Advertisement

Journal of Medical Systems

, 42:136 | Cite as

MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain

  • Kai FanEmail author
  • Shangyang Wang
  • Yanhui Ren
  • Hui Li
  • Yintang Yang
Systems-Level Quality Improvement
Part of the following topical collections:
  1. Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Abstract

With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients’ data in hospitals. They are stored in different hospitals’ databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients’ information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.

Keywords

Medical data sharing Blockchain Security Privacy preserving Openness Efficiency 

Notes

Funding

This study was funded by the National Key R&D Program of China (No. 2017YFB0802300), the National Natural Science Foundation of China (No. 61772403 and No. U1401251), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2017JM6004), and National 111 Program of China B16037 and B08038.

Compliance with Ethical Standards

Conflict of Interest

Kai Fan declares that he has no conflict of interest. Shangyang Wang declares that he has no conflict of interest. Yanhui Ren declares that he has no conflict of interest. Hui Li declares that he has no conflict of interest. Yintang Yang declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Perera, G., Holbrook, A., Lehana, T. et al., Views on health information sharing using electronic medical records. Int. J. Med. Inform. 80, 2011.  https://doi.org/10.1016/j.ijmedinf.2010.11.005.
  2. 2.
    Kish, L. J., and Topol, E. J., Unpatients– why patients should own their medical data. Nat. Biotechnol. 33(9):921–924, 2015.  https://doi.org/10.1038/nbt.3340.CrossRefPubMedGoogle Scholar
  3. 3.
    Wang, Y., Li, P.-F. et al., A shared decision-making system for diabetes medication choice. IEEE Journal of Biomedical and Health Informatics. 21(5):1280–1287, 2017.  https://doi.org/10.1109/JBHI.2016.2614991.CrossRefPubMedGoogle Scholar
  4. 4.
    Lee, S. J., Larson, E. B., Dublin, S., Walker, R. L., Marcum, Z., and Barnes, D. E., Electronic medical record (EMR) predictors of undiagnosed dementia. Alzheimer's and Dementia. 13(7):1040–1041, 2017.  https://doi.org/10.1016/j.jalz.2017.06.1469.CrossRefGoogle Scholar
  5. 5.
    Thilakanathan, D., Chen, S., Nepal, S., Calvo, R. A., Liu, D., and Zic, J., Secure multiparty data sharing in the cloud using hardware-based TPM devices. In: Proc. IEEE 7th Int. Conf. on Cloud Comput. (CLOUD), pp. 224–231, 2014.  https://doi.org/10.1109/CLOUD.2014.39.
  6. 6.
    Khan, A. N., Kiah, M. L. M., Ali, M., Madani, S. A., Khan, A. U. R., and Shamshirband, S., BSS: Block-based sharing scheme for secure data storage services in mobile cloud environment. J. Super Comput. 70(2):946–976, 2014. Springer US.  https://doi.org/10.1007/s11227-014-1269-8.CrossRefGoogle Scholar
  7. 7.
    Jena, D., Mishra, B., et al. Securing Files in the Cloud. Presented at 2016 IEEE International Conference on, 2016. 10.1109/CCEM.2016.016. Available: http://ieeexplore.ieee.org/document/7819669/
  8. 8.
    O’Driscoll, A., Daugelaite, J., and Sleator, R. D., ‘Big data’, Hadoop and cloud computing in genomics. J. Biomed. Inform. 46(5):774–781, 2013.  https://doi.org/10.1016/j.jbi.2013.07.001.CrossRefPubMedGoogle Scholar
  9. 9.
    The Economist Intelligence Unit of IBM Institute for Business Value. Healthcare rallies for Blockchains: Keeping patients at the center. Healthcare and Blockchain Executive Report. 2017. Available: http://www.ibm.biz/blockchainhealth.
