2018
DOI: 10.1007/978-3-030-00009-7_52
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture of Secure Health Information Storage System Based on Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…After all the findings for cloud-based e-health system security we would like to recommend to consider the papers ( [68], [78], [81], [82], [85]) on blockchain-based mechanism as it is more trending in recent days, the papers ( [74], [75], [76], [80]) on biometric-based mechanism for mobile devices. If anyone considering cryptographic methods for securing cloud-based e-health system then they should consider the papers ( [27], [30], [31], [42], [43], [63], [64] for AES based), ( [43], [64], [69] for RSA based) and ( [38], [42], [51], [53], [63], [65] for ABE based) hybrid system.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…After all the findings for cloud-based e-health system security we would like to recommend to consider the papers ( [68], [78], [81], [82], [85]) on blockchain-based mechanism as it is more trending in recent days, the papers ( [74], [75], [76], [80]) on biometric-based mechanism for mobile devices. If anyone considering cryptographic methods for securing cloud-based e-health system then they should consider the papers ( [27], [30], [31], [42], [43], [63], [64] for AES based), ( [43], [64], [69] for RSA based) and ( [38], [42], [51], [53], [63], [65] for ABE based) hybrid system.…”
Section: Discussionmentioning
confidence: 99%
“…Here, FPB is used as the classical database for the healthcare institute and CB is used for storing the medical data from all participating medicals. It provides tamperresistant and reliable storage [68]. In [56], the Watermarking approach used can mitigate insider threats to the e-health system.…”
Section: Non-crypto Techniquesmentioning
confidence: 99%
“…Most papers analysed did not discuss development strategy, yet a few mentioned their system as either open source or having an Open API or proprietary, and again most did not discuss this as shown in Figure 17. Only the following papers reviewed papers discussed one or more of the following consensus algorithms: Proof-of-Work [27], [31], [38], [40], [41], [44]- [46], [50], [70], [75], [77], [80], [84], [87], [92], [96], [98], [106], [108], [118], [122], [127], Proof-of-Stake [114], [115], [124], [125], Proof-of-Existence [28], Proof-of-Information [62], Delegated-Proof-of-Stake [34], [121], [166], Hybrid-Delegated-Proof-of-Stake [85], [90], Delegated-Proof-of-Work [103], Proof-of-Disease [59], Proof-of-Authority [143], and Proof-of-Familiarity [158].…”
Section: ) Blockchain Type and Consensus Mechanismmentioning
confidence: 99%
“…Han et al apply blockchain to medical data storage to build a decentralized, secure, tamperresistant health information storage system in Reference [95]. To improve the latency of data validation, the system utilizes a hybrid health blockchain, which combines the consortium and private blockchains.…”
Section: Secure Data Storagementioning
confidence: 99%