2021
DOI: 10.1109/jiot.2021.3052604
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain and SGX-Enabled Edge-Computing-Empowered Secure IoMT Data Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…Similar to the stock dividend system, people who possess comparatively greater shares might get higher dividends. Therefore, it is more energy-efficient than PoW and provides higher sustainability [ 48 ]. The nodes with stakes are meant to be trustworthy and refrain from manipulating transactions, but if they do, their stake might be taken away.…”
Section: Research Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar to the stock dividend system, people who possess comparatively greater shares might get higher dividends. Therefore, it is more energy-efficient than PoW and provides higher sustainability [ 48 ]. The nodes with stakes are meant to be trustworthy and refrain from manipulating transactions, but if they do, their stake might be taken away.…”
Section: Research Backgroundmentioning
confidence: 99%
“…PoS outperforms PoW in terms of speed as well. For instance, Ethereum can handle up to 100,000 transactions per second using PoS, but it can only handle 30 transactions per second with PoW [ 48 ]. In the case of PoS, however, there is a possibility that a node will not have enough assets, in which case, if it were to be chosen as a miner, it would be viewed as malicious since it would have no assets to be debited [ 47 ].…”
Section: Research Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Y. Gao et al [32] proposed a framework employed with Hyperledger Fabric and Intel SGX (Software Guard Extension) in order to utilize blockchain technology for authentication of IoMT devices and cloud service providers and for providing an access policy management mechanism for health data. In this work, the software guard extension technology is integrated with edge computing, ensuring the integrity and confidentiality of IoMT data.…”
Section: Related Workmentioning
confidence: 99%
“…No one, but the CPU, can access the code and data in it. SGX can now provide a trusted execution environment for many application scenarios, such as by introducing a trusted execution environment in edge computing, that is, software protection extension technology, to ensure the confidentiality of the medical IoT data analysis process [22]. ere are also applications of SGX to verifiable confidential cloud computing, which guarantees code and data confidentiality, as well as the correctness and integrity of its results [23].…”
Section: Fog Computingmentioning
confidence: 99%