Computer Science ›› 2021, Vol. 48 ›› Issue (9): 330-336.doi: 10.11896/jsjkx.200600139

• Information Security • Previous Articles     Next Articles

Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree

ZHOU Yi-hua1,2,3, JIA Yu-xin1,2,3, JIA Li-yuan1,2,3, FANG Jia-bo1,2,3, SHI Wei-min1,2   

  1. 1 Information Department,Beijing University of Technology,Beijing 100124,China
    2 Beijing Key Laboratory of Trusted Computing,Beijing 100124,China
    3 Blockchain Research Center,Beijing University of Technology,Beijing 100124,China
  • Received:2020-06-23 Revised:2020-11-14 Online:2021-09-15 Published:2021-09-10
  • About author:ZHOU Yi-hua,born in 1969,Ph.D,associate professor.His main research in-terests include cryptography,blockchain theory and technology,privacy protection technology and the interdisciplinary of information security and other disciplines.
    JIA Yu-xin,born in 1996,postgraduate.Her main research interests include information security,the data integrity verification problem of the combination of blockchain and cloud storage.
  • Supported by:
    National Natural Science Foundation of China(61572053) and Beijing Natural Science Foundation(4182006)

Abstract: In order to solve the privacy and data integrity problems of shared electronic medical records,this paper proposes a red-black tree-based shared electronic medical records data integrity verification scheme based on the parallel blockchain architecture.First,the doctor-patient integrity verification information is stored on the patient chain and the doctor chain with different attri-bute-based encryption,and the doctor-patient data specific information is stored on the CSP off-chain server.Then,the red-black tree-based data integrity verification scheme and dynamic data update scheme are constructed.Security analysis shows that the proposed scheme not only has public verifiability,can effectively resist the cloud server forgery attack,but also can protect the privacy of user and patient information,with high efficiency of integrity verification and data update.

Key words: Block chain, Integrity verification, Red black tree, Shared EMR

CLC Number: 

  • TP391
[1]PANG H,LIANG W,DU J L,et al.Enlightenment of low application rate of electronic medical records in American hospitals on the development of electronic medical records in Chinese hospitals[J].China Medical Records,2013(10):11-13.
[2]MEI Y.The using blockchain based method of the secure sto-rage of medical records[J].Journal of Jiangxi Normal University(Natural Science Edition),2017,41(5):484-490.
[3]TAN S,JIA Y,HAN W H.Research and development of data integrity proof in cloud storage[J].Journal of Computer Scien-ce,2015,38(1):164-177.
[4]CAO X,XU L,CHEN L X.Data integrity verification protocol in cloud storage system [J].Computer Application,2012,32(1):8-12.
[5]BIAN G Q,GAO S,SHAO B L.Cloud storage security architecture for distributed storage[J].Journal of Xi'an Jiaotong University,2011,45(4):41-45.
[6]ZHANG J,CHEN K F,LV L,et al.User data security in cloud storage[J].Computer Science and Exploration,2013,(12):1093-1103.
[7]XHAFA F,LI J,ZHAO G,et al.Designing cloud-based elec-tronic health record system with attribute-based encryption[J].Multimedia Tools & Applications,2015,74(10):3441-3458.
[8]LI J Y,FAN X H,WANG Y.Design of privacy protectionmechanism of sharing economy based on blockchain[J].Computer Application and Software,2019,36(1):302-307.
[9]MIAO J M,FENG C S,LI M,et al.Data integrity public audit scheme for public cloud[J].Computer Application,2018,38(10):146-152.
[10]ATENIESE G,BURNS R,CURTMOLA R,et al.Provabledata possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007.
[11]ERWAY C C,KÜPÇÜ A,PAPAMANTHOU C,et al.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2015,17(4):15.
[12]ANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859.
[13]LI Y,YAO G,LEI L N,et al.Cloud storage data integrity verification mechanism based on multi branch path tree[J].Journal of Tsinghua University:Natural Science Edition,2016(56):510.
[14]HU D M,YU X.A data integrity verification method for dynamic cloud storage based on homomorphic tags[J].Computer Application Research,2014,31(5):1362-1365,1395.
[15]LI J W,ZHU M D.MHT based dynamic data integrity verification and recovery scheme in cloud storage[J].Computer Application Research,2019,36(7):2179-2183,2194.
[16]ZHONG T,GENG J Z,XIONG H,et al.SBT based data integrity verification mechanism in cloud storage[J].Journal of University of Electronic Science and Technology,2014(6):131-135.
[17]WANG R J,ZHANG F L,WANG X Y,et al.Cloud data integrity verification protocol based on improved hop table[J].Journal of University of Electronic Science and Technology,2018,47(1):88-94.
[18]FU Y Y,ZHANG M,CHEN K Q,et al.Multi copy file integrity verification scheme for cloud storage[J].Computer Research and Development,2014(7):1410-1416.
[19]YAN X T,LI Y F.Cloud storage integrity detection algorithmbased on hash tree[J].Computer Science,2012,39(12):94-97.
[20]LIU H Y,DING Y W,CHEN L T.Multi copy data integrity verification schemes supporting dynamic operation[J].Compu-ter Application Research,2019(9):2778-2782.
[21]LIU Y F,WANG Y J,FU S J.Lightweight integrity verification scheme for cloud group data[J].Journal of Communications,2016(S1):144-150.
[22]WANG L Y,LU Z J,ZHANG X D,et al.Data payment integrity verification scheme for power payment terminal based on multi-branch tree structure[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(3):377-384.
[23]ZHU X D,ZHANG Y Y,YAO R K,et al.Research on Government Information Opening and Sharing Model and Application Based on Blockchain[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(5):122-128.
[1] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[2] HONG Xiao-ling, WAN Hu, XIAO Xiao and SUN Hao-xiang. Manufacturing Alliance System Based on Block Chain [J]. Computer Science, 2020, 47(6A): 369-374.
[3] KE Yu-Jing, JING Mao-hua and ZHENG Han-yin. Application Research of Blockchain Technology in Trust Industry [J]. Computer Science, 2020, 47(6A): 591-595.
[4] REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638.
[5] XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286.
[6] LIANG He-jun, HAN Jing-ti. Research on Decentralized Transaction Consensus Mechanism of Cloud Computing Resources Based on Block Chain [J]. Computer Science, 2019, 46(11A): 548-552.
[7] HOU Yi-bin, LIANG Xun, ZHAN Xiao-yu. Block Chain Based Architecture Model of Electronic Evidence System [J]. Computer Science, 2018, 45(6A): 348-351.
[8] DAI Hua, BAO Jing-jing, ZHU Xiang-yang, YI Xun, YANG Geng. Integrity-verifying Single Keyword Search Method in Clouds [J]. Computer Science, 2018, 45(12): 92-97.
[9] LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368.
[10] CHEN Wei,YANG Long and YU Le. Privacy-preserving Dynamic Integrity-verification Algorithm in Data Aggregation [J]. Computer Science, 2013, 40(7): 84-88.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!