Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (5): 1518-1526.DOI: 10.11772/j.issn.1001-9081.2022050733
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Meng CAO1,2, Sunjie YU1,2, Hui ZENG1,2, Hongzhou SHI1()
Received:
2022-05-23
Revised:
2022-08-18
Accepted:
2022-08-19
Online:
2022-09-23
Published:
2023-05-10
Contact:
Hongzhou SHI
About author:
CAO Meng, born in 1997, M. S. candidate. Her research interests include information security, blockchain.通讯作者:
史红周
作者简介:
曹萌(1997—),女,河南郑州人,硕士研究生,CCF会员,主要研究方向:信息安全、区块链CLC Number:
Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI. Hierarchical access control and sharing system of medical data based on blockchain[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526.
曹萌, 余孙婕, 曾辉, 史红周. 基于区块链的医疗数据分级访问控制与共享系统[J]. 《计算机应用》唯一官方网站, 2023, 43(5): 1518-1526.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022050733
属性分类 | 属性值 |
---|---|
使用者类型 | Research-Institute, Insurance-Company, Hospital, Person |
使用者专业等级 | A, B, C |
Tab. 1 Collection of user attributes
属性分类 | 属性值 |
---|---|
使用者类型 | Research-Institute, Insurance-Company, Hospital, Person |
使用者专业等级 | A, B, C |
符号 | 含义 |
---|---|
用户属性个数 | |
低(中)敏感数据访问策略包含的属性个数 | |
低(中)敏感数据访问策略树的中间节点数 | |
低(中)敏感数据访问策略树的中间节点包含的孩子数 | |
系统包含的属性个数 | |
属性授权机构数 | |
在 | |
在 | |
双线性对映射运算 | |
用户最短解密路径的叶子节点数 | |
用户最短解密路径的中间节点数 |
Tab. 2 Symbol description
符号 | 含义 |
---|---|
用户属性个数 | |
低(中)敏感数据访问策略包含的属性个数 | |
低(中)敏感数据访问策略树的中间节点数 | |
低(中)敏感数据访问策略树的中间节点包含的孩子数 | |
系统包含的属性个数 | |
属性授权机构数 | |
在 | |
在 | |
双线性对映射运算 | |
用户最短解密路径的叶子节点数 | |
用户最短解密路径的中间节点数 |
方案来源 | 分级访问控制 | 多权威 | 抵抗合谋攻击 |
---|---|---|---|
文献[ | × | × | × |
文献[ | × | √ | × |
文献[ | √ | × | × |
本文 | √ | √ | √ |
Tab. 3 Function comparison
方案来源 | 分级访问控制 | 多权威 | 抵抗合谋攻击 |
---|---|---|---|
文献[ | × | × | × |
文献[ | × | √ | × |
文献[ | √ | × | × |
本文 | √ | √ | √ |
方案来源 | 系统公钥长度 | 主密钥长度 | 用户密钥长度 | 密文长度 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
文献[ | ||||
本文 |
Tab. 4 Storage cost comparison
方案来源 | 系统公钥长度 | 主密钥长度 | 用户密钥长度 | 密文长度 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
文献[ | ||||
本文 |
方案来源 | 密钥生成 | 加密 | 解密 |
---|---|---|---|
文献[ | |||
文献[ | |||
文献[ | |||
本文 |
Tab. 5 Computational cost comparison
方案来源 | 密钥生成 | 加密 | 解密 |
---|---|---|---|
文献[ | |||
文献[ | |||
文献[ | |||
本文 |
1 | 林世才. 医疗信息化的福建实践[J]. 人口与计划生育, 2018(9):45-47. |
LIN S C. Fujian practice of medical informatization[J]. Population and Family Planning, 2018(9): 45-47. | |
2 | SURAHMAT, TENGGONO A. Analysis of server virtualization service performance using Citrix Xenserver[J]. Journal of Physics: Conference Series, 2020, 1500: No.012098. 10.1088/1742-6596/1500/1/012098 |
3 | 何延哲,付嵘. 275位艾滋病感染者个人信息泄露事件再次警示:安全是健康医疗大数据的核心基础[J]. 中国经济周刊, 2016(30):79-81. |
HE Y Z, FU R. The disclosure of personal information of 275 people infected with AIDS once again warns that safety is the core foundation of health care big data[J]. China Economic Weekly, 2016(30): 79-81. | |
4 | SEH A H, ZAROUR M, ALENEZI M, et al. Healthcare data breaches: insights and implications[J]. Healthcare, 2020, 8(2): 133. 10.3390/healthcare8020133 |
5 | 木须.对系统安全防护重视不够 国外多家医疗机构遭到勒索软件攻击[J].信息安全与通信保密,2016(5):68-69. |
MU X. Insufficient attention to system security protection, many foreign medical institutions were attacked by blackmail software[J]. Information Security and Communications Privacy, 2016(5): 68-69. | |
6 | 赵延红,原宝华,梁军.区块链技术在医疗领域中的应用探讨[J].中国医学教育技术,2018,32(1):1-7. 10.13566/j.cnki.cmet.cn61-1317/g4.201801001 |
ZHAO Y H, YUAN B H, LIANG J. Application of blockchain technology in medical field[J]. China Medical Education Technology, 2018, 32(1): 1-7. 10.13566/j.cnki.cmet.cn61-1317/g4.201801001 | |
