2022
DOI: 10.1038/s41598-021-04124-8
|View full text |Cite
|
Sign up to set email alerts
|

SVBE: searchable and verifiable blockchain-based electronic medical records system

Abstract: Central management of electronic medical systems faces a major challenge because it requires trust in a single entity that cannot effectively protect files from unauthorized access or attacks. This challenge makes it difficult to provide some services in central electronic medical systems, such as file search and verification, although they are needed. This gap motivated us to develop a system based on blockchain that has several characteristics: decentralization, security, anonymity, immutability, and tamper-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…, where, m = − ń. The model aims at a restricted duel game process for node n in the network while considering the trace algebra, σ, when the node n in the network calculates the best time of communication establishment with the majority of the nodes in the network and it can be represented by Equation (11).…”
Section: Formal Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…, where, m = − ń. The model aims at a restricted duel game process for node n in the network while considering the trace algebra, σ, when the node n in the network calculates the best time of communication establishment with the majority of the nodes in the network and it can be represented by Equation (11).…”
Section: Formal Security Analysismentioning
confidence: 99%
“…The trust value is directly proportional to the response which other nodes in the network get while calculating the threat avoidance of the corresponding node. The best time for threat avoidance is calculated from Equation ( 7) and the sorted list of nodes obtained at the initial stage from Equation ( 6) is as in Equation (11).…”
Section: Formal Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [ 22 , 23 ] conducted research on COVID-19 patient health analysis using blockchain technology. The security-based patient-centric healthcare was developed in [ 24 26 ]. It implements blockchain technology with fog computing to concentrate on the security of the system.…”
Section: Related Workmentioning
confidence: 99%
“…This results in a unique signature for each block known as a hash. These blocks are then ordered sequentially into a chain of blocks, with each block also containing the previous block's hash [6]. This makes it extremely difficult to tamper with a block, as altering a single piece of data would result in a different hash value, making it evident to the DLT's users and causing the transaction to be rejected.…”
mentioning
confidence: 99%