Journal of Applied Sciences ›› 2023, Vol. 41 ›› Issue (5): 881-895.doi: 10.3969/j.issn.0255-8297.2023.05.013

• Computer Science and Applications • Previous Articles    

Dual Authorization Sharing Scheme of Searchable Electronic Medical Data Based on Consortium Blockchain

MA Xue1,2,4, PAN Heng1,2, YAO Zhongyuan1,2, SI Xueming1,2,3   

  1. 1. The Frontier Information Technology Research Institute, Zhongyuan University of Technology, Zhengzhou 450007, Henan, China;
    2. Henan International Joint Laboratory of Blockchain and Data Sharing, Zhengzhou 450007, Henan, China;
    3. School of Computer Science, Fudan University, Shanghai 201203, China;
    4. Big Data and Artificial Intelligence Institute, Zhengzhou University of Economics and Business, Zhengzhou 450007, Henan, China
  • Received:2021-11-12 Published:2023-09-28

Abstract: Retrieval of electronic medical record (EMR) in cloud environments induces security problems and patient privacy data leakage problems. To this end, a dual-authorization sharing scheme for EMR that supports on-chain keyword ciphertext retrieval is proposed. In the scheme, original medical data ciphertexts are stored in a cloud, and the information of medical data keyword index is constructed with searchable encryption technology and stored on the blockchain. On the premise of obtaining the hospital retrieval authority, a keyword retrieval algorithm under distributed conditions is used to realize the secure re trieval of the medical data ciphertexts. Based on searchable proxy re-encryption algorithm, an authorization on-chain method for the electronic medical data is proposed, which en sures the access control of patients’ medical data and realizes a double authorization of the shared medical data by the hospital and patients. Finally, random oracle model is used to verify the semantic security of the scheme under the assumption of n-QBDH, and the superiority of the scheme in terms of computational cost is proved by experiments.

Key words: consortium blockchain, medical data security sharing, searchable encryption, proxy re-encryption, dual authorization, access control

CLC Number: