Skip to main content

Advertisement

Log in

An on-chain and off-chain collaborative data sharing and access control model for electronic medical records

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The rapid development of the healthcare industry has generated a large volume of electronic medical record data, which is stored across various hospitals. However, due to the sensitivity of medical data, it is prone to privacy breaches. Traditional ciphertext-policy attribute-based encryption schemes face several challenges, including excessive storage overhead for encrypted medical data, public access control policies, difficulties in data sharing between different hospitals, and the inability of patients to control the usage of their medical records. To address these issues, this paper proposes a blockchain-based attribute encryption access control model with constant-size ciphertext and hidden policy (ABE-BC-CSCHP). Firstly, by using an AND gate access structure based on multivalued attributes and wildcards, the model achieves a constant ciphertext size, thereby reducing both blockchain storage overhead and the computational cost of encryption and decryption. Secondly, medical data are stored in a hybrid on-chain and off-chain manner: encrypted medical data is stored off-chain in a distributed file storage system, while keyword index ciphertexts are stored on-chain. The access policies are embedded within the index ciphertext components to achieve policy hiding. Lastly, the model allows users to securely and accurately search encrypted medical data on the blockchain using a searchable encryption algorithm. To avoid single points of failure and to provide patients with flexible control over the usage of their data, the model designs multiple attribute authorities and allows patients to customize access policies. Finally, the security analysis and performance analysis compared with the current existing research shows that the model proposed in this paper is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Liu Y, Ma Z, Liu X, Ma S, Ren K (2019) Privacy-preserving object detection for medical images with faster R-CNN. IEEE Trans Inf Forensics Secur 17:69–84

    Article  MATH  Google Scholar 

  2. Hoerbst A, Ammenwerth E (2010) Electronic health records. Method Inf Med 49(04):320–336

    Article  Google Scholar 

  3. Jiang R, Liu R, Zhang T, Ding W, Tian S (2024) An electronic medical record access control model based on intuitionistic fuzzy trust. Inf Sci 658:1–19

    Article  MATH  Google Scholar 

  4. Goyal V, Pandey O, Sahai A, Waters B ( 2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98

  5. Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo K-KR (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3–9

    Article  Google Scholar 

  6. Chen R, Li Z ( 2021) Blockchain-based mechanism for electronic healthy records sharing using fine-grained authorization. In: 2021 7th International Conference on Computer and Communications (ICCC), pp. 1557–1564. IEEE

  7. Zhao Z, Zhu Z, Wang J et al (2018) Attribute-based encryption with attribute revocation and constant-size ciphertext. Acta Electronic Sin 46(10):2391–2399

    MATH  Google Scholar 

  8. Qiu S, Liu J, Shi Y, Zhang R (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci China Inf Sci 60(5):1–12

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu Z, Zhou P, Duan S (2018) Attribute-based proxy re-encryption scheme with keyword search. J Electron Inf Technol 40(3):683–689

    MATH  Google Scholar 

  10. Zhang K, Li Y, Lu L (2021) Privacy-preserving attribute-based keyword search with traceability and revocation for cloud-assisted IOT. Secur Commun Netw 2021(1):1–13

    Article  MATH  Google Scholar 

  11. Emura K, Miyaji A, Nomura A, Omote K, Soshi M ( 2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Information Security Practice and Experience: 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings 5, pp. 13–23. Springer

  12. Sravan Kumar G, Sri Krishna A (2019) Privacy sustaining constant length ciphertext-policy attribute-based broadcast encryption. In: Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Vol. 1, pp. 313–324. Springer

  13. Yang X, Li T, Ma T, Chen G, Wang C (2021) Searchable encryption scheme supporting policy hiding and constant ciphertext length. J Electron Inf Technol 43(4):900–907

    MATH  Google Scholar 

  14. Susilo W, Yang G, Guo F, Huang Q (2018) Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf Sci 429:349–360

    Article  MathSciNet  MATH  Google Scholar 

  15. Zhao Y, Xie X, Zhang X, Ding Y (2019) A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage. Math Biosci Eng 16(5):4229–4249

    Article  MathSciNet  MATH  Google Scholar 

  16. Zhang Y, Li J, Yan H (2019) Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access 7:47982–47990

    Article  MATH  Google Scholar 

  17. Yong Y, Fei-Yue W (2020) Editable blockchain: models, techniques and methods. Acta Autom Sin 46(5):831–846

    MATH  Google Scholar 

  18. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457–473. Springer

  19. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98

  20. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334. IEEE

  21. Li H, Yang Y, Dai Y, Yu S, Xiang Y (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484–494

    Article  MATH  Google Scholar 

  22. Xu L, Sun S, Yuan X, Liu JK, Zuo C, Xu C (2021) Enabling authorized encrypted search for multi-authority medical databases. IEEE Trans Emerg Top Comput 9(1):534–546

