期刊文献+

Blockchain-Based Secure Authentication Scheme for Medical Data Sharing

下载PDF
导出
摘要 Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process. A network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, data was ensured not to be tampered and trackable. The security threat was eliminated by bilinear mapping in the authentication process of medical data providers and users. The credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain node. The security analysis and performance test were carried out to verify the security and related performance of the authentication protocol. The results show that the MCPS based on blockchain realizes medical treatment data sharing, and meets safety requirements in the security authentication phase.
出处 《国际计算机前沿大会会议论文集》 2019年第1期409-411,共3页 International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
分类号 C [社会学]
  • 相关文献

参考文献1

二级参考文献54

  • 1Clark J,van Oorschot P C.SoK:SSL and HTTPS:Revisiting past challenges and evaluating certificate trust model enhancements. 20131EEE Symposium on Security and Privacy (SP) . 2013
  • 2Yang, Hao,Osterweil, Eric,Massey, Dan,Lu, Songwu,Zhang, Lixia.??Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC(J)IEEE Transactions on Dependable and Secure Computing . 2011 (5)
  • 3Rishab Nithyanand,Gene Tsudik,Ersin Uzun.??User-aided reader revocation in PKI-based RFID systems(J)Journal of Computer Security . 2011 (6)
  • 4Massimiliano Pala,Sean W. Smith.??Finding the PKI needles in the Internet haystack(J)Journal of Computer Security . 2010 (3)
  • 5David W. Chadwick,Sean Antony,Rune Bjerk.??Instant certificate revocation and publication using WebDAV(J)Journal of Computer Security . 2010 (3)
  • 6Dimitrios Lekkas,Dimitris Gritzalis.??e-Passports as a means towards a Globally Interoperable Public Key Infrastructure(J)Journal of Computer Security . 2010 (3)
  • 7Gabriel López Millán,Manuel Gil Pérez,Gregorio Martínez Pérez,Antonio F. Gómez Skarmeta.??PKI-based trust management in inter-domain scenarios(J)Computers & Security . 2009 (2)
  • 8Cooper D,Santesson S,Farrell S W, et al.Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC5280 . 2008
  • 9Lidong Zhou,Fred B Schneider,Robbert van Renesse.COCA: A secure distributed on-line certification authority. ACM Transactions on Computer Systems . 2002
  • 10Myers M,Ankney R,Malpani A,et al.X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP. RFC 2560 . 1999

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部