2020
DOI: 10.1186/s12911-020-01275-y
|View full text |Cite
|
Sign up to set email alerts
|

Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology

Abstract: Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(44 citation statements)
references
References 26 publications
(22 reference statements)
0
36
0
Order By: Relevance
“…Once a transaction request has been made by a user, the blockchain protocol requests the network nodes to verify the validity of the entire blockchain content. This in turn means that unless the networks nodes verify that the current version of the chain is identical to theirs and approve the transaction, it cannot be added to the chain [ 16 , 17 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Once a transaction request has been made by a user, the blockchain protocol requests the network nodes to verify the validity of the entire blockchain content. This in turn means that unless the networks nodes verify that the current version of the chain is identical to theirs and approve the transaction, it cannot be added to the chain [ 16 , 17 ].…”
Section: Discussionmentioning
confidence: 99%
“…It would be extremely difficult for someone to gather enough computing power to hack the blockchain database by altering the ledgers. The larger the blockchain, the more distributed it is, the more enormous is the computing power required for hacking, and the more secure it becomes [ 16 , 17 ].…”
Section: Discussionmentioning
confidence: 99%
“…Maliha Sultana et al [13] have provided a framework that gives a short outline about how to decentralize a trust less model that can handle security issues of medical images in healthcare systems. This has been finished by the fussing blockchain with zero trust standards.…”
Section: Related Workmentioning
confidence: 99%
“…Zero-trust authentication (Table 1 ) occurs among all respective nodes of the network. One emerging technology to achieve zero-trust architectures in health care is via blockchain-based technologies 25 and this has been evaluated in medical image sharing 26 .…”
Section: Federated Computation and Zero-trust Techniques For Dctsmentioning
confidence: 99%