Abstract
Electronic health record sharing can help to improve the accuracy of diagnosis, where security and privacy preservation are critical issues in the systems. In recent years, blockchain has been proposed to be a promising solution to achieve personal health information (PHI) sharing with security and privacy preservation due to its advantages of immutability. This work proposes a blockchain-based secure and privacy-preserving PHI sharing (BSPP) scheme for diagnosis improvements in e-Health systems. Firstly, two kinds of blockchains, private blockchain and consortium blockchain, are constructed by devising their data structures, and consensus mechanisms. The private blockchain is responsible for storing the PHI while the consortium blockchain keeps records of the secure indexes of the PHI. In order to achieve data security, access control, privacy preservation and secure search, all the data including the PHI, keywords and the patients’ identity are public key encrypted with keyword search. Furthermore, the block generators are required to provide proof of conformance for adding new blocks to the blockchains, which guarantees the system availability. Security analysis demonstrates that the proposed protocol can meet with the security goals. Furthermor, we implement the proposed scheme on JUICE to evaluate the performance.




Similar content being viewed by others
Notes
The hash value of the encrypted PHI is uploaded to the chain while the original ciphertext is stored in the local computer client.
Fast Healthcare Interoperability Resources is a standard describing data formats and elements for exchanging electronic health records. Its goals is to facilitate interoperation between legacy health care systems. This resource makes it easy to provide health care information to health care providers and individuals on a wide variety of devices from computers to tablets to cell phones. It also allows third-party application developers to provide medical applications which can be easily integrated into existing systems.
To avoid the case that less than 8 new blocks are generated in a long period, a time interval can be predefined in the system.
The doctor can also be chosen by the user in practical applications.
51% attack brings the attacker more cost than benefits thus it rarely happens [12].
The computer also needs to compute a signature. As signature algorithm is not specified in the scheme, we do not consider its time cost in the system.
References
Abbas, A., and Khan, S. U., A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE Journal of Biomedical and Health Informatics 18(4):1431–1441, 2014.
Shen, Q., Liang, X., Shen, X., Lin, X., and Luo, H., Exploiting geo-distributed clouds for a e-Health monitoring system with minimum service delay and privacy preservation. IEEE Journal of Biomedical and Health Informatics 18(2):430–439, 2014.
Yang, Y., and Ma, M., Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-Health clouds. IEEE Transactions on Information Forensics and Security 11(4):746–759, 2016.
Zhou, J., Cao, Z., Dong, X., and Lin, X., PPDM: A Privacy-preserving protocol for cloud-assisted e-Healthcare systems. IEEE Journal of Selected Topics in Signal Processing 9(7):1332–1344, 2015.
Zhang, Z., Dong, M., Zhu, L., Guan, Z., Chen, R., Xu, R., and Ota, K.: Achieving privacy-friendly storage and secure Statistics for smart meter data on outsourced clouds, IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2017.2685583
Chang, S., Zhu, H., Dong, M., Ota, K., Liu, X., and Shen, X., Private and flexible urban message delivery. IEEE Transactions on Vehicular Technology 65(7):4900–4910, 2016.
Esposito, C., De Santis, A., Tortora, G., Chang, H., and Choo, K. K. R., Blockchain: a panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing 5(1):31–37, 2018.
Novo, O., Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal 5(2):1184–1195, 2018.
Wang, J., Li, M., He, Y., Li, H., Xiao, K., and Wang, C., A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545–17556, 2018.
Dorri, A., Steger, M., Kanhere, S. S., and Jurdak, R., Blockchain: A distributed solution to automotive security and privacy. IEEE Communications Magazine 55(12):119–125, 2017.
Xia, Q., Sifah, E., Smahi, A., Amofa, S., and Zhang, X., BBDS: Blockchain-Based data sharing for electronic medical records in cloud environments. Information 8(44):1–16, 2017.
Kuo, T., Kim, H., and Ohno-Machado, L., Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association 24(6):1211–1220, 2017.
Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., and Du, X.: MeDShare: Trust-less medical data sharing among cloud service providers via blockchain, IEEE Access. https://doi.org/10.1109/ACCESS.2017.2730843
Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W., Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems 40(10):218 , 2016.
