Privacy Protection System of EMR Based on Hash Chain

被引:0
|
作者
Dang Ying [1 ]
Zhang Jiangxiao [2 ]
Dang Wei [1 ]
Dai Xulei [1 ]
Li Ruiyu [3 ]
Li Yue [4 ]
Li Meng [5 ]
机构
[1] Xingtai Med Coll, Xingtai 054000, Hebei, Peoples R China
[2] Xingtai Univ, Xingtai 054000, Hebei, Peoples R China
[3] Xingtai Med Coll, Affiliated Hosp 2, Xingtai 054000, Hebei, Peoples R China
[4] Chengde Med Univ, Chengde 054000, Peoples R China
[5] Hotan Detachment Xinjiang Armed Police Corps, Hlth Team, Hotan 848011, Xinjiang Uygur, Peoples R China
关键词
EMR; Hash chain; Private key;
D O I
10.23977/etmhs.2017.1003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This paper presents a privacy protection system of electronic medical record which deals with the problems of privacy disclosure. Through this system, the patient's latest medical record can be viewed by patient's private key with Hash algorithm. The earlier medical record can be viewed only with the private key which is input by the patient himself, which protect the privacy of the patients. Because of the high computational efficiency of the Hash algorithm, the system has a very high efficiency.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [1] A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
    Zhang, Yongxiong
    You, Yucong
    Wang, Liangming
    Yi, Luxia
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 254 - 257
  • [2] Image encryption algorithm based on lattice hash function and privacy protection
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Lu, Tianyu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 18251 - 18277
  • [3] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [4] Image encryption algorithm based on lattice hash function and privacy protection
    Yu Wang
    Liquan Chen
    Kunliang Yu
    Tianyu Lu
    Multimedia Tools and Applications, 2022, 81 : 18251 - 18277
  • [5] A privacy protection solution based on NLPCA for blockchain supply chain financial system
    Wu, Hongyu
    Su, Nianle
    Ma, Chunguang
    Liao, Pengda
    Li, Dawei
    INTERNATIONAL JOURNAL OF FINANCIAL ENGINEERING, 2020, 7 (03)
  • [6] FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
    Zhu, Yan
    Yang, Shuai
    Chu, William Cheng-Chung
    Feng, Rongquan
    2019 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2019), 2019, : 90 - 99
  • [7] A new fair micropayment system based on hash chain
    Yang, ZK
    Lang, WM
    Tan, YM
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 139 - 145
  • [8] A Design of Mobile Phone Privacy Protection Based on Block Chain
    Yang, Kun
    Liu, Mingzhe
    Yang, Yaming
    Jiang, Xin
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 553 - 562
  • [9] A Survey on Patients' Privacy and Safety Protection with EMR Applications in Primary Care
    Kralj, D.
    Koncar, M.
    Tonkovic, S.
    5TH EUROPEAN CONFERENCE OF THE INTERNATIONAL FEDERATION FOR MEDICAL AND BIOLOGICAL ENGINEERING, PTS 1 AND 2, 2012, 37 : 1132 - +
  • [10] A Privacy Protection Protocol For RFID-enabled Supply Chain System
    Xia, XianYao
    Han, ShuiHua
    2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +