Computer Science ›› 2020, Vol. 47 ›› Issue (4): 285-291.doi: 10.11896/jsjkx.190400001

• Information Security • Previous Articles     Next Articles

Medical Data Storage Mechanism Integrating Blockchain Technology

WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming   

  1. School of Computer Science and Technology,Nanjing University of Technology,Nanjing 211816,China
  • Received:2019-04-01 Online:2020-04-15 Published:2020-04-15
  • Contact: LIU Yu-xiang,born in 1996,postgra-duate,is member of China Computer Fe-deration(CCF).His main research inte-rests include blockchain and data secu-rity.
  • About author:WANG Hui, born in 1962,Ph.D,professor.Her main research interests include optical communication and signal processing.

Abstract: The Singularity and centrality of Medical Institutions’ existing database storage makes the security,integrity and traceability of electronic medical data impossible to be guaranteed,as a result,the medical privacy of patients is threatened.Although existing research has proposed a secure data storage scheme based on cloud storage,it needs to rely on a fully trusted third party to ensure the reliability of interaction.Therefore,this paper proposed a decentralized block chain information management scheme to achieve the safe storage of medical data.This scheme adopts improved PBFT consensus algorithm and optimized Hash encryption algorithm to store medical data safely and effectively in distributed database to ensure the integrity and traceabi-lity of medical data.At the same time,it proposes and designs a new data interaction system to prevent the direct interaction between the third party and the database,prevent the untrustworthy third party from maliciously destroying medical data and ensure the data.Finally,through access control and Lucene search mechanism to ensure patient privacy and achieve rapid retrieval of medical data.Experiments show that the improved PBFT consensus algorithm provides better stability and throughput than proof of work(POW) and delegated proof of stake (DPOS).Compared with the common database interaction,the data interaction system in this paper effectively prevents the direct operation of the database and has better security and tamper resistance.The experimental data show that the decentralized medical data storage system,the improved PBFT consensus algorithm and the data interaction system architecture have realized the security,traceability and tamper-proof of medical data,solved the difficulties of centralized storage,traceability and vulnerability of medical data,and laid a foundation for further promoting the application of block chain technology in the development of medical information industry.

Key words: Medical blockchain, Consensus algorithm, Privacy protection, Data interaction, Access control

CLC Number: 

  • TP393
[1]FAN K,WANG S Y,REN Y H,et al.MedBlock:Efficient and Secure Medical Data Sharing Via Blockchain[J].Journal of Medical Systems,2018,42(8):136.
[2]WANG H,SONG Y J.Secure Cloud-Based EHR System UsingAttribute-Based Cryptosystem and Blockchain[J].Journal of Medical Systems,2018,42(8):152.
[3]AZARIA A,EKBLAW A,VIEIRA T,et al.MedRec:UsingBlockchain for Medical Data Access and Permission Management[C]//International Conference on Open and Big Data.IEEE,2016:25-30.
[4]ESPOSITO C,SANTIS A D,TORTORA G,et al.Blockchain:A Panacea for Healthcare Cloud-Based Data Security and Privacy?[J].IEEE Cloud Computing,2018,5(1):31-37.
[5]PATEL V.A framework for secure and decentralized sharing of medical imaging data via blockchain consensus[J].Health Informatics Journal,2018,25(4):146045821876969.
[6]LI H Y,ZHU L H,SHEN M,et al.Blockchain-Based DataPreservation System for Medical Data[J].Journal of Medical Systems,2018,42(8):1-13.
[7]CHEN Y,DING S,XU Z,et al.Blockchain-Based Medical Records Secure Storage and Medical Service Framework[J].Journal of Medical Systems,2018,43(1).
[8]BROGAN J,BASKARAN I,RAMACHANDRAN N.Authenticating Health Activity Data Using Distributed Ledger Technologies [J].Computational and Structural Biotechnology Journal,2018,16(7):257-266.
[9]XIA Q,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-less Medical Data Sharing Among Cloud Service Providers Via Blockchain[J].IEEE Access,2017,PP(99):1-1.
[10]LIU P T S.Medical Record System Using Blockchain,Big Data and Tokenization[C]//International Conference on Information and Communications Security.Springer International Publi-shing,2016.
[11]KIM K J,HONG S P.A Trusted Sharing Model for Patient Records based on Permissioned Blockchain[J].Journal of Internet Computing and Services,2017,6:75-84.
[12]METTLER M.Blockchain technology in healthcare:The revolution starts here[C]//2016 IEEE 18th International Conference on E-Health Networking,Applications and Services.IEEE,2016:1-3.
[13]LIU P T S.Medical Record System Using Blockchain,Big Data and Tokenization[C]//International Conference on Information and Communications Security.Springer International Publishing,2016.
[14]ZHANG P,WHITE J,SCHMIDT D C,et al.FHIRChain:Applying Blockchain to Securely and Scalably Share Clinical Data [J].Computational and Structural Biotechnology Journal,2018,16:267-278.
[15]HOY M B.An Introduction to the Blockchain and Its Implications for Libraries and Medicine[J].Medical Reference Services Quarterly,2017,36(3):273-279.
[16]ZHOU L J,WANG L C,SUN Y R.MIStore:a Blockchain-Based Medical Insurance Storage System[J].Journal of Medical Systems,2018,42(8):149.
[17]LESLIE M.(Block) Chain Reaction:A Blockchain RevolutionSweeps into Health Care,Offering the Possibility for a Much-Needed Data Solution[J].IEEE Pulse,2018,9(3):4-7.
[18]HÖLBL,MARKO,KOMPARA M,et al.A Systematic Review of the Use of Blockchain in Healthcare[J].Symmetry,2018,10(10):470.
[19]XUE T F,FU Q C,WANG W,et al.Research on medical data sharing model based on blockchain[J].Acta Automatica Sinica,2017,43(9):1555-1562.
[1] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[2] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[3] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[4] GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[7] WU Guang-fu, CHEN Ying, ZENG Xian-wen, HE Dao-Jing and LI Jiang-hua. Design and Analysis of Token Model Based on Blockchain Technology [J]. Computer Science, 2020, 47(6A): 603-608.
[8] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[9] XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286.
[10] ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319.
[11] TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299.
[12] ZHANG Peng-yi, SONG Jie. Research Advance on Efficiency Optimization of Blockchain Consensus Algorithms [J]. Computer Science, 2020, 47(12): 296-303.
[13] WANG Tong, MA Wen-ping, LUO Wei. Information Sharing and Secure Multi-party Computing Model Based on Blockchain [J]. Computer Science, 2019, 46(9): 162-168.
[14] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[15] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .