
Research Article
Cross-Chain Data Auditing for Medical IoT Data Sharing
@INPROCEEDINGS{10.1007/978-3-031-30623-5_5, author={Kuan Fan and Zhuoxuan Liu and Mingxi Liu and Yihong Wen and Ning Lu and Wenbo Shi}, title={Cross-Chain Data Auditing for Medical IoT Data Sharing}, proceedings={Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings}, proceedings_a={SPNCE}, year={2023}, month={4}, keywords={Cross-chain Data sharing Consistency verification Data auditing}, doi={10.1007/978-3-031-30623-5_5} }
- Kuan Fan
Zhuoxuan Liu
Mingxi Liu
Yihong Wen
Ning Lu
Wenbo Shi
Year: 2023
Cross-Chain Data Auditing for Medical IoT Data Sharing
SPNCE
Springer
DOI: 10.1007/978-3-031-30623-5_5
Abstract
Secure medical IoT data sharing significantly improves medical collaboration and facilitates patients’ medical treatment. Since block chain provides integrity and traceability management for medical data, many IoT medical data choose block chain as a storage medium. However, the isolation of block chain hinders data sharing between heterogeneous chains, so how to realize the secure sharing of medical IoT data in heterogeneous block chains and allow users to obtain correct and credible shared data is still a challenge. Existing data integrity verification techniques ensure the correctness of shared data by comparing off-chain data with metadata stored on-chain. However, these schemes ignore the consistency of shared data and the correctness of cross-chain data. This paper builds a cross-chain medical IoT data-sharing framework, introduces a relay chain, and verifies the consistency between data requests and actual storage through registration, auditing, and other methods. Based on this framework, this paper uses homomorphic signature technology and batch auditing to design a cross-chain audit protocol to verify the consistency of registered data attributes and the correctness of shared data. Security analysis and simulation experiments based on security reduction demonstrate the security and effectiveness of the proposed scheme.