7 | ZHOU J Y, TANG F Y, ZHU H, et al. Distributed data vending on blockchain[C]// Proceedings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data. Piscataway: IEEE, 2018: 1100-1107. 10.1109/cybermatics_2018.2018.00201 |
8 | XIONG W, XIONG L. Smart contract based data trading mode using blockchain and machine learning[J]. IEEE Access, 2019, 7: 102331-102344. 10.1109/access.2019.2928325 |
9 | DAI W Q, DAI C K, CHOO K K R, et al. SDTE: a secure blockchain-based data trading ecosystem[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 725-737. 10.1109/tifs.2019.2928256 |
10 | ZHAO Y Q, YU Y, LI Y N, et al. Machine learning based privacy-preserving fair data trading in big data market[J]. Information Sciences, 2019, 478: 449-460. 10.1016/j.ins.2018.11.028 |
11 | 郑序颖.区块链首次落地医疗场景:常州医联体化解信息孤岛困境[J].科技新时代,2017(4):61-61. |
ZHENG X Y. The first application of blockchain to the medical scene: Changzhou medical treatment consortium resolves the dilemma of information islands[J]. New Era of Science and Technology, 2017(4): 61-61. | |
12 | METTLER M. Blockchain technology in healthcare: the revolution starts here[C]// Proceedings of the IEEE 18th International Conference on e-Health Networking, Applications and Services. Piscataway: IEEE, 2016: 1-3. 10.1109/healthcom.2016.7749510 |
13 | KIYOMOTO S, RAHMAN M S, BASU A. On blockchain-based anonymized dataset distribution platform[C]// Proceedings of the IEEE 15th International Conference on Software Engineering Research, Management and Applications. Piscataway: IEEE, 2017: 85-92. 10.1109/sera.2017.7965711 |
14 | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management[C]// Proceedings of the 2nd International Conference on Open and Big Data. Piscataway: IEEE, 2016: 25-30. 10.1109/obd.2016.11 |
15 | 王于丁,杨家海,徐聪,等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5):1129-1150. 10.13328/j.cnki.jos.004820 |
WANG Y D, YANG J H, XU C, et al. Survey on access control technologies for cloud computing[J]. Journal of Software, 2015, 26(5): 1129-1150. 10.13328/j.cnki.jos.004820 | |
16 | 杨茂江. 基于密码和区块链技术的数据交易平台设计[J]. 信息通信技术, 2016, 10(4): 24-31. |
YANG M J. A design of data trading platform based on cryptology and blockchain technology[J]. Information and Communications Technologies, 2016, 10(4): 24-31. | |
17 | YUE X, WANG H J, JIN D W, et al. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40(10): No.218. 10.1007/s10916-016-0574-6 |
18 | 郭子菁,罗玉川,蔡志平,等. 医疗健康大数据隐私保护综述[J] 计算机科学与探索, 2021, 15(3):389-402. 10.3778/j.issn.1673-9418.2009071 |
GUO Z J, LUO Y C, CAI Z P, et al. Overview of privacy protection technology of big data in healthcare[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402. 10.3778/j.issn.1673-9418.2009071 | |
19 | SAHAI A, WATERS B. Fuzzy identity-based encryption[C]// Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 457-473. |
20 | WEI J H, CHEN X F, HUANG X Y, et al. RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(5): 2301-2315. |
21 | RIAD K, HAMZA R, YAN H Y. Sensitive and energetic IoT access control for managing cloud electronic health records[J]. IEEE Access, 2019, 7: 86384-86393. 10.1109/access.2019.2926354 |
22 | POURNAGHI S M, BAYAT M, FARJAMI Y. MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11: 4613-4641. 10.1007/s12652-020-01710-y |
23 | YANG K, JIA X H, REN K, et al. Enabling efficient access control with dynamic policy updating for big data in the cloud[C]// Proceedings of the 2014 IEEE Conference on Computer Communications. Piscataway: IEEE, 2014: 2013-2021. 10.1109/infocom.2014.6848142 |
24 | KAWAI Y. Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption[C]// Proceedings of the 2015 International Conference on Information Security Practice and Experience, LNCS 9065. Cham: Springer, 2015: 301-315. |
