Advertisement

Journal of Medical Systems

, 42:141 | Cite as

Blockchain-Based Data Preservation System for Medical Data

  • Hongyu Li
  • Liehuang Zhu
  • Meng ShenEmail author
  • Feng Gao
  • Xiaoling Tao
  • Sheng Liu
Systems-Level Quality Improvement
Part of the following topical collections:
  1. Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Abstract

Medical care has become an indispensable part of people’s lives, with a dramatic increase in the volume of medical data (e.g., diagnosis certificates and medical records). Medical data, however, is easily stolen, tampered with, or even completely deleted. If the above occurs, medical data cannot be recorded or retrieved in a reliable manner, resulting in delay treatment progress, even endanger the patient’s life. In this paper, we propose a novel blockchain-based data preservation system (DPS) for medical data. To provide a reliable storage solution to ensure the primitiveness and verifiability of stored data while preserving privacy for users, we leverage the blockchain framework. With the proposed DPS, users can preserve important data in perpetuity, and the originality of the data can be verified if tampering is suspected. In addition, we use prudent data storage strategies and a variety of cryptographic algorithms to guarantee user privacy; e.g., an adversary is unable to read the plain text even if the data are stolen. We implement a prototype of the DPS based on the real world blockchain-based platform Ethereum. Performance evaluation results demonstrate the effectiveness and efficiency of the proposed system.

Keywords

Data preservation Blockchain Medical data Sensitive data Ethereum 

Notes

Funding Information

This work was supported in part by the Guangxi Cooperative Innovation Center of cloud computing and Big Data (No.YD16E14), National Science Foundation of China under Grant 61602039, CCF-Venustech Open Research Fund and BIT-UMF research and development fund.