    Article  MATH  Google Scholar 

  23. Wu Y, Li X, Liu Z (2022) Attribute-based keyword searchable encryption scheme for multi-authority in cloud storage. In: 2022 IEEE 22nd International Conference on Communication Technology (ICCT), pp. 933–939. IEEE

  24. Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2020) Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985–998

    MATH  Google Scholar 

  25. Zhang K, Long J, Wang X, Dai H-N, Liang K, Imran M (2021) Lightweight searchable encryption protocol for industrial internet of things. IEEE Trans Ind Inf 17(6):4248–4259

    Article  MATH  Google Scholar 

  26. Liu J, Li Y, Sun R, Pei Q, Zhang N, Dong M, Leung VC (2022) EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination. IEEE Internet Things J 9(19):18650–18662

    Article  Google Scholar 

  27. Liu J, Fan Y, Sun R, Liu L, Wu C, Mumtaz S (2023) Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system. IEEE Internet Things J 10(24):21377–21388

    Article  Google Scholar 

  28. Liu X, Huan L, Sun R, Wang J (2023) Lightweight fine-grained multiowner search over encrypted data in cloud-edge computing. Secur Commun Netw 2023(1):1701874

    MATH  Google Scholar 

  29. Yuan Y, Wang F-Y (2018) Blockchain and cryptocurrencies: model, techniques, and applications. IEEE Trans Syst Man Cybern Syst 48(9):1421–1428

    Article  MATH  Google Scholar 

  30. More N, Motwani D (2021) A blockchain-based decentralized framework for crowdsourcing. In: Image Processing and Capsule Networks: ICIPCN 2020, pp. 448–460. Springer

  31. Peng Y, Du M, Li F, Cheng R, Song D (2020) Falcondb: Blockchain-based collaborative database. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pp. 637–652

  32. Azaria, A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25–30. IEEE

  33. Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K ( 2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 792–800. IEEE

  34. Cai C, Weng J, Yuan X, Wang C (2021) Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans Depend Secure Comput 18(1):131–144

    Article  MATH  Google Scholar 

  35. Wang M, Guo Y, Zhang C, Wang C, Huang H, Jia X (2021) Medshare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans Serv Comput 16(1):438–451

    MATH  Google Scholar 

  36. Wu S, Du J (2019) Electronic medical record security sharing model based on blockchain. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 13–17

  37. Zhen L, Liu J, Tao Y (2023) Medical information attribute encryption access control scheme based on blockchain. J Cyber Secur 8(1):93–107

    MATH  Google Scholar 

  38. Ding X, Yang J (2019) An access control model and its application in blockchain. In: 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 163–167. IEEE

  39. Ba Y, Hu X, Chen Y, Hao Z, Li X, Yan X (2021) A blockchain-based CP-ABE scheme with partially hidden access structures. Secur Commun Netw 2021(1):1–16

    Article  MATH  Google Scholar 

  40. Al Omar A, Rahman MS, Basu A, Kiyomoto S (2017) Medibchain: A blockchain based privacy preserving platform for healthcare data. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings 10, pp. 534–543. Springer

  41. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

  42. Politou E, Alepis E, Patsakis C, Casino F, Alazab M (2020) Delegated content erasure in IPFS. Future Gener Comput Syst 112:956–964

    Article  Google Scholar 

Download references

Funding

This work was supported by the National Natural Science Foundation of China (No.72471206,71972165,61763048,72164037), Major Science and Technology Special Plan of Yunnan Province Science and Technology Plan Project (No.202402AD080040), Key Projects of Basic Research for Science and Technology Foundation of Yunnan Province (No.202001AS070031), the Central Government’s Special Program for Guiding Local Science and Technology Development (No.202307AB110009), Science and Technology Foundation of Yunnan Province Education Department (No.2023J0657), and the Postgraduate Innovation Foundation of Yunnan University of Finance and Economics (No.2024YUFEYC012).

Author information

Authors and Affiliations

Authors

Contributions

Bo Wang presented writing—original draft, formal analysis, data curation, visualization, and writing—review and editing. Rong Jiang provided conceptualization, methodology, investigation, supervision, writing—review and editing, and funding acquisition. Xuetao Pu carried out data curation, methodology, and writing—review and editing. Hejiao Zhang performed writing—review and editing and supervision.

Corresponding author

Correspondence to Rong Jiang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, B., Jiang, R., Pu, X. et al. An on-chain and off-chain collaborative data sharing and access control model for electronic medical records. J Supercomput 81, 396 (2025). https://doi.org/10.1007/s11227-024-06884-2

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06884-2

Keywords