Skip to main content
Log in

A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To date, we can see the application of big data and cloud in various fields and levels, making induction, arrangement, transmission, and exchange of data easier and faster. The electronic and systematisation of patient medical records in the medical environment is an example. The use of electronic medical records can help improve the quality of medical care, reduce duplication of treatment, and reduce the waste of examination resources. It has many advantages, but also many risks. Medical institutions may abuse electronic medical data without the consent of patients, leading to the leakage of patient privacy data and causing serious social impact. Therefore, this study proposes a medical record exchange and sharing mechanism based on the Hyperledger blockchain architecture combined with proxy reencryption. When pharmacists need to obtain medical records for related research, patients can decide whether to share medical records, and hospitals can also revoke pharmacist access rights at any time to achieve more private, secure, and convenient sharing of medical records. The proposed scheme meets various blockchain security requirements and the BAN (Burrows–Abadi–Needham) logic proof model (Burrows–Abadi–Needham) is applied to assess the correctness of the proposed scheme. The proposed scheme performs well in terms of computational and communication costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Algorithm 2
Algorithm 3
Fig. 5
Algorithm 4
Algorithm 5
Fig. 6
Algorithm 6
Algorithm 7
Fig. 7
Algorithm 8
Algorithm 9
Fig. 8
Algorihtm 10
Algorithm 11
Algorithm 12
Fig. 9
Algorithm 13
Algorithm 14
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  2. Buterin, V.: A next-generation smart contract and decentralised application platform. Ethereum White Paper 3, 36 (2014)

    Google Scholar 

  3. Wang, H., Song, Y.: Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J. Med. Syst. 42(8), 1–9 (2018). https://doi.org/10.1007/s10916-018-0994-6

    Article  MathSciNet  Google Scholar 

  4. Wang, J., Li, M., He, Y., Li, H., Xiao, K., Wang, C.: A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6, 17545–17556 (2018)

    Article  Google Scholar 

  5. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)

    Article  Google Scholar 

  6. Xia, Q., Sifah, E., Smahi, A., Amofa, S., Zhang, X.: BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(44), 1–16 (2017)

    Google Scholar 

  7. Xu, J., Xue, K., Li, S., Tian, H., Hong, J., Hong, P., Yu, N.: Healthchain: a blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J. 6(5), 8770–8781 (2019)

    Article  Google Scholar 

  8. Liu, X., Wang, Z., Jin, C., Li, F., Li, G.: A Blockchain-based medical data sharing and protection scheme. IEEE Access 7, 118943–118953 (2019)

    Article  Google Scholar 

  9. Chen, C.C., Huang, P.T., Deng, Y.Y., Chen, H.C., Wang, Y.C.: A secure electronic medical record authorization system for smart device application in cloud computing environments. Hum. Centric Comput. Inf. Sci. 10, 1–31 (2020). https://doi.org/10.1186/s13673-020-00221-1

  10. Powles, J., Hodson, H.: Google DeepMind and healthcare in an age of algorithms. Health Technol. 7(4), 351–367 (2017)

    Article  Google Scholar 

  11. Chiuchisan, I., Dimian, M.: Internet of things for e-health: an approach to medical application. In: IEEE International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), pp. 1–5 (2015)

  12. Moosavi, S.R., Gia, T.N., Nigussie, E., Rahmani, A.M., Virtanen, S., Tenhunen, H., Isoaho, J.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108–124 (2016)

    Article  Google Scholar 

  13. Azeez, N.A., Vyver, C.V.D.: Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt. Inform. J. 20(2), 97–108 (2019)

    Article  Google Scholar 

  14. Li, C.T., Shih, D.H., Wang, C.C.: Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput. Methods Progr. Biomed. 157, 191–203 (2018)

    Article  Google Scholar 

  15. Iribarren, S.J., Brown, W., III., Giguere, R., Stone, P., Schnall, R., Staggers, N., Carballo-Diéguez, A.: Scoping review, and evaluation of SMS/text messaging platforms for mHealth projects or clinical interventions. Int. J. Med. Inform. 101, 28–40 (2017)

    Article  PubMed  PubMed Central  Google Scholar 

  16. Khemissa, H., Tandjaoui, D.: A lightweight authentication scheme for e-health applications in the context of Internet of Things. In: International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 90–95 (2015)

  17. Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 11, 746–759 (2016)

    Article  Google Scholar 

  18. Dave, M., Rastogi, V., Miglani, M., Saharan, P., Goyal, N.: Smart fog-based video surveillance with privacy preservation based on blockchain, wireless personal communications. Springer (2021). https://doi.org/10.1007/s11277-021-09426-8

    Article  Google Scholar 

  19. Chauhan, H., Gupta, D., Gupta, S., Singh, A., Aljahdali, H.M., Goyal, N., Noya, I.D., Kadry, S.: Blockchain enabled transparent and anti-counterfeiting supply of COVID-19 vaccine vials, vaccines. MDPI 9(11), 1239 (2021). https://doi.org/10.3390/vaccines9111239

    Article  CAS  Google Scholar 

  20. Kumar, A., Sharma, S., Goyal, N., Singh, A., Cheng, X., Singh, P.: Secure and energy-efficient smart building architecture with emerging technology IoT. Comput. Commun. 176, 207–217 (2021). https://doi.org/10.1016/j.comcom.2021.06.003

    Article  Google Scholar 

  21. Chen, C.C., Deng, Y.Y., Weng, W., Sun, H., Zhou, M.: A blockchain-based secure inter-hospital EMR sharing system. Appl. Sci. 10(14), 4958 (2020). https://doi.org/10.3390/app10144958

