Enhancing Security of Data Exchange through Block Chain Technology

Authors

  • Pream Kumar  PG Student, Department Of CSE, Global Institute Of Engineering and Technology, Tamil Nadu, India
  • Ramesh. V  Assistant Professor, Department Of CSE, Global Institute Of Engineering and Technology, Tamil Nadu, India

Keywords:

Searchable Encryption, Cloud Security, Privacy Preserving Scheme, Secure Hash Algorithm, Attribute Based Encryption; Anonymity

Abstract

Electronic medical records (EMRs) square measure vital, sensitive personal data in aid, and wish to be often shared between peers. Blockchain Technology facilitates a shared, immutable and history of all the transactions creating software of trust,responsibility and transparency. This provides a novel chance to implement a secure and reliable EMR knowledge management and sharing, system victimization. In this paper, we gift our views on block chain primarily based aid knowledge management, specially, for EMR knowledge sharing between aid suppliers and for analysis studies. All World Health Organization work with health data— health information processing and management professionals, doctors, researchers, business directors have responsibility to accept that data. Confidentiality of patient medical records is of utmost importance. Access to patient medical records in hospital software package ought to be with the treating/admitting practician and therefore the team. Victimization digital signatures on Blockchain-based knowledge permits access for multiple folks may regulate the provision and maintain the security of health records.

References

  1. Ming Li, Shucheng Yu, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute based Encryption”, IEEE Transactions On Parallel And Distributed Systems 2012.
  2. IEEE 2012 paper on “Improving the interoperability of healthcare information system through HL7 CDA and CCD standards”.
  3. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and WJonker, ―Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attribute 2009.
  4. “Privacy-preserving personal health record system using attributebased encryption,” Master’s thesis, WORCESTER POLYTECHNIC INSTITUTE, 2011.
  5. M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011.
  6. S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving phr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52.
  7. M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89– 106.
  8. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010
  9. C. Dong, G. Russell, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,” in Journal of Computer Security, 2010.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Pream Kumar, Ramesh. V, " Enhancing Security of Data Exchange through Block Chain Technology , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.473-486, March-April-2021.