Skip to main content
Top
Published in: Journal of Medical Systems 8/2018

01-08-2018 | Mobile & Wireless Health

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems

Authors: Yaxian Ji, Junwei Zhang, Jianfeng Ma, Chao Yang, Xin Yao

Published in: Journal of Medical Systems | Issue 8/2018

Login to get access

Abstract

The sharing of patients’ locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and openness, there is also a challenge to guarantee the security and the privacy of locations recorded in a blockchain. To this end, this paper investigates the location sharing based on blockchains for telecare medical information systems. Firstly, we define the basic requirements of blockchain-based location sharing including decentralization, unforgeability, confidentiality, multi-level privacy protection, retrievability and verifiability. Then, using order-preserving encryption and merkle tree, we propose a blockchain-based multi-level location sharing scheme, i.e. BMPLS. The analysis results show that our scheme satisfies the above requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for both patients and medical workers. In a word, our scheme can be applied to realize privacy-preserving location sharing based on blockchains for telecare medical information systems.
Literature
1.
go back to reference He, D., Kumar, N., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263, 2015.CrossRef He, D., Kumar, N., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263, 2015.CrossRef
2.
go back to reference He, D., Zeadally, S., and Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2015 He, D., Zeadally, S., and Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2015
3.
go back to reference Wang, D., Cheng, H., He, D., and Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Systems Journal, 2016 Wang, D., Cheng, H., He, D., and Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Systems Journal, 2016
4.
go back to reference Chao, H. C., Zeadally, S., and Hu, B., Wearable computing for health care. J. Med. Syst. 40(4):87, 2016.CrossRefPubMed Chao, H. C., Zeadally, S., and Hu, B., Wearable computing for health care. J. Med. Syst. 40(4):87, 2016.CrossRefPubMed
5.
go back to reference Mezghani, E., Exposito, E., Drira, K., and Silveira, M. D., A semantic big data platform for integrating heterogeneous wearable data in healthcare. J. Med. Syst. 39(12):185, 2015.CrossRefPubMed Mezghani, E., Exposito, E., Drira, K., and Silveira, M. D., A semantic big data platform for integrating heterogeneous wearable data in healthcare. J. Med. Syst. 39(12):185, 2015.CrossRefPubMed
6.
go back to reference He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4):2590, 2017.CrossRef He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4):2590, 2017.CrossRef
7.
go back to reference Jiang, Q., Ma, J., Yang, C., Ma, X., Shen, J., and Chaudhry, S. A., Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63:182, 2017.CrossRef Jiang, Q., Ma, J., Yang, C., Ma, X., Shen, J., and Chaudhry, S. A., Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63:182, 2017.CrossRef
8.
go back to reference He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989, 2012.CrossRef He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989, 2012.CrossRef
9.
go back to reference He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Communications Magazine 53(1):71, 2015.CrossRef He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Communications Magazine 53(1):71, 2015.CrossRef
10.
go back to reference Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic. Secur. 12(10):2402, 2017.CrossRef Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic. Secur. 12(10):2402, 2017.CrossRef
11.
go back to reference Shen, J., Liu, D., Bhuiyan, M. Z. A., Shen, J., Sun, X., and Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Transactions on Emerging Topics in Computing, 2017 Shen, J., Liu, D., Bhuiyan, M. Z. A., Shen, J., Sun, X., and Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Transactions on Emerging Topics in Computing, 2017
12.
go back to reference Bandara, H. D., and Jayasumana, A. P., Collaborative applications over peer-to-peer systems–challenges and solutions. Peer-to-Peer Netw. Appl. 6(3):257, 2013.CrossRef Bandara, H. D., and Jayasumana, A. P., Collaborative applications over peer-to-peer systems–challenges and solutions. Peer-to-Peer Netw. Appl. 6(3):257, 2013.CrossRef
13.
go back to reference Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Consulted, 2008 Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Consulted, 2008
14.
go back to reference Swan, M.: Blockchain: Blueprint for a new economy. O’Reilly Media, Inc, 2015 Swan, M.: Blockchain: Blueprint for a new economy. O’Reilly Media, Inc, 2015
16.
go back to reference Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S., Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press, 2016. Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S., Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press, 2016.
17.
go back to reference Zyskind, G., Nathan, O., and Pentland, A. S.: Decentralizing privacy: Using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops, pp. 180–184, 2015 Zyskind, G., Nathan, O., and Pentland, A. S.: Decentralizing privacy: Using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops, pp. 180–184, 2015
