Implication of Smart Contracts to Mitigate the Security Risk in Healthcare System

Authors

  • Kiran Kanwar Research Scholar, School of Computer Application & Technology, Career Point University, Kota, Rajasthan, India Author
  • Dr. Abid Hussain Research Supervisor, School of Computer Application & Technology, Career Point University, Kota, Rajasthan, India Author

Keywords:

blockchain, smart contract, security, bitcoin, ethereum, counterparty, stellar, monax, lisk

Abstract

"A distributed database that maintains an ever-expanding list of ordered records, called blocks," is how a blockchain is defined.These parts are connected by the use of cryptography. A timestamp contain by each, the preceding block of a cryptographic hash , and with a transaction information. Also we can say that distributed, public, decentralized digital ledger that keeps track of transactions across several computers is called a blockchain. Its goal is to stop record tampering without interfering with network consensus or all subsequent blocks. Because blockchain and smart contracts are developed using non-standard software life cycles, there may be security flaws and difficulties in getting users to adopt the technology. For instance, distributed applications may not receive regular updates or may have bugs that can only be fixed by releasing a new version. A detailed review of smart contracts was covered in this publication. In terms of security, privacy, communication channel, etc., it further differentiated and contrasted the security of smart contracts with that of traditional security. This study also discusses other smart contract systems, including Stellar, Monax, Ethereum, Bitcoin, and Lisk. For smart contracts certain suggested methods are applied in various contexts to address security risks. Furthermore, also smart contract classification of the security application was put out in an effort to address some of the shortcomings. Additionally, the paper offers a thorough security scenario for smart contracts using several methods. Finally, the dangers and weaknesses of the smart contracts that might lead to an attack are listed. Here we can find and focuses on security risks and weaknesses specific to smart contracts.

Downloads

Download data is not yet available.

References

Agarwal R, T. T. (2021). Vulnerability and transaction behavior based detection of malicious smart contracts. IEEE Communication Management, 4(2), 1-13.

Ahmadjee S, B. R. (2021). Assessing smart contracts security technical debts. IEEE Communication Survey(3(3)), 1-10.

Akin Y, D. C. (2019). Ethereum blockchain network-based electrical vehicle charging platform with multi-criteria decision support system. (pp. 1-5). Ankara, Turkey: IEEE. doi:https://doi.org/10.1109/ UBMYK48245.2019.8965557.

Amend, J. K. (2021). What Do We Really Need? A Systematic Literature Review of the Requirements for Blockchain-Based E-government Services. 46. doi:https://doi.org/10.1007/978-3-030-86790-4_27

Ang Liu, D. Z. (2021). Blockchain-based customization towards decentralized consensus on product requirement, quality, and price,. www.sciencedirect.com, 18-25,. doi:https://doi.org/10.1016/j.mfglet.2020.12.001.

Bartoletti M, P. L. (2021). An empirical analysis of smart contracts: Platforms, applications, and design patterns. IEEE Communication Survey Tutorials, 2(6), 1-16.

Biswas A, R. A. (2022). Blockchain and Ipfs Based Secure Cloud Banking System Using Smart Card. Research Square preprint, 1-34. doi:https://doi.org/10.21203/rs.3.rs-1684189/v1.

Farshidi S, J. S. (2020). Decision support for blockchain platform selection: Three industry case studies. IEEE Transaction Engineering Management, 67(14), 1109-1128. doi:https://doi. org/10.1109/TEM.2019.2956897

Ghadi, Y. M. (2024). The role of blockchain to secure internet of medical things. Sci Rep. doi:https://doi.org/10.1038/s41598-024-68529-x

Herda. (2023). A Guide to Smart Contract Security. hedera. doi:https://hedera.com/learning/smart-contracts/smart-contract-security

Huang S, L. C. (2021). . Identification of active attacks in internet of things: Joint model- and data-driven automatic modulation classification approach. IEEE Internet Things Journal., 8(3), 2051-2065.

Ivanov D, D. A. (2019). New disruption risk management perspectives in supply chains: Digital twins, the ripple effect, and resileanness. IFAC-PapersOnLine, 52(13), 337-342. doi:https://doi.org/10.1016/j.ifacol.2019.11.138

Koul B, Y. D. (n.d.). Insights into the Domestic Wastewater Treatment (DWWT) regimes: A review. Water. 14(21): 3542. doi:https://doi.org/10.3390/w14213542

Leiba, M., Dahan, E., Barger, A., Bertha, A., Aspir, T., & Aviv, I. (2024). Addressing Infrastructure Requirements of Blockchain-Native Information System. EEE 32nd International Requirements Engineering Conference Workshops (REW) (pp. 330-339). Reykjavik, Iceland: IEEE. doi:10.1109/REW61692.2024.00051

Meng Q, Z. Y. ( 2020). A review of integrated applications of BIM and related technologies in whole building life cycle. Engineering Construction Architectural Management, 27(8), 1647-1677.

Shit PK, A. P. (2021). Spatial modeling and assessment of environmental contaminants Risk Assessment and Remediation. Springer Cham. doi:https://doi.org/10.1007/978-3-030-63422-3.

Singh, D. S.-C.-L. (2023). Adoption of Blockchain Technology in Healthcare: Challenges, Solutions, and Comparisons. Applied Sciences 13, no. 4: 2380. doi:https://doi.org/10.3390/app13042380

Downloads

Published

30-11-2024

Issue

Section

Research Articles

How to Cite

Implication of Smart Contracts to Mitigate the Security Risk in Healthcare System. (2024). International Journal of Scientific Research in Science and Technology, 11(6), 399-409. https://ijsrst.com/index.php/home/article/view/IJSRST24116196

Similar Articles

1-10 of 51

You may also start an advanced similarity search for this article.