Abstract
The essence of “blockchain” is a shared database in which information stored is un-falsifiable, traceable, open, and transparent. Therefore, to improve the security of private information in medical systems, this article uses blockchain technology to design a method to protect private information in medical systems and effectively realize anti-theft control of private information. First, the Patient-oriented Privacy Preserving Access Control model is introduced into the access control process of private information in medical systems. Next, a private information storage platform is built by using blockchain technology, and information transmission is realized using standard cryptographic algorithms. In this process, file authorization contracts are also used to guarantee the security of private information and further prevent theft of medical private information. Our simulation results show that the storage response time of this method is kept below 1,000 ms, and the maximum information throughput rate reaches 550 kbit/s, which indicates that this method has strong performance in information storage and transmission efficiency. Moreover, the reliability and bandwidth utilization of data transmission across domains is higher, so the method has higher information security control performance and superior overall performance.
- Jaafar M. Alghazo. 2019. Intelligent security and privacy of electronic health records using biometric images. Curr. Med. Imag. 15, 4 (2019), 386–394.Google Scholar
Cross Ref
- Jalal Amini, Abbas Hooshmand Viki, Ahmad Radan, and Mehrdad Moallem. 2016. A general control method for multilevel converters based on knapsack problem. IEEE Trans. Power Electr. 32, 1 (2016), 2–10.Google Scholar
Cross Ref
- Zachary BaynhamHerd. 2017. Enlist blockchain to boost conservation. Nature 548, 7669 (2017), 523–523.Google Scholar
- Mohamed Baza, Noureddine Lasla, Mohamed Mahmoud, Gautam Srivastava, and Mohamed Abdallah. 2019. B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Trans. Netw. Sci. Eng. (2019).Google Scholar
- Joan C. Chrisler, Angela Barney, and Brigida Palatino. 2016. Ageism can be hazardous to women’s health: Ageism, sexism, and stereotypes of older women in the healthcare system. J. Soc. Issues 72, 1 (2016), 86–104.Google Scholar
Cross Ref
- Joan Daemen and Vincent Rijmen. 2005. Rijndael/AES. In Encyclopedia of Cryptography and Security, Henk C. A. van Tilborg (Ed.). Springer. DOI:https://doi.org/10.1007/0-387-23483-7_358Google Scholar
- Ashutosh Dhar Dwivedi, Pawel Morawiecki, and Sebastian Wojtowicz. 2018. Finding differential paths in ARX ciphers through nested Monte-Carlo search. Int. J. Electr. Telecommun. 64, 2 (2018). DOI:https://doi.org/10.24425/119362Google Scholar
- Ashutosh Dhar Dwivedi, Lukas Malina, Petr Dzurenda, and Gautam Srivastava. 2019. Optimized blockchain model for internet of things based healthcare applications. In Proceedings of the 42nd International Conference on Telecommunications and Signal Processing (TSP’19). IEEE, 135–139.Google Scholar
Cross Ref
- Ashutosh Dhar Dwivedi, Pawel Morawiecki, and Gautam Srivastava. 2019. Differential cryptanalysis of round-reduced SPECK suitable for Internet of Things devices. IEEE Access 7 (2019), 16476–16486. DOI:https://doi.org/10.1109/ACCESS.2019.2894337Google Scholar
Cross Ref
- Ashutosh Dhar Dwivedi and Gautam Srivastava. 2018. Differential cryptanalysis of round-reduced LEA. IEEE Access 6 (2018), 79105–79113. DOI:https://doi.org/10.1109/ACCESS.2018.2881130Google Scholar
Cross Ref
- Ashutosh Dhar Dwivedi, Gautam Srivastava, Shalini Dhar, and Rajani Singh. 2019. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19, 2 (2019), 326.Google Scholar
- Peter Fairley. 2017. Blockchain worldfeeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous. IEEE Spectrum 54, 10 (2017), 36–59.Google Scholar
Digital Library
- Joshua J. Fenton, John A. Robbins, Anna Lee D. Amarnath, and Peter Franks. 2016. Osteoporosis overtreatment in a regional health care system. JAMA Internal Med. 176, 3 (2016), 391–393.Google Scholar
Cross Ref
- Hui Huang, Xiaofeng Chen, and Jianfeng Wang. 2020. Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Info. Sci. 63, 3 (2020), 130101.Google Scholar
Cross Ref
- Eva Krah, Johannes de Kruijf, and Luigi Ragno. 2018. Integrating traditional healers into the health care system: Challenges and opportunities in rural northern Ghana. J. Commun. Health 43, 1 (2018), 157–163.Google Scholar
Cross Ref
- Shuai Liu, Weina Fu, Liqiang He, Jiantao Zhou, and Ming Ma. 2017. Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl. 76, 4 (2017), 5787–5802. Google Scholar
Digital Library
