4.3 Article

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

Journal

Publisher

KSII-KOR SOC INTERNET INFORMATION
DOI: 10.3837/tiis.2022.05.012

Keywords

data sharing; blockchain; access control; permission revocation; medical environment

Funding

  1. National Key Research and Development Program of China [2021YFE0102100]
  2. National Natural Science Foundation of China [62172353]
  3. Future Network Scientific Research Fund Project [FNSRFP-2021-YB-48]
  4. Science and Technology Program of Yangzhou City [YZU202003]
  5. Six Talent Peaks Project in Jiangsu Province [XYDXX-108]

Ask authors/readers for more resources

In the age of big data, achieving data access control and implementing user permission revocation in the blockchain environment has become an urgent problem. This paper proposes a novel blockchain-based data sharing scheme that provides fine-grained access control and permission revocation, using encryption technologies to ensure data security.
Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available