skip to main content
research-article

Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology

Published:14 June 2021Publication History
Skip Abstract Section

Abstract

The essence of “blockchain” is a shared database in which information stored is un-falsifiable, traceable, open, and transparent. Therefore, to improve the security of private information in medical systems, this article uses blockchain technology to design a method to protect private information in medical systems and effectively realize anti-theft control of private information. First, the Patient-oriented Privacy Preserving Access Control model is introduced into the access control process of private information in medical systems. Next, a private information storage platform is built by using blockchain technology, and information transmission is realized using standard cryptographic algorithms. In this process, file authorization contracts are also used to guarantee the security of private information and further prevent theft of medical private information. Our simulation results show that the storage response time of this method is kept below 1,000 ms, and the maximum information throughput rate reaches 550 kbit/s, which indicates that this method has strong performance in information storage and transmission efficiency. Moreover, the reliability and bandwidth utilization of data transmission across domains is higher, so the method has higher information security control performance and superior overall performance.

References

  1. Jaafar M. Alghazo. 2019. Intelligent security and privacy of electronic health records using biometric images. Curr. Med. Imag. 15, 4 (2019), 386–394.Google ScholarGoogle ScholarCross RefCross Ref
  2. Jalal Amini, Abbas Hooshmand Viki, Ahmad Radan, and Mehrdad Moallem. 2016. A general control method for multilevel converters based on knapsack problem. IEEE Trans. Power Electr. 32, 1 (2016), 2–10.Google ScholarGoogle ScholarCross RefCross Ref
  3. Zachary BaynhamHerd. 2017. Enlist blockchain to boost conservation. Nature 548, 7669 (2017), 523–523.Google ScholarGoogle Scholar
  4. Mohamed Baza, Noureddine Lasla, Mohamed Mahmoud, Gautam Srivastava, and Mohamed Abdallah. 2019. B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Trans. Netw. Sci. Eng. (2019).Google ScholarGoogle Scholar
  5. Joan C. Chrisler, Angela Barney, and Brigida Palatino. 2016. Ageism can be hazardous to women’s health: Ageism, sexism, and stereotypes of older women in the healthcare system. J. Soc. Issues 72, 1 (2016), 86–104.Google ScholarGoogle ScholarCross RefCross Ref
  6. Joan Daemen and Vincent Rijmen. 2005. Rijndael/AES. In Encyclopedia of Cryptography and Security, Henk C. A. van Tilborg (Ed.). Springer. DOI:https://doi.org/10.1007/0-387-23483-7_358Google ScholarGoogle Scholar
  7. Ashutosh Dhar Dwivedi, Pawel Morawiecki, and Sebastian Wojtowicz. 2018. Finding differential paths in ARX ciphers through nested Monte-Carlo search. Int. J. Electr. Telecommun. 64, 2 (2018). DOI:https://doi.org/10.24425/119362Google ScholarGoogle Scholar
  8. Ashutosh Dhar Dwivedi, Lukas Malina, Petr Dzurenda, and Gautam Srivastava. 2019. Optimized blockchain model for internet of things based healthcare applications. In Proceedings of the 42nd International Conference on Telecommunications and Signal Processing (TSP’19). IEEE, 135–139.Google ScholarGoogle ScholarCross RefCross Ref
  9. Ashutosh Dhar Dwivedi, Pawel Morawiecki, and Gautam Srivastava. 2019. Differential cryptanalysis of round-reduced SPECK suitable for Internet of Things devices. IEEE Access 7 (2019), 16476–16486. DOI:https://doi.org/10.1109/ACCESS.2019.2894337Google ScholarGoogle ScholarCross RefCross Ref
  10. Ashutosh Dhar Dwivedi and Gautam Srivastava. 2018. Differential cryptanalysis of round-reduced LEA. IEEE Access 6 (2018), 79105–79113. DOI:https://doi.org/10.1109/ACCESS.2018.2881130Google ScholarGoogle ScholarCross RefCross Ref
  11. Ashutosh Dhar Dwivedi, Gautam Srivastava, Shalini Dhar, and Rajani Singh. 2019. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19, 2 (2019), 326.Google ScholarGoogle Scholar
  12. Peter Fairley. 2017. Blockchain worldfeeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous. IEEE Spectrum 54, 10 (2017), 36–59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Joshua J. Fenton, John A. Robbins, Anna Lee D. Amarnath, and Peter Franks. 2016. Osteoporosis overtreatment in a regional health care system. JAMA Internal Med. 176, 3 (2016), 391–393.Google ScholarGoogle ScholarCross RefCross Ref
  14. Hui Huang, Xiaofeng Chen, and Jianfeng Wang. 2020. Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Info. Sci. 63, 3 (2020), 130101.Google ScholarGoogle ScholarCross RefCross Ref
