Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 240400056-8.doi: 10.11896/jsjkx.240400056

• Information Security • Previous Articles    

Data Security Management Scheme Based on Editable Medical Consortium Chain

TAN Jingqi1, XUE Lingyan1, HUANG Haiping1,2, CHEN Long1,2, LI Yixuan1   

  1. 1 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210023,China
  • Published:2024-06-06
  • About author:TAN Jingqi,born in 2003,undergra-duate.Her main research interests include information security and blockchain.
    HUANG Haiping,born in 1981,Ph.D,professor,Ph.D supervisor,is a member of CCF(No.15253S).His main research interests include information security and data privacy in IoT.
  • Supported by:
    National Natural Science Foundation of China(62072252) and Postgraduate Research & Practice Innovation Program of Jiangsu Province(KYCX210790,KYCX23_1086,CX10284).

Abstract: Secure management of medical data is crucial for ensuring the security of patient privacy and effectively conducting medical treatments and related research.However,most existing medical data management solutions have the problems of low transparency,inadequate sharing and fail to secure patient privacy.By designing an editable blockchain model with a “main-side” chain structure,a secure and accountable healthcare data management scheme for healthcare consortium chain is proposed.Its main chain stores current information about the patient’s electronic medical record,while the side chain records historical proof of modification,enabling the transparency and traceability of data management.Introducing chameleon hash function,secret sharing and verifiable signature technology,only verified system administrators of healthcare organizations are able to construct the complete trapdoor,which ensures the correctness and security of the medical data modification process.Security analysis and related experiment simulation show that,the proposed scheme performs well in computational overhead and communication load,as well as storage efficiency,which demonstrates its effectiveness and feasibility.

Key words: Data management, Consortium chain, Editable blockchain, Secret sharing, Digital signature

CLC Number: 

  • TP393.08
[1]NIE F B.Research on Blockchain-based Medical Data Management Methods[D].Changsha:Central South University,2024.
[2]YE T,LUO M,YANG Y,et al.A survey on redactable blockchain:challenges and opportunities[J].IEEE Transactions on Network Science and Engineering,2023,10(3):1669-1683.
[3]ATENIESE G,MAGRI B,VENTURI D,et al.Redactableblockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security Pnd privacy(EuroS&P).IEEE,2017:111-126.
[4]YUAN Y,WANG F Y.Editable Blockchain:Models,Tech-niques and Methods[J].Journal of Automation,2020,46(5):831-846.
[5]AZARIA,EKBLAW A,VIEIRA T,et al.MedRec:Using Blockchain for Medical Data Access and Permission Management[C]//2016 2nd International Conference on Open and Big Data(OBD).Vienna,Austria,2016:25-30.
[6]XUE T F,FU Q C,WANG C,et al.A Medical Data Sharing Model via Blockchain[J].Journal of Automation,2017,43(9):1555-1562.
[7]ZHANG C,LI Q,CHEN Z H,et al.Medical Chain:AllianceMedical Blockchain System[J].Journal of Automation,2019,45(8):1495-1510
[8]ZHAO X Q,ZHANG Z H,LI Y.An Editable and Accountable Blockchain Scheme[J].Journal of Information Security,2022,7(5):19-28.
[9]LV W L,WEI S J,YU M H,et al.Research on Verifiable Block-chain Ledger Redaction Method for Trusted Consortium[J].Journal of Computers,2021,44(10):2016-2032.
[10]WANG X,ZHENG D,GUO R.Electronic Medical Record Sharing Solution for Editable Blockchain[C]//2021 3rd Interna-tional Conference on Natural Language Processing(ICNLP).Beijing,China,2021:93-103.
[11]MARSALEK,ZEFFERER T.A Correctable Public Blockchain[C]//2019 18th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE).Rotorua,New Zealand,2019:554-561.
[12]JIA M,CHEN J,HE K,et al.Redactable Blockchain From Decentralized Chameleon Hash Functions[J].IEEE Transactions on Information Forensics and Security,2022,17:2771-2783.
[13]ZHANG C,NI Z,XU Y,et al.A trustworthy industrial data management scheme based on redactable blockchain[J].Journal of Parallel and Distributed Computing,2021,152:167-176.
[14]LI M,JIA C,DU R,et al.DSE-RB:A privacy-preserving dyna-mic searchable encryption framework on redactable blockchain[J].IEEE Transactions on Cloud Computing,2023,11(3):2856-2872.
[15]BERA B,CHATTARAJ D,DAS A K.Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment[J].Computer Communications,2020,153:229-249.
[16]SHI J,ZHANG A,BAI X Y,et al.Survey on Performance Optimization Technologies of Distributed Ledger System[J].Journal of Software,2023,34(10):4607-4635.
[17]LI G Z,LI L X,GAO H Y.Cross-Chain Technology Development and Application Research[J].Computer Engineering and Applications,2024,60(2):32-45.
[18]LAI M X,DU R Y,CHEN J,et al.A Decentralized and Ac-countable Redactable Blockchain Scheme[J/OL].Journal of Wuhan University(Science Edition).[2024-03-05].https://kns.cnki.net/kcms2/detail/42.1674.N.20230626.1009.004.html.
[19]CHEN Y B,ZHONG C R,ZHOU C R,et al.Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain[J].Computer Science,2022,49(S1):537-543.
[20]JIA Y,SUN S F,ZHANG Y,et al.Redactable Blockchain Supporting Supervision and Self-Management[C]//ASIA CCS ’21:ACM Asia Conference on Computer and Communications Secu-rity.ACM,2021.
[21]MATZUTT R,AHLRICHS V,PENNEKAMP J,et al.A mo-deration framework for the swift and transparent removal of illicit blockchain content[C]//2022 IEEE International Confe-rence on Blockchain and Cryptocurrency(ICBC).IEEE,2022:1-9.
[1] DU Xiaoyong, LI Tong, LU Wei, FAN Ju, ZHANG Feng, CHAI Yunpeng. Cross-domain Data Management [J]. Computer Science, 2024, 51(1): 4-12.
[2] WANG Xinmiao, SUN Tingting, MA Jingjun. Research Progress of RSA Algorithm in Network Data Transmission [J]. Computer Science, 2023, 50(6A): 220300107-7.
[3] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[4] ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381.
[5] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[6] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[7] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[8] JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532.
[9] DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508.
[10] PU Hong-quan, CUI Zhe, LIU Ting,RAO Jin-tao. Comprehensive Review of Secure Electronic Voting Schemes [J]. Computer Science, 2020, 47(9): 275-282.
[11] ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390.
[12] DONG Chen, JI Shu-ting, ZHANG Hao-yu, LI Lei. Operational Visual Multi-secret Sharing Scheme for Threshold Structure [J]. Computer Science, 2020, 47(10): 322-326.
[13] LIU Ya-qiang,LI Xiao-yu. Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code [J]. Computer Science, 2020, 47(1): 293-301.
[14] ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314.
[15] WANG Xing-wei, HOU Shu-hui. Improved Efficient Proxy Blind Signature Scheme [J]. Computer Science, 2019, 46(6A): 358-361.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!