Advertisement

Blockchain-Based Medical Records Secure Storage and Medical Service Framework

  • Yi Chen
  • Shuai DingEmail author
  • Zheng XuEmail author
  • Handong Zheng
  • Shanlin Yang
Patient Facing Systems
Part of the following topical collections:
  1. Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Abstract

Accurate and complete medical data are one valuable asset for patients. Privacy protection and the secure storage of medical data are crucial issues during medical services. Secure storage and making full use of personal medical records has always been a concern for the general population. The emergence of blockchain technology brings a new idea to solve this problem. As a hash chain with the characteristics of decentralization, verifiability and immutability, blockchain technology can be used to securely store personal medical data. In this paper, we design a storage scheme to manage personal medical data based on blockchain and cloud storage. Furthermore, a service framework for sharing medical records is described. In addition, the characteristics of the medical blockchain are presented and analyzed through a comparison with traditional systems. The proposed storage and sharing scheme does not depend on any third-party and no single party has absolute power to affect the processing.

Keywords

Medical data Blockchain technology Medical data sharing Medical data storage Medical service 

Notes

Acknowledgements

This work is partly supported by the National Natural Science Foundation of China (Grant No. 71571058 and 71690235), Anhui Provincial Science and Technology Major Project (Grant No. 16030801121 and 17030801001), CCF-Venustech Open Research Fund (Grant No. CCF-VenustechRP2017006).

Funding

This study was funded by the National Natural Science Foundation of China (Grant No. 71571058 and 71690235), Anhui Provincial Science and Technology Major Project (Grant No. 16030801121 and 17030801001), CCF-Venustech Open Research Fund (Grant No. CCF-VenustechRP2017006).

