Me DShare TrustLess Medical Data Sharing Among Cloud

  • Slides: 14
Download presentation
Me. DShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain Source: IEEE

Me. DShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain Source: IEEE Access, Vol. 5, pp. 14757– 14767, July 2017. Author: Qi Xia, Emmanuel Boateng Sifah, Kwame Omono Asamoah, Jianbin Gao, Xiaojiang Du, and Mohsen Guizani Speaker: Joyun Liu Date: 09/18/2018 1

Outline Introduction Related works - Blockchain - Smart contract Proposed scheme Security analysis Discussion

Outline Introduction Related works - Blockchain - Smart contract Proposed scheme Security analysis Discussion Conclusions 2

Introduction Medical researcher System Medical data Hospital 1 Medical data Hospital 2 Blockchain Medical

Introduction Medical researcher System Medical data Hospital 1 Medical data Hospital 2 Blockchain Medical data Smart contract Hospital 3 3

Related works(1/2) - Blockchain • Decentralization • Immutability Bob gives Alice 10 dollars. Blockchain

Related works(1/2) - Blockchain • Decentralization • Immutability Bob gives Alice 10 dollars. Blockchain 4

Related works(2/2) - Smart contract Money Drink 5

Related works(2/2) - Smart contract Money Drink 5

Proposed scheme(1/5) Querying Trigger system Requestors Requestor public key Requestor private key Existing database

Proposed scheme(1/5) Querying Trigger system Requestors Requestor public key Requestor private key Existing database infrastructure Processing and consensus nodes Authenticato r Form • h(requestor ID) • h(timestamp) System 6

Proposed scheme(2/5) Processing and consensus nodes n. ID r. ID #D’ Form Payload Existing

Proposed scheme(2/5) Processing and consensus nodes n. ID r. ID #D’ Form Payload Existing database infrastructure Request data Output data Tag : Sensitivity = High #A Payload #B Payload #C Payload #D Payload n. ID #D’ Payload System 7

Requestor public key Proposed scheme(3/5) Package • Data ID • Data • Smart contract

Requestor public key Proposed scheme(3/5) Package • Data ID • Data • Smart contract Processing and consensus nodes Contract key Requestor private key Authenticato r Package • Data ID • Encrypted data • Smart contract Contract key Smart contract center System Blockchain network Form 8

Requestor public key Proposed scheme(4/5) Querying Trigger system Requestors Contract key Requestor private key

Requestor public key Proposed scheme(4/5) Querying Trigger system Requestors Contract key Requestor private key Processing and consensus nodes Package • Data ID • Encrypted data • Smart contract Authenticato r Package Encrypted package Data. ID ID • • Data Encrypteddata • • Encrypted Smartcontract • • Smart System 9

Requestor public key Proposed scheme(5/5) Querying Trigger system data Requestors Contract key Requestor private

Requestor public key Proposed scheme(5/5) Querying Trigger system data Requestors Contract key Requestor private key Processing and consensus nodes Smart contract • get. Action() • get. Sensitivity() • access. Control() Smart contract center System Blockchain network 10

Requestor public key Security analysis Contract key Requestor private key • Malicious access Processing

Requestor public key Security analysis Contract key Requestor private key • Malicious access Processing and consensus nodes Authenticator Contract key Blockchain network System 11

Discussion request User System data [26] T. Hardjono and N. Smith, “Cloud-based commissioning of

Discussion request User System data [26] T. Hardjono and N. Smith, “Cloud-based commissioning of constrained devices using permissioned blockchains, '' in Proc. 2 nd ACMInt. Workshop Io. T Privacy, Trust, Secur. (Io. TPTS), 2016, pp. 29 -36. [27] S. Sundareswaran, A. C. Squicciarini, and D. Lin, “Ensuring distributed accountability for data sharing in the cloud, '' IEEE Trans. Depend. Sec. Comput. , vol. 9, no. 4, pp. 556568, Jul. /Aug. 2012. [28] G. Zyskind, O. Nathan, and A. Pentland. (2015). “Enigma: Decentralized computation platform with guaranteed privacy. '' [Online]. Available: https: //arxiv. org/abs/1506. 03471 [29] Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, “BBDS: Blockchain-based data sharing for electronic medical records in cloud environments, '' Information, vol. 8, no. 2, p. 44, 2017. [30] S. Ferdous, A. Margheri, F. Paci, and V. Sassone, “Decentralised runtime monitoring for access control systems in cloud federations, '' in Proc. IEEE Int. Conf. Distrib. Comput. , Jun. 2017, pp. 1 -11. 12 vol. 66, [31] M. M. Hassan, K. Lin, X. Yue, and J. Wan, “A multimedia healthcare data sharing approach through cloud-based body area network, '' Future Gener. Comput. Syst. , pp. 48 -58, Jan. 2017.

Conclusions • Data privacy • Effectively trace • Revoke access 13

Conclusions • Data privacy • Effectively trace • Revoke access 13

System model User Querying Trigger system Existing database infrastructure Processing and consensus nodes Authenticato

System model User Querying Trigger system Existing database infrastructure Processing and consensus nodes Authenticato r Smart contract center Blockchain network System 14