计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 330-336.doi: 10.11896/jsjkx.200600139
周艺华1,2,3, 贾玉欣1,2,3, 贾立圆1,2,3, 方嘉博1,2,3, 侍伟敏1,2
ZHOU Yi-hua1,2,3, JIA Yu-xin1,2,3, JIA Li-yuan1,2,3, FANG Jia-bo1,2,3, SHI Wei-min1,2
摘要: 为了解决共享电子病历的隐私性及数据完整性问题,在平行区块链架构的基础上,文中提出了一种基于红黑树的共享电子病历数据完整性验证方案。首先,医患完整性验证信息以不同的属性基加密的方式分别存储在患者链和医生链上,而医患数据具体信息存储在云服务提供商CSP的链下服务器上;其次,构造基于红黑树的数据完整性验证方案及动态数据更新方案。安全性分析表明,所提方案不但具有公开可验证性,能有效抵抗云服务器的伪造攻击,而且能保障用户及患者信息的隐私性,具有较高的完整性验证效率及数据更新效率。
中图分类号:
[1]PANG H,LIANG W,DU J L,et al.Enlightenment of low application rate of electronic medical records in American hospitals on the development of electronic medical records in Chinese hospitals[J].China Medical Records,2013(10):11-13. [2]MEI Y.The using blockchain based method of the secure sto-rage of medical records[J].Journal of Jiangxi Normal University(Natural Science Edition),2017,41(5):484-490. [3]TAN S,JIA Y,HAN W H.Research and development of data integrity proof in cloud storage[J].Journal of Computer Scien-ce,2015,38(1):164-177. [4]CAO X,XU L,CHEN L X.Data integrity verification protocol in cloud storage system [J].Computer Application,2012,32(1):8-12. [5]BIAN G Q,GAO S,SHAO B L.Cloud storage security architecture for distributed storage[J].Journal of Xi'an Jiaotong University,2011,45(4):41-45. [6]ZHANG J,CHEN K F,LV L,et al.User data security in cloud storage[J].Computer Science and Exploration,2013,(12):1093-1103. [7]XHAFA F,LI J,ZHAO G,et al.Designing cloud-based elec-tronic health record system with attribute-based encryption[J].Multimedia Tools & Applications,2015,74(10):3441-3458. [8]LI J Y,FAN X H,WANG Y.Design of privacy protectionmechanism of sharing economy based on blockchain[J].Computer Application and Software,2019,36(1):302-307. [9]MIAO J M,FENG C S,LI M,et al.Data integrity public audit scheme for public cloud[J].Computer Application,2018,38(10):146-152. [10]ATENIESE G,BURNS R,CURTMOLA R,et al.Provabledata possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007. [11]ERWAY C C,KÜPÇÜ A,PAPAMANTHOU C,et al.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2015,17(4):15. [12]ANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859. [13]LI Y,YAO G,LEI L N,et al.Cloud storage data integrity verification mechanism based on multi branch path tree[J].Journal of Tsinghua University:Natural Science Edition,2016(56):510. [14]HU D M,YU X.A data integrity verification method for dynamic cloud storage based on homomorphic tags[J].Computer Application Research,2014,31(5):1362-1365,1395. [15]LI J W,ZHU M D.MHT based dynamic data integrity verification and recovery scheme in cloud storage[J].Computer Application Research,2019,36(7):2179-2183,2194. [16]ZHONG T,GENG J Z,XIONG H,et al.SBT based data integrity verification mechanism in cloud storage[J].Journal of University of Electronic Science and Technology,2014(6):131-135. [17]WANG R J,ZHANG F L,WANG X Y,et al.Cloud data integrity verification protocol based on improved hop table[J].Journal of University of Electronic Science and Technology,2018,47(1):88-94. [18]FU Y Y,ZHANG M,CHEN K Q,et al.Multi copy file integrity verification scheme for cloud storage[J].Computer Research and Development,2014(7):1410-1416. [19]YAN X T,LI Y F.Cloud storage integrity detection algorithmbased on hash tree[J].Computer Science,2012,39(12):94-97. [20]LIU H Y,DING Y W,CHEN L T.Multi copy data integrity verification schemes supporting dynamic operation[J].Compu-ter Application Research,2019(9):2778-2782. [21]LIU Y F,WANG Y J,FU S J.Lightweight integrity verification scheme for cloud group data[J].Journal of Communications,2016(S1):144-150. [22]WANG L Y,LU Z J,ZHANG X D,et al.Data payment integrity verification scheme for power payment terminal based on multi-branch tree structure[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(3):377-384. [23]ZHU X D,ZHANG Y Y,YAO R K,et al.Research on Government Information Opening and Sharing Model and Application Based on Blockchain[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(5):122-128. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[3] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[4] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[5] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[6] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[7] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[8] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[9] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[10] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[11] | 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜. 区块链BFT共识算法研究进展 Research Advance on BFT Consensus Algorithms 计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011 |
[12] | 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云. 一种面向电能量数据的联邦学习可靠性激励机制 Reliable Incentive Mechanism for Federated Learning of Electric Metering Data 计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195 |
[13] | 张潆藜, 马佳利, 刘子昂, 刘新, 周睿. 以太坊Solidity智能合约漏洞检测方法综述 Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts 计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004 |
[14] | 杨昕宇, 彭长根, 杨辉, 丁红发. 基于演化博弈的理性拜占庭容错共识算法 Rational PBFT Consensus Algorithm with Evolutionary Game 计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110 |
[15] | 范家幸, 王志伟. 基于门限环签名的分级匿名表决方案 Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature 计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032 |
|