Zyskind, G., Nathan, O., and Pentland, A.: Decentralizing privacy: Using blockchain to protect personal data. IEEE Security and Privacy Workshops: San Jose, 18–20, 2015
Azaria, A., Ekblaw, A., Vieiraand, T., and Lippmanl, A.: Medrec: Using blockchain for medical data access and permission management. IEEE International Conference on Open and Big Data, 25–30, 2016
Zhang, J., Xue, N., and Huang, X., A secure system for pervasive social network-based healthcare. IEEE Access 4(99):9239–9250, 2016.
Peterson, K., Deeduvanu, R., Kanjamala, P., and Boles, K.: A blockchain-based approach to health information exchange networks
Shae, Z., and Tsai, J.: On the design of a blockchain platform for clinical trial and precision medicine. International Conference on Distributed Computing Systems (ICDCS 2017): Atlanta , 2017
Zhao, H., Zhang, Y., Peng, Y., and Xu, R.: Lightweight backup and efficient recovery scheme for health blockchain keys. IEEE International Symposium on Autonomous Decentralized System (ISADS): Bangkok, 22–24, 2017
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Public key encryption with keyword search, EUROCRYPT 2004, LNCS. Vol. 3027, pp. 506–522. Berlin: Springer, 2004.
Baek, J., Safavi-Naini, R., and Susilo, W.: Public key encryption with keyword search revisited, International Conference on Computational Sciences and its Applications (ICCSA): Perugia, 2008
Hu, C., and Liu, P., An enhanced searchable public key encryption scheme with a designated tester and its extensions. Journal of Computer 7(3):716–723, 2012.
Shao, J., Cao, Z., Liang, X., and Lin, H., Proxy re-encryption with keyword search. Information Science 180(13):2576–2587, 2010.
Yau, W., Phan, R., Heng, S., and Goi, B.: Proxy re-encryption with keyword search: New definitions and algorithms. International Conference, SecTech and DRBC: Jeju Island, 13–15, 2010
Ogata, W., and Kurosawa, K., Oblivious keyword search. Journal of Complexity 20(2-3):356–371, 2004.
Ryu, E., and Takagi, T.: Efficient conjunctive keyword-searchable encryption. IEEE 21st International Conference on Advanced Information Networking and Applications: Niagara Falls, 21–23, 2007
Bethencourt, J., Song, D., and Waters, B.: New constructions and practical applications for private stream searching (extended abstract). IEEE Symposium on Security & Privacy: Berkeley, 21–24, 2006
Boneh, D., and Waters, B., Conjunctive, subset, and range queries on encrypted data, TCC 2007, LNCS. Vol. 4392, pp. 535–554. Berlin: Springer, 2007.
Wang, X., Huang, X., Yang, X., Liu, L., and Wu, X., Further observation on proxy re-encryption with keyword search. The Journal of Systems and Software 85:643–654, 2012.
Castro, M., and liskov, B.: Practical Byzantine Fault Tolerance, the Third Symposium on Operating Systems Design and Implementation: New Orleans, 1999
HL7. HL7 Fast Healthcare Interoperability Resources (FHIR). https://www.hl7.org/fhir/. Accessed: 2017-11-20
Leftwich, R.: The path to deriving clinical value from FHIR - InterSystems, http://www.intersystems.com/library/library-item/path-deriving-clinical-value-fhir/. Accessed: 2017-11-20
Acknowledgments
This work is partly supported by the National Natural Science Foundation of China (Grants No. 61601005, No. 61571240), Natural Science Foundation of Anhui Province (Grant No. 1608085QF138, No. 1808085MF164), Anhui Provincial Key Laboratory of Network and Information Security (Grant No. AHNIS2018003), and Scientific Research Staring Foundation of Anhui Normal University (Grant No. 2014bsqdjj38).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
Author Aiqing Zhang declares that she has no conflict of interest. Author Xiaodong Lin declares that he has no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
This article is part of the Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities
Rights and permissions
About this article
Cite this article
Zhang, A., Lin, X. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain. J Med Syst 42, 140 (2018). https://doi.org/10.1007/s10916-018-0995-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-018-0995-5