Journal ArticleDOI
SeFra: A Secure Framework to Manage eHealth Records Using Blockchain Technology
Reads0
Chats0
TLDR
The proposed work provides a secure framework to manage the eHealth record by using blockchain (SeFra), where a temporal shadow is used and the integrity of health records is ensured by blockchain technology.Abstract:
Electronic health information is an efficient technique for providing health care services to society. Patient health information is stored in the cloud, to allow access of eHealth information from anywhere, and at any time, but the technical problems are security, privacy, etc. Sharing the medical data in a trustless environment is overcome by the proposed framework SeFra. The proposed work provides a secure framework to manage the eHealth record by using blockchain (SeFra). For authentication purposes, a temporal shadow is used and the integrity of health records is ensured by blockchain technology.read more
Citations
More filters
Journal ArticleDOI
Blockchain Personal Health Records: Systematic Review.
TL;DR: The first systematic review on blockchain-based personal health records (PHRs) is presented in this paper, where the authors examine the current landscape, design choices, limitations, and future directions of blockchainbased PHRs, and reveal that although research interest in blockchain PHRs is increasing and that the space is maturing, this technology is still largely in the conceptual stage.
Journal ArticleDOI
Diabetic Retinopathy Detection: A Blockchain and African Vulture Optimization Algorithm-Based Deep Learning Framework
TL;DR: In this paper , the authors focused on data pertinent to diabetic retinopathy disease and its prediction, and used the SqueezeNet classifier to predict the occurrence of diabetic Retinopathy (DR) disease.
Journal ArticleDOI
Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain
R Charanya,R A K Saravanaguru +1 more
TL;DR: This paper focuses on ensuring the integrity of the health record with context-based Merkle tree (CBMT) through temporal shadow with general public ledger (GPL) and personalized micro ledger (PML).
References
More filters
Proceedings ArticleDOI
Decentralized name-based security for content distribution using blockchains
Nikos Fotiou,George C. Polyzos +1 more
TL;DR: In this work, Hierarchical Identity Based Encryption is used to build (content) name-based security mechanisms used for securely distributing content and each user maintains his own Private Key Generator used for generating the master secret key and the public system parameters required by the HIBE algorithm.
Journal ArticleDOI
Health Information Technology: Strategic Initiatives, Real Progress
TL;DR: A broad national consensus is emerging in support of advancing health IT to enable the transformation of health and care and solutions exist forhealth IT to advance rapidly without adversely affecting future policy choices.
Proceedings ArticleDOI
Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography
Priyanka Ora,Parashu Ram Pal +1 more
TL;DR: This research paper provides a solution to maintain data security and data integrity through a combination of RSA Partial homomorphic and MD5 hashing algorithm.
Proceedings ArticleDOI
Improving Korean Service Delivery System in Health Care: Focusing on National E-health System
TL;DR: The national e-health project is anticipated to improve transparency by overcoming inequality of healthcare system, and enhance accountability by providing well structured health administrative services, but to support e- health project it is necessary to solve information security issues such as protecting the privacy of personally-identifiable health records and preventing discrimination based on genetic information.
Proceedings ArticleDOI
Survey on access control issues in cloud computing
R Charanya,M Aramudhan +1 more
TL;DR: Various features of attribute based Encryption, Role based, Hierarchical identity management, Identity based authentication, Trust based model suitable for cloud computing environment are discussed.