scispace - formally typeset
Journal ArticleDOI

SeFra: A Secure Framework to Manage eHealth Records Using Blockchain Technology

Reads0
Chats0
TLDR
The proposed work provides a secure framework to manage the eHealth record by using blockchain (SeFra), where a temporal shadow is used and the integrity of health records is ensured by blockchain technology.
Abstract
Electronic health information is an efficient technique for providing health care services to society. Patient health information is stored in the cloud, to allow access of eHealth information from anywhere, and at any time, but the technical problems are security, privacy, etc. Sharing the medical data in a trustless environment is overcome by the proposed framework SeFra. The proposed work provides a secure framework to manage the eHealth record by using blockchain (SeFra). For authentication purposes, a temporal shadow is used and the integrity of health records is ensured by blockchain technology.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Blockchain Personal Health Records: Systematic Review.

TL;DR: The first systematic review on blockchain-based personal health records (PHRs) is presented in this paper, where the authors examine the current landscape, design choices, limitations, and future directions of blockchainbased PHRs, and reveal that although research interest in blockchain PHRs is increasing and that the space is maturing, this technology is still largely in the conceptual stage.
Journal ArticleDOI

Diabetic Retinopathy Detection: A Blockchain and African Vulture Optimization Algorithm-Based Deep Learning Framework

Posham Uppamma, +1 more
- 01 Feb 2023 - 
TL;DR: In this paper , the authors focused on data pertinent to diabetic retinopathy disease and its prediction, and used the SqueezeNet classifier to predict the occurrence of diabetic Retinopathy (DR) disease.
Journal ArticleDOI

Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain

TL;DR: This paper focuses on ensuring the integrity of the health record with context-based Merkle tree (CBMT) through temporal shadow with general public ledger (GPL) and personalized micro ledger (PML).
References
More filters
Proceedings ArticleDOI

Decentralized name-based security for content distribution using blockchains

TL;DR: In this work, Hierarchical Identity Based Encryption is used to build (content) name-based security mechanisms used for securely distributing content and each user maintains his own Private Key Generator used for generating the master secret key and the public system parameters required by the HIBE algorithm.
Journal ArticleDOI

Health Information Technology: Strategic Initiatives, Real Progress

TL;DR: A broad national consensus is emerging in support of advancing health IT to enable the transformation of health and care and solutions exist forhealth IT to advance rapidly without adversely affecting future policy choices.
Proceedings ArticleDOI

Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography

TL;DR: This research paper provides a solution to maintain data security and data integrity through a combination of RSA Partial homomorphic and MD5 hashing algorithm.
Proceedings ArticleDOI

Improving Korean Service Delivery System in Health Care: Focusing on National E-health System

TL;DR: The national e-health project is anticipated to improve transparency by overcoming inequality of healthcare system, and enhance accountability by providing well structured health administrative services, but to support e- health project it is necessary to solve information security issues such as protecting the privacy of personally-identifiable health records and preventing discrimination based on genetic information.
Proceedings ArticleDOI

Survey on access control issues in cloud computing

R Charanya, +1 more
TL;DR: Various features of attribute based Encryption, Role based, Hierarchical identity management, Identity based authentication, Trust based model suitable for cloud computing environment are discussed.
Related Papers (5)