A Smart Contract-Based Access Control Framework For Smart Healthcare Systems DOI
Amal Abid, Saoussen Cheikhrouhou, Slim Kallel

и другие.

The Computer Journal, Год журнала: 2022, Номер 67(2), С. 407 - 422

Опубликована: Дек. 30, 2022

Abstract Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due the constrained nature smart objects. Usually, a powerful third party is used handle logic. However, this lacking transparency could harm user privacy. Therefore, providing distributed solution, while considering privacy-preserving awareness systems, paramount importance. The described issue can addressed using emergent Blockchain technology that provides promising choice build new generation decentralized transparent solutions. This paper proposes contract-based framework healthcare which based on contracts provide trustworthy control, combined with GTRBAC model express fine-grained policies temporal authorization constraints. To prove feasibility validity proposed framework, also detailed technical description an initial implementation execution. An experimental evaluation shows security properties’ analyses achieved best possible no vulnerabilities found, cost operations increases linearly as number policy constraints increases. Besides, comparative analysis reveals approach achieve good results low gas costs latency.

Язык: Английский

Recent Advances of Blockchain and Its Applications DOI Creative Commons
Xiao Li, Weili Wu

Journal of Social Computing, Год журнала: 2022, Номер 3(4), С. 363 - 394

Опубликована: Дек. 1, 2022

Blockchain is an emerging decentralized data collection, sharing, and storage technology, which have provided abundant transparent, secure, tamper-proof, robust ledger services for various real-world use cases. Recent years witnessed notable developments of blockchain technology itself as well blockchain-enabled applications. Most existing surveys limit the scopes on several particular issues or applications, are hard to depict general picture current giant ecosystem. In this paper, we investigate recent advances both its most active research topics in We first review consensus mechanisms communication schema systems. Then extensive literature conducted Internet Things (IoT), edge computing, federated learning, applications including healthcare, COVID-19 pandemic, online social network, supply chain, where detailed specific discussed each. Finally, discuss future directions, challenges, opportunities academia industry.

Язык: Английский

Процитировано

20

A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic DOI Creative Commons
Abdul Majeed, Seong Oun Hwang

IEEE Access, Год журнала: 2021, Номер 9, С. 164159 - 164187

Опубликована: Янв. 1, 2021

Since the emergence of coronavirus disease–2019 (COVID-19) outbreak, every country has implemented digital solutions in form mobile applications, web-based frameworks, and/or integrated platforms which huge amounts personal data are collected for various purposes (e.g., contact tracing, suspect search, and quarantine monitoring). These systems not only collect basic about individuals but, most cases, very sensitive like their movements, spatio-temporal activities, travel history, visits to churches/clubs, purchases, social interactions. While collection utilization person-specific different contexts is essential limiting spread COVID-19, it increases chances privacy breaches misuse. Recently, many protection techniques (PPTs) have been proposed based on included types tables, graphs, matrixes, barcodes, geospatial data), epidemic containment strategies (ECSs) (contact monitoring, symptom reports, etc.) order minimize permit intended uses such data. In this paper, we present an extensive review PPTs that recently address diverse requirements/concerns stemming from COVID-19 pandemic. We describe heterogeneous control pandemic, corresponding PPTs, as well paradigm shifts handling brought by systemically map into ECSs lifecycle phases, in-depth existing evaluation metrics employed analysis suitability. developed during period leverage emerging technologies, federated learning, blockchain, design, swarm name a few. Furthermore, discuss challenges preserving individual role regulations/laws, promising future research directions. With article, our aim highlight recent specifically arena, point out gaps developments regard.

Язык: Английский

Процитировано

26

Leveraging blockchain in response to a pandemic through disaster risk management: an IF-MCDM framework DOI Open Access
İskender Peker, İlker Murat Ar, İsmail Erol

и другие.

Operations Management Research, Год журнала: 2022, Номер 16(2), С. 642 - 667

Опубликована: Дек. 31, 2022

Язык: Английский

Процитировано

17

Digital Identity Verification: Transforming KYC Processes in Banking Through Advanced Technology and Enhanced Security Measures DOI Open Access
Sachin Parate, Hari Prasad Josyula, Latha Thamma Reddi

и другие.

International Research Journal of Modernization in Engineering Technology and Science, Год журнала: 2023, Номер unknown

Опубликована: Сен. 5, 2023

The digital transformation of the banking sector has ushered in a new era opportunities and challenges, particularly realm identity verification.This article delves into evolution significance verification mechanisms, especially context KYC (Know Your Customer) processes, which are pivotal for ensuring security integrity financial transactions age.Through comprehensive literature review, underscores convergence technologies such as machine learning, 5G communication, blockchain shaping future banking.Case studies provide practical insights implementation these technologies, highlighting both their transformative potential challenges they present.The analysis findings review offers deeper understanding real-world implications technologies.The emphasizes benefits including enhanced security, efficiency, improved customer experience, while also addressing concerns, interoperability issues, evolving regulatory landscapes.Furthermore, research importance trust, transparency, user-friendliness systems.The conclusion reiterates promising emphasizing need continuous innovation adaptation to address emerging challenges.In essence, this provides holistic overview landscape sector, offering valuable stakeholders, researchers, policymakers interested its verification.

Язык: Английский

Процитировано

11

Neural Networks-Based Predictive Models for Self-Healing in Cloud Computing Environments DOI

D. Sujatha,

Michael Raj TF,

G. Ramesh

и другие.

