[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The sharing of patients’ locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and openness, there is also a challenge to guarantee the security and the privacy of locations recorded in a blockchain. To this end, this paper investigates the location sharing based on blockchains for telecare medical information systems. Firstly, we define the basic requirements of blockchain-based location sharing including decentralization, unforgeability, confidentiality, multi-level privacy protection, retrievability and verifiability. Then, using order-preserving encryption and merkle tree, we propose a blockchain-based multi-level location sharing scheme, i.e. BMPLS. The analysis results show that our scheme satisfies the above requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for both patients and medical workers. In a word, our scheme can be applied to realize privacy-preserving location sharing based on blockchains for telecare medical information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. He, D., Kumar, N., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263, 2015.

    Article  Google Scholar 

  2. He, D., Zeadally, S., and Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2015

  3. Wang, D., Cheng, H., He, D., and Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Systems Journal, 2016

  4. Chao, H. C., Zeadally, S., and Hu, B., Wearable computing for health care. J. Med. Syst. 40(4):87, 2016.

    Article  PubMed  Google Scholar 

  5. Mezghani, E., Exposito, E., Drira, K., and Silveira, M. D., A semantic big data platform for integrating heterogeneous wearable data in healthcare. J. Med. Syst. 39(12):185, 2015.

    Article  PubMed  Google Scholar 

  6. He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4):2590, 2017.

    Article  Google Scholar 

  7. Jiang, Q., Ma, J., Yang, C., Ma, X., Shen, J., and Chaudhry, S. A., Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63:182, 2017.

    Article  Google Scholar 

  8. He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989, 2012.

    Article  Google Scholar 

  9. He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Communications Magazine 53(1):71, 2015.

    Article  Google Scholar 

  10. Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic. Secur. 12(10):2402, 2017.

    Article  Google Scholar 

  11. Shen, J., Liu, D., Bhuiyan, M. Z. A., Shen, J., Sun, X., and Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Transactions on Emerging Topics in Computing, 2017

  12. Bandara, H. D., and Jayasumana, A. P., Collaborative applications over peer-to-peer systems–challenges and solutions. Peer-to-Peer Netw. Appl. 6(3):257, 2013.

    Article  Google Scholar 

  13. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Consulted, 2008

  14. Swan, M.: Blockchain: Blueprint for a new economy. O’Reilly Media, Inc, 2015

  15. Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., and Gazi, P.: Spacecoin: A cryptocurrency based on proofs of space. Cryptology ePrint Archive, Report 2015/528, 2015. http://eprint.iacr.org/2015/528

  16. Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S., Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press, 2016.

    Google Scholar 

  17. Zyskind, G., Nathan, O., and Pentland, A. S.: Decentralizing privacy: Using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops, pp. 180–184, 2015

  18. Brambilla, G., Amoretti, M., and Zanichelli, F.: Using blockchain for peer-to-peer proof-of-location. arXiv:1607.00174, 2016

  19. Yao, X., Lin, Y., Liu, Q., and Zhang, J., Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access 6:3809, 2018.

    Article  Google Scholar 

  20. Miyaji, A., Nakasho, K., and Nishida, S., Privacy-preserving integration of medical data. J. Med. Syst. 41(3):37, 2017.

    Article  PubMed  PubMed Central  Google Scholar 

  21. Shen, J., Zhou, T., Wei, F., Sun, X., and Xiang, Y.: Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet of Things Journal, 2017

  22. Gedik, B., and Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 620–629, 2005

  23. Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., and Palamidessi, C.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 901–914, 2013

  24. Boldyreva, A., Chenette, N., Lee, Y., and O’Neill, A.: Order-preserving symmetric encryption, Advances in Cryptology - EUROCRYPT 2009, International Conference on the Theory and Applications of Cryptographic Techniques. Cologne: Proceedings, pp. 224–241, 2009

  25. Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., and Peng, C., Hope: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6):062101, 2017.

    Article  Google Scholar 

  26. Merkle, R. C.: A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp. 218–238, 1989

  27. Xiao, L., and Yen, I. L.: Security analysis for order preserving encryption schemes. In: Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6, 2012

  28. Zhang, J., Ma, J., Yang, C., and Yang, L., Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11):1, 2015.

    Google Scholar 

  29. Shamir, A., Identity-based cryptosystems and signature schemes. Lect. Notes Comput. Sci. 196(2):47, 1985.

    Article  Google Scholar 

  30. Wang, D., Cheng, H., Wang, P., Huang, X., and Jian, G., Zipf’s law in passwords. IEEE Trans. Inf. Forensic. Secur. PP(99):1, 2017.

    Google Scholar 

  31. Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J.: Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2017. https://doi.org/10.1007/s12652-017-0516-2

  32. Wang, D., and Wang, P., Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99):1, 2016.

    Google Scholar 

  33. He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816, 2015.

    Article  Google Scholar 

  34. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., and Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 2017

  35. Shen, J., Zhou, T., Chen, X., Li, J., and Susilo, W., Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensic. Secur. 13(4):912, 2018.

    Article  Google Scholar 

Download references

Funding

This study was funded by National Natural Science Foundation of China (61472310, U1536202, U1405255, 61672413, 61672415, 61671360, 61602360, 61702404), the China 111 project (grant B16037).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junwei Zhang.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

This article is part of the Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ji, Y., Zhang, J., Ma, J. et al. BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J Med Syst 42, 147 (2018). https://doi.org/10.1007/s10916-018-0998-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-018-0998-2

Keywords

Navigation