scholarly journals A Threshold Signature Scheme Without Trusted Center for Blockchain-Based Medical Cyber-Physical Systems

Author(s):  
Xianfei Zhou ◽  
Jing Huang ◽  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang ◽  
...  

Abstract With the rapid development of medical information technology, the medical cyber-physical system is undergoing a rapid transformation, and the safe storage and sharing of medical data are facing great challenges. It makes the work of safe medical data storage, privacy protection and data sharing get more difficult. In this paper, we propose the combination of private blockchain and consortium blockchain that can protect information security and realize data sharing. In the system, the medical records of each node are stored in the private blockchain, and the shared data is on the consortium blockchain so as to improve the data storage and reduce data redundancy. And the threshold signature scheme without trusted center is applied in the system. In order to initiate threshold signature, a set of nodes is constructed by the sponsoring doctor, in which the threshold signature process is initiated. When there are no less than $t$ nodes sending part-signatures, the signature can be synthesized to group signature. This scheme can be well applied to the scene of multidisciplinary joint consultation in the medical blockchain. The scheme proposed in this paper has high security and computing efficiency.

2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselbergs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


This modern society expects sophisticated modern health care services to enhance the healthy living conditions. The world’s ageing population and prevalence of chronic diseases has lead to high demand for medical data monitoring. The modern technology is supporting in all the way to realize the sophisticated health services. Specialized doctors are generally very rare and they may be geographically far away from needy patient. Without the support of technology, they cannot provide health services from remote places. In most of the cases, patients are immovable to doctor’s place due to their critical health conditions. But, the technology is a coming to help in such situations in a great way. The modern technology is helping in providing health services remotely with same quality as a local doctor can provide. The key concept behind this technology is collecting health data with highest possible accuracy and sharing it with remotely present health specialists. The wearable devices can collect body data most accurately and can send data to cloud for sharing it with remotely present health specialists. But, we know, sharing medical information is very critical and challenging issue because medical information contains patient’s important and highly confidential information. On the other hand, medical ethics says that doctors cannot share patient’s health records with others without the consent of patient. Such data will be shared between only authentic persons in cloud. The chain of processing mainly includes data collection, data storage, and data sharing. In this work a protected cloudlet based medical data sharing is proposed. In this paper, three major issues pertaining to medical data sharing are addressed. Firstly, a method for secured medical data sharing using cloudlet is proposed. During data collection, Number Theory Research Unit (NTRU) method used to encrypt user’s body data collected by wearable devices, then transmitted to nearby cloudlet. Secondly, a new trust model to help users to select trustable partners for sharing stored data in the cloudlet is presented. This model is to help similar patients to communicate with each other. Thirdly, a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh is proposed, which can effectively prevent the remote healthcare big data cloud from attacks. Finally, an analysis of security to the information is presented and the results are quite encouraging.


1999 ◽  
Vol 38 (01) ◽  
pp. 16-24 ◽  
Author(s):  
Th. Wrba ◽  
G. Duftschmid ◽  
P. Sachs ◽  
W. Gall ◽  
Ch. Rehnelt ◽  
...  

Abstract:ArchiMed is a highly flexible medical data storage and retrieval system which adds sophisticated clinical research support to a standard hospital information system (HIS).Currently, the HIS of Vienna General Hospital-University Hospital (2000 beds) stores the clinical data of over 2 million patients. While this system supports patient care (e.g., ADT, clinical chemistry, diagnosis, procedures), it has no features to facilitate research, such as the management of clinical studies.ArchiMed is designed to support clinical research. It includes an independent database, which mirrors virtually all the information held in the HIS while also allowing new data to be collected independently and to be added to the database. Flexible retrieval and analysis of data contained in the database are then possible. Thus, existing patient data can be smoothly incorporated into a study together with data collected specifically for research purposes. The system has already been successfully installed in the departments of surgery and soon in other departments as well.


2011 ◽  
Vol 50-51 ◽  
pp. 49-53
Author(s):  
Yong Quan Cai ◽  
Fu Lai Cheng

The traditional threshold signature scheme is a combination of the digital signature scheme and the secret sharing scheme. Any group of t (threshold value) or more players can reconstruct the secret together but no group of fewer than t players can in secret sharing scheme. Because of this property of secret sharing scheme, the current threshold signature scheme has a natural weakness in the anti-collusion attack. A new threshold signature scheme based on the factorial decompose theorem is designed successfully without the secret sharing scheme in order to get the ability of anti-collusion attacks. It not only has the property of group signature and threshold signature, but also has some good features including traceability,robustness and resisting forgery attacks.


2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselberghs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zhuo Zhao ◽  
Chingfang Hsu ◽  
Lein Harn ◽  
Qing Yang ◽  
Lulu Ke

Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients and medical sensors. Patients can share real-time medical data collected in IoMT with medical professionals. This enables medical professionals to provide patients with efficient medical services. Due to the high efficiency of cloud computing, patients prefer to share gathering medical information using cloud servers. However, sharing medical data on the cloud server will cause security issues, because these data involve the privacy of patients. Although recently many researchers have designed data sharing schemes in medical domain for security purpose, most of them cannot guarantee the anonymity of patients and provide access control for shared health data, and further, they are not lightweight enough for IoMT. Due to these security and efficiency issues, a novel lightweight privacy-preserving data sharing scheme is constructed in this paper for IoMT. This scheme can achieve the anonymity of patients and access control of shared medical data. At the same time, it satisfies all described security features. In addition, this scheme can achieve lightweight computations by using elliptic curve cryptography (ECC), XOR operations, and hash function. Furthermore, performance evaluation demonstrates that the proposed scheme takes less computation cost through comparison with similar solutions. Therefore, it is fairly an attractive solution for efficient and secure data sharing in IoMT.


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.


2021 ◽  
Author(s):  
Xianfei Zhou ◽  
Jing Huang ◽  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang

Abstract With the rapid development of medical information, the medical cyber system is rapidly transforming, and medical information sharing faces new challenges. Blockchain technology is a revolutionary technology. It has the characteristics of tamper-proof and privacy-preserving, and has natural protection for big data systems, that can be used in medical systems. In this paper,we proposed to store medical cyber physical data in a mixed blockchain with private blockchain and consortium blockchain in order to realize the secure storage of medical cyber physical data by the tamper-resistant and sharing of blockchain technology. In the system, a threshold signature system based on blockhain is also proposed. Aiming at the situation that medical accidents are easy to occur in multidisciplinary joint consultation in the medical process, this paper proposes to use threshold signature for joint consultation. Using the security and threshold of threshold signature, treatment can be carried out when the threshold number is reached, and medical data can be uploaded to the consortium blockchain. The security analysis and performance analysis show that the scheme has advantages in safety and performance and is suitable for the medical environment to a certain extent.


2020 ◽  
Author(s):  
Suresh Kondeti ◽  
Siva Kumar

With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client's body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients' therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Liang Huang ◽  
Hyung-Hyo Lee

With the features of decentralization and trustlessness and through distributed data storage, point-to-point transmission, and encryption algorithms, blockchain has shed new light on the security and protection of medical data, and it can resolve the contradiction between data sharing and privacy protection with proper security strategies. In this paper, we integrate the strengths of both blockchain and cloud computing and build the privacy protection scheme for medical data based on blockchain and cloud computing. This scheme introduces cloud computing and provides services to blockchain nodes with cloud server computing; meanwhile, it collects, analyzes, processes, and maintains medical data in the identity authentication interface and solves the insufficient computing abilities of some nodes in blockchain so as to verify the authenticity and reliability of data. The simulation experiment proves that the proposed scheme is effective. It can achieve the secure protection and integrity verification of medical data and address the problems of high computing complexity, data sharing, and privacy protection.


Sign in / Sign up

Export Citation Format

Share Document