Journal of Medical Systems

, 40:218 | Cite as

Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control

  • Xiao Yue
  • Huiju Wang
  • Dawei Jin
  • Mingqiang Li
  • Wei Jiang
Mobile & Wireless Health

Abstract

Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.

Keywords

Healthcare data system Indicator-centric schema BlockChain Healthcare data sharing Privacy risk 

Notes

Acknowledgment

This work is partly supported by the Humanity and Social Science Youth Foundation of Ministry of Education of China (Grant No.14YJC630181), the Fundamental Research Funds for the Central Universities of China(Grant No. JB-SK1206), the Scientific Research Fund for Talent Introduction of Zhongnan University of Economics and Law (Grant No. 21141611313), the Scientific Research Fund for Talent Introduction of Huaqiao University (Grant No. 12Y0324) and National Social Science Foundation for Young Scholars (Grant No.13CTJ003).

References

  1. 1.
    Kemkarl, O. S., and Dahikar, D. P. B., Can electronic medical record systems transform health care? potential health benefits, savings, and cost using latest advancements in ict for better interactive healthcare learning. International Journal of Computer Science & Communication Networks 2(3/6):453—455, 2012.Google Scholar
  2. 2.
    Bordea, G., Jothi, N., Rashid, N. A., Husain, W., Data mining in healthcare: a review. Procedia Computer Science 72:306–313, 2015.  http://dx.doi.org/10.1016/j.procs.2015.12.145.
  3. 3.
    Zhang, Y., Chen, M., Huang, D., Wu, D., Li, Y., idoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Futur. Gener. Comput. Syst., 2016.  http://dx.doi.org/10.1016/j.future.2015.12.001.
  4. 4.
    ONA General Counsel.: Members and patient privacy: be aware and beware!. https://www.ona.org/ (2016). [Online; accessed 28-Jul-2016]
  5. 5.
    The Office of the National Coordinator for Health Information Technology (ONC), USA.: The value of consumer access & use of online health records. https://www.healthit.gov/ (2015). [Online; accessed 28-Jul-2016]
  6. 6.
    Chen, M., Zhang, Y., Hu, L., Taleb, T., Sheng, Z., Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5g technologies. Mobile Networks and Applications 20(6):704–712, 2015.  http://dx.doi.org/10.1007/s11036-015-0590-7.CrossRefGoogle Scholar
  7. 7.
    Hendrick, E., Schooley, B., Gao, C.: Cloudhealth: Developing a reliable cloud platform for healthcare applications. In: 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp. 887–891.  http://dx.doi.org/10.1109/CCNC.2013.6488579 (2013)
  8. 8.
    Gul, O., Al-Qutayri, M., Vu, Q. H.: Framework of a national level electronic health record system. In: 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), pp. 60–65 2012.  http://dx.doi.org/10.1109/ICCCTAM.2012.6488072, p. Yeun, C.Y.
  9. 9.
    Patra, M. R., Das, R. K., Padhy, R. P.: Crhis: Cloud based rural healthcare information system. In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, ICEGOV ’12, pp. 402–405. ACM, New York, NY, USA.  http://dx.doi.org/10.1145/2463728.2463805 (2012)
  10. 10.
    Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., Salvador, G. S.: A cloud computing solution for patient’s data collection in health care institutions. In: 2nd International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED ’10. pp. 95–99.  http://dx.doi.org/10.1109/eTELEMED.2010.19 (2010)
  11. 11.
    Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., Alamri, A., Health-cps: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. PP(99):1–8, 2015.Google Scholar
  12. 12.
    Barua, M., Liang, X., Lu, R., Shen, X., Espac: Enabling security and patient-centric access control for ehealth in cloud computing. Int. J. Secur. Netw. 6(2/3):67–76, 2011.  http://dx.doi.org/10.1504/IJSN.2011.043666.CrossRefGoogle Scholar
  13. 13.
    Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving ehr system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW ’10, pp. 47–52. ACM, New York, NY, USA.  http://dx.doi.org/10.1145/1866835.1866845 (2010)
  14. 14.
    Chen, L., and Hoang, D. B.: Novel data protection model in healthcare cloud. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 550–555.  http://dx.doi.org/10.1109/HPCC.2011.148 (2011)
  15. 15.
    Zhang, Y., Grorec: A group-centric intelligent recommender system integrating social, mobile and big data technologies. IEEE Trans. Serv. Comput. 99:1–1, 2016.Google Scholar
  16. 16.
    Bentley, J. L., Multidimensional binary search trees used for associative searching. Commun. ACM 18(9): 509–517, 1975.  http://dx.doi.org/10.1145/361002.361007.CrossRefGoogle Scholar
  17. 17.
    Bereczky, N., Duch, A., Németh, K., Roura, S., Quad-kd trees. Theor. Comput. Sci. 616(C):126–140, 2016.  http://dx.doi.org/10.1016/j.tcs.2015.12.030.CrossRefGoogle Scholar
  18. 18.
    Guttman, A.: R-trees: A dynamic index structure for spatial searching. In: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD ’84, pp. 47–57. ACM, New York, NY, USA.  http://dx.doi.org/10.1145/602259.602266 (1984)
  19. 19.
    Jin, P., Xie, X., Wang, N., Yue, L., Optimizing r-tree for flash memory. Expert Syst. Appl. 42(10): 4676–4686, 2015.  http://dx.doi.org/10.1016/j.eswa.2015.01.011.CrossRefGoogle Scholar
  20. 20.
    Zyskind, G., Nathan, O., Pentland, A., Enigma: Decentralized computation platform with guaranteed privacy. CoRR abs/1506,03471, 2015.Google Scholar
  21. 21.
    Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC ’88, pp. 11–19. ACM, New York, NY, USA .  http://dx.doi.org/10.1145/62212.62214 (1988)
  22. 22.
    Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC ’87, pp. 218–229. ACM, New York, NY, USA.  http://dx.doi.org/10.1145/28395.28420 (1987)

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Political Science and Public AdministrationHuaqiao UniversityFujianChina
  2. 2.School of Information and Safety EngineeringZhongnan University of Economics and LawWuhanChina
  3. 3.School of Public AdministrationZhongnan University of Economics and LawWuhanChina

Personalised recommendations