Ramamurthy et al., 2021 - Google Patents
Blockchain Management System with Three Layer of Security for E-Health Record using Improved 16-bit XOR Cryptography.Ramamurthy et al., 2021
View PDF- Document ID
- 579749717618929810
- Author
- Ramamurthy M
- Pushpa S
- Publication year
- Publication venue
- International Journal of Intelligent Engineering & Systems
External Links
Snippet
Blockchain system has various advantages in transaction data storage. Due to the distributed nature of blockchain, security becomes a concern to store private data. In literature, many techniques to maintain security in the blockchain is proposed. But the …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mittal et al. | Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health | |
Dagher et al. | Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology | |
Sharma et al. | RSA based encryption approach for preserving confidentiality of big data | |
Dhar et al. | Advanced security model for multimedia data sharing in Internet of Things | |
US9698974B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
Samkari et al. | Protecting medical records against cybercrimes within Hajj period by 3-layer security | |
Dixit et al. | Multi authority access control in a cloud ehr system with ma-abe | |
Kumar et al. | Novel method for safeguarding personal health record in cloud connection using deep learning models | |
Sangeetha et al. | Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud | |
Kanwal et al. | Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud | |
Wenhua et al. | A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications | |
Singh et al. | Aggregating privatized medical data for secure querying applications | |
Tcholakian et al. | [Retracted] Self‐Sovereign Identity for Consented and Content‐Based Access to Medical Records Using Blockchain | |
Dhanalakshmii et al. | An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 (KDF2). | |
Ramamurthy et al. | Blockchain Management System with Three Layer of Security for E-Health Record using Improved 16-bit XOR Cryptography. | |
Puneeth et al. | Blockchain-Based Framework for Privacy Preservation and Securing EHR with Patient-Centric Access Control | |
Karunakaran et al. | A Privacy Preserving Framework for Health Records using Blockchain. | |
Kiran et al. | Ontology‐based data access control model supported with grid computing for improving security in healthcare data | |
Dinesh et al. | Design and Development of an E-Healthcare Records Management System using Blockchain Algorithm | |
Feldner et al. | Security issues in mobile healthcare applications | |
Negi et al. | Framework for securing EPR records with Searchable encryption & AES | |
Wu et al. | Privacy-Preserving Pathological Data Sharing Among Multiple Remote Parties | |
Sudarsa et al. | Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification. | |
JP2020109447A (en) | Confidential information retrieval system, confidential information retrieval program and confidential information retrieval method | |
Dhanalakshmi et al. | Secure and Privacy-Preserving storage of E-Healthcare data in the cloud: advanced data integrity measures and privacy assurance |