2021
DOI: 10.3390/electronics10162034
|View full text |Cite
|
Sign up to set email alerts
|

Security, Privacy, and Reliability in Digital Healthcare Systems Using Blockchain

Abstract: According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system. Using a permis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 66 publications
(32 citation statements)
references
References 45 publications
0
18
0
Order By: Relevance
“…Users can securely search the desired health-related data without decryption based on homomorphic SSE. We have provided a comparison to the benchmark models such as [13,30,[50][51][52] . Our proposed approach is resistant to active collusion and replay attacks due to the flexible policy revocation.…”
Section: Discussionmentioning
confidence: 99%
“…Users can securely search the desired health-related data without decryption based on homomorphic SSE. We have provided a comparison to the benchmark models such as [13,30,[50][51][52] . Our proposed approach is resistant to active collusion and replay attacks due to the flexible policy revocation.…”
Section: Discussionmentioning
confidence: 99%
“…Ali et al [30] proposed a healthcare framework based on blockchain. They developed a security algorithm for protecting the security and privacy of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Bitcoin is used as the underlying chain to select a certain number of nodes and complete the generation of the final block through the Chain Agreement (CA) algorithm after their identity authentication. Ali et al [ 38 ] proposed the Hybrid Consensus mechanism, which realized state machine replication in an unauthorized environment by using workload proof. Hybrid Consensus for the first time uses a formal security model and modular design to model the hybrid consensus mechanism and proves that it can meet the safety characteristics such as consistency and activity.…”
Section: Background and Related Studiesmentioning
confidence: 99%