{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:22:45Z","timestamp":1770596565405,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing is also easy to leak in the smart medical cloud platform. This paper proposed a medical data privacy preserving framework named PMHE based on blockchain and fully homomorphic encryption technology. The framework receives personal physiological data from wearable devices on the client side, and uses blockchain as data storage to ensure that the data cannot be tampered with or forged; Besides, it uses fully homomorphic encryption method to design disease prediction models implemented by smart contracts. In PMHE, data is encoded and encrypted on the client side, and encrypted data is uploaded to the cloud platform via the public Internet, preventing privacy leakage caused by channel eavesdropping; smart contracts run on the blockchain platform for disease prediction, and the operators participating in computing are encrypted user data too. So, privacy and security issues caused by platform data leakage are avoided. The client-to-cloud interaction protocol is also designed to overcome the defect that fully homomorphic encryption only supports addition and multiplication by submitting tuples on the client side, to ensure that the prediction model can perform complex computing. In addition, the design of the smart contract is introduced in detail, and the performance of the system is analyzed. Finally, experiments are conducted to verify the operating effect of the system, ensuring that user privacy is not leaked without affecting the accuracy of the model, and realizing a smart medical cloud platform in which data can be used but cannot be borrowed.<\/jats:p>","DOI":"10.1186\/s13677-022-00373-8","type":"journal-article","created":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T22:02:16Z","timestamp":1671314536000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing"],"prefix":"10.1186","volume":"11","author":[{"given":"Jindong","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1645-1549","authenticated-orcid":false,"given":"Wenshuo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunxiao","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,17]]},"reference":[{"issue":"1","key":"373_CR1","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Qiu M, Tsai C, Hassan M, Alamri A (2017) Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 11(1):88\u201395","journal-title":"IEEE Syst J"},{"issue":"6","key":"373_CR2","first-page":"32","volume":"47","author":"X Zhang","year":"2021","unstructured":"Zhang X, Zhang J, Hang C, Tang W (2021) Verifiable statistical analysis scheme for encrypted medical data in cloud storage. Comput. Eng 47(6):32\u201337","journal-title":"Comput. Eng"},{"issue":"7","key":"373_CR3","first-page":"1449","volume":"40","author":"W She","year":"2019","unstructured":"She W, Chen J, Liu Q, Hu Y, Gu Z, Tian Z, Liu W (2019) New blockchain technology for medical big data security sharing. J Chin Comp Syst 40(7):1449\u20131454","journal-title":"J Chin Comp Syst"},{"issue":"23","key":"373_CR4","first-page":"72","volume":"9","author":"O Sovova","year":"2019","unstructured":"Sovova O (2019) Electronization in health care and privacy protection. J Sustain Dev 9(23):72\u201380","journal-title":"J Sustain Dev"},{"issue":"1","key":"373_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1038\/s41591-018-0272-7","volume":"25","author":"W Price","year":"2019","unstructured":"Price W, Cohen I (2019) Privacy in the age of medical big data. Nat Med 25(1):37\u201343. https:\/\/doi.org\/10.1038\/s41591-018-0272-7","journal-title":"Nat Med"},{"key":"373_CR6","unstructured":"Wang S (2020) Research on medical data privacy protection application based on homomorphic encryption. Dissertation, Shenyang Aerospace University."},{"issue":"2","key":"373_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3969\/j.issn.1673-6036.2018.02.001","volume":"39","author":"J Huang","year":"2018","unstructured":"Huang J, Jiang Y, Li Z, Fan L (2018) Application prospect of blockchain in medical industry. J Med Inf 39(2):1\u20138. https:\/\/doi.org\/10.3969\/j.issn.1673-6036.2018.02.001","journal-title":"J Med Inf"},{"key":"373_CR8","unstructured":"Niu G (2020) Research and implementation of trusted sharing platform for medical data based on blockchain. Dissertation, Harbin Institute of Technology."},{"issue":"8","key":"373_CR9","doi-asserted-by":"publisher","first-page":"e13592","DOI":"10.2196\/13592","volume":"21","author":"R Hylock","year":"2019","unstructured":"Hylock R, Zeng X (2019) A blockchain framework for patient-centered health records and exchange (HealthChain): evaluation and proof-of-concept study. J Med Internet Res 21(8):e13592. https:\/\/doi.org\/10.2196\/13592","journal-title":"J Med Internet Res"},{"issue":"6","key":"373_CR10","first-page":"886","volume":"48","author":"R Wang","year":"2019","unstructured":"Wang R, Yu S, Li Y, Tang Y, Zhang F (2019) Medical blockchain of privacy data sharing model based on ring Signature. J Univ Electron Sci Technol China 48(6):886\u2013892","journal-title":"J Univ Electron Sci Technol China"},{"key":"373_CR11","doi-asserted-by":"crossref","unstructured":"Liu J, Liang T, Sun R, Du X, Guizani M (2020) A privacy-preserving medical data sharing scheme based on consortium blockchain. In: GLOBECOM 2020\u20132020 IEEE Conference and Exhibition on Global Telecommunications. IEEE, Taipei.","DOI":"10.1109\/GLOBECOM42002.2020.9348251"},{"issue":"1","key":"373_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3969\/j.issn.0255-8297.2021.01.011","volume":"39","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Chen Y, Li T, Ren X, Qing X (2021) Medical data security sharing scheme based on consortium blockchain. J Appl 39(1):123\u2013134. https:\/\/doi.org\/10.3969\/j.issn.0255-8297.2021.01.011","journal-title":"J Appl"},{"key":"373_CR13","doi-asserted-by":"publisher","unstructured":"Crawford J, Gentry C, Halevi S, Platt D, Shoup V (2018) Doing Real Work with FHE: The Case of Logistic Regression. In: Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.