2022
DOI: 10.1155/2022/9889263
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Privacy Preservation Scheme in Mobile Medical

Abstract: With the rapid development of mobile medical, how to establish an effective security mechanism to protect data security and privacy while users enjoy medical services has become an urgent problem to be solved. Aiming at the easy leakage of privacy in mobile medical terminals and untrustworthy data, we make use of a role-separated mechanism to generate trusted anonymous certificates. We propose a lightweight identity authentication scheme and adopt blockchain to protect the security of medical data. Meanwhile, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Immutability 3. Secrecy 27 , 28 Privacy issues and attacks Data encryption and access control mechanisms 1. Privacy 2.…”
Section: Introductionmentioning
confidence: 99%
“…Immutability 3. Secrecy 27 , 28 Privacy issues and attacks Data encryption and access control mechanisms 1. Privacy 2.…”
Section: Introductionmentioning
confidence: 99%
“…Li et al [336] discussed a provably secure method for privacy preservation in real-time IoT applications. Wen et al [337] discussed a mobile medical, a system that ensures privacy and security of sensitive data while users can enjoy multiple medical services. Mobile medical makes use of identity authentication and blockchain technology in order to restrict information sharing with the server, and only minimal information is shared with the server.…”
Section: B Potential Opportunities For Future Research In Privacy Domainmentioning
confidence: 99%
“…Recently, many fog/edge-based applications have been developed to avoid any delay in real-time monitoring applications that collect and process real-time data. Sarrab et al [337] data based on criticality, and only some data is moved to the cloud environments. The h-IoT framework can restrict privacy breaches and can avoid delays in time-critical realtime applications.…”
Section: B Potential Opportunities For Future Research In Privacy Domainmentioning
confidence: 99%