2022
DOI: 10.12928/telkomnika.v20i4.23765
|View full text |Cite
|
Sign up to set email alerts
|

A security services for internet of thing smart health care solutions based blockchain technology

Abstract: Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technolo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…A user's data sits in an off-blockchain storage and permissions related to access of this data by any sort of third parties is set by a user by making a transaction to the blockchain. This way the data access information for a piece of user data is mined in a distributed and trusted manner in a block of a blockchain as mentioned in [37]. Such as an access control system provides long chain for blockchain for the owners of the data to either modify or completely revoke the permissions related to their data.…”
Section: Secure Hashing Algorithm (Sha)mentioning
confidence: 99%
See 1 more Smart Citation
“…A user's data sits in an off-blockchain storage and permissions related to access of this data by any sort of third parties is set by a user by making a transaction to the blockchain. This way the data access information for a piece of user data is mined in a distributed and trusted manner in a block of a blockchain as mentioned in [37]. Such as an access control system provides long chain for blockchain for the owners of the data to either modify or completely revoke the permissions related to their data.…”
Section: Secure Hashing Algorithm (Sha)mentioning
confidence: 99%
“…This set should be modifiable on the go with the extreme case of this set being empty, i.e., a user can revoke a service/application's right to access her data at any time she wants. Figure 5 shows the blocks that have been created by encryption and Figure 6 shows the secure hash algorithm works on choosing the longest chain with hash function [37]. Figure 7 shows the secure hash algorithm works on choosing the longest chain with hash function [38] and Figure 8 show an example of secure hashing being performed on text [39].…”
Section: Secure Hashing Algorithm (Sha)mentioning
confidence: 99%
“…This allows us to focus on both the healthcare and supply chain industries and draw inspiration from them. The use of blockchain allows a secure ledger to record all transactions of goods and materials in the chain [24]- [26]. The paper is organized in the four sections.…”
Section: Introductionmentioning
confidence: 99%
“…Still, not many people who should consume drugs regularly neglect to consume drugs because much work must be done at work or at home [3]. In the problem, the author wants to create a system that will schedule the consumption of drugs with a schedule and medicines that must be consumed [4] [5].…”
Section: Introductionmentioning
confidence: 99%