MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain
- 1.9k Downloads
With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients’ data in hospitals. They are stored in different hospitals’ databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients’ information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.
KeywordsMedical data sharing Blockchain Security Privacy preserving Openness Efficiency
This study was funded by the National Key R&D Program of China (No. 2017YFB0802300), the National Natural Science Foundation of China (No. 61772403 and No. U1401251), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2017JM6004), and National 111 Program of China B16037 and B08038.
Compliance with Ethical Standards
Conflict of Interest
Kai Fan declares that he has no conflict of interest. Shangyang Wang declares that he has no conflict of interest. Yanhui Ren declares that he has no conflict of interest. Hui Li declares that he has no conflict of interest. Yintang Yang declares that he has no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
- 1.Perera, G., Holbrook, A., Lehana, T. et al., Views on health information sharing using electronic medical records. Int. J. Med. Inform. 80, 2011. https://doi.org/10.1016/j.ijmedinf.2010.11.005.
- 5.Thilakanathan, D., Chen, S., Nepal, S., Calvo, R. A., Liu, D., and Zic, J., Secure multiparty data sharing in the cloud using hardware-based TPM devices. In: Proc. IEEE 7th Int. Conf. on Cloud Comput. (CLOUD), pp. 224–231, 2014. https://doi.org/10.1109/CLOUD.2014.39.
- 6.Khan, A. N., Kiah, M. L. M., Ali, M., Madani, S. A., Khan, A. U. R., and Shamshirband, S., BSS: Block-based sharing scheme for secure data storage services in mobile cloud environment. J. Super Comput. 70(2):946–976, 2014. Springer US. https://doi.org/10.1007/s11227-014-1269-8.CrossRefGoogle Scholar
- 7.Jena, D., Mishra, B., et al. Securing Files in the Cloud. Presented at 2016 IEEE International Conference on, 2016. 10.1109/CCEM.2016.016. Available: http://ieeexplore.ieee.org/document/7819669/
- 9.The Economist Intelligence Unit of IBM Institute for Business Value. Healthcare rallies for Blockchains: Keeping patients at the center. Healthcare and Blockchain Executive Report. 2017. Available: http://www.ibm.biz/blockchainhealth.
- 10.Fan, K., Ren, Y., Wang, Y., Li, H., and Yang, Y., Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5):527–532, 2018. https://doi.org/10.1049/iet-com.2017.0619.
- 13.Kim, K., and Zhang, F., ID-based blind signature and ring signature from pairings. International Conference on the Theory & Application., 2002. https://doi.org/10.1007/3-540-36178-2_33.
- 14.Salazar, J. L., Tornos, J. L., and Piles, J. J., Efficient ways of prime number generation for ring signatures. Information Security, IET. 10, 2016. https://doi.org/10.1049/iet-ifs.2014.0547.
- 15.Hardjono, T., and Smith, N., Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proc. 2nd ACM Int. WorkshopIoT Privacy, Trust, Secur. (IoTPTS), pp. 29–36, 2016. 10.1145/2899007.2899012Google Scholar
- 16.Zyskind, G., Nathan, O., and Pentland, A., Decentralizing privacy: Using blockchain to protect personal data. Proceedings of IEEE Security and Privacy Workshops:180–184, 2015. https://doi.org/10.1109/SPW.2015.27.
- 17.Lippman, A., Vieira, T., Ekblaw, A., Azaria, A., et al., MedRec: Using blockchain for medical data. Presented at International Conference on Open & Big Data. 2016. Available: http://ieeexplore.ieee.org/document/7573685/
- 18.Xia, Q., Sifah, E. B. et al., MeDShare: Trust-Less Medical Data Sharing via Blockchain. IEEE Access. 5, 2017. https://doi.org/10.1109/ACCESS.2017.2730843.
- 21.Li, W.-M., Li, X.-L. et al., Flexible CP-ABE Based Access Controlin in Hybrid Cloud System. J. Comput. Sci. Technol. 32, 2017. https://doi.org/10.1007/s11390-017-1776-1.
- 22.Goyal, V., Pandey, O. et al., Attribute-based encryption for fine grained access control of encrypted data. In: Proc. 13th ACM conf. on Computer and communications security. pp. 89–98, 2006. https://doi.org/10.1145/1180405.1180418.
- 25.Ferdous, S., Margheri, A., Paci, F., and Sassone, V., Decentralized runtime monitoring for access control systems in cloud federations. Proc. IEEE Int. Conf. Distrib. Comput.:1–11, 2017. https://doi.org/10.1109/ICDCS.2017.178.