Compliance with Ethical Standards

Conflict of Interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

References

  1. 1.
    Medibloc Team. Medibloc whitepaper, 2017. https://www.chainwhy.com/whitepaper/medxwhite paperen.html. Accessed 15 September 2018.
  2. 2.
    U.S. Department of Health and Human Services. Blue Button Connector | You’re your Health Records, 2017. http://bluebuttonconnector.healthit.gov/. Accessed 15 September 2018.
  3. 3.
    Apple Inc. iOS-Health, 2018. https://www.apple.com/ios/health/. Accessed 15 September 2018.
  4. 4.
    Deloitte Consulting LLP. Blockchain: Opportunities for health care, 2016. https://www2.deloitte.com/us/en/pages/public-sector/articles/blockchain-opportunities-for-health-care.html. Accessed 15 September 2018.
  5. 5.
    Hydari, M. Z., Telang, R., and Marella, W. M., Saving Patient Ryan—Can Advanced Electronic Medical Records Make Patient Care Safer? Manage Sci Articles in Advance:1–19, 2018.  https://doi.org/10.1287/mnsc.2018.3042.
  6. 6.
    Bhargava, H. K., and Mishra, A. N., Electronic Medical Records and Physician Productivity: Evidence from Panel Data Analysis. Manag. Sci. 60:2543–2562, 2014.  https://doi.org/10.1287/mnsc.2014.1934.CrossRefGoogle Scholar
  7. 7.
    Zheng, C., Xia, C., Guo, Q., and Dehmer, M., Interplay Between SIR-based Disease Spreading and Awareness Diffusion on Multiplex Networks. J Parallel Distr Com 115:20–28, 2018.  https://doi.org/10.1016/j.jpdc.2018.01.001.CrossRefGoogle Scholar
  8. 8.
    Li, X.-B., and Qin, J., Anonymizing and Sharing Medical Text Records. Inf. Syst. Res. 28:332–352, 2017.  https://doi.org/10.1287/isre.2016.0676.CrossRefPubMedPubMedCentralGoogle Scholar
  9. 9.
    Li, C., Wang, L., Sun, S., and Xia, C., Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 320:512–523, 2018.  https://doi.org/10.1016/j.amc.2017.10.001.CrossRefGoogle Scholar
  10. 10.
    Xu, Z., Wei, X., Luo, X., Liu, Y., Mei, L., Hu, C., and Chen, L., Knowle: a semantic link network based system for organizing large scale online news events. Future Gener Comp Sy 43-44:40–50, 2015.  https://doi.org/10.1016/j.future.2014.04.002.CrossRefGoogle Scholar
  11. 11.
    He, D., Kumar, N., Wang, H., Wang, L., Choo, K.-K. R., and Vinel, A., A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Trans Dependable Secur Comput 15:633–645, 2018.  https://doi.org/10.1109/TDSC.2016.2596286.CrossRefGoogle Scholar
  12. 12.
    Ma, M., He, D., Khan, M. K., and Chen, J., Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65:413–424, 2018.  https://doi.org/10.1016/J.COMPELECENG.2017.05.014.CrossRefGoogle Scholar
  13. 13.
    Zhang, Y., Qiu, M., Tsai, C., Hassan, M., and Alamri, A., Health-CPS: Healthcare-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data. IEEE Syst. J. 11:88–95, 2017.  https://doi.org/10.1109/JSYST.2015.2460747.CrossRefGoogle Scholar
  14. 14.
    Bahga, A., and Madisetti, V., A Cloud-based Approach for Interoperable Electronic Health Records (EHRs). IEEE J Biomed Health 17:894–906, 2013.  https://doi.org/10.1109/JBHI.2013.2257818.CrossRefGoogle Scholar
  15. 15.
    Godinho, T., Viana-Ferreira, C., and Silva, L., A Routing Mechanism for Cloud Outsourcing of Medical Imaging Repositories. IEEE J Biomed Health 20:367–375, 2016.  https://doi.org/10.1109/JBHI.2014.2361633.CrossRefGoogle Scholar
  16. 16.
    He, C., Fan, X., and Li, Y., Toward Ubiquitous Healthcare Services with a Novel Efficient Cloud Platform. IEEE Bio-med Eng 60:230–234, 2013.  https://doi.org/10.1109/TBME.2012.2222404.CrossRefGoogle Scholar
  17. 17.
    Wang, H., Ding, S., Wu, D., Zhang, Y., and Yang, S., Smart connected electronic gastroscope system for gastric cancer screening using multi-column convolutional neural networks. Int. J. Prod. Res.:1–12, 2018.  https://doi.org/10.1080/00207543.2018.1464232.
  18. 18.
    Ding, S., Li, Y., Wu, D., Zhang, Y., and Yang, S., Time-aware cloud service recommendation using similarity-enhanced collaborative filtering and ARIMA model. Decis. Support. Syst. 107:103–115, 2018.  https://doi.org/10.1016/j.dss.2017.12.012.CrossRefGoogle Scholar
