skip to main content
10.1145/3321408.3321574acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

Anonymous cross-domain authentication scheme for medical PKI system

Published: 17 May 2019 Publication History

Abstract

Nowadays, most information systems of hospitals are established based on Public Key Infrastructure(PKI). Each of them has a certificate authority(CA) act as a trust anchor for all the members it authorized. However, each hospital builds system according to its own understanding and form a lot of isolated domains. In medical application scenario, patients often passively need to change hospitals because of different medical levels and different diseases. For hospital cannot electronically share medical data, which cause lots of waste of resource such as repeated treatment and time consuming. The solution to medical information sharing between hospitals becomes urgent. In this paper, we propose blockchain-based cross-domain authentication scheme for doctor users and designed corresponding protocols to support supervision department and user privacy protection. The security analysis and engineering tests demonstrate that the scheme can better meet the requirements of cross-domain authentication and provide better privacy protection services when sharing medical data.

References

[1]
Zhang. Kai, Yang. Yuanyuan, Zhu. Yanjie, et al Author, Design of cross-regional medical information sharing exchange system based on IHE XDS/XCA. Chinese Journal of Digital Medicine <b>2</b>(5), 11--15 (2009).
[2]
Development from electronic medical record (EMR) to personal health record (PHR): the status and development of the European Union in the field of electronic health records (EHR)., http:www.china-her.com. Last accessed 4 Jul 2018
[3]
Liang, Zongqiang. Liang, Xingyuan. An, Xiaoyue. et al.: Discussion on several issues of electronic medical record security in hospital information system. Journal of Medical Information Science <b>30</b>(3), 6--9 (2009)
[4]
Wang M. Discussion on Safety System about Electronic Medical Records{J}. Chinese Medical Record, 2012.
[5]
Junjie, Li.: Cases of regional medical information sharing at home and abroad. Chongqing Informatization <b>10</b>, 12--13 (2009)
[6]
B. Yuksel, A. Kupcu, O. Ozkasap, Research issues for privacy and security of electronic health services, Future Gener. Comput. Syst. 68 (2017) 113.
[7]
Hu, J., Chen, H.-H., and Hou, T.-W., A hybrid public key infrastructure solution(HPKI) for HIPAA privacy/security regulations. Comput Stand Interfaces 32:274280, 2010. Elsevier.
[8]
Tzer-Long Chen, Frank Y. S. Lin. Electronic Medical Archives: A Different Approach to Applying Re-signing Mechanisms to Digital Signatures{J}. Journal of Medical Systems, 2011, 35(4):735--742.
[9]
Wang H, Gu C. Application Scheme of PKI System in Wireless Medical Data Transmission Network{C}// International Wireless Internet Conference. Springer, Cham, 2017:387--395.
[10]
CertCoin: A NameCoin Based Decentralized Authentication System, http://xueshu.baidu.com/s?wd=paperuri. Last accessed 4 Jul 2018
[11]
Distributed Public Key Infrastructure (PKI) protocol and Access Management DApps, https://www.remme.io/. Last accessed 4 Jul 2018
[12]
Muneeb Ali and Jude Nelson, Blockstack: a global naming and storage system secured by blockchains. https://www.usenix.org/system/files/conference/atc16/atc16paper-ali.pdf. Last accessed 4 Jul 2018
[13]
Kevin King. Verizon Enterprise Solutions will create global blockchain platform services, https://www.verizon.com/about/news/. Last accessed 4 Jul 2018.
[14]
J.L. Fernandez-Aleman, I.C. Senor, Lozoya Pao, et al., Security and privacy in electronic health records: A systematic literature review, J. Biomed. Inf. 46 (3)(2013) 541562.
[15]
Mantas G. PKI Security in Large-Scale Healthcare Networks{J}. Journal of Medical Systems, 2012, 36(3):1107--1116.
[16]
Hyperledger. Project Charter, https://www.hyperledger.org/about/charter. Last accessed 4 Jul 2018
[17]
Tsai, WT. Yu, L. Wang, R. Liu, N. Deng, EY.: Blockchain application development techniques. Ruan Jian Xue Bao<b>28</b>(6), 1474--1487 (2017)
[18]
Yuan, Yong. Wang, Fei-Yue.: Blockchain: the state of the art and future trends. Acta Automatica Sinica<b>42</b>(4), 481--494 (2016)
[19]
China Blockchain Technology and Application Development White Paper, http:www.cbdforum.cn/index/article/rar-6.html. Last accessed 4 Jul 2018.
[20]
Bergan, T. Anderson, O. Devietti, J. et al.:CryptoNote v 2.0., http://xueshu.baidu.com/s?wd=paperuri. Last accessed 4 Jul 2018
[21]
Lehtinen, S.: Diffie-Hellman Key Exchange. Issa J, 342--342 (1976)
[22]
Antonopoulos, A., M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O'Reilly Media, Inc (2014)
[23]
Satoshi.N.:Bitcoin: A Peer-to-Peer Electronic Cash System., http://bitcoin.org/bitcoin.pdf, 2009. Last accessed 4 Jul 2018
[24]
Hu kexin.: Research on FIDO UAF Authentication Protocols Security. University of Science and Technology of China (2016)

