Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 490-495.doi: 10.11896/jsjkx.210500063

• Information Security • Previous Articles     Next Articles

Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric

YUAN Hao-nan1, WANG Rui-jin1,2, ZHENG Bo-wen1, WU Bang-yan1   

  1. 1 School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
    2 Network and Data Security Key Laboratory of Sichuan Province,Chengdu 610054,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:YUAN Hao-nan,born in 2000,undergraduate,is a member of China Computer Federation.His main research interests include blockchain,information security and software engineering.
    WANG Rui-jin,born in 1980,Ph.D,associate professor,master supervisor,is a member of China Computer Federation.His main research interests include information security,privacy protection and blockchain.
  • Supported by:
    National Natural Science Foundation of China(61802033,61472064,61602096),Sichuan Regional Innovation Cooperation Project(2020YFQ0018),Sichuan Science and Technology Program(2021YFG0027,2020YFG0475,2018GZ0087,2019YJ0543),Chinese Postdoctoral Science Foundation(2018M643453),Guangdong Provincial Key Laboratory Project(2017B030314131) and Network and Data Security Key Laboratory of Sichuan Province Open Issue(NDSMS201606).

Abstract: Electronic medical record(EMR) is a sensitive and important privacy data asset of patients.Its trusted sharing is significant to the development of medical informalization.Aiming at the problems of unsafe data storage,difficult cross-domain trusted sharing and long access period of EMRs,this paper integrates blockchain and edge computing,designs and implements a cross-chain trusted EMR sharing system based on Fabric alliance chain frame.The system is mainly divided into patient mobile application,hospital Web application and RFID tag bracelet,including medical record encryption and authentication,cross-chain trusted sharing,remote authorization and other functions.In addition,this paper designs encryption and authentication mechanism based on biometric key and national commercial cipher algorithm series,to control the flow of privacy data with patients as the main bodyand realize personalized privacy protection.It applies a master-slave multi-chain hierarchical cross-chain model on the Hyperledger Fabric to achieve reliable access and control.Experiments and comparative analysis show that the system has great advantages in data security and performance.

Key words: Alliance chain, Biometric key, Edge computing, Electronic medical record, Trusted sharing

CLC Number: 

  • TP311
[1] JIANG J X.Application Research of Medical System Based on Blockchain[D].Anshan:University of Science and Technology Liaoning,2020.
[2] DENNIS R,OWENSON G,AZIZ B.A temporal blockchain:A formal analysis[C]//2016 International Conference on Collaboration Technologies and Systems(CTS).Orlando,FL,USA:IEEE,2016:430-437.
[3] CCID.White Paper on Network Security of Medical Industry2020[EB/OL].[2020-12-15].http://www.wfnetworks.cn/news1/shownews.php?id=416.
[4] VUKOLI M.Rethinking permissioned blockchains[C]//Proceedings of the ACM Workshop on Blockchain,Cryptocurrencies and Contracts.Abu Dhabi,United Arab Emirates:ACM,2017:3-7.
[5] SHRIER D,WU W,PENTLAND A.Blockchain&infrastructure(identity,data security)[J].Massachusetts Institute of Technology-Connection Science,2016,1(3):8-11.
[6] XIANG F,ZHANG B L,FAN B N.Application of blockchain technology in foreign medical and health field[J].Chinese Journal of Medical Library and Information Science,2018,27(8):31-37.
[7] BAXENDALE G.Can blockchain revolutionise EPRs?[J].ITNow,2016,58(1):38-39.
[8] DHILLON V,METCALF D,HOOPER M.The HyperledgerProject[EB/OL].[2018-07-20].http://www.gemhealth.net/.
[9] QIN B,CHEN L C H,WU Q H,et al.Bitcoin and Digital Fiat Currency[J].Journal of Cryptologic Research,2017,4(2):176-186.
[10] SATYANARAYANAN M.The emergence of edge computing[J].Computer,2017,50(1):30-39.
[11] DAVIDA G I,FRANKEL Y,MATT B J.On Enabling Secure Applications Through Off-Line Biometric Identification[C]//Security and Privacy-1998 IEEE Symposium on Security and Privacy.Oakland,CA,USA,IEEE,1998:148-157.
[12] HAO F,ANDERSON R,DAUGMAN J.Combining cryptography with biometrics effectively[J].IEEE Transactions on Computers,2006,55(9):1081-1088.
[13] RATHGEB C,UHL A.Context-based biometric key generation for iris[J].Computer Vision,2011,5(6):389-397.
[14] HUANG Q B,AN Q W,SU H Q.Study and Realization of an Improved PBFT Algorithm as An Ethereum Consensus Mechanism[J].Computer Applications and Software,2017,34(10):288-293.
[15] AZARIA A,EKBLAW A,VIEIRA T,et al.MedRec:UsingBlockchain for Medical Data Access and Permission Management[C]//2016 2nd International Conference on Open and Big Data (OBD).IEEE,2016:25-30.
[16] XIA Q,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain[J].IEEE Access,2017,5:14757-14767.
[17] XUE T F,FU Q C,WANG C,et al.A Medical Data Sharing Model via Blockchain[J].Acta Automatica Sinica,2017,43(9):1555-1562.
[18] ZHANG L H,LAN F,JIANG P P,et al.A secure medical record storage and sharing scheme based on dual-blockchain[J].Computer Engineering & Science,2019,41(9):61-67.
[1] SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248.
[2] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[3] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[4] YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38.
[5] FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605.
[6] LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627.
[7] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[8] LI Su, SONG Bao-yan, LI Dong, WANG Jun-lu. Composite Blockchain Associated Event Tracing Method for Financial Activities [J]. Computer Science, 2022, 49(3): 346-353.
[9] ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311.
[10] LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320.
[11] FAN Hong-jie, LI Xue-dong, YE Song-tao. Aided Disease Diagnosis Method for EMR Semantic Analysis [J]. Computer Science, 2022, 49(1): 153-158.
[12] LIANG Jun-bin, ZHANG Hai-han, JIANG Chan, WANG Tian-shu. Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing [J]. Computer Science, 2021, 48(7): 316-323.
[13] XUE Yan-fen, GAO Ji-mei, FAN Gui-sheng, YU Hui-qun, XU Ya-jie. Energy-aware Fault-tolerant Collaborative Task Execution Algorithm in Edge Computing [J]. Computer Science, 2021, 48(6A): 374-382.
[14] SONG Hai-ning, JIAO Jian, LIU Yong. Research on Mobile Edge Computing in Expressway [J]. Computer Science, 2021, 48(6A): 383-386.
[15] QIAN Tian-tian, ZHANG Fan. Emotion Recognition System Based on Distributed Edge Computing [J]. Computer Science, 2021, 48(6A): 638-643.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!