Опубликована: Янв. 24, 2024

Due to the widespread adoption of cloud computing, protecting security and uptime services is crucial importance. Unforeseen malfunctions performance bottlenecks in settings can lead considerable downtime financial losses. Systems that automatically detect, diagnose, recover from errors using self-healing mechanisms are a promising new approach. This study investigates how neural network-based prediction models be used improve cloud-based systems' inherent capacity for self-healing. research introduces novel method networks forecast system failures irregularities. The proposed able spot warning signs by assessing past data current metrics real time. Neural may accurately anticipate outcomes recognizing complicated patterns learning large, varied information. Various forms networks, including deep designs, evaluated determine their efficacy diverse contexts. also looks into proactively reducing faults incorporating these predictive systems. Responses, such as resource reallocation, workload migration, backup procedures, triggered when problems predicted. preventative drastically lessens amount time users spend waiting systems restart. Extensive simulations real-world case studies yielded experimental prove based on computing effective. models' proficiency failure enables corrective measures taken promptly precisely. Implementing massive environments discussed, scalability, flexibility, consequences. tapping potential analysis, this adds development capabilities settings. not only improves services' dependability resilience, but it lays groundwork autonomous intelligent future

Язык: Английский

Процитировано

4

Blockchain for sustainable city transformation: A review on Bangladesh DOI Creative Commons

Rahul Joysoyal,

Shekh S. Uddin,

Md. Touhid Islam

и другие.

Engineering Reports, Год журнала: 2024, Номер 6(9)

Опубликована: Июнь 11, 2024

Abstract Blockchain (BCn) revolution across the world leads global transformation by altering existing structure and introducing accessible decentralized paradigm. This technology facilitates access to resources redefines conventional frameworks, empowering people communities globally. Motivated these attention‐seeking potentiality of BCn features, in this article, we examine challenges, advancements, emerging prospects Bangladesh. With a specific focus on implications for sustainability smart development, study addresses urgent need understand how can facilitate sustainable development rapidly evolving countries like The goal research is draw attention successful use knowledge extract best practices cutting‐edge strategies contribution covers underlying concepts technology, showing revolutionary state world, applications sustainability, assessment its current usage, highlighting implementation problems. Furthermore, serves as gateway transparent, future that fosters inclusive national progress aligns with goals. also strives inspire individuals transformational collective benefit society BCn's potential empower while driving positive change.

Язык: Английский

Процитировано

4

Highly private blockchain-based management system for digital COVID-19 certificates DOI Creative Commons
Rosa Pericàs-Gornals, Macià Mut–Puigserver, M. Magdalena Payeras–Capellà

и другие.

International Journal of Information Security, Год журнала: 2022, Номер 21(5), С. 1069 - 1090

Опубликована: Июль 29, 2022

As a result of the declaration COVID-19 pandemic, several proposals blockchain-based solutions for digital certificates have been presented. Considering that health data high privacy requirements, management system must fulfil strict and security requirements. On one hand, confidentiality medical be assured, being owner (the patient) actor maintain control over their certificates. other entities involved in generation validation supervised by regulatory authority. This set requirements are generally not achieved together previous proposals. Moreover, it is required certificate protocol provides an easy verification process also strongly avoid risk forgery. In this paper we present design implementation to manage where individual users decide how share private hierarchical system. order achieve this, put two different technologies: use proxy re-encryption (PRE) service conjunction with protocol. Additionally, our introduces authority regulate centers can generate offers kinds registered non-registered entities. Therefore, achieves all is, sovereignty, privacy, forgery avoidance, regulation entities, verification.

Язык: Английский

Процитировано

16

Hyperledger fabric platform for healthcare trust relations—Proof-of-Concept DOI Open Access
Aleksandar Nedaković, Anton Hasselgren, Katina Kralevska

и другие.

Blockchain Research and Applications, Год журнала: 2023, Номер 4(4), С. 100156 - 100156

Опубликована: Авг. 1, 2023

In recent years, blockchain technologies have expanded from the finance field to other areas that rely on trust-based solutions. The healthcare industry represents one such area, as digital transformation disrupts relationships between patients, professionals, and institutes. Patients institutes lack a proficient tool verify credentials of medical professionals in environment. Furthermore, where they are control over their credentials. first contribution this paper is proposal solution leverages private permissioned Hyperledger Fabric smart contracts provide source transparent trust for within industry. Second, we pave ground GDPR compliance by storing only hash values blockchain. Third, solve problem patient authentication utilizing cryptographic techniques. Finally, prove usability proposed implementing user interface creating live deployment.

Язык: Английский

Процитировано

9

Blockchain Security and Privacy: Threats, Challenges, Applications, and Tools DOI Open Access

Ahod Alghuried,

Mohammed Alkinoon, Manar Mohaisen

и другие.

Deleted Journal, Год журнала: 2025, Номер unknown

Опубликована: Фев. 6, 2025

Blockchain technology has heralded a new era in digital innovation, revolutionizing our approach to designing and building distributed applications the sphere. operates as an immutable ledger, where each entry representing transaction is indelible cannot be altered once established. Initially designed fundamental framework for cryptocurrencies, blockchain outgrown its original purpose, demonstrating significant potential various industries offering variety of security privacy features. Our study provides thorough current survey applications, security, concepts, primitives, threat models. It stands out by concentrating on how intersects with emerging fields like IoT, EVs, FinTech, healthcare systems single framework. To provide features, employ different foundational notions primitives while tackling diverse adversarial scenarios capabilities goals. This presents fresh examination state models systems. Additionally, this work highlights existing gaps knowledge outlines open questions, aiming stimulate interest further advancements field.

Язык: Английский

Процитировано

0

A2SHE: An anonymous authentication scheme for health emergencies in public venues DOI Creative Commons
Xiaohan Yue, Peng Yang,

Haoran Si

и другие.

Information Sciences, Год журнала: 2025, Номер 703, С. 121944 - 121944

Опубликована: Фев. 7, 2025

Язык: Английский

Процитировано

0