Skip to main content
Log in

Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kemkarl, O. S., and Dahikar, D. P. B., Can electronic medical record systems transform health care? potential health benefits, savings, and cost using latest advancements in ict for better interactive healthcare learning. International Journal of Computer Science & Communication Networks 2(3/6):453—455, 2012.

    Google Scholar 

  2. Bordea, G., Jothi, N., Rashid, N. A., Husain, W., Data mining in healthcare: a review. Procedia Computer Science 72:306–313, 2015. http://dx.doi.org/10.1016/j.procs.2015.12.145.

  3. Zhang, Y., Chen, M., Huang, D., Wu, D., Li, Y., idoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Futur. Gener. Comput. Syst., 2016. http://dx.doi.org/10.1016/j.future.2015.12.001.

  4. ONA General Counsel.: Members and patient privacy: be aware and beware!. https://www.ona.org/ (2016). [Online; accessed 28-Jul-2016]

  5. The Office of the National Coordinator for Health Information Technology (ONC), USA.: The value of consumer access & use of online health records. https://www.healthit.gov/ (2015). [Online; accessed 28-Jul-2016]

  6. Chen, M., Zhang, Y., Hu, L., Taleb, T., Sheng, Z., Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5g technologies. Mobile Networks and Applications 20(6):704–712, 2015. http://dx.doi.org/10.1007/s11036-015-0590-7.

    Article  Google Scholar 

  7. Hendrick, E., Schooley, B., Gao, C.: Cloudhealth: Developing a reliable cloud platform for healthcare applications. In: 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp. 887–891. http://dx.doi.org/10.1109/CCNC.2013.6488579 (2013)

  8. Gul, O., Al-Qutayri, M., Vu, Q. H.: Framework of a national level electronic health record system. In: 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), pp. 60–65 2012. http://dx.doi.org/10.1109/ICCCTAM.2012.6488072, p. Yeun, C.Y.

  9. Patra, M. R., Das, R. K., Padhy, R. P.: Crhis: Cloud based rural healthcare information system. In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, ICEGOV ’12, pp. 402–405. ACM, New York, NY, USA. http://dx.doi.org/10.1145/2463728.2463805 (2012)

  10. Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., Salvador, G. S.: A cloud computing solution for patient’s data collection in health care institutions. In: 2nd International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED ’10. pp. 95–99. http://dx.doi.org/10.1109/eTELEMED.2010.19 (2010)

  11. Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., Alamri, A., Health-cps: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. PP(99):1–8, 2015.

  12. Barua, M., Liang, X., Lu, R., Shen, X., Espac: Enabling security and patient-centric access control for ehealth in cloud computing. Int. J. Secur. Netw. 6(2/3):67–76, 2011. http://dx.doi.org/10.1504/IJSN.2011.043666.

    Article  Google Scholar 

  13. Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving ehr system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW ’10, pp. 47–52. ACM, New York, NY, USA. http://dx.doi.org/10.1145/1866835.1866845 (2010)

  14. Chen, L., and Hoang, D. B.: Novel data protection model in healthcare cloud. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 550–555. http://dx.doi.org/10.1109/HPCC.2011.148 (2011)

  15. Zhang, Y., Grorec: A group-centric intelligent recommender system integrating social, mobile and big data technologies. IEEE Trans. Serv. Comput. 99:1–1, 2016.

    Google Scholar 

  16. Bentley, J. L., Multidimensional binary search trees used for associative searching. Commun. ACM 18(9): 509–517, 1975. http://dx.doi.org/10.1145/361002.361007.

    Article  Google Scholar 

  17. Bereczky, N., Duch, A., Németh, K., Roura, S., Quad-kd trees. Theor. Comput. Sci. 616(C):126–140, 2016. http://dx.doi.org/10.1016/j.tcs.2015.12.030.

    Article  Google Scholar 

  18. Guttman, A.: R-trees: A dynamic index structure for spatial searching. In: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD ’84, pp. 47–57. ACM, New York, NY, USA. http://dx.doi.org/10.1145/602259.602266 (1984)

  19. Jin, P., Xie, X., Wang, N., Yue, L., Optimizing r-tree for flash memory. Expert Syst. Appl. 42(10): 4676–4686, 2015. http://dx.doi.org/10.1016/j.eswa.2015.01.011.

    Article  Google Scholar 

  20. Zyskind, G., Nathan, O., Pentland, A., Enigma: Decentralized computation platform with guaranteed privacy. CoRR abs/1506,03471, 2015.

  21. Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC ’88, pp. 11–19. ACM, New York, NY, USA . http://dx.doi.org/10.1145/62212.62214 (1988)

  22. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC ’87, pp. 218–229. ACM, New York, NY, USA. http://dx.doi.org/10.1145/28395.28420 (1987)

Download references

Acknowledgment

This work is partly supported by the Humanity and Social Science Youth Foundation of Ministry of Education of China (Grant No.14YJC630181), the Fundamental Research Funds for the Central Universities of China(Grant No. JB-SK1206), the Scientific Research Fund for Talent Introduction of Zhongnan University of Economics and Law (Grant No. 21141611313), the Scientific Research Fund for Talent Introduction of Huaqiao University (Grant No. 12Y0324) and National Social Science Foundation for Young Scholars (Grant No.13CTJ003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiju Wang.

Additional information

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yue, X., Wang, H., Jin, D. et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control. J Med Syst 40, 218 (2016). https://doi.org/10.1007/s10916-016-0574-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-016-0574-6

Keywords

Navigation