  15. Eva Krah, Johannes de Kruijf, and Luigi Ragno. 2018. Integrating traditional healers into the health care system: Challenges and opportunities in rural northern Ghana. J. Commun. Health 43, 1 (2018), 157–163.Google ScholarGoogle ScholarCross RefCross Ref
  16. Shuai Liu, Weina Fu, Liqiang He, Jiantao Zhou, and Ming Ma. 2017. Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl. 76, 4 (2017), 5787–5802. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shuai Liu, Chunli Guo, Fadi AlTurjman, Khan Muhammad, and Victor Hugo C. de Albuquerque. 2020. Reliability of response region: A novel mechanism in visual tracking by edge computing for IIoT environments. Mech. Syst. Signal Process. 138 (2020), 106537.Google ScholarGoogle ScholarCross RefCross Ref
  18. Shuai Liu, Zheng Pan, and Xiaochun Cheng. 2017. A novel fast fractal image compression method based on distance clustering in high dimensional sphere surface. Fractals 25, 04 (2017), 1740004.Google ScholarGoogle ScholarCross RefCross Ref
  19. Zhaofeng Ma, Weihua Huang, and Hongmin Gao. 2018. Secure DRM scheme based on blockchain with high credibility. Chinese J. Electr. 27, 5 (2018), 1025–1036.Google ScholarGoogle ScholarCross RefCross Ref
  20. Stefanos Malliaros, Christos Xenakis, George Moldovan, John Mantas, Andriana Magdalinou, and Lydia Montandon. 2019. The integrated holistic security and privacy framework deployed in CrowdHEALTH project. Acta Informatica Medica 27, 5 (2019), 333.Google ScholarGoogle ScholarCross RefCross Ref
  21. Morgen E. Peck and Samuel K. Moore. 2017. The blossoming of the blockchain. IEEE Spectrum 54, 10 (2017), 24–25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. YiNing Qi and YongFeng Huang. 2019. DIRA: Enabling decentralized data integrity and reputation audit via blockchain. Sci. China Technol. Sci. 62 (2019), 698–701.Google ScholarGoogle ScholarCross RefCross Ref
  23. Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, and Xiaochun Cheng. 2020. A game theoretic analysis of resource mining in blockchain. Cluster Comput.: J. Netw. Softw. Tools Appl. 23, 3 (2020), 2035--2046. DOI:https://doi.org/10.1007/s10586-020-03046-wGoogle ScholarGoogle ScholarCross RefCross Ref
  24. Nina R. Sperber, Rebecca A. Bruening, Ashley Choate, Elizabeth Mahanna, Virginia Wang, Byron J. Powell, Teresa Damush, George L. Jackson, Courtney H. Van Houtven, Kelli D. Allen et al. 2019. Implementing a mandated program across a regional health care system: A rapid qualitative assessment to evaluate early implementation strategies. Qual. Manage. Healthcare 28, 3 (2019), 147–154.Google ScholarGoogle ScholarCross RefCross Ref
  25. Gautam Srivastava, Ashutosh Dhar Dwivedi, and Rajani Singh. 2018. Automated remote patient monitoring: Data sharing and privacy using blockchain. Retrieved from http://arxiv.org/abs/1811.03417.Google ScholarGoogle Scholar
  26. Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Data sharing and privacy for patient IoT devices using blockchain. In Proceedings of the International Conference on Smart City and Informatization. Springer, 334–348.Google ScholarGoogle ScholarCross RefCross Ref
  27. Philip Treleaven, Richard Gendal Brown, and Danny Yang. 2017. Blockchain technology in finance. Computer 50, 9 (2017), 14–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sarah Underwood. 2016. Blockchain beyond bitcoin. Cummun. ACM 59, 11 (Nov. 2016), 15–17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jessica J. Wyse, Adam J. Gordon, Steven K. Dobscha, Benjamin J. Morasco, Elizabeth Tiffany, Karen Drexler, Friedhelm Sandbrink, and Travis I. Lovejoy. 2018. Medications for opioid use disorder in the department of veterans affairs (VA) health care system: Historical perspective, lessons learned, and next steps. Substance Abuse 39, 2 (2018), 139–144.Google ScholarGoogle ScholarCross RefCross Ref
  30. Abbas Yazdinejad, Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Mohammed Aledhari. 2020. Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J. Biomed. Health Info. 24, 8 (2020), 2146--2156.Google ScholarGoogle ScholarCross RefCross Ref
  31. XianMing Zhang, QingLong Han, and Xiaohua Ge. 2017. A novel finitesum inequalitybased method for robust \(\) control of uncertain discretetime Takagi–Sugeno fuzzy systems with intervallike timevarying delays. IEEE Trans. Cybernet. 48, 9 (2017), 2569–2582.Google ScholarGoogle ScholarCross RefCross Ref
  32. Bo Zhao, Yu Xiao, Yuqing Huang, and Xiaoyu Cui. 2017. A private user data protection mechanism in TrustZone architecture based on identity authentication. Tsinghua Sci. Technol. 22, 2 (2017), 218–225.Google ScholarGoogle Scholar
  33. Dong Zhaoyang, Luo Fengji, and Gaoqi Liang. 2018. Blockchain: A secure, decentralized, trusted cyber infrastructure solution for future energy systems. J. Modern Power Syst. Clean Energy 6, 5 (2018), 958–967.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!