ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management 2019
DOI: 10.1007/978-981-13-8461-5_52
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain Based Approach for Privacy Preservation in Healthcare IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Many researchers have used complete or partial blockchain technology to safeguard the privacy and integrity of data obtained from IoT devices. [4] have treated Electronic Health Records (EHRs) as blockchain transactions, each having a unique identifier and a hashed value. The unique identifier is encrypted with their proposed encryption scheme which is devoid of a decryption key.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Many researchers have used complete or partial blockchain technology to safeguard the privacy and integrity of data obtained from IoT devices. [4] have treated Electronic Health Records (EHRs) as blockchain transactions, each having a unique identifier and a hashed value. The unique identifier is encrypted with their proposed encryption scheme which is devoid of a decryption key.…”
Section: Literature Surveymentioning
confidence: 99%
“…Table 2 lists the prevalent privacy-preserving solutions in healthcare edge computing, along with the limitations that need to be addressed. Quantum level computations SIMD-SHE [21] Dependence on other platforms (cloud computing) Complete or partial use of blockchain [4] Need excessive computation resources Data encryption schemes [15,22] Low computation resources and high latency Cryptography mechanisms [15,28] [29] Limited resources Data pseudonymization and anonymization schemes [30][31][32] Low bandwidth and network performance, absence of legal framework Secure authentication scheme (SAB-UAS) [33] Low latency and network performance with high cost Table 2: Privacy-preserving solutions in edge computing-based healthcare and the associated challenges.…”
Section: Privacy Preservation Edge Computing-based Healthcare Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The majority [3,9,12,13] implement smart contracts to allow access to only authorized users based on some attributes of the IoMT ecosystem and their interaction with the users/stakeholders. Some other works [5,14,20] focused on maintaining patient privacy by proposing a lightweight privacy-preserving algorithms like ring signature scheme.…”
Section: Discussion and Open Issuesmentioning
confidence: 99%
“…The authors in [14] use some features of the standard version of blockchain to provide privacy and data integrity when sharing IoMT data. They use the hashing technique and propose a newly encryption algorithm to encrypt the transactions containing personal and sensitive data about patients.…”
Section: Modified Cryptographic Techniquementioning
confidence: 99%