Privacy Protection System of EMR Based on Hash Chain

被引:0
|
作者
Dang Ying [1 ]
Zhang Jiangxiao [2 ]
Dang Wei [1 ]
Dai Xulei [1 ]
Li Ruiyu [3 ]
Li Yue [4 ]
Li Meng [5 ]
机构
[1] Xingtai Med Coll, Xingtai 054000, Hebei, Peoples R China
[2] Xingtai Univ, Xingtai 054000, Hebei, Peoples R China
[3] Xingtai Med Coll, Affiliated Hosp 2, Xingtai 054000, Hebei, Peoples R China
[4] Chengde Med Univ, Chengde 054000, Peoples R China
[5] Hotan Detachment Xinjiang Armed Police Corps, Hlth Team, Hotan 848011, Xinjiang Uygur, Peoples R China
关键词
EMR; Hash chain; Private key;
D O I
10.23977/etmhs.2017.1003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This paper presents a privacy protection system of electronic medical record which deals with the problems of privacy disclosure. Through this system, the patient's latest medical record can be viewed by patient's private key with Hash algorithm. The earlier medical record can be viewed only with the private key which is input by the patient himself, which protect the privacy of the patients. Because of the high computational efficiency of the Hash algorithm, the system has a very high efficiency.
引用
下载
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [41] A Study on Privacy Protection of Cross-Chain Transactions Based on Improved Notary Mechanisms
    Sheng Tan, Zhong
    Hui Chen, Chun
    Chen, Xue Bin
    Yang, Xin
    IEEE ACCESS, 2024, 12 : 95846 - 95856
  • [42] BlockMeds: A Blockchain-Based Online Prescription System with Privacy Protection
    He, Minhua
    Han, Xu
    Jiang, Frank
    Zhang, Rongbai
    Liu, Xingzi
    Liu, Xiao
    SERVICE-ORIENTED COMPUTING, ICSOC 2019, 2020, 12019 : 299 - 303
  • [43] Android platform-based individual privacy information protection system
    Weizhe Zhang
    Xiong Li
    Naixue Xiong
    Athanasios V. Vasilakos
    Personal and Ubiquitous Computing, 2016, 20 : 875 - 884
  • [44] A Secret Sharing-Based Distributed Cloud System for Privacy Protection
    Kim, Tae Woo
    EL Azzaoui, Abir
    Koh, Byoungsoo
    Kim, Jaesoo
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [45] IOV Privacy Protection System Based on Double-Layered Chains
    Chen, Yin Ru
    Sha, Jin Rui
    Zhou, Zhi Hong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [46] PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior
    Jiang, Wei
    Wang, Ruijin
    Xu, Zhiyuan
    Huang, Yaodong
    Chang, Shuo
    Qin, Zhiguang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [47] Mobile payment system with privacy protection
    Sue, KL
    Hsieh, WP
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 795 - 800
  • [48] A Reverse Sequence Hash Chain-based Access Control for a Smart Home System
    Kim, DaeYoub
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 570 - 573
  • [49] Android platform-based individual privacy information protection system
    Zhang, Weizhe
    Li, Xiong
    Xiong, Naixue
    Vasilakos, Athanasios V.
    PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (06) : 875 - 884
  • [50] Privacy protection based on user-defined preferences in RFID system
    Kim, I
    Lee, B
    Kim, H
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U858 - U862