Computer Science ›› 2020, Vol. 47 ›› Issue (4): 305-311.doi: 10.11896/jsjkx.190300087

• Information Security • Previous Articles     Next Articles

Medical Health Data Security Model Based on Alliance Blockchain

FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye   

  1. School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730000,China
  • Received:2019-03-20 Online:2020-04-15 Published:2020-04-15
  • Contact: FENG Tao,born in 1970,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include network and information security.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61462060)

Abstract: In traditional medical information system,medical health data security storage and sharing have been becoming a challenging task.There are many restrictions in process of health data accessing and sharing for different people of identity,which spends a lot of resources and time on identity verification and data authentication.Aiming at these problems such as storage of the high concentration,unreliable data sharing security and the difficulty of reaching agreement,this paper proposed an alliance blockchain-based medical health data security model.According to the distribution of medical resources in reality,the medical institutions are ranked in the security model,and then combine DPOS with PBFT to ensure that the medical institutions can reach an agreement rapidly without a central node and share medical data in alliance.The security model has the advantages of decentralization,high security and tamper resistance,so it can store data records and other important information on the blockchain,but the original medical data is stored in Distributed database.The use’s medical health data is stored securely,meanwhile the sharing efficiency among the medical institutions is improved.Security analysis shows that the proposed model can protect medical health data within the scope of fault tolerance,prevent the data from tampering and the collusion problem.The proposed model has a 99% probability to ensure that the medical institutions can reach a consensus and share medical data in alliance by the consistency analysis.

Key words: Medical health data, Blockchain, Hybrid consensus mechanism, Proxy re-encryption, Security model

CLC Number: 

  • TP309.2
[1]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and smart contracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[2]AZARIA A,EKBLAW A,VIEIRA T,et al.MedRec:usingblockchain for medical data access and permission management[C]//2016 2nd International Conference on Open and Big Data (OBD).Vienna,Austria.IEEE,2016:25-30.
[3]ZHAO H W,ZHANG Y,PENG Y,et al.Lightweight backup and efficient recovery scheme for health blockchain keys[C]//2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS).Bangkok,Thailand:IEEE,2017.
[4]SHRIER A A,CHANG A,DIAKUN-THIBAULT N,et al.Blockchain and health IT:algorithms,privacy,and data.
[5]ICHIKAWA D,KASHIYAMA M,UENO T.Tamper-resistant mobile health using blockchain technology[J].JMIR MHealth and UHealth,2017,5(7):e111.
[6]CHEN L,XU L,GAO Z,et al.Protecting Early Stage Proof-of-Work Based Public Blockchain[C]// 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).IEEE,2018:122-127.
[7]LI D,WEI J W.Theory,application fields and challenge of the blockchain technology[J].Telecommunications Science,2016,32(12):20-25.
[8]HE P,YU G,ZHANG Y F,et al.Survey on blockchaintechnology and its application prospect[J].Computer Science,2017,44(4):1-7,15.
[9]CASTRO M,LISKOV B.Practical byzantine fault tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.New Orleans:Usenix Association,1999:173-186.
[10]EASTLAKE D,JONES P.Message digest (MD5) algorithmand secure hash algorithm (SHA)[M]//Encyclopedia of Multimedia.Boston,MA:Springer US,2006:407-408.
[11]SZYDLO M.Merkle tree traversal in log space and time[M]//Advances in Cryptology - EUROCRYPT 2004.Berlin:Springer,2004:541-554.
[12]CORON J S,DODIS Y,MALINAUD C,et al.Merkle-damgard revisited:how to construct a hash function[M]//Advances in Cryptology - CRYPTO 2005.Berlin:Springer,2005:430-448.
[13]BLAZE M,BLEUMER G,STRAUSS M.Divertible protocolsand atomic proxy cryptography[M]//Lecture Notes in Compu-ter Science.Berlin:Springer,1998:127-144.
[14]NISHIMAKI R,XAGAWA K.Key-private proxy Re-encryption from lattices,revisited[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2015,E98.A(1):100-116.
[15]ATTIYA H,CENSOR-HILLEL K.Lower bounds for randomized consensus under a weak adversary[J].SIAM Journal on Computing,2010,39(8):3885-3904.
[16]CAO B,LIN L,LI Y,et al.Review of blockchain research.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020:32(1):1-14.
[17]WU T,HUANG K,ZHOU L L,et al.Research on Blockchain Consistency Algorithm with State Legality Verification.Computer Engineering,2018,44(1):160-164.
[18]HAILEMICHAEL M A,MARCORUIZ L,BELLIKA J G.Privacy-preserving Statistical Query and Processing on Distributed OpenEHR Data[J].Studies in Health Technology & Informa-tics,2015,210:766-770.
[19]KEMKAR O S,KALODE P.Formulation of Distributed Electronic Patient Record (DEPR) System Using Openemr Concept [J].International Journal of Engineering Innovations and Research,2015,4(1):85-89.
[20]YUE X,WANG H J,JIN D W,et al.Healthcare data gateways:found healthcare intelligence on blockchain with novel privacy risk control[J].Journal of Medical Systems,2016,40(10):218.
[21]XUE T F,FU Q C,WANG C,et al.A medical data sharingmodel via blockchain[J].Acta Automatica Sinica,2017,43(9):1555-1562.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[9] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[10] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[11] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[12] LV Jian-fu,LAI Ying-xu,LIU Jing. Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain [J]. Computer Science, 2020, 47(3): 298-303.
[13] ZHOU Chang,LU Hui-mei,XIANG Yong,WU Jing-bang. Survey on Application of Blockchain in VANET [J]. Computer Science, 2020, 47(2): 213-220.
[14] CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275.
[15] ZHANG Peng-yi, SONG Jie. Research Advance on Efficiency Optimization of Blockchain Consensus Algorithms [J]. Computer Science, 2020, 47(12): 296-303.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .