4.3 Article

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

期刊

出版社

KSII-KOR SOC INTERNET INFORMATION
DOI: 10.3837/tiis.2022.05.012

关键词

data sharing; blockchain; access control; permission revocation; medical environment

资金

  1. National Key Research and Development Program of China [2021YFE0102100]
  2. National Natural Science Foundation of China [62172353]
  3. Future Network Scientific Research Fund Project [FNSRFP-2021-YB-48]
  4. Science and Technology Program of Yangzhou City [YZU202003]
  5. Six Talent Peaks Project in Jiangsu Province [XYDXX-108]

向作者/读者索取更多资源

In the age of big data, achieving data access control and implementing user permission revocation in the blockchain environment has become an urgent problem. This paper proposes a novel blockchain-based data sharing scheme that provides fine-grained access control and permission revocation, using encryption technologies to ensure data security.
Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据