Skip to main content

Advertisement

Log in

Blockchain-Based Data Preservation System for Medical Data

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Medical care has become an indispensable part of people’s lives, with a dramatic increase in the volume of medical data (e.g., diagnosis certificates and medical records). Medical data, however, is easily stolen, tampered with, or even completely deleted. If the above occurs, medical data cannot be recorded or retrieved in a reliable manner, resulting in delay treatment progress, even endanger the patient’s life. In this paper, we propose a novel blockchain-based data preservation system (DPS) for medical data. To provide a reliable storage solution to ensure the primitiveness and verifiability of stored data while preserving privacy for users, we leverage the blockchain framework. With the proposed DPS, users can preserve important data in perpetuity, and the originality of the data can be verified if tampering is suspected. In addition, we use prudent data storage strategies and a variety of cryptographic algorithms to guarantee user privacy; e.g., an adversary is unable to read the plain text even if the data are stolen. We implement a prototype of the DPS based on the real world blockchain-based platform Ethereum. Performance evaluation results demonstrate the effectiveness and efficiency of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Lefeuvre, D., Pavillon, G., Aouba, A., Lamarche-Vadel, A., Fouillet, A., Jougla, E., and Rey, G., Quality comparison of electronic versus paper death certificates in France, 2010. Popul. Health Metrics 12(1):3, 2014. https://doi.org/10.1186/1478-7954-12-3.

    Article  Google Scholar 

  2. Oskolkov, I., and Shishkov, R.: Converting paper invoice to electronic form for processing of electronic payment thereof. Jan. 21 2014, US Patent 8,635,156. [Online]. Available: https://www.google.com/patents/US8635156

  3. Berman, F., Got data?: A guide to data preservation in the information age. Commun. ACM 51(12):50–56, 2008. https://doi.org/10.1145/1409360.1409376.

    Article  Google Scholar 

  4. Miller, A., Juels, A., Shi, E., Parno, B., and Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy, pp. 475–490, 2014.

  5. Swan, M., Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015.

    Google Scholar 

  6. Wijaya, D. A.: Extending asset management system functionality in bitcoin platform. In: 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 97–101, 2016.

  7. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, 2008

  8. Raghav, S., and Saxena, A. K.: Mobile forensics: Guidelines and challenges in data preservation and acquisition. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 5–8, 2009.

  9. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., and Felten, E. W.: Research perspectives and challenges for bitcoin and cryptocurrencies, vol. to appear, pp. 104–121, 2015

  10. Vukolić, M.: The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In: Camenisch, J., and Kesdoğan, D. (Eds.). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-39028-4_9, 2016

  11. Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’16. https://doi.org/10.1145/2976749.2978341, pp. 3–16. ACM, New York, 2016.

  12. Back, A.: Hashcash - a denial of service counter-measure. In: USENIX Technical Conference, Conference Proceedings, 2002

  13. Pass, R., Seeman, L., and Shelat, A.: Analysis of the blockchain protocol in asynchronous networks:643–673. https://doi.org/10.1007/978-3-319-56614-6_22, 2017

  14. Gao, F., Zhu, L., Shen, M., Sharif, K., Wan, Z., and Ren, K.: A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. In: IEEE Network. https://doi.org/10.1109/MNET.2018.1700269, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8338177&isnumber=7593428, 2018

  15. Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858, 2016.

  16. Atzei, N., Bartoletti, M., and Cimoli, T., A Survey of Attacks on Ethereum Smart Contracts (SoK), pp. 164–186. Berlin: Springer, 2017. https://doi.org/10.1007/978-3-662-54455-6_8.

    Google Scholar 

  17. Wood, G., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32, 2014.

    Google Scholar 

  18. Christidis, K., and Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303, 2016.

    Article  Google Scholar 

  19. Wan, Z., Deng, R. H., and Lee, D., Electronic Contract Signing Without Using Trusted Third Party, pp. 386–394. Cham: Springer International Publishing, 2015. https://doi.org/10.1007/978-3-319-25645-0_27.

