计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 330-336.doi: 10.11896/jsjkx.200600139

• 信息安全 • 上一篇    下一篇

基于红黑树的共享电子病历数据完整性验证方案

周艺华1,2,3, 贾玉欣1,2,3, 贾立圆1,2,3, 方嘉博1,2,3, 侍伟敏1,2   

  1. 1 北京工业大学信息学部 北京100124
    2 可信计算北京市重点实验室 北京100124
    3 北京工业大学区块链研究中心 北京100124
  • 收稿日期:2020-06-23 修回日期:2020-11-14 出版日期:2021-09-15 发布日期:2021-09-10
  • 通讯作者: 贾玉欣(l002363595@qq.com)
  • 作者简介:zhouyh@bjut.edu.cn
  • 基金资助:
    国家自然科学基金(61572053);北京市自然科学基金(4182006)

Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree

ZHOU Yi-hua1,2,3, JIA Yu-xin1,2,3, JIA Li-yuan1,2,3, FANG Jia-bo1,2,3, SHI Wei-min1,2   

  1. 1 Information Department,Beijing University of Technology,Beijing 100124,China
    2 Beijing Key Laboratory of Trusted Computing,Beijing 100124,China
    3 Blockchain Research Center,Beijing University of Technology,Beijing 100124,China
  • Received:2020-06-23 Revised:2020-11-14 Online:2021-09-15 Published:2021-09-10
  • About author:ZHOU Yi-hua,born in 1969,Ph.D,associate professor.His main research in-terests include cryptography,blockchain theory and technology,privacy protection technology and the interdisciplinary of information security and other disciplines.
    JIA Yu-xin,born in 1996,postgraduate.Her main research interests include information security,the data integrity verification problem of the combination of blockchain and cloud storage.
  • Supported by:
    National Natural Science Foundation of China(61572053) and Beijing Natural Science Foundation(4182006)

摘要: 为了解决共享电子病历的隐私性及数据完整性问题,在平行区块链架构的基础上,文中提出了一种基于红黑树的共享电子病历数据完整性验证方案。首先,医患完整性验证信息以不同的属性基加密的方式分别存储在患者链和医生链上,而医患数据具体信息存储在云服务提供商CSP的链下服务器上;其次,构造基于红黑树的数据完整性验证方案及动态数据更新方案。安全性分析表明,所提方案不但具有公开可验证性,能有效抵抗云服务器的伪造攻击,而且能保障用户及患者信息的隐私性,具有较高的完整性验证效率及数据更新效率。

关键词: 共享电子病历, 红黑树, 区块链, 完整性验证

Abstract: In order to solve the privacy and data integrity problems of shared electronic medical records,this paper proposes a red-black tree-based shared electronic medical records data integrity verification scheme based on the parallel blockchain architecture.First,the doctor-patient integrity verification information is stored on the patient chain and the doctor chain with different attri-bute-based encryption,and the doctor-patient data specific information is stored on the CSP off-chain server.Then,the red-black tree-based data integrity verification scheme and dynamic data update scheme are constructed.Security analysis shows that the proposed scheme not only has public verifiability,can effectively resist the cloud server forgery attack,but also can protect the privacy of user and patient information,with high efficiency of integrity verification and data update.

Key words: Block chain, Integrity verification, Red black tree, Shared EMR

中图分类号: 

  • TP391
[1]PANG H,LIANG W,DU J L,et al.Enlightenment of low application rate of electronic medical records in American hospitals on the development of electronic medical records in Chinese hospitals[J].China Medical Records,2013(10):11-13.
[2]MEI Y.The using blockchain based method of the secure sto-rage of medical records[J].Journal of Jiangxi Normal University(Natural Science Edition),2017,41(5):484-490.
[3]TAN S,JIA Y,HAN W H.Research and development of data integrity proof in cloud storage[J].Journal of Computer Scien-ce,2015,38(1):164-177.
[4]CAO X,XU L,CHEN L X.Data integrity verification protocol in cloud storage system [J].Computer Application,2012,32(1):8-12.
[5]BIAN G Q,GAO S,SHAO B L.Cloud storage security architecture for distributed storage[J].Journal of Xi'an Jiaotong University,2011,45(4):41-45.
[6]ZHANG J,CHEN K F,LV L,et al.User data security in cloud storage[J].Computer Science and Exploration,2013,(12):1093-1103.
[7]XHAFA F,LI J,ZHAO G,et al.Designing cloud-based elec-tronic health record system with attribute-based encryption[J].Multimedia Tools & Applications,2015,74(10):3441-3458.
[8]LI J Y,FAN X H,WANG Y.Design of privacy protectionmechanism of sharing economy based on blockchain[J].Computer Application and Software,2019,36(1):302-307.
[9]MIAO J M,FENG C S,LI M,et al.Data integrity public audit scheme for public cloud[J].Computer Application,2018,38(10):146-152.
[10]ATENIESE G,BURNS R,CURTMOLA R,et al.Provabledata possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007.
[11]ERWAY C C,KÜPÇÜ A,PAPAMANTHOU C,et al.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2015,17(4):15.
[12]ANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859.
[13]LI Y,YAO G,LEI L N,et al.Cloud storage data integrity verification mechanism based on multi branch path tree[J].Journal of Tsinghua University:Natural Science Edition,2016(56):510.
[14]HU D M,YU X.A data integrity verification method for dynamic cloud storage based on homomorphic tags[J].Computer Application Research,2014,31(5):1362-1365,1395.
[15]LI J W,ZHU M D.MHT based dynamic data integrity verification and recovery scheme in cloud storage[J].Computer Application Research,2019,36(7):2179-2183,2194.
[16]ZHONG T,GENG J Z,XIONG H,et al.SBT based data integrity verification mechanism in cloud storage[J].Journal of University of Electronic Science and Technology,2014(6):131-135.
[17]WANG R J,ZHANG F L,WANG X Y,et al.Cloud data integrity verification protocol based on improved hop table[J].Journal of University of Electronic Science and Technology,2018,47(1):88-94.
[18]FU Y Y,ZHANG M,CHEN K Q,et al.Multi copy file integrity verification scheme for cloud storage[J].Computer Research and Development,2014(7):1410-1416.
[19]YAN X T,LI Y F.Cloud storage integrity detection algorithmbased on hash tree[J].Computer Science,2012,39(12):94-97.
[20]LIU H Y,DING Y W,CHEN L T.Multi copy data integrity verification schemes supporting dynamic operation[J].Compu-ter Application Research,2019(9):2778-2782.
[21]LIU Y F,WANG Y J,FU S J.Lightweight integrity verification scheme for cloud group data[J].Journal of Communications,2016(S1):144-150.
[22]WANG L Y,LU Z J,ZHANG X D,et al.Data payment integrity verification scheme for power payment terminal based on multi-branch tree structure[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(3):377-384.
[23]ZHU X D,ZHANG Y Y,YAO R K,et al.Research on Government Information Opening and Sharing Model and Application Based on Blockchain[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(5):122-128.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[3] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[13] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[14] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!