  10. 10.
    Fan, K., Ren, Y., Wang, Y., Li, H., and Yang, Y., Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5):527–532, 2018.  https://doi.org/10.1049/iet-com.2017.0619.
  11. 11.
    Shen, Z., Shu, J., and Xue, W., Keyword search with access control over encrypted cloud data. IEEE Sensors J. 17(3):858–868, 2016.  https://doi.org/10.1109/JSEN.2016.2634018.CrossRefGoogle Scholar
  12. 12.
    Liu, Z., Li, T. et al., Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78:778–788, 2017.  https://doi.org/10.1016/j.future.2017.02.024.CrossRefGoogle Scholar
  13. 13.
    Kim, K., and Zhang, F., ID-based blind signature and ring signature from pairings. International Conference on the Theory & Application., 2002.  https://doi.org/10.1007/3-540-36178-2_33.
  14. 14.
    Salazar, J. L., Tornos, J. L., and Piles, J. J., Efficient ways of prime number generation for ring signatures. Information Security, IET. 10, 2016.  https://doi.org/10.1049/iet-ifs.2014.0547.
  15. 15.
    Hardjono, T., and Smith, N., Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proc. 2nd ACM Int. WorkshopIoT Privacy, Trust, Secur. (IoTPTS), pp. 29–36, 2016. 10.1145/2899007.2899012Google Scholar
  16. 16.
    Zyskind, G., Nathan, O., and Pentland, A., Decentralizing privacy: Using blockchain to protect personal data. Proceedings of IEEE Security and Privacy Workshops:180–184, 2015.  https://doi.org/10.1109/SPW.2015.27.
  17. 17.
    Lippman, A., Vieira, T., Ekblaw, A., Azaria, A., et al., MedRec: Using blockchain for medical data. Presented at International Conference on Open & Big Data. 2016. Available: http://ieeexplore.ieee.org/document/7573685/
  18. 18.
    Xia, Q., Sifah, E. B. et al., MeDShare: Trust-Less Medical Data Sharing via Blockchain. IEEE Access. 5, 2017.  https://doi.org/10.1109/ACCESS.2017.2730843.
  19. 19.
    Esposito, C., Santis, A. D. et al., Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing. 5(1):31–37, 2018.  https://doi.org/10.1109/MCC.2018.011791712.CrossRefGoogle Scholar
  20. 20.
    Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel & Distributed Systems 24(1):131–143, 2013.  https://doi.org/10.1109/TPDS.2012.97.CrossRefGoogle Scholar
  21. 21.
    Li, W.-M., Li, X.-L. et al., Flexible CP-ABE Based Access Controlin in Hybrid Cloud System. J. Comput. Sci. Technol. 32, 2017.  https://doi.org/10.1007/s11390-017-1776-1.
  22. 22.
    Goyal, V., Pandey, O. et al., Attribute-based encryption for fine grained access control of encrypted data. In: Proc. 13th ACM conf. on Computer and communications security. pp. 89–98, 2006.  https://doi.org/10.1145/1180405.1180418.
  23. 23.
    Gu, K., Jia, W., Wang, G., and Wen, S., Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5):521–541, 2017. Springer Berlin Heidelberg.  https://doi.org/10.1007/s00236-016-0270-5.CrossRefGoogle Scholar
  24. 24.
    Guo, R., Shi, H., Zhao, Q., and Zheng, D., Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems. IEEE, 2018.  https://doi.org/10.1109/ACCESS.2018.2801266.
  25. 25.
    Ferdous, S., Margheri, A., Paci, F., and Sassone, V., Decentralized runtime monitoring for access control systems in cloud federations. Proc. IEEE Int. Conf. Distrib. Comput.:1–11, 2017.  https://doi.org/10.1109/ICDCS.2017.178.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.State Key Laboratory of Integrated Service NetworksXidian UniversityXi’anChina
  2. 2.Key Lab. of Minist. of Educ. for Wide Band-Gap Semicon. Materials and DevicesXidian UniversityXi’anChina

Personalised recommendations