  19. 19.
    Ding, S., Wang, Z., Wu, D., and Olson, D. L., Utilizing customer satisfaction in ranking prediction for personalized cloud service selection. Decis. Support. Syst. 93:1–10, 2017.  https://doi.org/10.1016/j.dss.2016.09.001.CrossRefGoogle Scholar
  20. 20.
    Yang, Y., Zheng, X., Guo, W., Liu, X., and Chang, V., Privacy-preserving Smart IoT-based Healthcare Big Data Storage and Self-adaptive Access Control System. Inf. Sci.:1–26, 2018.  https://doi.org/10.1016/j.ins.2018.02.005.
  21. 21.
    Singh, K., and Batten, L., Aggregating Privatized Pedical Data for Secure Querying Applications. Future Gener Comp Sy 72:250–263, 2017.  https://doi.org/10.1016/j.future.2016.11.028.CrossRefGoogle Scholar
  22. 22.
    Alshagathrh, F., Khan, S., Alothmany, N., Al-Rawashdeh, N., and Househ, M., Building a Cloud-based Data Sharing Model for the Saudi National Registry for Implantable Medical Devices: Results of a Readiness Assessment. Int. J. Med. Inform. 118:113–119, 2018.  https://doi.org/10.1016/j.ijmedinf.2018.08.005.CrossRefGoogle Scholar
  23. 23.
    Yang, J., Li, J., and Niu, Y., A Hybrid Solution for Privacy Preserving Medical Data Sharing in the Coud Environment. Future Gener Comp Sy 43-44:74–86, 2015.  https://doi.org/10.1016/j.future.2014.06.004.CrossRefGoogle Scholar
  24. 24.
    Xia, C., Meloni, S., Perc, M., and Moreno, Y., Dynamic instability of cooperation due to diverse activity patterns in evolutionary social dilemmas. EPL 109:58002, 2015.  https://doi.org/10.1209/0295-5075/109/58002.CrossRefGoogle Scholar
  25. 25.
    Jabeen, F., Hamid, Z., and Abdul, W., Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment. IEEE Access 5:13308–13326, 2017.  https://doi.org/10.1109/ACCESS.2017.2707584.CrossRefGoogle Scholar
  26. 26.
    Al, H. H., Rahman, S., and Hossain, M., A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-based Cryptography. IEEE Access 5:22313–22328, 2017.  https://doi.org/10.1109/ACCESS.2017.2757844.CrossRefGoogle Scholar
  27. 27.
    Solanas, A., Martínez-Ballesté, A., and Mateo-Sanz, J., Distributed Architecture with Double-phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health. IEEE T Inf Foren Sec 8:901–910, 2013.  https://doi.org/10.1109/TIFS.2013.2248728.CrossRefGoogle Scholar
  28. 28.
    Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., and Hayajneh, T., Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring. J. Med. Syst. 42:130, 2018.  https://doi.org/10.1007/s10916-018-0982-x.CrossRefGoogle Scholar
  29. 29.
    Lin, C., He, D., Huang, X., Choo, K.-K. R., and Vasilakos, A. V., BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116:42–52, 2018.  https://doi.org/10.1016/J.JNCA.2018.05.005.CrossRefGoogle Scholar
  30. 30.
    Lin, C., He, D., Huang, X., Khan, M., and Choo, K., A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6:28203–28212, 2018.  https://doi.org/10.1109/ACCESS.2018.2837650.CrossRefGoogle Scholar
  31. 31.
    Peter BN (2017) Blockchain applications for healthcare. http://www.cio.com/article/3042603/innovation/blockchain-applications-for-healthcare.html. Accessed 17 March 2017.
  32. 32.
    Prisco G (2016) The Blockchain for Healthcare: Gem Launches Gem Health Network With Philips Blockchain Lab. https://bitcoinmagazine.com/articles/the-blockchain-for-heathcare-gem-launches-gem-health-network-with-philips-blockchain-lab-1461674938/. Accessed 26 April 2018.
  33. 33.
    Mettler M (2016) Blockchain Technology in Healthcare: The Revolution Starts Here. 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom) 1–3.  https://doi.org/10.1109/HealthCom.2016.7749510
  34. 34.
    Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W., Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control. J. Med. Syst. 40(10):1–8, 2016.  https://doi.org/10.1007/s10916-016-0574-6.CrossRefGoogle Scholar
  35. 35.
    Shrier AA, Chang A, Diakun-thibault N, Forni L, Landa F, Mayo J, van Riezen R (2016) Blockchain and Health IT: Algorithms, Privacy, and Data. http://www.truevaluemetrics.org/DBpdfs/Technology/Blockchain/1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper.pdf. Accessed 19 August 2017.
