Privacy Protection System of EMR Based on Hash Chain

被引:0
|
作者
Dang Ying [1 ]
Zhang Jiangxiao [2 ]
Dang Wei [1 ]
Dai Xulei [1 ]
Li Ruiyu [3 ]
Li Yue [4 ]
Li Meng [5 ]
机构
[1] Xingtai Med Coll, Xingtai 054000, Hebei, Peoples R China
[2] Xingtai Univ, Xingtai 054000, Hebei, Peoples R China
[3] Xingtai Med Coll, Affiliated Hosp 2, Xingtai 054000, Hebei, Peoples R China
[4] Chengde Med Univ, Chengde 054000, Peoples R China
[5] Hotan Detachment Xinjiang Armed Police Corps, Hlth Team, Hotan 848011, Xinjiang Uygur, Peoples R China
关键词
EMR; Hash chain; Private key;
D O I
10.23977/etmhs.2017.1003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This paper presents a privacy protection system of electronic medical record which deals with the problems of privacy disclosure. Through this system, the patient's latest medical record can be viewed by patient's private key with Hash algorithm. The earlier medical record can be viewed only with the private key which is input by the patient himself, which protect the privacy of the patients. Because of the high computational efficiency of the Hash algorithm, the system has a very high efficiency.
引用
下载
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [31] Location Privacy Protection MCS system Based on Double Blockchains
    Huang, Xiuwen
    Chen, Jiahui
    Huang, Huiwu
    Aliyev, Anar
    Journal of Network Intelligence, 2023, 8 (01): : 113 - 131
  • [32] EMR based telegeriatric system
    Pallawala, PMDS
    Lun, KC
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2001, 61 (2-3) : 229 - 234
  • [33] Improvement of QR Code Access Control System Based on Lamport Hash Chain
    Park, Hyeongmin
    Kim, Taeeun
    Kim, Gaeul
    Jang, Wonyoung
    Lee, Kyungroul
    Lee, Sun-Young
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 824 - 833
  • [34] zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets
    Huang, Jiahui
    Huang, Teng
    Wei, Huanchun
    Zhang, Jiehua
    Yan, Hongyang
    Wong, Duncan S.
    Hu, Haibo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [35] Mechanism of supply chain coordination based on price discount with privacy protection in one-supplier-one-buyer system
    Xie, Cui-Hua
    Zhan, Jing-Chun
    Zeng, Le-Tian
    Han, Shao-Yong
    FRONTIERS IN PHYSICS, 2023, 11
  • [36] Application of image hash algorithm in copyright protection system
    Yang Xiaoyu
    Feng Liuping
    Lu Tingting
    Dong Qianxu
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION; NETWORK AND COMPUTER TECHNOLOGY (ECNCT 2021), 2022, 12167
  • [37] Hash-Chain-Based Authentication for IoT
    Pinto, Antonio
    Costa, Ricardo
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2016, 5 (04): : 43 - 57
  • [38] Implementation of RFID middleware based on Hash chain
    Yuan Jin Sha
    Hu Yue
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 12 - 15
  • [39] Improved User Privacy in Social Networks Based on Hash Function
    Alrwuili, Kawthar
    Hendaoui, Saloua
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (01): : 97 - 104
  • [40] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73