sun, Y., Zhang, R., Wang, X., Gao, K., Liu, L.: A decentralizing attribute-based signature for healthcare blockchain. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9 (2018)
Vinoth, R., Deborah, L.J.: An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J. Ambient. Intell. Humaniz. Comput. 14, 1431–1443 (2021)
Wang, J., Shi, D., Chen, J., Liu, C.C.: Privacy-preserving hierarchical state estimation in untrustworthy cloud environments. IEEE Trans. Smart Grid 12, 1541–1551 (2021)
Yu, Y., Liu, S., Yeoh, P.L., Vucetic, B., Li, Y.: Layerchain: a hierarchical edge-cloud blockchain for large-scale low-delay industrial internet of things applications. IEEE Trans. Industr. Inf. 17(7), 5077–5086 (2021). https://doi.org/10.1109/TII.2020.3016025
Zhang, J., Lu, R., Wang, B., Wang, X.A.: Comments on “privacy-preserving public auditing protocol for regenerating-code-based cloud storage.” IEEE Trans. Inf. Forensics Secur. 16, 1288–1289 (2021)
Acknowledgement
This work was supported in part by the National Key Research and Development Program of China (No. 2020YFB1805400); in part by the National Natural Science Foundation of China (No. 42071431); in part by the Provincial Key Research and Development Program of Hubei, China (No. 2020BAB101).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Qin, P., Zhang, T., Fang, C., Wang, L. (2023). BBAC: Blockchain-Based Access Control Scheme for EHRs with Data Sharing Support. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14180. Springer, Cham. https://doi.org/10.1007/978-3-031-46677-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-46677-9_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46676-2
Online ISBN: 978-3-031-46677-9
eBook Packages: Computer ScienceComputer Science (R0)