    Article  CAS  Google Scholar 

  22. Zhang, A., Lin, X.: Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 2018. https://doi.org/10.1007/s10916-018-0995-5

  23. Chen, Z., Xu, W., Wang, B., Yu, H.: A blockchain-based preserving and sharing system for medical data privacy. Futur. Gener. Comput. Syst. 124, 338–350 (2021)

    Article  Google Scholar 

  24. Johari, R., Kumar, V., Gupta, K., Vidyarthi, D.P.: BLOSOM: blockchain technology for security of medical records. ICT Express 8(1):56-60 (2022)

  25. Roy, S., Das, A.K., Chatterjee, S., Kumar, N., Chattopadhyay, S., Rodrigues, J.J.: Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans. Industr. Inf. 15(1), 457–468 (2018)

    Article  Google Scholar 

  26. Wazid, M., Das, A.K., Kumari, S., Li, X., Wu, F.: Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur. Commun. Netw. 9(17), 4103–4119 (2016)

    Article  Google Scholar 

  27. Sureshkumar, V., Amin, R., Vijaykumar, V.R., Sekar, S.R.: Robust secure communication protocol for smart healthcare system with FPGA implementation. Futur. Gener. Comput. Syst. 100, 938–951 (2019)

    Article  Google Scholar 

  28. Roy, S., Chatterjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Jo, M.: Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J. 5(4), 2884–2895 (2017)

    Article  Google Scholar 

  29. Banerjee, S., Odelu, V., Das, A.K., Srinivas, J., Kumar, N., Chattopadhyay, S., Choo, K.K.R.: A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J. 6(5), 8739–8752 (2019)

    Article  Google Scholar 

  30. Shuai, M., Yu, N., Wang, H., Xiong, L.: Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86, 132–146 (2019)

    Article  Google Scholar 

  31. Abbas, A., Khan, S.: A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431–1441 (2014)

    Article  PubMed  Google Scholar 

  32. Yang, J., Li, J., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43–44, 74–86 (2015)

    Article  Google Scholar 

  33. Soni, P., Pal, A.K., Islam, S.H.: An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Progr. Biomed. 182, 105054 (2019)

  34. Masdari, M., Ahmadzadeh, S.: A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. J. Netw. Comput. Appl. 87, 1–19 (2017)

    Article  Google Scholar 

  35. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur. Gener. Comput. Syst. 80, 483–495 (2018)

    Article  Google Scholar 

  36. Chen, L., Lee, W.K., Chang, C.C., Choo, K.K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Futur. Gener. Comput. Syst. 95, 420–429 (2019)

    Article  Google Scholar 

  37. Tanwar, S., Parekh, K., Evans, R.: Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 50:102407 (2020)

  38. Szabo, N.: Smart contracts: building blocks for digital markets. Extropy 18(2), 16 (1996)

    Google Scholar 

  39. Szabo, N.: The idea of smart contracts (1997). http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_idea.html.

  40. Vanstone, S.: Responses to NIST’s proposal. Commun. ACM 35, 50–52 (1992)

    Google Scholar 

  41. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 36–63 (2001). https://doi.org/10.1007/s102070100002

    Article  Google Scholar 

  42. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  Google Scholar 

  43. Sierra, J.-M., Hernández, J.-C., Alcaide, A., Torres, J.: Validating the Use of BAN LOGIC, pp. 851–858. Springer, Berlin (2004)

    Google Scholar 

  44. Hyperledger Fabric Docs. https://hyperledgerfabric.readthedocs.io/en/release-2.2

  45. Foschini, L., Gavagna, A., Martuscelli, G., Montanari, R.: Hyperledger fabric blockchain: chaincode performance analysis. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), pp. 1–6 (2020). https://doi.org/10.1109/ICC40277.2020.9149080.

  46. Uddin, M.: Blockchain medledger: hyperledger fabric enabled drug traceability system for counterfeit drugs in the pharmaceutical industry. Int. J. Pharm. 597, 120235 (2021)

    Article  CAS  PubMed  Google Scholar 

  47. Marcus, M.J.: 5G and IMT for 2020 and beyond. IEEE Wirel. Commun. 22(4), 2–3 (2015)

    Article  Google Scholar 

Download references

Funding

This work was supported in part by the National Science and Technology Council of Taiwan, 0 under contract NSTC 112-2410-H-324-001-MY2.

Author information

Authors and Affiliations

Authors

Contributions

The authors’ contributions are summarised below. Ling-Chun Liu, Chin-Ling Chen and Yung-Yuan Deng have made substantial contributions to the conception and design, who participated in the draughting of the manuscript. Ling-Chun Liu and Der-Chen Huang have acquired data and analysed and interpretation of data. The critically important intellectual content of this manuscript have been revised by Der-Chen Huang, Chin-Ling Chen and Kuang-Wei Zeng. All authors read and approved the final manuscript.

Corresponding authors

Correspondence to Yong-Yuan Deng or Chin-Ling Chen.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This study is based 0 on theoretical basic research. It does not involve humans.

Informed consent

This study is based 0 on theoretical basic research. It does not involve humans.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

AP: Access Party.

BAN Logic: Burrows–Abadi–Needham Logic.

BCC: Blockchain Center.

CA: Certificate Authority.

COVID-19: Coronavirus Disease 2019.

DSA: Digital Signature Algorithm.

ECC: Elliptic Curve Cryptography.

ECDSA: Elliptic Curve Digital Signature Algorithm.

EMR: Electronic Medical Record.

HP: Hospital.

IoT: Internet of Things.

MC: Medical Cloud.

PC: Pharmacist.

PT: Patient.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, DC., Liu, LC., Deng, YY. et al. A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04286-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04286-w

Keywords

Navigation