- Shuai Liu, Chunli Guo, Fadi AlTurjman, Khan Muhammad, and Victor Hugo C. de Albuquerque. 2020. Reliability of response region: A novel mechanism in visual tracking by edge computing for IIoT environments. Mech. Syst. Signal Process. 138 (2020), 106537.Google Scholar
Cross Ref
- Shuai Liu, Zheng Pan, and Xiaochun Cheng. 2017. A novel fast fractal image compression method based on distance clustering in high dimensional sphere surface. Fractals 25, 04 (2017), 1740004.Google Scholar
Cross Ref
- Zhaofeng Ma, Weihua Huang, and Hongmin Gao. 2018. Secure DRM scheme based on blockchain with high credibility. Chinese J. Electr. 27, 5 (2018), 1025–1036.Google Scholar
Cross Ref
- Stefanos Malliaros, Christos Xenakis, George Moldovan, John Mantas, Andriana Magdalinou, and Lydia Montandon. 2019. The integrated holistic security and privacy framework deployed in CrowdHEALTH project. Acta Informatica Medica 27, 5 (2019), 333.Google Scholar
Cross Ref
- Morgen E. Peck and Samuel K. Moore. 2017. The blossoming of the blockchain. IEEE Spectrum 54, 10 (2017), 24–25.Google Scholar
Digital Library
- YiNing Qi and YongFeng Huang. 2019. DIRA: Enabling decentralized data integrity and reputation audit via blockchain. Sci. China Technol. Sci. 62 (2019), 698–701.Google Scholar
Cross Ref
- Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, and Xiaochun Cheng. 2020. A game theoretic analysis of resource mining in blockchain. Cluster Comput.: J. Netw. Softw. Tools Appl. 23, 3 (2020), 2035--2046. DOI:https://doi.org/10.1007/s10586-020-03046-wGoogle Scholar
Cross Ref
- Nina R. Sperber, Rebecca A. Bruening, Ashley Choate, Elizabeth Mahanna, Virginia Wang, Byron J. Powell, Teresa Damush, George L. Jackson, Courtney H. Van Houtven, Kelli D. Allen et al. 2019. Implementing a mandated program across a regional health care system: A rapid qualitative assessment to evaluate early implementation strategies. Qual. Manage. Healthcare 28, 3 (2019), 147–154.Google Scholar
Cross Ref
- Gautam Srivastava, Ashutosh Dhar Dwivedi, and Rajani Singh. 2018. Automated remote patient monitoring: Data sharing and privacy using blockchain. Retrieved from http://arxiv.org/abs/1811.03417.Google Scholar
- Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Data sharing and privacy for patient IoT devices using blockchain. In Proceedings of the International Conference on Smart City and Informatization. Springer, 334–348.Google Scholar
Cross Ref
- Philip Treleaven, Richard Gendal Brown, and Danny Yang. 2017. Blockchain technology in finance. Computer 50, 9 (2017), 14–17.Google Scholar
Digital Library
- Sarah Underwood. 2016. Blockchain beyond bitcoin. Cummun. ACM 59, 11 (Nov. 2016), 15–17. Google Scholar
Digital Library
- Jessica J. Wyse, Adam J. Gordon, Steven K. Dobscha, Benjamin J. Morasco, Elizabeth Tiffany, Karen Drexler, Friedhelm Sandbrink, and Travis I. Lovejoy. 2018. Medications for opioid use disorder in the department of veterans affairs (VA) health care system: Historical perspective, lessons learned, and next steps. Substance Abuse 39, 2 (2018), 139–144.Google Scholar
Cross Ref
- Abbas Yazdinejad, Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Mohammed Aledhari. 2020. Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J. Biomed. Health Info. 24, 8 (2020), 2146--2156.Google Scholar
Cross Ref
- XianMing Zhang, QingLong Han, and Xiaohua Ge. 2017. A novel finitesum inequalitybased method for robust \(\) control of uncertain discretetime Takagi–Sugeno fuzzy systems with intervallike timevarying delays. IEEE Trans. Cybernet. 48, 9 (2017), 2569–2582.Google Scholar
Cross Ref
- Bo Zhao, Yu Xiao, Yuqing Huang, and Xiaoyu Cui. 2017. A private user data protection mechanism in TrustZone architecture based on identity authentication. Tsinghua Sci. Technol. 22, 2 (2017), 218–225.Google Scholar
- Dong Zhaoyang, Luo Fengji, and Gaoqi Liang. 2018. Blockchain: A secure, decentralized, trusted cyber infrastructure solution for future energy systems. J. Modern Power Syst. Clean Energy 6, 5 (2018), 958–967.Google Scholar
Cross Ref
Index Terms
Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology
Recommendations
A Patient Privacy Protection Scheme for Medical Information System
In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection ...
Method for measuring the privacy level of pre‐published dataset
Several privacy protection technologies have been designed for protecting individuals’ privacy information in data publishing. It is often easy to make additional information loss of a dataset without measuring the strength of privacy protection it ...
Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IRadio Frequency Identification (RFID) system is an important technology in ubiquitous computing environment RFID system should be compatible with most RFID system applications to support the ubiquitous computing environment Recently, researchers had ...






Comments