Nothing Special   »   [go: up one dir, main page]

Komal et al., 2022 - Google Patents

Role Of Blockchain in Securing Patient Data for Health Care Application

Komal et al., 2022

Document ID
3829327302402057777
Author
Komal
Rajkumar
Publication year
Publication venue
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)

External Links

Snippet

The purpose of blockchain technology is to make it feasible to store and transfer digital data without the danger of it being changed in transit. Immutable ledgers or transaction records that cannot be edited, erased, or destroyed are created based on a blockchain. DLT is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Thwin et al. Blockchain‐based access control model to preserve privacy for personal health record systems
Dai et al. From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues
Sharma et al. Blockchain-based interoperable healthcare using zero-knowledge proofs and proxy re-encryption
Aujla et al. SecSVA: secure storage, verification, and auditing of big data in the cloud environment
Mehmood et al. Protection of big data privacy
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
Hardin et al. Blockchain in health data systems: A survey
Yan et al. BC-PDS: protecting privacy and self-sovereignty through BlockChains for OpenPDS
Odoom et al. A privacy-preserving Covid-19 updatable test result and vaccination provenance based on blockchain and smart contract
Panwar et al. A cognitive approach for blockchain-based cryptographic curve hash signature (BC-CCHS) technique to secure healthcare data in Data Lake
Rosa et al. Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults
Zhou et al. Volunteer service time record system based on blockchain technology
Singh et al. A digital asset inheritance model to convey online persona posthumously
Kamboj et al. An exploratory analysis of blockchain: applications, security, and related issues
Rani et al. Trustworthy Blockchain Based Certificate Distribution for the Education System
Li A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
Verma et al. Applications of Data Security and Blockchain in Smart City Identity Management
Komal et al. Role Of Blockchain in Securing Patient Data for Health Care Application
Myat et al. Preserving the Privacy for University Data Using Blockchain and Attribute-based Encryption
Mustaçoğlu Blockchain-Based Data Sharing and Managing Sensitive Data
Yinka et al. Improving the data access control using blockchain for healthcare domain
Madanagopal et al. Blockchain based Letter of Recommendation Verification System for Higher Studies
ALKHDOUR et al. REAL TIME OF CYBERSECURITY RISKS DETECTION APPROACH FOR BLOCKCHAIN BASED PERSONAL MEDICAL DEVICES
Saragih et al. The Use of Blockchain for Digital Identity Management in Healthcare
Rajnish Securing healthcare records using blockchain technology