Compliance with Ethical Standards

Conflict of interests

Mr. H. Li declares that he has no conflict of interest. Mr. Z. Lie declares that he has no conflict of interest. Mr. M. Shen declares that he has no conflict of interest. Mr. F. Gao declares that he has no conflict of interest. Ms. X. Tao declares that she has no conflict of interest. Mr. S. Liu declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Lefeuvre, D., Pavillon, G., Aouba, A., Lamarche-Vadel, A., Fouillet, A., Jougla, E., and Rey, G., Quality comparison of electronic versus paper death certificates in France, 2010. Popul. Health Metrics 12(1):3, 2014.  https://doi.org/10.1186/1478-7954-12-3.CrossRefGoogle Scholar
  2. 2.
    Oskolkov, I., and Shishkov, R.: Converting paper invoice to electronic form for processing of electronic payment thereof. Jan. 21 2014, US Patent 8,635,156. [Online]. Available: https://www.google.com/patents/US8635156
  3. 3.
    Berman, F., Got data?: A guide to data preservation in the information age. Commun. ACM 51(12):50–56, 2008.  https://doi.org/10.1145/1409360.1409376.CrossRefGoogle Scholar
  4. 4.
    Miller, A., Juels, A., Shi, E., Parno, B., and Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy, pp. 475–490, 2014.Google Scholar
  5. 5.
    Swan, M., Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015.Google Scholar
  6. 6.
    Wijaya, D. A.: Extending asset management system functionality in bitcoin platform. In: 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 97–101, 2016.Google Scholar
  7. 7.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, 2008Google Scholar
  8. 8.
    Raghav, S., and Saxena, A. K.: Mobile forensics: Guidelines and challenges in data preservation and acquisition. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 5–8, 2009.Google Scholar
  9. 9.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., and Felten, E. W.: Research perspectives and challenges for bitcoin and cryptocurrencies, vol. to appear, pp. 104–121, 2015Google Scholar
  10. 10.
    Vukolić, M.: The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In: Camenisch, J., and Kesdoğan, D. (Eds.). Cham: Springer International Publishing.  https://doi.org/10.1007/978-3-319-39028-4_9, 2016
  11. 11.
    Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’16.  https://doi.org/10.1145/2976749.2978341, pp. 3–16. ACM, New York, 2016.
  12. 12.
    Back, A.: Hashcash - a denial of service counter-measure. In: USENIX Technical Conference, Conference Proceedings, 2002Google Scholar
  13. 13.
    Pass, R., Seeman, L., and Shelat, A.: Analysis of the blockchain protocol in asynchronous networks:643–673.  https://doi.org/10.1007/978-3-319-56614-6_22, 2017
  14. 14.
    Gao, F., Zhu, L., Shen, M., Sharif, K., Wan, Z., and Ren, K.: A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. In: IEEE Network.  https://doi.org/10.1109/MNET.2018.1700269, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8338177&isnumber=7593428, 2018
  15. 15.
    Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858, 2016.Google Scholar
  16. 16.
    Atzei, N., Bartoletti, M., and Cimoli, T., A Survey of Attacks on Ethereum Smart Contracts (SoK), pp. 164–186. Berlin: Springer, 2017.  https://doi.org/10.1007/978-3-662-54455-6_8.Google Scholar
  17. 17.
    Wood, G., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32, 2014.Google Scholar
  18. 18.
    Christidis, K., and Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303, 2016.CrossRefGoogle Scholar
  19. 19.
    Wan, Z., Deng, R. H., and Lee, D., Electronic Contract Signing Without Using Trusted Third Party, pp. 386–394. Cham: Springer International Publishing, 2015.  https://doi.org/10.1007/978-3-319-25645-0_27.Google Scholar
  20. 20.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07.  https://doi.org/10.1145/1315245.1315318, pp. 598–609. ACM, New York, 2007.
  21. 21.
    Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., and Hu, J., Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940–953, 2018.CrossRefGoogle Scholar
  22. 22.
    Zhu, L., Tang, X., Shen, M., Du, X., and Guizani, M., Privacy-preserving ddos attack detection using cross-domain traffic in software defined networks. IEEE J. Sel. Areas Commun. 36(3):628–643, 2018.CrossRefGoogle Scholar
  23. 23.
    Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8):1830–1843, 2017.CrossRefGoogle Scholar
  24. 24.
    He, D., Kumar, N., Wang, H., Wang, L., and Choo, K.-K. R., Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314(Supplement C):31–43, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0096300317304599.Google Scholar
  25. 25.
    Cheng, H., Rong, C., Hwang, K., Wang, W., and Li, Y., Secure big data storage and sharing scheme for cloud tenants. China Communications 12(6):106–115, 2015.CrossRefGoogle Scholar
  26. 26.
    McConaghy, T., Marques, R., and Müller, A.: Bigchaindb: A scalable blockchain database, 2016Google Scholar
  27. 27.
    Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments, 2017Google Scholar
  28. 28.
    Summary of the amazon s3 service disruption in the northern virginia (us-east-1) region. https://aws.amazon.com/cn/message/41926/. Accessed 20 Aug 2017
  29. 29.
    Bengtsson, S., and Solheim, B., Enforcement of data protection, privacy and security in medical informatics. MEDINFO 92:6–10, 1992.Google Scholar
  30. 30.
    Barnaby Jack Could Hack Your Pacemaker and Make Your Heart Explode. https://www.vice.com/en_ca/article/avnx5j/i-worked-out-how-to-remotely-weaponise-a-pacemaker. Accessed 11 May 2017
  31. 31.
    Ethereum Project. https://www.ethereum.org/. Accessed 11 May 2017
  32. 32.
    ethernodes.org - The ethereum node explorer. https://www.ethernodes.org/network/1. Accessed 31 Jan 2017
  33. 33.
    Arent, L. M., Brownstone, R. D., and Fenwick, W. A., Ediscovery: Preserving, requesting & producing electronic information. Santa Clara Computer & High Tech. LJ 19:131, 2002.Google Scholar
  34. 34.
    Cooper, B. F., and Garcia-Molina, H.: Bidding for storage space in a peer-to-peer data preservation system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 372–381, 2002.Google Scholar
  35. 35.
    Wang, H., He, D., and Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Futur. Gener. Comput. Syst., 2017Google Scholar
  36. 36.
  37. 37.
    ethereum/go-ethereum: Official go implementation of the ethereum protocol. https://github.com/ethereum/go-ethereum. Accessed 30 Jan 2017
  38. 38.
    Bitcoin, ethereum, and litecoin price charts - coinbase. https://www.coinbase.com/charts. Accessed 11 May 2017
  39. 39.
    Myetherwallet.com. https://www.myetherwallet.com/helpers.html. Accessed 11 May 2017

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Hongyu Li
    • 1
  • Liehuang Zhu
    • 1
  • Meng Shen
    • 1
    Email author
  • Feng Gao
    • 1
  • Xiaoling Tao
    • 2
  • Sheng Liu
    • 3
  1. 1.Beijing Institute of TechnologyBeijingChina
  2. 2.Guilin University of Electronic TechnologyGuilinChina
  3. 3.Union Mobile Finacial Technology Co., Ltd.BeijingChina

Personalised recommendations