Skip to main content

Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)

  • Conference paper
  • First Online:
Book cover Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2019)

Abstract

The cloud storage and sharing system are widely used in medical systems. The unique characteristics of cloud storage enable healthy data being efficiently delivered and retrieved. Nevertheless, traditional medical cloud system suffers two flaws. For one thing, centralized cloud servers are vulnerable to malicious attack and single point of failure. For another, these systems cannot offer a powerful capability to protect medical health data. Blockchain technology is considered to be one of vital technologies of Bitcoin. In this paper, we propose a security model which combines the cloud storage technology with blockchain technology. Our model adopts Delegate Proof of Stake (DPOS) consensus mechanism to ensure that all nodes have unified state in the network. Additionally, the CP-ABE scheme is introduced into the Proxy Re-encryption to store and share medical data which supports the keywords searching. Moreover, we rank medical institutions that different ranks have different duties. In our secure sharing models, there are no central nodes and it is a distributed environment. It not only can reduce the access overhead of the blockchain but also better resist the collusion attack. Furthermore, our security analysis indicates that the proposed scheme achieves provable security under the q-DBDHE assumption in the random oracle model. Then, the comparisons show that our model is more efficient and practical than previous ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. He, C., Fan, X., Li, Y.: Toward ubiquitous healthcare services with a novel efficient cloud platform. IEEE Trans. Biomedical Eng. 60(1), 230–234 (2013)

    Article  Google Scholar 

  2. Kyazze, M., Wesson, J., Naude, K.: The design and implementation of a ubiquitous personal health record system for South Africa. Stud. Health Technol. Informatics 206(206), 29–41 (2014)

    Google Scholar 

  3. Cheng, H., Min, Z., Deng-Guo, F.: Achieving efficient dynamic cryptographic access control in cloud storage. J. Commun. 32(7), 125–132 (2011)

    Google Scholar 

  4. Seo, H.J., Kim, H.W.: Attribute-based proxy re-encryption with a constant number of pairing operations. J. Inf. Commun. Convergence Eng. 10(1), 53–60 (2012)

    Google Scholar 

  5. Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Tran. Inf. Forensics Secur. 10(9), 1981–1992 (2017)

    Article  Google Scholar 

  6. Azaria, A., Ekblad, A., Vieira, T.: MedRec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data (OBD), pp. 25–30. IEEE (2016)

    Google Scholar 

  7. Fu, D., Fang L.: Blockchain-based trusted computing in social network. In: IEEE International Conference on Computer & Communications, pp. 19–22. IEEE (2017)

    Google Scholar 

  8. Kuo, T., Ohno-Machado, L.: Model chain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. Int. J. Netw. Secur. Appl. 1802, 01746 (2018)

    Google Scholar 

  9. Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2017)

    Article  Google Scholar 

  10. Akinyele, J.A., et al.: Securing electronic medical records using attribute-based encryption on mobile devices. In: 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–86. ACM (2011)

    Google Scholar 

  11. Yanfeng, S., Jiqiang, L., Zhen, H.: Attribute-based proxy re-encryption with keyword search. PLoS ONE 9(12), 116325 (2014)

    Article  Google Scholar 

  12. Luo, S., Hu, J., Chen, Z.: Ciphertext policy attribute-based proxy re-encryption. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 401–415. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17650-0_28

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Feng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feng, T., Jiao, Y., Fang, J. (2019). Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper). In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30146-0_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30145-3

  • Online ISBN: 978-3-030-30146-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics