A Privacy-Preservation Scheme based on Mobile Terminals in Internet Medical

Since the 21st century, Internet technologies have entered a stage of rapid developments, and gradually been widely used in various industries. Internet Medical is gradually matured and used widely. Aiming at the problems such as the easy leakage of privacy in mobile medical equipment and untrustworthy data, we make use of a role-separated mechanism to generate trusted anonymous certificates and propose a lightweight identity authentication scheme to protect the medical data security. It reduces the calculation cost. Meanwhile, in view of problems of transparency and visibility of blockchain information, we adapt searchable encryption algorithm to realize ciphertext processing in the whole life cycle. Experiments show that our scheme can reduce the cost of computation on basis of ensuring traffic. In process of dynamic updating of ciphertext keywords, except the keyword identifier, less information is leaked to the server, which protect users’ privacy.

[1]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[2]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[3]  Haibo Tian,et al.  Medical Data Management on Blockchain with Privacy , 2019, Journal of Medical Systems.

[4]  Honghao Gao,et al.  An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing , 2019, EURASIP Journal on Wireless Communications and Networking.

[5]  Yue Sun,et al.  Efficient dynamic multi-keyword fuzzy search over encrypted cloud data , 2020, J. Netw. Comput. Appl..

[6]  Aiqing Zhang,et al.  Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain , 2018, Journal of Medical Systems.

[7]  Fei Tao,et al.  Resource Service Composition and Its Optimal-Selection Based on Particle Swarm Optimization in Manufacturing Grid System , 2008, IEEE Transactions on Industrial Informatics.

[8]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[9]  Joonsang Baek,et al.  On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme , 2019, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[10]  Carl A. Gunter,et al.  Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.

[11]  Wee Keong Ng,et al.  Blockchain-Based System for Secure Data Storage with Private Keyword Search , 2017, 2017 IEEE World Congress on Services (SERVICES).