Privacy Protection System of EMR Based on Hash Chain

被引:0
|
作者
Dang Ying [1 ]
Zhang Jiangxiao [2 ]
Dang Wei [1 ]
Dai Xulei [1 ]
Li Ruiyu [3 ]
Li Yue [4 ]
Li Meng [5 ]
机构
[1] Xingtai Med Coll, Xingtai 054000, Hebei, Peoples R China
[2] Xingtai Univ, Xingtai 054000, Hebei, Peoples R China
[3] Xingtai Med Coll, Affiliated Hosp 2, Xingtai 054000, Hebei, Peoples R China
[4] Chengde Med Univ, Chengde 054000, Peoples R China
[5] Hotan Detachment Xinjiang Armed Police Corps, Hlth Team, Hotan 848011, Xinjiang Uygur, Peoples R China
关键词
EMR; Hash chain; Private key;
D O I
10.23977/etmhs.2017.1003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This paper presents a privacy protection system of electronic medical record which deals with the problems of privacy disclosure. Through this system, the patient's latest medical record can be viewed by patient's private key with Hash algorithm. The earlier medical record can be viewed only with the private key which is input by the patient himself, which protect the privacy of the patients. Because of the high computational efficiency of the Hash algorithm, the system has a very high efficiency.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [1] A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
    Zhang, Yongxiong
    You, Yucong
    Wang, Liangming
    Yi, Luxia
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 254 - 257
  • [2] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [3] Image encryption algorithm based on lattice hash function and privacy protection
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Lu, Tianyu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 18251 - 18277
  • [4] Image encryption algorithm based on lattice hash function and privacy protection
    Yu Wang
    Liquan Chen
    Kunliang Yu
    Tianyu Lu
    [J]. Multimedia Tools and Applications, 2022, 81 : 18251 - 18277
  • [5] A privacy protection solution based on NLPCA for blockchain supply chain financial system
    Wu, Hongyu
    Su, Nianle
    Ma, Chunguang
    Liao, Pengda
    Li, Dawei
    [J]. INTERNATIONAL JOURNAL OF FINANCIAL ENGINEERING, 2020, 7 (03)
  • [6] FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
    Zhu, Yan
    Yang, Shuai
    Chu, William Cheng-Chung
    Feng, Rongquan
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2019), 2019, : 90 - 99
  • [7] A new fair micropayment system based on hash chain
    Yang, ZK
    Lang, WM
    Tan, YM
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 139 - 145
  • [8] A Design of Mobile Phone Privacy Protection Based on Block Chain
    Yang, Kun
    Liu, Mingzhe
    Yang, Yaming
    Jiang, Xin
    [J]. CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 553 - 562
  • [9] A Survey on Patients' Privacy and Safety Protection with EMR Applications in Primary Care
    Kralj, D.
    Koncar, M.
    Tonkovic, S.
    [J]. 5TH EUROPEAN CONFERENCE OF THE INTERNATIONAL FEDERATION FOR MEDICAL AND BIOLOGICAL ENGINEERING, PTS 1 AND 2, 2012, 37 : 1132 - +
  • [10] A Privacy Protection Protocol For RFID-enabled Supply Chain System
    Xia, XianYao
    Han, ShuiHua
    [J]. 2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +