iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11277-020-07945-4
A Secure Online Treatment Blockchain Service | Wireless Personal Communications Skip to main content
Log in

A Secure Online Treatment Blockchain Service

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the telecare medicine information system (TMIS), to acquire the medical data, the patients need to log in to the remote medical server. Usually, each hospital has its server and they would not like to share the data with other hospitals. However, the patients are likely to upload their data to the different medical servers. In this case, since the patients have to register for these medical servers, they will need to save many keys for these servers. Hence, it is inconvenient for the patients to use these data. Moreover, the data may be tampered or deleted by an attacker or malicious staff in hospitals. To resolve these problems, we use blockchain to design a privacy-preserving scheme for TMIS. We integrate cryptography (broadcast encryption and Merkle tree) to construct our scheme. Moreover, we utilize the provable security theory to prove the security of our scheme. The security analysis indicates that the proposed scheme achieves privacy protection for the patients.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cisotto, G., Casarin, E., & Tomasin, S. (2020). Requirements and enablers of advanced healthcare services over future cellular systems. IEEE Communications Magazine, 58(3), 76–81.

    Article  Google Scholar 

  2. Esmaeilzadeh, P. (2020). The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention. Computers & Security, 95, 101819.

    Article  Google Scholar 

  3. Salem, F. M., & Amin, R. (2020). A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Information Sciences, 527, 382–393.

    Article  MathSciNet  Google Scholar 

  4. Sureshkumar, V., Amin, R., Obaidat, M. S., & Karthikeyan, I. (2020). An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. Journal of Information Security and Applications, 53, 102539.

    Article  Google Scholar 

  5. Office for Civil Rights, Department of Health and Human Services. (2002). Standards for privacy of individually identifiable health information. Final rule. Federal Register, 67(157), 53182–53272.

    Google Scholar 

  6. ASTM. (2005). Standard E2369-05e1 “Standard specification for continuity of care record (CCR)”. West Conshohocken, PA: ASTM International. https://doi.org/10.1520/E236905E01.

    Book  Google Scholar 

  7. Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., & Titouna, F. (2020). A privacy-preserving cryptosystem for IoT e-healthcare. Information Sciences, 527, 493–510.

    Article  MathSciNet  Google Scholar 

  8. Ermakova, T., Fabian, B., Kornacka, M., Thiebes, S., & Sunyaev, A. (2020). Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a Patient Perspective. ACM Transactions on Management Information Systems, 11(2), 6:1–6:29.

    Article  Google Scholar 

  9. Tang, F., Ma, S., Xiang, Y., & Lin, C. L. (2019). An efficient authentication scheme for blockchain-based electronic health records. IEEE Access, 7, 41678–41689.

    Article  Google Scholar 

  10. Wang, H., & Song, Y. J. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 42(8), 152:1–152:9.

    Article  MathSciNet  Google Scholar 

  11. Bhatia, T., Verma, A. K., & Sharma, G. (2020). Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.5520.

    Article  Google Scholar 

  12. Butpheng, C., Yeh, K. H., & Xiong, H. (2020). Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry, 12(7), 1191.

    Article  Google Scholar 

  13. Aguiar, E. J. D., Faiçal, B. S., Krishnamachari, B., & Ueyama, J. (2020). A survey of blockchain-based strategies for healthcare. ACM Computing Surveys, 53(2), 27:1–27:27.

    Article  Google Scholar 

  14. Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic cash system. 2012. [online]. http://www.bitcoin.org/bitcoin.pdf.

  15. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., et al. (2014). Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE Symposium on Security and Privacy (pp. 459–474).

  16. Ruffing, T., Moreno-Sanchez, P., & Kate, A. (2014). CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security (pp. 345–364).

  17. Danezis, G., Fournet, C., Kohlweiss, M., & Parno, B. (2013) . Pinocchio coin: Building zerocoin from a succinct pairing-based proof system. In PETShop’13 Proceedings of the first ACM workshop on language support for privacy-enhancing technologies (pp. 27–30).

  18. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858).

  19. Green, M., & M & Miers, I., (2017). Bolt: Anonymous payment channels for decentralized currencies. In ACM Sigsac Conference on Computer and Communications Security (pp. 473–489).

  20. Huang, K., Zhang, X. S., Mu, Y., Rezaeibagha, F., Du, X. J., & Guizani, N. (2020). Achieving intelligent trust-layer for Internet-of-Things via self-redactable blockchain. IEEE Transactions on Industrial Informatics, 16(4), 2677–2686.

    Article  Google Scholar 

  21. Ge, C. P., Liu, Z., & Fang, L. M. (2020). A blockchain based decentralized data security mechanism for the Internet of Things. Journal of Parallel and Distributed Computing, 141, 1–9.

    Article  Google Scholar 

  22. Gai, K. K., Wu, Y. L., Zhu, L. H., Zhang, Z. J., & Qiu, M. K. (2020). Differential privacy-based blockchain for industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 16(6), 4156–4165.

    Article  Google Scholar 

  23. Wilkinson, S., Boshevski, T., Brandoff, T., & Buterin, V., (2014). Storj: a peer-to- peer cloud storage network, The whitepaper is Storj Labs, Atlanta, GA, USA, Tech. Rep., Accessed 10 Jan 2019. [Online]. Available: https://storj.io/storj.pdf.

  24. McGhin, T., Choo, K. K. R., Liu, C. Z., & He, D. B. (2019). Blockchain in healthcare applications: Research challenges and opportunities. Journal of Network and Computer Applications, 135, 62–75.

    Article  Google Scholar 

  25. Miller, A., Juels, A., Shi, E., Parno, B., & Katz, J. (2014). Permacoin: Repurposing Bitcoin work for data preservation. In IEEE Symposium on Security and Privacy (pp. 475–490).

  26. Boneh, D., Gentry, C., & Waters, B. (2005). Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO (pp. 258–275).

  27. Gentry, C., & Waters, B. (2009). Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology-EUROCRYPT (pp. 171–188).

  28. Kim, J., Susilo, W., Au, M. H., & Seberry, J. (2015). Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10(3), 679–693.

    Article  Google Scholar 

  29. Guo, D. L., Wen, Q. Y., Li, W. M., Zhang, H., & Jin, Z. P. (2016). Adaptively secure broadcast encryption with constant ciphertexts. IEEE Transactions on Broadcasting, 62(3), 709–715.

    Article  Google Scholar 

  30. Merkle, R. C. (1980). Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy (pp. 122–134).

  31. Sander, T., & Ta-Shma, A. (1999). Auditable, anonymous electronic cash. In Advances in Cryptology-CRYPTO (pp. 555–572).

  32. Wang, C., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM (pp. 1–9).

  33. Zhou, L. J., Wang, L. C., & Sun, Y. R. (2018). MIStore: A blockchain-based medical insurance storage system. Journal of Medical Systems, 42(8), 149:1–149:17.

    Article  Google Scholar 

Download references

Acknowledgements

We are appreciate for the helpful comments and suggestions of anonymous reviewers. This work is supported by NSFC (Grant Nos. 62072051, 61976024, 61972048), National Key R&D Program of China (Grant No. 2020YFB1005900), and the Fundamental Research Funds for the Central Universities (Grant No. 2019XD-A01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, H., Zhang, H., Yan, H. et al. A Secure Online Treatment Blockchain Service. Wireless Pers Commun 117, 1773–1795 (2021). https://doi.org/10.1007/s11277-020-07945-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07945-4

Keywords

Navigation