\u00a0https:\/\/doi.org\/10.1145\/3267973.3267974","DOI":"10.1145\/3267973.3267974"},{"issue":"2","key":"373_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2196\/medinform.8805","volume":"6","author":"M Kim","year":"2018","unstructured":"Kim M, Song Y, Wang S, Xia Y, Jiang X (2018) Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med Inform 6(2):1\u201311. https:\/\/doi.org\/10.2196\/medinform.8805","journal-title":"JMIR Med Inform"},{"key":"373_CR15","unstructured":"Lui K (2020) Research of Privacy Preservation In Logistic Regression Based on Homomorphic Encryption. Dissertation, Dalian University of Technology."},{"key":"373_CR16","unstructured":"Nakamoto S(2008) Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bit-coin.pdf."},{"issue":"3","key":"373_CR17","doi-asserted-by":"publisher","first-page":"445","DOI":"10.16383\/j.aas.c180586","volume":"45","author":"L OuYang","year":"2019","unstructured":"OuYang L, Wang S, Yuan Y, Ni X, Wang F (2019) Smart contracts: architecture and research progresses. Acta Autom Sin 45(3):445\u2013457. https:\/\/doi.org\/10.16383\/j.aas.c180586","journal-title":"Acta Autom Sin"},{"issue":"11","key":"373_CR18","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML (1978) On data banks and privacy homomorphisms. Found Secure Comput 4(11):169\u2013180","journal-title":"Found Secure Comput"},{"issue":"2","key":"373_CR19","first-page":"120","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Assoc Comput Mach 21(2):120\u2013126","journal-title":"Assoc Comput Mach"},{"key":"373_CR20","doi-asserted-by":"publisher","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In:\u00a0Proc. 41st ACM Symp. Theory Comput. (STOC), pp. 169\u2013178.\u00a0https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"373_CR21","doi-asserted-by":"crossref","unstructured":"Cheon J. H, Kim A, Kim M, Song Y (2017) Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 409\u2013437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"issue":"5","key":"373_CR22","first-page":"92","volume":"6","author":"Y Liu","year":"2020","unstructured":"Liu Y, Xia Q, Li Z, Xia H, Zhang X, Gao J (2020) Research on secure data sharing system based on blockchain. Big Data Res 6(5):92\u2013105","journal-title":"Big Data Res"},{"key":"373_CR23","first-page":"357","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao C, Zhao S, Zhao M, Chen Z, Gao C, Li H, Tan Y (2019) Secure multi-party computation: theory, practice and applications, \"Inf. Sci 476:357\u2013372","journal-title":"Sci"},{"issue":"6","key":"373_CR24","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.11772\/j.issn.1001-9081.2020091447","volume":"41","author":"S Zheng","year":"2021","unstructured":"Zheng S, Liu X, Zhou T, Yang X (2021) Optimized CKKS scheme based on learning with errors problem. J Comp Appl 41(6):1723\u20131728. https:\/\/doi.org\/10.11772\/j.issn.1001-9081.2020091447","journal-title":"J Comp Appl"},{"key":"373_CR25","doi-asserted-by":"publisher","unstructured":"Anindita L, Isnandar S, Sugiyanto (2020) Comparison of heart disease classification with logistic regression algorithm and random forest algorithm. In: international conference on science and applied science.\u00a0https:\/\/doi.org\/10.1063\/5.0030579","DOI":"10.1063\/5.0030579"},{"key":"373_CR26","doi-asserted-by":"publisher","unstructured":"Aono Y, Hayashi T, Wang L, Phong L (2016) Scalable and Secure Logistic Regression via Homomorphic Encryption. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy.\u00a0https:\/\/doi.org\/10.1145\/2857705.2857731","DOI":"10.1145\/2857705.2857731"},{"key":"373_CR27","unstructured":"Chen J (2020) Research on privacy protection method of medical and health data based on blockchain. Dissertation, Zhengzhou university."},{"issue":"3","key":"373_CR28","doi-asserted-by":"publisher","first-page":"83","DOI":"10.15958\/j.cnki.gdxbzrb.2021.03.12","volume":"38","author":"H Xu","year":"2021","unstructured":"Xu H, Yang X, Zhang X (2021) Protection of face feature information based on fully homomorphic encryption in cloud computing environment. Guizhou Daxue Xuebao (Ziran Kexueban) 38(3):83\u201391. https:\/\/doi.org\/10.15958\/j.cnki.gdxbzrb.2021.03.12","journal-title":"Guizhou Daxue Xuebao (Ziran Kexueban)"},{"key":"373_CR29","unstructured":"Lattigo v2.2.0. http:\/\/github.com\/ldsec\/lattigo."},{"key":"373_CR30","unstructured":"Low Birth Weight Study Data Set [OL]. 2017. https:\/\/rdrr.io\/rforge\/LogisticDx\/man\/lbw.html."},{"key":"373_CR31","unstructured":"https:\/\/archive.ics.uci.edu\/ml\/datasets\/Heart+Disease."},{"key":"373_CR32","unstructured":"Umaru Impact Study Data Set [OL]. 2017. https:\/\/rdrr.io\/rforge\/LogisticDx\/man\/uis.html."},{"key":"373_CR33","unstructured":"https:\/\/archive.ics.uci.edu\/ml\/machine-learning-databases\/breast-cancer-wisconsin."},{"key":"373_CR34","unstructured":"Nhanes III Data Set [OL]. 2017.\u00a0https:\/\/rdrr.io\/rforge\/LogisticDx\/man\/nhanes3.html."}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00373-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00373-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00373-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T22:02:42Z","timestamp":1671314562000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00373-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["373"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00373-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,17]]},"assertion":[{"value":"29 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"96"}}