Cited By

View all
  • (2024)An Efficient Consensus Algorithm for Blockchain-Based Cross-Domain Authentication in Bandwidth-Constrained Wide-Area IoT NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.342071911:19(31917-31931)Online publication date: 1-Oct-2024
  • (2023)Efficient and Anonymous Cross-Domain Authentication for IIoT Based on BlockchainIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.322445310:2(899-910)Online publication date: 1-Mar-2023
  • (2023)IoMT-Net: Blockchain-Integrated Unauthorized UAV Localization Using Lightweight Convolution Neural Network for Internet of Military ThingsIEEE Internet of Things Journal10.1109/JIOT.2022.317631010:8(6634-6651)Online publication date: 15-Apr-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - China
May 2019
963 pages
ISBN:9781450371582
DOI:10.1145/3321408
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymous
  2. blockchain
  3. cross-domain authentication
  4. medical
  5. public key infrastructure (PKI)

Qualifiers

  • Research-article

Conference

ACM TURC 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)An Efficient Consensus Algorithm for Blockchain-Based Cross-Domain Authentication in Bandwidth-Constrained Wide-Area IoT NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.342071911:19(31917-31931)Online publication date: 1-Oct-2024
  • (2023)Efficient and Anonymous Cross-Domain Authentication for IIoT Based on BlockchainIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.322445310:2(899-910)Online publication date: 1-Mar-2023
  • (2023)IoMT-Net: Blockchain-Integrated Unauthorized UAV Localization Using Lightweight Convolution Neural Network for Internet of Military ThingsIEEE Internet of Things Journal10.1109/JIOT.2022.317631010:8(6634-6651)Online publication date: 15-Apr-2023
  • (2022)Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECCWireless Communications & Mobile Computing10.1155/2022/75196882022Online publication date: 1-Jan-2022
  • (2022)A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical ConsortiumsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314692919:3(2409-2420)Online publication date: Sep-2022
  • (2022)The Security of Blockchain-Based Medical Systems: Research Challenges and OpportunitiesIEEE Systems Journal10.1109/JSYST.2022.315515616:4(5741-5752)Online publication date: Dec-2022
  • (2022)Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things2022 13th International Conference on Information and Communication Technology Convergence (ICTC)10.1109/ICTC55196.2022.9953024(890-894)Online publication date: 19-Oct-2022
  • (2022)A Cross-domain Authentication Scheme Based on Zero-Knowledge ProofAlgorithms and Architectures for Parallel Processing10.1007/978-3-030-95388-1_43(647-664)Online publication date: 23-Feb-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media