Skip to main content

BBAC: Blockchain-Based Access Control Scheme for EHRs with Data Sharing Support

  • Conference paper
  • First Online:
Advanced Data Mining and Applications (ADMA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14180))

Included in the following conference series:

  • 443 Accesses

Abstract

With the advancement of modern medicine, human whole genome sequencing technology has become more and more efficient and accurate. Genomic data are characterized by large data volume, privacy, and ease of being tampered with. Genomic data are usually stored in different data centers, and it is not easy to share the data. We propose a blockchain-based dual-verifiable cloud storage solution BBAC with the features of traceability and non-comparability of blockchain. First, we use homomorphic encryption technology to encrypt data and upload it to the cloud to ensure transmission security and data privacy protection. At the same time, the aggregated ciphertext and uploader information is stored on the blockchain to avoid the risk of data tampering by illegal users effectively and enable the traceability of malicious users, realizing double verification of data integrity in the cloud. Security analysis proves BBAC is more secure and reliable than similar schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akavia, A., Leibovich, M., Resheff, Y.S., Ron, R., Shahar, M., Vald, M.: Privacy-preserving decision trees training and prediction. ACM Trans. Priv. Secur. 25, 1–30 (2022)

    Article  Google Scholar 

  2. Bai, J., Song, X., Cui, S., Chang, E.C., Russello, G.: Scalable private decision tree evaluation with sublinear communication. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (2022)

    Google Scholar 

  3. Barhoun, R.: A trust and activity based access control model for preserving privacy and sensitive data in a distributed and collaborative system: application to a healthcare system. Int. Rev. Comput. Softw. (IRECOS) (2021)

    Google Scholar 

  4. Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Range query integrity in cloud data streams with efficient insertion. In: Cryptology and Network Security (2016)

    Google Scholar 

  5. Chen, Y.C., Chang, C.C., Hung, C.C., Lin, J.F., Hsu, S.Y.: SecDT: privacy-preserving outsourced decision tree classification without polynomial forms in edge-cloud computing. IEEE Trans. Signal Inf. Process. Netw. 8, 1037–1048 (2022)

    Google Scholar 

  6. Davis, S., et al.: Standardized health data and research exchange (share): promoting a learning health system. JAMIA Open 5 (2022)

    Google Scholar 

  7. Dimitriou, T.: Efficient, coercion-free and universally verifiable blockchain-based voting. IACR Cryptol. ePrint Arch. 2019, 1406 (2020)

    Google Scholar 

  8. Ding, Y., Sato, H.: Derepo: a distributed privacy-preserving data repository with decentralized access control for smart health. In: 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 29–35 (2020)

    Google Scholar 

  9. Gan, Q., Wang, X., Li, J., Yan, J., Li, S.: Enabling online/offline remote data auditing for secure cloud storage. Clust. Comput. 24, 3027–3041 (2021)

    Article  Google Scholar 

  10. Iezzi, M.: Practical privacy-preserving data science with homomorphic encryption: an overview. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 3979–3988 (2020)

    Google Scholar 

  11. Kim, D., Kim, K.S.: Privacy-preserving public auditing for shared cloud data with secure group management. IEEE Access PP, 1 (2022)

    Google Scholar 

  12. Li, X., Zhou, R., Zhou, T., Liu, L., Yu, K.: Connectivity probability analysis for green cooperative cognitive vehicular networks. IEEE Trans. Green Commun. Netw. 6, 1553–1563 (2022)

    Article  Google Scholar 

  13. Jie Lu, W., Huang, Z., Hong, C., Ma, Y., Qu, H.: PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1057–1073 (2021)

    Google Scholar 

  14. Müller, S.: Is there a civic duty to support medical AI development by sharing electronic health records? BMC Med. Ethics 23 (2022)

    Google Scholar 

  15. Pankhurst, T., et al.: Introducing SNOMED-CT* coding into an electronic health record: Impact on clinicians, data sharing and research potential *systemised nomenclature of medicine clinical terminology (preprint) (2021)

    Google Scholar 

  16. Song, B.K., Yoo, J.S., Hong, M., Yoon, J.W.: A bitwise design and implementation for privacy-preserving data mining: from atomic operations to advanced algorithms. Secur. Commun. Netw. 2019, 3648671:1–3648671:14 (2019)

    Google Scholar 

  17. Subbayamma, M.S.S.: The secured client-side encrypted data with public auditing in cloud storage (2021)

    Google Scholar 

  18. Sun, Y., Zhang, R., Wang, X., Gao, K., Liu, L.: A decentralizing attribute-based signature for healthcare blockchain. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9 (2018)

    Google Scholar 

  19. Vinoth, R., Deborah, L.J.: An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J. Ambient. Intell. Humaniz. Comput. 14, 1431–1443 (2021)

    Article  Google Scholar 

  20. Wang, J., Shi, D., Chen, J., Liu, C.C.: Privacy-preserving hierarchical state estimation in untrustworthy cloud environments. IEEE Trans. Smart Grid 12, 1541–1551 (2021)

    Article  Google Scholar 

  21. Yu, Y., Liu, S., Yeoh, P.L., Vucetic, B., Li, Y.: Layerchain: a hierarchical edge-cloud blockchain for large-scale low-delay industrial internet of things applications. IEEE Trans. Industr. Inf. 17(7), 5077–5086 (2021). https://doi.org/10.1109/TII.2020.3016025

    Article  Google Scholar 

  22. Zhang, J., Lu, R., Wang, B., Wang, X.A.: Comments on “privacy-preserving public auditing protocol for regenerating-code-based cloud storage.” IEEE Trans. Inf. Forensics Secur. 16, 1288–1289 (2021)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Key Research and Development Program of China (No. 2020YFB1805400); in part by the National Natural Science Foundation of China (No. 42071431); in part by the Provincial Key Research and Development Program of Hubei, China (No. 2020BAB101).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lina Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qin, P., Zhang, T., Fang, C., Wang, L. (2023). BBAC: Blockchain-Based Access Control Scheme for EHRs with Data Sharing Support. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14180. Springer, Cham. https://doi.org/10.1007/978-3-031-46677-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46677-9_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46676-2

  • Online ISBN: 978-3-031-46677-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics