Abstract
Medical image analysis systems with machine learning have played an important role in the computer-aided diagnosis and treatment for diseases. However, individual privacy of user data is vulnerable since the training data is exposed to unauthorized user. Therefore, this paper designs an access control scheme to prevent illegal users from accessing medical data while achieving high accuracy of lesion classification. Specifically, in the novel lightweight consortium blockchain-based access control scheme, a chosen consortium node is utilized as key generation center instead of a trusted third party in conventional schemes. Two public retinal datasets are utilized for the classification of diabetic retinopathy (DR). Security analysis shows that the proposed scheme can prevent the user data from leakage and malicious tampering. Experimental results demonstrate that the processing of data cleaning is efficient to increase the accuracy of the classification for early lesions of DR by removing low quality images, and the accuracy is up to 90.2%.
This work was supported by the National Natural Science Foundation of China under Grant Nos. 61672171 and 61902078, Guangxi Natural Science Foundation of China under Grant No. 2018GXNSFAA138082, Guangxi Key Laboratory of Cryptography and Information Security under Grant No. GCIS201816.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anwar, S.M., Majid, M., Qayyum, A., Awais, M., Alnowami, M., Khan, M.K.: Medical image analysis using convolutional neural networks: a review. J. Med. Syst. 42(11), 226 (2018)
Fan, K., Jiang, W., Li, H., Yang, Y.: Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans. Industr. Inf. 14(4), 1656–1665 (2018)
Carrie Gates: Access control requirements for web 2.0 security and privacy. IEEE Web, 2(0) (2007)
Choi, D., Kim, D., Park, S.: A framework for context sensitive risk-based access control in medical information systems. Comput. Math. Methods Med. 2015, 1–9 (2015)
Begum, J.N., Kumar, K., Sumathy, V.: Two tier protocol for hierarchical access control in medical image transmission. In: International Conference on Computing for Sustainable Global Development, pp. 769–775. IEEE (2014)
Kamau, G., Boore, C., Maina, E., Njenga, S.: Blockchain technology: is this the solution to EMR interoperability and security issues in developing countries? In: IST-Africa Week Conference (IST-Africa), pp. 1–8. IEEE (2018)
Hussein, A.F., ArunKumar, N., Ramirez-Gonzalez, G., Abdulhay, E., Tavares, J.M.R.S., de Albuquerque, V.H.C.: A medical records managing and securing blockchain based system supported by a genetic algorithm and discrete wavelet transform. Cogn. Syst. Res. 52, 1–11 (2018)
Al Omar, A., Rahman, M.S., Basu, A., Kiyomoto, S.: MediBchain: a blockchain based privacy preserving platform for healthcare data. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 534–543. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_49
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Tan, J.H., et al.: Automated segmentation of exudates, haemorrhages, microaneurysms using single convolutional neural network. Inf. Sci. 420, S0020025517308927 (2017)
Yao, X., Han, X., Du, X.: A light-weight certificate-less public key cryptography scheme based on ECC. In: 23rd International Conference on Computer Communication and Networks, pp. 1–8. IEEE (2014)
Yao, X., Kong, H., Liu, H., Qiu, T., Ning, H.: An attribute credential based public key scheme for fog computing in digital manufacturing. IEEE Trans. Industr. Inf. 15(4), 2297–2307 (2019)
Arnbak, A., Asghari, H., Van Eeten, M., van Eijk, N.A.N.M.: Security collapse in the https market. Comput. ACM 57(10), 47–55 (2014)
Karati, A., Islam, S.K.H., Biswas, G.P.: A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450, 378–391 (2018)
Kauppi, T., et al.: DIARETDB0: evaluation database and methodology for diabetic retinopathy algorithms. Mach. Vis. Pattern Recogn. Res. Group 73, 1–17 (2006)
Kauppi, T., et al.: The DIARETDB1 diabetic retinopathy database and evaluation protocol (2007)
Bunch, P.C., Hamilton, J.F., Sanderson, G.K., Simmons, A.H.: A free response approach to the measurement and characterization of radiographic observer performance. In: Proceedings of SPIE: in Application of Optical Instrumentation in Medicine, pp. 124–136 (1977)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, T., Wu, J., Zhang, X., Peng, Z., Li, J. (2020). Blockchain-Based Access Control Schemes for Medical Image Analysis System. In: Shen, H., Sang, Y. (eds) Parallel Architectures, Algorithms and Programming. PAAP 2019. Communications in Computer and Information Science, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-2767-8_32
Download citation
DOI: https://doi.org/10.1007/978-981-15-2767-8_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2766-1
Online ISBN: 978-981-15-2767-8
eBook Packages: Computer ScienceComputer Science (R0)