Review on Privacy Protection of Electronic Medical Data in Cross-domain Sharing


  • Yue Zhang
  • Mingchuan Zhang



Electronic medical data, Cloud storage, Secure sharing


With the rapid development of information technology, the medical industry is rapidly moving in the direction of smart medical care, and more and more users tend to put their medical data in cloud servers, so as to share them safely among Internet hospitals. Electronic medical data stores all patients' medical information, and its high value is obvious to all, which also leads to the attack of illegal elements, which leads to the leakage of patients' private data. In addition, the cloud server used to store data is semi-trusted, so it is necessary for the intelligent development of the medical industry to ensure that the private data is not leaked when the electronic medical data is shared among internet hospitals. This paper deeply discusses different technical schemes to protect medical data, and then realizes the privacy protection of electronic medical data.


Chen Lanxiang, Lee Wai-Kong, Chang Chin-chen, et al. Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems,2019,95: 420−429.

Hao Wang, Song Yujiao. Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal Of Medical Systems, 2018, 18(2): 152−161.

Wang Yong, Zhang Aiqing, Zhang Peiyun, et al. Cloud-Assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access, 2019, 7: 136704−136719.

Jensen Peter B, Jensen Lars J , Brunak Soren . Mining electronic health records: towards better research applications and clinical care[J]. Nature Reviews Genetics, 2012, 13(6):395-405.

Liu Jian, Han Qiujun, Cao Lei. Research on the Construction of Clinical Data Center Based on Electronic Medical Records [J]. China Digital Medicine, 2017,12(3):38-41.

Hoerbst A, Ammenwerth E. Electronic health records a systematic review on quality requirements [J]. Methods of information in medicine, 2010, 49(4):320.

Yong Mingyuan, Lu An. Privacy protection of patients with infectious diseases and public health safety [J]. Medicine and philosophy,2019,40(14):9-11,30.

Wang Tianyi, Liu Aiping. Research on privacy protection of medical data in big data environment [J]. Information technology and network security,2019,38(8):28-32.

Zhou Yousheng, Chen Lvjun. Safe storage and deletion scheme of fine-grained cloud data based on blockchain [J]. Journal of Electronics and Information,2021,43(7):1856-1863.

Zhang Yulei, Liu Xiangzhen, Lang Xiaoli. Multi-server key aggregation searchable encryption scheme in cloud storage environment [J]. Journal of Electronics and Information., 2019, 41(3): 674-679.

XUE Liang, YU Yong, LI Yannan, et al. Efficient attributebased encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640-650.

hang Jiannan, Li Yingying, Gu Yanju, et al. Discussion on the basic principles of health care data sharing [J]. China Engineering Science, 2020,22(4):93-100.

Zang Hao, Zhao Qiang, Bian Shuirong. Research and design of electronic medical record privacy data desensitization technology based on XML [J]. Information technology and informatization,2017(3):111-114.

Zhang Zhili, Heng Xiuxiu. Study on the method of desensitization of electronic medical record data [J]. China Digital Medicine, 2022,17(10):100-103,120.

Cheng Lei. Access control of medical information database based on identity authentication [J]. Information technology, 2022, 46(9):112-117.

Zhang Min, Xu Chunxiang, Huang Minying. Research on lightweight multi-factor authentication protocol for multi-server in telemedicine environment [J]. Information network security,2019(10):42-49.

Zhang Xiaojun, wangxin, Liao Wencai, et al. Lightweight integrity verification scheme of cloud storage medical data supporting conditional anonymity [J]. Journal of Electronics and Information, 2022,44(12):4348-4356.

Zhu Zongwu, Huang Ruwei. Secure multi-party computing protocol based on efficient homomorphic encryption [J]. Computer science,2022,49(11):345-350.

Lin Qing, Faye Ting, Tian Bo, et al. Storage and retrieval scheme of secret knowledge map based on searchable encryption [J]. Computer Engineering and Science, 2023, 45(1):66-76.

ZHOU, L., VARADHARAJAN, V., HITCHENS, M. Enforcing role-based access control for secure data storage in the cloud[J]. The Computer journal,2011,54(10):1675-1687.

Yuan Yong, Ni Xiao-Chun, Zeng Shuai, WANG Fei-Yue. Blockchain consensus algorithms: the state of the art and future trends.Acta Automatica Sinica, 2018, 44(11): 2011−2022.

Han Xuan, Yuan Yong, Wang Fei-Yue. Security problems on blockchain: the state of the art and future trends. Acta Automatica Sinica, 2019, 45(1): 206−225

Zeng Shuai, Yuan Yong, Ni Xiao-Chun, Wang Fei-Yue. Scaling blockchain towards bitcoin: key technologies, constraints and related issues.Acta Automatica Sinica, 2019, 45(6): 1015−1030.

GUO Lifeng,LU Bo. Efficient proxy re-encryption with keyword search scheme [J]. Journal of Computer Research and Development,2014, 51(6):1221-1228.

Rao Y Sreenivasa. A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing[J]. Future Generation Computer Systems, 2017, 67(feb.):133-151.







How to Cite

Zhang, Y., & Zhang, M. (2023). Review on Privacy Protection of Electronic Medical Data in Cross-domain Sharing. Journal of Computing and Electronic Information Management, 10(3), 51-54.

Similar Articles

1-10 of 65

You may also start an advanced similarity search for this article.