Explore chapters and articles related to this topic
Introduction to Blockchain Technology and Its Role in the Healthcare Sector
Published in Ambikapathy, R. Shobana, Logavani, Dharmasa, Reinvention of Health Applications with IoT, 2022
Chen et al. (2019) has considered leakage of data from EHRs as a major problem. Blockchain helps to store the data in blocks using cryptography algorithms to ensure data security. Different medical organizations can access the EHRs stored on the blockchain and the data is encrypted and entered in a cloud server. The searchable symmetric encryption (SSE) scheme is a noninteractive scheme that scans potential encrypted files and compares the keywords to determine whether they exist in the scanned files. This scheme is based on a single keyword system. SSE can detect malicious behavior of outside servers. In this paper, Chen et al. discuss smart contracts in Ethereum, which is a computer-based program that enforces the negotiation of a contract by digitally facilitating the transaction without the help of third parties. The transactions can be tracked and they are irreversible. It provides security to the contract law and cost of transactions can be reduced. In Ethereum, the smart contracts can be accessed via a small calculation on blockchain or the distributed ledger. The first implementation in blockchain has introduced which is known as Ethereum. Ethereum blockchain has built-in turing complete virtual machine set up. Using ethereum blockchain, a block can be created or deleted for the system. This reflects that the analysis of security and data becomes feasible and effective. This reflects that the analysis of security and data becomes feasible and effective. EMR systems are based on blockchain technology. EMRs are secure, accessible as well as controlled by the patient. Within the system, the patient can record data and send to it to a healthcare provider within seconds regardless of distance. The mobile application introduced in this study is called Healthcare Data Gateway and it uses a simplified technique called Indicator-centric Schema to collect and organize the data and secure the data from the third party entity. Blockchain in the field of health care helps to feed and transfer the information securely and easily.
Fractional-Ant Lion Optimization Algorithm for Privacy Protection in Cloud with MapReduce Framework
Published in Cybernetics and Systems, 2023
S. Nagendra Prabhu, Parsi Kalpana, D. B. Jagannadha Rao, Vijayakumar Polepally
The performance improvement of the proposed model is compared with the existing methods, like Multi-Scheme Crypto Deep Neural Network (MSCryptoNet) (Kwabena et al. 2019), Brain Storm based Whale Optimization Algorithm (BS-WOA) (Revathi, Ramaraj, and Chithra 2019), Adaptive particle swarm optimization (APSO) (Revathi, Ramaraj, and Chithra 2019), Dynamic symmetric searchable encryption with forward privacy (DFP) (Ocansey et al. 2018), Dynamic searchable symmetric encryption[DSEE] (Kamara, Papamanthou, and Roeder 2012), and Highly efficient federated learning with strong privacy preservation [HFWP] [A].
Trusted data infrastructure for smart cities: a blockchain perspective
Published in Building Research & Information, 2021
For instance, Singh et al. (2020) analysed the influence of the current side-chain technologies and the limitations of its application, and proposed corresponding suggestions. Li et al. (2019) combined blockchain technology and searchable symmetric encryption to provide secret protection and proof of completeness for data. Zhang, Cui, Ma, et al. (2019) proposed a crowdsourcing scheme based on blockchain technology. Kim et al. (2019) proposed a blockchain-based electric vehicle safe charging system. Cai et al. (2020) proposed a consensus algorithm based on dynamic reputation for energy blockchain.
Enhancing the Time Performance of Encrypting and Decrypting Large Tabular Data
Published in Applied Artificial Intelligence, 2021
Nguyen Thon Da, Ho Trung Thanh
(Liu et al. 2018) proposed a multi-user verifiable searchable symmetric encryption scheme that achieves all the desirable features of a verifiable searchable symmetric encryption and allows multiple users to perform searches. The experimental results indicated that their scheme shows high performance on some real datasets.