25 | LAI J Z, DENG R H, YANG Y J, et al. Adaptable ciphertext-policy attribute-based encryption[C]// Proceedings of the 2013 International Conference on Pairing-Based Cryptography, LNCS 8365. Cham: Springer, 2014: 199-214. |
26 | CACHIN C. Architecture of the Hyperledger blockchain fabric[C/OL]// Proceedings of the 2016 Workshop on Distributed Cryptocurrencies and Consensus Ledgers [2022-06-20].. 10.1007/978-3-030-93944-1_13 |
27 | WANG C J, LUO J F. An efficient key-policy attribute-based encryption scheme with constant ciphertext length[J]. Mathematical Problems in Engineering, 2013, 2013: No.810969. 10.1155/2013/810969 |
28 | HAN J G, SUSILO W, MU Y, et al. Privacy-preserving decentralized key-policy attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(11): 2150-2162. 10.1109/tpds.2012.50 |
29 | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11 |
30 | 王皓,郑志华,吴磊,等.自适应安全的外包CP-ABE方案研究[J].计算机研究与发展,2015,52(10):2270-2280. 10.7544/issn1000-1239.2015.20150497 |
WANG H, ZHENG Z H, WU L, et al. Adaptively secure outsourcing ciphertext-policy attribute-based encryption[J]. Journal of Computer Research and Development, 2015, 52(10): 2270-2280. 10.7544/issn1000-1239.2015.20150497 | |
31 | 中国人民解放军总医院. 糖尿病并发症预警数据集[DS/OL]. [2022-06-30].. |
Chinese PLA General Hospital. Diabetes complications data set[DS/OL]. [2022-06-30].. | |
32 | Hyperledger Performance and Scale Working Group. Hyperledger blockchain performance metrics[R/OL]. [2022-06-30].. |
33 | FAN C X, GHAEMI S, KHAZAEI H, et al. Performance evaluation of blockchain systems: a systematic survey[J]. IEEE Access, 2020, 8: 126927-126950. 10.1109/access.2020.3006078 |
34 | CROMAN K, DECKER C, EYAL I, et al. On scaling decentralized blockchains[C]// Proceedings of the 2016 International Conference on Financial Cryptography and Data Security, LNCS 9604. Berlin: Springer, 2016: 106-125. |
35 | HUR J. Improving security and efficiency in attribute-based data sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(10): 2271-2282. 10.1109/tkde.2011.78 |
36 | WANG S L, ZHOU J W, LIU J K, et al. An efficient file hierarchy attribute-based encryption scheme in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265-1277. 10.1109/tifs.2016.2523941 |
37 | LIU X Y, YANG X T, LUO Y K, et al. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment[J]. IEEE Access, 2020, 8: 200180-200193. 10.1109/access.2020.3035468 |
38 | Flaredown. Chronic illness: symptoms, treatments and triggers[DS/OL]. (2021-02-04) [2022-06-30].. |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[4] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[7] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[8] | Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN. MAC layer scheduling strategy of roadside units based on MEC server priority service [J]. Journal of Computer Applications, 2024, 44(4): 1227-1235. |
[9] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[10] | Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI. Incentive mechanism for federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(2): 344-352. |
[11] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[12] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. |
[13] | Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI. Overview of on-chain and off-chain consistency protection technologies [J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. |
[14] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[15] | Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI. Review of blockchain consensus algorithms for internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3678-3687. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||