Research Article
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
@INPROCEEDINGS{10.1007/978-3-030-30146-0_30, author={Tao Feng and Ying Jiao and Junli Fang}, title={Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)}, proceedings={Collaborative Computing: Networking, Applications and Worksharing. 15th EAI International Conference, CollaborateCom 2019, London, UK, August 19-22, 2019, Proceedings}, proceedings_a={COLLABORATECOM}, year={2019}, month={8}, keywords={Medical cloud (MC) Blockchain DPOS consensus mechanism Attribute-based Proxy Re-encryption (AB-PRE) Privacy-preserving}, doi={10.1007/978-3-030-30146-0_30} }
- Tao Feng
Ying Jiao
Junli Fang
Year: 2019
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
COLLABORATECOM
Springer
DOI: 10.1007/978-3-030-30146-0_30
Abstract
The cloud storage and sharing system are widely used in medical systems. The unique characteristics of cloud storage enable healthy data being efficiently delivered and retrieved. Nevertheless, traditional medical cloud system suffers two flaws. For one thing, centralized cloud servers are vulnerable to malicious attack and single point of failure. For another, these systems cannot offer a powerful capability to protect medical health data. Blockchain technology is considered to be one of vital technologies of Bitcoin. In this paper, we propose a security model which combines the cloud storage technology with blockchain technology. Our model adopts Delegate Proof of Stake (DPOS) consensus mechanism to ensure that all nodes have unified state in the network. Additionally, the CP-ABE scheme is introduced into the Proxy Re-encryption to store and share medical data which supports the keywords searching. Moreover, we rank medical institutions that different ranks have different duties. In our secure sharing models, there are no central nodes and it is a distributed environment. It not only can reduce the access overhead of the blockchain but also better resist the collusion attack. Furthermore, our security analysis indicates that the proposed scheme achieves provable security under the q-DBDHE assumption in the random oracle model. Then, the comparisons show that our model is more efficient and practical than previous ones.