Abstract
The sharing of patients’ locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and openness, there is also a challenge to guarantee the security and the privacy of locations recorded in a blockchain. To this end, this paper investigates the location sharing based on blockchains for telecare medical information systems. Firstly, we define the basic requirements of blockchain-based location sharing including decentralization, unforgeability, confidentiality, multi-level privacy protection, retrievability and verifiability. Then, using order-preserving encryption and merkle tree, we propose a blockchain-based multi-level location sharing scheme, i.e. BMPLS. The analysis results show that our scheme satisfies the above requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for both patients and medical workers. In a word, our scheme can be applied to realize privacy-preserving location sharing based on blockchains for telecare medical information systems.
Similar content being viewed by others
References
He, D., Kumar, N., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263, 2015.
He, D., Zeadally, S., and Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2015
Wang, D., Cheng, H., He, D., and Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Systems Journal, 2016
Chao, H. C., Zeadally, S., and Hu, B., Wearable computing for health care. J. Med. Syst. 40(4):87, 2016.
Mezghani, E., Exposito, E., Drira, K., and Silveira, M. D., A semantic big data platform for integrating heterogeneous wearable data in healthcare. J. Med. Syst. 39(12):185, 2015.
He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4):2590, 2017.
Jiang, Q., Ma, J., Yang, C., Ma, X., Shen, J., and Chaudhry, S. A., Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63:182, 2017.
He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989, 2012.
He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Communications Magazine 53(1):71, 2015.
Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic. Secur. 12(10):2402, 2017.
Shen, J., Liu, D., Bhuiyan, M. Z. A., Shen, J., Sun, X., and Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Transactions on Emerging Topics in Computing, 2017
Bandara, H. D., and Jayasumana, A. P., Collaborative applications over peer-to-peer systems–challenges and solutions. Peer-to-Peer Netw. Appl. 6(3):257, 2013.
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Consulted, 2008
Swan, M.: Blockchain: Blueprint for a new economy. O’Reilly Media, Inc, 2015
Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., and Gazi, P.: Spacecoin: A cryptocurrency based on proofs of space. Cryptology ePrint Archive, Report 2015/528, 2015. http://eprint.iacr.org/2015/528
Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S., Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press, 2016.
Zyskind, G., Nathan, O., and Pentland, A. S.: Decentralizing privacy: Using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops, pp. 180–184, 2015
Brambilla, G., Amoretti, M., and Zanichelli, F.: Using blockchain for peer-to-peer proof-of-location. arXiv:1607.00174, 2016
Yao, X., Lin, Y., Liu, Q., and Zhang, J., Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access 6:3809, 2018.
Miyaji, A., Nakasho, K., and Nishida, S., Privacy-preserving integration of medical data. J. Med. Syst. 41(3):37, 2017.
Shen, J., Zhou, T., Wei, F., Sun, X., and Xiang, Y.: Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet of Things Journal, 2017
Gedik, B., and Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 620–629, 2005
Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., and Palamidessi, C.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 901–914, 2013
Boldyreva, A., Chenette, N., Lee, Y., and O’Neill, A.: Order-preserving symmetric encryption, Advances in Cryptology - EUROCRYPT 2009, International Conference on the Theory and Applications of Cryptographic Techniques. Cologne: Proceedings, pp. 224–241, 2009
Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., and Peng, C., Hope: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6):062101, 2017.
Merkle, R. C.: A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp. 218–238, 1989
Xiao, L., and Yen, I. L.: Security analysis for order preserving encryption schemes. In: Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6, 2012
Zhang, J., Ma, J., Yang, C., and Yang, L., Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11):1, 2015.
Shamir, A., Identity-based cryptosystems and signature schemes. Lect. Notes Comput. Sci. 196(2):47, 1985.
Wang, D., Cheng, H., Wang, P., Huang, X., and Jian, G., Zipf’s law in passwords. IEEE Trans. Inf. Forensic. Secur. PP(99):1, 2017.
Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J.: Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2017. https://doi.org/10.1007/s12652-017-0516-2
Wang, D., and Wang, P., Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99):1, 2016.
He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816, 2015.
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., and Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 2017
Shen, J., Zhou, T., Chen, X., Li, J., and Susilo, W., Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensic. Secur. 13(4):912, 2018.
Funding
This study was funded by National Natural Science Foundation of China (61472310, U1536202, U1405255, 61672413, 61672415, 61671360, 61602360, 61702404), the China 111 project (grant B16037).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
This article is part of the Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities
Rights and permissions
About this article
Cite this article
Ji, Y., Zhang, J., Ma, J. et al. BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J Med Syst 42, 147 (2018). https://doi.org/10.1007/s10916-018-0998-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-018-0998-2