2022
DOI: 10.1016/j.jksuci.2021.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Secure decentralized electronic health records sharing system based on blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Recently, there was a unique increase in identity theft, security breaches, and data loss. It was reported that about 3,813 data breaches which leads to 4.1 billion records expose at first 6 months of 2019 [11]. Intentional breach or illegal access becomes a major threat which is presented because of the inappropriate maintenance and execution of the access control scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, there was a unique increase in identity theft, security breaches, and data loss. It was reported that about 3,813 data breaches which leads to 4.1 billion records expose at first 6 months of 2019 [11]. Intentional breach or illegal access becomes a major threat which is presented because of the inappropriate maintenance and execution of the access control scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In this phase, the aim of the system is to store a few pieces of information on the blockchain for reducing the cost and time compared to the cost and time required for storing the actual files on the blockchain, as shown in figure (3).…”
Section: Proposed System Architecturementioning
confidence: 99%
“…This system provides a distributed system for reviews, in addition to Open Access by-design infrastructures and a governing process of high transparency [2]. The researchers in [3] deal with medical images where they introduce a framework for eliminating third-party intermediaries to share records and store them on the networks securely. An open asymmetric encryption technique is used for hashing and protecting the content of images.…”
Section: Introductionmentioning
confidence: 99%
“…A few associations or government offices "own" the hubs, who license the hubs to speak with one another. Personalities and jobs of individuals are known to other individuals (Shuaib et al, 2021).…”
Section: Hyperledger Fabricmentioning
confidence: 99%