2023
DOI: 10.1109/jiot.2023.3268278
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Blockchain-Assisted Access Control Scheme for Smart Healthcare System in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 32 publications
0
0
0
Order By: Relevance
“…In the context of the Internet of Vehicles (IoV) and vehicle-to-vehicle (V2V) communication and coordination, numerous studies [30][31][32][33] have explored how BIoT offers trusted communications and data exchanges, therefore contributing to safer and more efficient vehicular networks. Digital health is another sector where BIoT systems can provide significant benefits, particularly in ensuring privacy and creating tamper-proof digital health records [34][35][36][37][38]. These applications demonstrate the versatility and potential of BIoT systems across various industries and use cases, showcasing their adaptability and effectiveness in addressing security needs and challenges.…”
Section: Biot: Integration Of Blockchain and Iot Systemsmentioning
confidence: 99%
“…In the context of the Internet of Vehicles (IoV) and vehicle-to-vehicle (V2V) communication and coordination, numerous studies [30][31][32][33] have explored how BIoT offers trusted communications and data exchanges, therefore contributing to safer and more efficient vehicular networks. Digital health is another sector where BIoT systems can provide significant benefits, particularly in ensuring privacy and creating tamper-proof digital health records [34][35][36][37][38]. These applications demonstrate the versatility and potential of BIoT systems across various industries and use cases, showcasing their adaptability and effectiveness in addressing security needs and challenges.…”
Section: Biot: Integration Of Blockchain and Iot Systemsmentioning
confidence: 99%
“…Based on Hasse's theorem, the points on a finite elliptic curve E(p, a, b) are bounded as shown in Equation (7).…”
Section: Proxy Re-encryption With Enhanced Salp Swarm Algorithmmentioning
confidence: 99%
“…πœ† = 𝑦 βˆ’ 𝑦 π‘₯ βˆ’ π‘₯ , 𝑃≠𝑄 3π‘₯ + π‘Ž 2𝑦 , ⁄ 𝑃 = 𝑄 In a point 𝑃 ∈ 𝐸 𝑝, π‘Ž, 𝑏 , a scalar point multiplication π‘˜ ∈ 𝑍 is denoted in Equa (6). π‘˜π‘ƒ = 𝑂, π‘˜ = 0 𝑃 + π‘˜ βˆ’ 1 𝑃 ⁄ , π‘œπ‘‘β„Žπ‘’π‘Ÿπ‘€π‘–π‘ π‘’Based on Hasse's theorem, the points on a finite elliptic curve 𝐸 𝑝, π‘Ž, 𝑏 are boun as shown in Equation(7).𝑝 + 1 βˆ’ 2 𝑝 ≀ 𝐸 𝑝, π‘Ž, 𝑏 ≀ 𝑝 + 1 + 2 𝑝In the present scenario, there is no effective algorithm in finding π‘˜ ∈ 𝑍 and hardness of this concern forms the basis of ECC. The secret π‘˜ is hidden in the structu 𝑃 = π‘˜πΊ.…”
mentioning
confidence: 99%
“…Li et al [11] introduce a secure blockchain-assisted access control scheme tailored for smart healthcare systems in fog computing, ensuring data security and access control. Lakhan et al [12] bring forward the concept of a federated-learning-based privacy preservation system combined with blockchain for fraud detection in IoT healthcare.…”
Section: Review Of Existing Modelsmentioning
confidence: 99%