2022
DOI: 10.21203/rs.3.rs-2034814/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Blockchain-Enabled Secure and Efficient Data Sharing Scheme for Trust Management in Healthcare Smartphone Network

Abstract: Internet of Medical Things (IoMT) is an extended genre of Internet of Things (IoT) where the Things collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH). Smartphones and IoMTs' are expected to maintain a secure and trusted confidential patient-records exchange while managing the patient remotely. Healthcare organizations deploy Healthcare Smartphone Networks (HSN) for confidential patient data collection and sharing among smartphone users and IoMT nodes. However, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 50 publications
(65 reference statements)
0
0
0
Order By: Relevance
“…Health data sharing. Health data management systems [30]- [32] allow a client to maintain personal health data and share the data with healthcare institutions. For example, the health data sharing system of [32] may consist of a client, a cloud database, healthcare institutions, and a blockchain network.…”
Section: B Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Health data sharing. Health data management systems [30]- [32] allow a client to maintain personal health data and share the data with healthcare institutions. For example, the health data sharing system of [32] may consist of a client, a cloud database, healthcare institutions, and a blockchain network.…”
Section: B Applicationsmentioning
confidence: 99%
“…For examples, in glaucoma care [29], a user of the smart soft contact lenses would like to learn an average of the continuous 24-hour measurements of intraocular pressure rather than obtains piles of real-time data. In [30], secure sharing of personal health data, which includes highly sensitive physiological information, among healthcare institutions is quite important. One may need to restrict the information that can be accessed by the institutions with different trust level.…”
Section: Introductionmentioning
confidence: 99%
“…Android OS secures user data and app contents by combining Inter-Component Interaction [3], [20]- [22] and system-level calls. Accessibility of an app component is regulated by applying permissions opted for by the user at installation time and stored in Androidmanifest.xml.…”
Section: A Inter-component Communicationmentioning
confidence: 99%
“…Zhao et al [33] proposed a BC-centric approach to protect privacy in FL, ensuring data security and integrity during cross-device model training without raw data sharing. Bhan et al [34] suggested a BC-infused solution for healthcare data sharing security, employing BC and encryption to safeguard privacy and security during medical data exchange among providers. Lou et al [35] introduced a BC-powered privacy-preserving framework for edge computing, leveraging BC to safeguard data privacy in shared edge device environments.…”
Section: Related Workmentioning
confidence: 99%