    Google Scholar 

  20. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. https://doi.org/10.1145/1315245.1315318, pp. 598–609. ACM, New York, 2007.

  21. Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., and Hu, J., Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940–953, 2018.

    Article  Google Scholar 

  22. Zhu, L., Tang, X., Shen, M., Du, X., and Guizani, M., Privacy-preserving ddos attack detection using cross-domain traffic in software defined networks. IEEE J. Sel. Areas Commun. 36(3):628–643, 2018.

    Article  Google Scholar 

  23. Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8):1830–1843, 2017.

    Article  Google Scholar 

  24. He, D., Kumar, N., Wang, H., Wang, L., and Choo, K.-K. R., Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314(Supplement C):31–43, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0096300317304599.

    Google Scholar 

  25. Cheng, H., Rong, C., Hwang, K., Wang, W., and Li, Y., Secure big data storage and sharing scheme for cloud tenants. China Communications 12(6):106–115, 2015.

    Article  Google Scholar 

  26. McConaghy, T., Marques, R., and Müller, A.: Bigchaindb: A scalable blockchain database, 2016

  27. Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments, 2017

  28. Summary of the amazon s3 service disruption in the northern virginia (us-east-1) region. https://aws.amazon.com/cn/message/41926/. Accessed 20 Aug 2017

  29. Bengtsson, S., and Solheim, B., Enforcement of data protection, privacy and security in medical informatics. MEDINFO 92:6–10, 1992.

    Google Scholar 

  30. Barnaby Jack Could Hack Your Pacemaker and Make Your Heart Explode. https://www.vice.com/en_ca/article/avnx5j/i-worked-out-how-to-remotely-weaponise-a-pacemaker. Accessed 11 May 2017

  31. Ethereum Project. https://www.ethereum.org/. Accessed 11 May 2017

  32. ethernodes.org - The ethereum node explorer. https://www.ethernodes.org/network/1. Accessed 31 Jan 2017

  33. Arent, L. M., Brownstone, R. D., and Fenwick, W. A., Ediscovery: Preserving, requesting & producing electronic information. Santa Clara Computer & High Tech. LJ 19:131, 2002.

    Google Scholar 

  34. Cooper, B. F., and Garcia-Molina, H.: Bidding for storage space in a peer-to-peer data preservation system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 372–381, 2002.

  35. Wang, H., He, D., and Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Futur. Gener. Comput. Syst., 2017

  36. Example transaction cost. http://ethdocs.org/en/latest/contracts-and-transactions/account-types-gas-and-transactions.html#example-transaction-cost. Accessed 31 Jan 2017

  37. ethereum/go-ethereum: Official go implementation of the ethereum protocol. https://github.com/ethereum/go-ethereum. Accessed 30 Jan 2017

  38. Bitcoin, ethereum, and litecoin price charts - coinbase. https://www.coinbase.com/charts. Accessed 11 May 2017

  39. Myetherwallet.com. https://www.myetherwallet.com/helpers.html. Accessed 11 May 2017

Download references

Funding

This work was supported in part by the Guangxi Cooperative Innovation Center of cloud computing and Big Data (No.YD16E14), National Science Foundation of China under Grant 61602039, CCF-Venustech Open Research Fund and BIT-UMF research and development fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Shen.

Ethics declarations

Conflict of interests

Mr. H. Li declares that he has no conflict of interest. Mr. Z. Lie declares that he has no conflict of interest. Mr. M. Shen declares that he has no conflict of interest. Mr. F. Gao declares that he has no conflict of interest. Ms. X. Tao declares that she has no conflict of interest. Mr. S. Liu declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

This article is part of the Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Zhu, L., Shen, M. et al. Blockchain-Based Data Preservation System for Medical Data. J Med Syst 42, 141 (2018). https://doi.org/10.1007/s10916-018-0997-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-018-0997-3

Keywords

Navigation