  36. 36.
    Lvan D (2016) Moving toward a blockchain-based method for the secure storage of patient records. http://www.healthit.gov/sites/default/files/9-16-drew_ivan-20160804_blockchain_for_healthcare_final.pdf. Accessed 4 August 2016.
  37. 37.
    Yuan B, Lin W, McDonnell C (2016) Blockchains and electronic health records. http://mcdonnell.mit.edu/blockchain_ehr.pdf. Accessed 4 May 2016.
  38. 38.
    Ekblaw A, Azaria A, Halamka JD, Lippman A (2016) A Case Study for Blockchain in Healthcare: “MedRec” prototype for electronic health records and medical research data. https://pdfs.semanticscholar.org/56e6/5b469cad2f3ebd560b3a10e7346780f4ab0a.pdf. Accessed 4 May 2017.
  39. 39.
    Azaria A, Ekblaw A, Vieira T, Lippman A (2016) MedRec: Using Blockchain for Medical Data Access and Permission Management. 2016 2nd International Conference on Open and Big Data (OBD) 25–30.  https://doi.org/10.1109/OBD.2016.11
  40. 40.
    Xia, Q., Sifah, E., Smahi, A., Amofa, S., and Zhang, X., BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2):44, 2017.  https://doi.org/10.3390/info8020044.CrossRefGoogle Scholar
  41. 41.
    Peterson K, Deeduvanu R, Kanjamala P, Clinic KBM (2016) A Blockchain-Based Approach to Health Information Exchange Networks. https://www.healthit.gov/sites/default/files/12-55-blockchain-based-approach-final.pdf. Accessed 26 May 2016.
  42. 42.
    Kuo TT, Hsu CN, Ohno-Machado L (2016) ModelChain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. https://www.healthit.gov/sites/default/files/10-30-ucsd-dbmi-onc-blockchain-challenge.pdf. Accessed 22 May 2016.
  43. 43.
    Chen, T., and Zhong, S., Emergency access authorization for personally controlled online health care data. J. Med. Syst. 36(1):291, 2012.  https://doi.org/10.1007/s10916-010-9475-2.CrossRefGoogle Scholar
  44. 44.
    Huba, N., and Zhang, Y., Designing patient-centered personal health records (PHRs): health care professionals’ perspective on patient-generated data. J. Med. Syst. 36(6):3893–3905, 2012.  https://doi.org/10.1007/s10916-012-9861-z.CrossRefGoogle Scholar
  45. 45.
    Xia, C., Ding, S., Wang, C., Wang, J., and Chen, Z., Risk analysis and enhancement of cooperation yielded by the individual reputation in the spatial public goods game. IEEE Syst. J. 11(3):1516–1525, 2017.  https://doi.org/10.1109/JSYST.2016.2539364.CrossRefGoogle Scholar
  46. 46.
    Simpao, A. F., Ahumada, L. M., Gálvez, J. A., and Rehman, M. A., A review of analytics and clinical informatics in health care. J. Med. Syst. 38(4):45, 2014.  https://doi.org/10.1007/s10916-014-0045-x.CrossRefGoogle Scholar
  47. 47.
    Wang, Y., Tian, Y., Tian, L. L., Qian, Y. M., and Li, J. S., An electronic medical record system with treatment recommendations based on patient similarity. J. Med. Syst. 39(5):1–9, 2015.  https://doi.org/10.1007/s10916-015-0237-z.CrossRefGoogle Scholar
  48. 48.
    Wang, Z., Cao, C., Yang, N., and Chang, V., ABE with improved auxiliary input for big data security. J. Comput. Syst. Sci. 89:41–50, 2017.  https://doi.org/10.1016/j.jcss.2016.12.006.CrossRefGoogle Scholar
  49. 49.
    Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security 89–98.  https://doi.org/10.1145/1180405.1180418
  50. 50.
    Chu, C., Chow, S. S. M., Tzeng, W., Zhou, J., Deng, R. H., and Member, S., Supplementary Material for Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans Parallel Distrib Syst 25:1–4, 2014.  https://doi.org/10.1109/TPDS.2013.112.CrossRefGoogle Scholar
  51. 51.
    Wang, Z., Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud. Futur. Gener. Comput. Syst., 2017.  https://doi.org/10.1016/j.future.2017.09.041.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of ManagementHefei University of TechnologyHefeiChina
  2. 2.Key Laboratory of Process Optimization and Intelligent Decision-Making (Ministry of Education)Hefei University of TechnologyHefeiChina
  3. 3.The Third Research Institute of the Ministry of Public SecurityShanghaiChina

Personalised recommendations