| Literature DB >> 35310180 |
Jingshou Chen1, Xiaofeng Chen2, Chin-Ling Chen3,4,5.
Abstract
Blockchain technology is essentially a decentralized database maintained by relevant parties and has been widely used in various scenarios such as logistics and finance. In terms of applications in the medical field, it is becoming more and more important because the patient's symptoms may be related to a certain vaccine. Whether the patient has been vaccinated with this vaccine will lead to different diagnostic results by the doctor. However, in the current vaccination environment of many regions, the vaccination record (VR) can only be kept in the patient's vaccination booklet, which is easy to lose or destroy. Therefore, the doctor needs to retrieve the patient's VR through a centralized database maintained by the government, which is time-consuming and will increase the medical risk. This study proposes a traceable blockchain-based vaccination record storage and sharing system. In the proposed system, the patient gets the vaccination at any legal clinic and the VR can be saved accompanied by the signature into the blockchain center, which ensures traceability. When the patient visits the hospital for treatment, the doctor can obtain the detail of the VR from the blockchain center and then make a diagnosis. The security of the proposed system will be protected by the programmed smart contracts. Through mutual authentication, our system can also provide and guarantee data integrity and nonrepudiation. Moreover, the proposed system has resistance to replay and man-in-the-middle attacks, and the performance is good.Entities:
Mesh:
Year: 2022 PMID: 35310180 PMCID: PMC8926549 DOI: 10.1155/2022/2211065
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 2.682
Figure 1The framework of the proposed system.
The notations used in this study.
| Name | Description |
|---|---|
|
| The identity of |
|
| A |
|
| Finite group of |
|
|
|
|
|
|
|
| The |
| ( | The elliptic curve signature key pair for |
| ( | The ECDSA signature key pair for |
| ( | ( |
|
| One-way hash function |
| ( | The private key and public key for |
|
| The ciphertext send by |
|
| The |
|
| The threshold for checking the validity of timestamps |
| MX | The sending message from |
|
| Encrypt message |
|
| Decrypt message |
|
| Verify that |
|
| The name of the vaccination |
|
| The symptom of the patient |
|
| The diagnostic result of the patient |
| VR | The vaccination record |
|
| The primary message of the VR |
Figure 2The primary information is defined in the smart contract.
Figure 3The chaincode structure of the vaccination record is stored in BC.
Figure 4The framework of the registration phase.
Figure 5The flowchart of the authentication phase.
Figure 6The flowchart of the patient vaccination phase.
Figure 7The flowchart of the patient treatment phase.
Common notations are used in the BAN logic.
| P | P believes X |
|
| |
| P ⊲ X | P sees X |
|
| |
| P | P said X |
|
| |
| P | P controls X |
|
| |
| #( | X is fresh |
|
| |
|
| P and |
|
| |
|
| K is the public key of P |
|
| |
|
| P and |
The goals of the authentication analysis.
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
The delivered messages.
|
|
|
|
| |
|
|
|
The assumptions between User A and User B.
|
|
|
|---|---|
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
|
| |
|
|
|
Nonrepudiation of the proposed scheme.
| Phases | Items | ||
|---|---|---|---|
| Sender | Receiver | Verification | |
| Authentication phase | User A | User B |
|
| User B | User A |
| |
| Patient vaccination | Patient | Clinic |
|
| Clinic | Patient |
| |
| Patient treatment | Patient | Hospital |
|
| Hospital | Patient |
| |
Data integrity of the proposed scheme.
| Phases | Items | ||
|---|---|---|---|
| Sender | Receiver | Signature | |
| Authentication phase | User A | User B | ( |
| User B | User A | ( | |
| Patient vaccination | Patient | Clinic | ( |
| Clinic | Patient | ( | |
| Patient treatment | Patient | Hospital | ( |
| Hospital | Patient | ( | |
The computation costs of the proposed scheme.
| Phase | Role 1 | Role 2 |
|---|---|---|
| Authentication | User A: | User B: |
| 2 | 2 | |
| Patient vaccination | Patient: | Clinic: |
| 2 | 2 | |
| Patient treatment | Patient: | Hospital: |
| 2 | 2 |
The communication costs of the proposed scheme.
| Phase | Message length (bits) | 3.5 | 4 | 5 |
|---|---|---|---|---|
| Authentication | 1792 | 0.015 | 0.002 | 0.01 |
| Patient vaccination | 1792 | 0.015 | 0.002 | 0.01 |
| Patient treatment | 1792 | 0.015 | 0.002 | 0.01 |
The functionality comparison of previous schemes and the proposed scheme.
| Scheme functionality | Xu et al. [ | Liu et al. [ | Xu et al. [ | Our scheme |
|---|---|---|---|---|
| Internet of things (IoTs) | Yes | No | No | No |
| Blockchain architecture | No | Yes | Yes | Yes |
| Mutual authentication | No | Yes | Yes | Yes |
| Data integrity | Yes | Yes | Yes | Yes |
| Resistance to replay attack | No | Yes | Yes | Yes |
| Resistance to man-in-the-middle attack | No | No | No | Yes |
| Nonrepudiation | No | No | Yes | Yes |
| Theoretical proof | No | No | No | Yes |