2023
DOI: 10.30953/bhty.v6.244
|View full text |Cite
|
Sign up to set email alerts
|

GAHBT: Genetic Based Hashing Algorithm for Managing and Validating Health Data Integrity in Blockchain Technology

Abstract: This research work proposes a method for managing, securing, and validating the health data distribution records using a genetic-based hashing algorithm in a decentralized environment. The reason behind choosing blockchain is to secure the transaction of health data and protect the data from manipulated fraudulent movement and corruption by the contributor of the chain or any individual. The path of this technology approach provides an efficient surveillance measure such as transparency of record, fraud immuni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 29 publications
(42 reference statements)
0
1
0
Order By: Relevance
“…To ensure alignment, a user may, for instance, publish a hashed version of their data along with the key, allowing recipients to compare their computed hash value to the published value. The study [173] suggests a reliable approach that makes use of a cryptographic hash function and the conventional cryptographic method to create a new hash. The system presented here uses a genetic algorithm (GA) approach for optimisation and is backed by a hashing algorithm to enhance overall data surveillance.…”
Section: • Verifying File and Message Integrity: Hashingmentioning
confidence: 99%
“…To ensure alignment, a user may, for instance, publish a hashed version of their data along with the key, allowing recipients to compare their computed hash value to the published value. The study [173] suggests a reliable approach that makes use of a cryptographic hash function and the conventional cryptographic method to create a new hash. The system presented here uses a genetic algorithm (GA) approach for optimisation and is backed by a hashing algorithm to enhance overall data surveillance.…”
Section: • Verifying File and Message Integrity: Hashingmentioning
confidence: 99%