[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ramamurthy et al., 2021 - Google Patents

Blockchain Management System with Three Layer of Security for E-Health Record using Improved 16-bit XOR Cryptography.

Ramamurthy et al., 2021

View PDF
Document ID
579749717618929810
Author
Ramamurthy M
Pushpa S
Publication year
Publication venue
International Journal of Intelligent Engineering & Systems

External Links

Snippet

Blockchain system has various advantages in transaction data storage. Due to the distributed nature of blockchain, security becomes a concern to store private data. In literature, many techniques to maintain security in the blockchain is proposed. But the …
Continue reading at inass.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/009Trust
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Mittal et al. Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health
Dagher et al. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology
Sharma et al. RSA based encryption approach for preserving confidentiality of big data
Dhar et al. Advanced security model for multimedia data sharing in Internet of Things
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
Samkari et al. Protecting medical records against cybercrimes within Hajj period by 3-layer security
Dixit et al. Multi authority access control in a cloud ehr system with ma-abe
Kumar et al. Novel method for safeguarding personal health record in cloud connection using deep learning models
Sangeetha et al. Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud
Kanwal et al. Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud
Wenhua et al. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Singh et al. Aggregating privatized medical data for secure querying applications
Tcholakian et al. [Retracted] Self‐Sovereign Identity for Consented and Content‐Based Access to Medical Records Using Blockchain
Dhanalakshmii et al. An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 (KDF2).
Ramamurthy et al. Blockchain Management System with Three Layer of Security for E-Health Record using Improved 16-bit XOR Cryptography.
Puneeth et al. Blockchain-Based Framework for Privacy Preservation and Securing EHR with Patient-Centric Access Control
Karunakaran et al. A Privacy Preserving Framework for Health Records using Blockchain.
Kiran et al. Ontology‐based data access control model supported with grid computing for improving security in healthcare data
Dinesh et al. Design and Development of an E-Healthcare Records Management System using Blockchain Algorithm
Feldner et al. Security issues in mobile healthcare applications
Negi et al. Framework for securing EPR records with Searchable encryption & AES
Wu et al. Privacy-Preserving Pathological Data Sharing Among Multiple Remote Parties
Sudarsa et al. Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification.
JP2020109447A (en) Confidential information retrieval system, confidential information retrieval program and confidential information retrieval method
Dhanalakshmi et al. Secure and Privacy-Preserving storage of E-Healthcare data in the cloud: advanced data integrity measures and privacy assurance