Skip to main content

Blockchain-Based Secure Authentication Scheme for Medical Data Sharing

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2019)

Abstract

Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process. A network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, data was ensured not to be tampered and trackable. The security threat was eliminated by bilinear mapping in the authentication process of medical data providers and users. The credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain node. The security analysis and performance test were carried out to verify the security and related performance of the authentication protocol. The results show that the MCPS based on blockchain realizes medical treatment data sharing, and meets safety requirements in the security authentication phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, I., Sokolsky, O.: Medical cyber physical systems. In: IEEE International Conference and Workshops on Engineering of Computer Based Systems, pp. 743–748. IEEE (2010)

    Google Scholar 

  2. Haro, A., Flickner, M., Essa, I.: Detecting and tracking eyes by using their physiological properties, dynamics, and appearance In: IEEE Conference on Computer Vision & Pattern Recognition, pp. 163–168. IEEE (2010)

    Google Scholar 

  3. Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. IEEE CSIT Newslett. 63(9), 1278–1308 (2005)

    Google Scholar 

  4. Ouaddah, A., Mousannif, H., Ouahman, A.A.: Access control models in IoT: the road ahead. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 1–2. IEEE (2015)

    Google Scholar 

  5. Lee, E.A.: Cyber physical systems: design challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369. IEEE (2008)

    Google Scholar 

  6. Fromknecht, C., Velicanu, D., Yakoubov, S.A.: Decentralized public key infrastructure with identity retention. IACR Cryptology ePrint Archive, pp. 1–16 (2014)

    Google Scholar 

  7. Zhang, F., Cecchetti, E., Croman, K., et al.: Town crier: an authenticated data feed for smart contracts. In: The ACM Conference on Computer and Communications Security, pp. 1–13. ACM (2016)

    Google Scholar 

  8. Liu, J., Zhang, Z., Chen, X., et al.: Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2013)

    Article  Google Scholar 

  9. Lin, J.Q., Jing, J.W., Zhang, Q.L., et al.: Recent advances in PKI technologies. J. Cryptol. Res. 2(6), 487–496 (2015)

    Google Scholar 

  10. Al-Bassam, M.: SCPKI: a smart contract-based PKI and identity system. In: ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35–40. ACM (2017)

    Google Scholar 

  11. Alexopoulos, N., Daubert, J., Mühlhäuser, M., et al.: Beyond the hype: on using blockchains in trust management for authentication. In: 2017 IEEE Conference on Trustcom/BigDataSE/ICESS, pp. 546–553. IEEE (2017)

    Google Scholar 

  12. Pramuditha, P., Patel, V.M.: Face-based multiple user active authentication on mobile devices. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(5), 1240–1250 (2019)

    Article  Google Scholar 

  13. Lin, C., He, D., Huang, X., et al.: A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access 6, 28203–28212 (2018)

    Article  Google Scholar 

  14. Liang, X., Shetty, S., Tosh, D., et al.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: IEEE/ACM International Symposium on Cluster, pp. 468–477 (2017)

    Google Scholar 

  15. Movassaghi, S., Abolhasan, M., Lipman, J., et al.: Wireless body area networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1658–1686 (2014)

    Article  Google Scholar 

  16. Ramli, S.N., Ahmad, R., Abdollah, M.F., et al.: A biometric-based security for data authentication in Wireless Body Area Network (WBAN). In: International Conference on Advanced Communication Technology, pp. 998–1001 (2013)

    Google Scholar 

  17. Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1978)

    MathSciNet  MATH  Google Scholar 

  18. Truong, T.T., Tran, M.T., Duong, A.D.: Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. In: International Conference on Advanced Information Networking & Applications Workshops, pp. 698–703 (2012)

    Google Scholar 

  19. Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43–44(45), 74–86 (2015)

    Article  Google Scholar 

  20. Jabbar, K., Bjørn, P.: Infrastructural grind: introducing blockchain technology in the shipping domain. In: ACM Conference on Supporting Groupwork, pp. 297–308. ACM (2018)

    Google Scholar 

  21. Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)

    Article  Google Scholar 

  22. Xiong, X., Wong, D., Deng, T.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of Wireless Communication Network Conference (WCNC 2010), pp. 1–6 (2010)

    Google Scholar 

Download references

Acknowledgement

This work has been financially supported by the National Natural Science Foundation of China through the research projects (Grant No. 61572036) and Shenzhen Key Fundamental Research Projects (Grant No. JCYJ20170306091556329).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuyun Qi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, X., Chen, F., Xie, D., Sun, H., Huang, C., Qi, Z. (2019). Blockchain-Based Secure Authentication Scheme for Medical Data Sharing. In: Cheng, X., Jing, W., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2019. Communications in Computer and Information Science, vol 1058. Springer, Singapore. https://doi.org/10.1007/978-981-15-0118-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0118-0_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0117-3

  • Online ISBN: 978-981-15-0118-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics