Journal
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
Volume 16, Issue 5, Pages 1634-1652Publisher
KSII-KOR SOC INTERNET INFORMATION
DOI: 10.3837/tiis.2022.05.012
Keywords
data sharing; blockchain; access control; permission revocation; medical environment
Funding
- National Key Research and Development Program of China [2021YFE0102100]
- National Natural Science Foundation of China [62172353]
- Future Network Scientific Research Fund Project [FNSRFP-2021-YB-48]
- Science and Technology Program of Yangzhou City [YZU202003]
- Six Talent Peaks Project in Jiangsu Province [XYDXX-108]
Ask authors/readers for more resources
In the age of big data, achieving data access control and implementing user permission revocation in the blockchain environment has become an urgent problem. This paper proposes a novel blockchain-based data sharing scheme that provides fine-grained access control and permission revocation, using encryption technologies to ensure data security.
Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available