Explore chapters and articles related to this topic
Security, Privacy Issues, and Challenges in Adoption of Smart Digital Healthcare
Published in Chinmay Chakraborty, Digital Health Transformation with Blockchain and Artificial Intelligence, 2022
Aditee Swain, Bhabendu Kumar Mohanta, Debasish Jena
In view of this particular example, it is necessary to ensure production together with seclusion for the proper management of data returned to customers so that it will inspire information sharing. It’s fairly simple to address protection and privacy issues whilst the record resides in a single company, but it will be challenging in the case of secure health statistics passed through different domains. This mechanism includes accessing coverage normally such as access control list (ACL) related to statistics owner. ACL is a list of users who can get admission to records, and have associated authorization (read, write, update) to precise statistics. Concurrence is the purpose of allowing authentication authority to customers so as to achieve the covered assets backing presumed get entry to strategies. Customers constantly anticipate the mediator (e.g., cloud servers) carry out corroboration and have access to information requirements. Although, in reality, the host is sincere yet peculiar. It’s encouraging that merging blockchain with access to check devices enables a sincere device. Buyers can feel reassured that their data is safe. In this new model, patients can predetermine access rights (authorize, deny, revoke) operations (check, write, update, delete) and provide statistical data duration through smart contracts on the blockchain without lost correct access. After all prerequisites are met, a smart contract can be generated on the blockchain, and an audit mechanism can also be provided for each request recorded in the ledger.
Substation Automation and Control
Published in Ramesh Bansal, Power System Protection in Smart Grid Environment, 2019
Adeyemi Charles Adewole, Raynitchka Tzoneva
VLANs can be used to segment networks within a physical LAN such that devices connected to different physical switches can communicate with each other as long as they are in the same VLAN. Devices which are in different VLANs cannot communicate with each other and would require a VLAN-aware router to route packets. Aside from the use of VLANs, access control lists (ACLs) can be created in routers to prevent unauthorized access to the network. Also, firewalls can be applied to add security to an existing network. Firewalls can log, administer, and audit network access in order to create alerts during attacks and failures. They provide secure control functions like inspection, content inspection, access control, user control, protocol and services control, as well as data control for secure substation automation networking. Generally, firewalls can be used to create secure cells and secure zones inside a network and set restricted communication outside a cell and zone. Gateways may be applied to achieve cyber security against a variety of cyber attacks. A gateway collects metering, status, event, and fault report data from IEDs and RTUs and creates an interface between substation automation systems and external connections like a web browser or ERP systems. It can manage, filter and control data traffic and secure IEDs and other devices against external access. Normal gateways can be achieved by using virtual private networks (VPNs) and encryption.
Secured Decentralized Archiving Healthcare Data Using Blockchain with IOT
Published in Durgesh Kumar Mishra, Nilanjan Dey, Bharat Singh Deora, Amit Joshi, ICT for Competitive Strategies, 2020
Deep Ranjan Deb, Bhupendra Pratap Singh, Logashanmugam, Aditya Kumar Sinha
Where, .cto: Model file, it consists of assets, participate, transaction..js: Script file, it consists of transaction function..acl: Access control, it consists of access control rules..qry: Query file, it consists of Query definition..bna: Business network archive.
The SLUMBAT Demo of Blockchain Based Nuclear Safeguards
Published in Journal of Nuclear Science and Technology, 2021
Edward Yu, Guntur D. Putra, Gabrielle B. Green, Cindy Vestergaard, Edward Obbard
Reading and writing data using smart contracts must follow rules set out by the Access Control List (ACL). Rules contained in the SLUMBAT ACL are listed in Table 1. There are four types of participants represented in SLUMBAT – nuclear material holders, transport providers, regulators, and super-regulators. The ACL rules specify the access rights of different types of participants. The super-regulator is synonymous with an international safeguard agency like the IAEA; regulators are State safeguards regulators and holders are custodians of nuclear material.