18.
go back to reference Brambilla, G., Amoretti, M., and Zanichelli, F.: Using blockchain for peer-to-peer proof-of-location. arXiv:1607.00174, 2016 Brambilla, G., Amoretti, M., and Zanichelli, F.: Using blockchain for peer-to-peer proof-of-location. arXiv:1607.​00174, 2016
19.
go back to reference Yao, X., Lin, Y., Liu, Q., and Zhang, J., Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access 6:3809, 2018.CrossRef Yao, X., Lin, Y., Liu, Q., and Zhang, J., Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access 6:3809, 2018.CrossRef
21.
go back to reference Shen, J., Zhou, T., Wei, F., Sun, X., and Xiang, Y.: Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet of Things Journal, 2017 Shen, J., Zhou, T., Wei, F., Sun, X., and Xiang, Y.: Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet of Things Journal, 2017
22.
go back to reference Gedik, B., and Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 620–629, 2005 Gedik, B., and Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 620–629, 2005
23.
go back to reference Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., and Palamidessi, C.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 901–914, 2013 Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., and Palamidessi, C.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 901–914, 2013
24.
go back to reference Boldyreva, A., Chenette, N., Lee, Y., and O’Neill, A.: Order-preserving symmetric encryption, Advances in Cryptology - EUROCRYPT 2009, International Conference on the Theory and Applications of Cryptographic Techniques. Cologne: Proceedings, pp. 224–241, 2009 Boldyreva, A., Chenette, N., Lee, Y., and O’Neill, A.: Order-preserving symmetric encryption, Advances in Cryptology - EUROCRYPT 2009, International Conference on the Theory and Applications of Cryptographic Techniques. Cologne: Proceedings, pp. 224–241, 2009
25.
go back to reference Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., and Peng, C., Hope: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6):062101, 2017.CrossRef Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., and Peng, C., Hope: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6):062101, 2017.CrossRef
26.
go back to reference Merkle, R. C.: A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp. 218–238, 1989 Merkle, R. C.: A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp. 218–238, 1989
27.
go back to reference Xiao, L., and Yen, I. L.: Security analysis for order preserving encryption schemes. In: Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6, 2012 Xiao, L., and Yen, I. L.: Security analysis for order preserving encryption schemes. In: Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6, 2012
28.
go back to reference Zhang, J., Ma, J., Yang, C., and Yang, L., Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11):1, 2015. Zhang, J., Ma, J., Yang, C., and Yang, L., Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11):1, 2015.
29.
go back to reference Shamir, A., Identity-based cryptosystems and signature schemes. Lect. Notes Comput. Sci. 196(2):47, 1985.CrossRef Shamir, A., Identity-based cryptosystems and signature schemes. Lect. Notes Comput. Sci. 196(2):47, 1985.CrossRef
30.
go back to reference Wang, D., Cheng, H., Wang, P., Huang, X., and Jian, G., Zipf’s law in passwords. IEEE Trans. Inf. Forensic. Secur. PP(99):1, 2017. Wang, D., Cheng, H., Wang, P., Huang, X., and Jian, G., Zipf’s law in passwords. IEEE Trans. Inf. Forensic. Secur. PP(99):1, 2017.
31.
go back to reference Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J.: Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2017. https://doi.org/10.1007/s12652-017-0516-2 Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J.: Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2017. https://​doi.​org/​10.​1007/​s12652-017-0516-2
32.
go back to reference Wang, D., and Wang, P., Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99):1, 2016. Wang, D., and Wang, P., Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99):1, 2016.
33.
go back to reference He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816, 2015.CrossRef He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816, 2015.CrossRef
34.
go back to reference Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., and Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 2017 Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., and Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 2017
35.
go back to reference Shen, J., Zhou, T., Chen, X., Li, J., and Susilo, W., Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensic. Secur. 13(4):912, 2018.CrossRef Shen, J., Zhou, T., Chen, X., Li, J., and Susilo, W., Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensic. Secur. 13(4):912, 2018.CrossRef
Metadata
Title
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems
Authors
Yaxian Ji
Junwei Zhang
Jianfeng Ma
Chao Yang
Xin Yao
Publication date
01-08-2018
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 8/2018
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-018-0998-2

Other articles of this Issue 8/2018

Journal of Medical Systems 8/2018 Go to the issue