Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things DOI Creative Commons
Rasha Halim Razzaq, Mishall Al-Zubaidie,

Rajaa Ghali Atiyah

и другие.

Deleted Journal, Год журнала: 2024, Номер 4(3), С. 152 - 165

Опубликована: Дек. 5, 2024

Protecting patient data in the Internet of Medical Things (IoMT) is one major challenges facing healthcare organizations because increasing threats to privacy and security. Although there are many existing protocols solutions, such as Rivest–Shamir–Adleman (RSA) El-Gamal cryptographies or centralized methods, that aim protect data, they suffer from weaknesses slow performance inability handle large volumes data. The issue security medical records has become an urgent need, use methods can expose them single-point failure. In this paper, we present efficient approach securing information (EASPI), which depends on blockchain integrates innovative techniques advanced encryption algorithm (AES), reverse word frequency analysis (TF-IDF), Lemplel-Ziv-Welch (LZW), decision tree model (DTM), naive Bayes classifier (NBC). EASPI seeks improve by storing it encrypted securely via technology, providing a high level reliability. experimental results indicate reduces execution time 0.2 ms decryption 0.3 while improving accuracy diagnosis. potential suggested for systems further demonstrated fact TF-IDF attained 0.004 ms, blockchain's greatest was 0.014 ms. Additionally, using formal verification Scyther tool, system examined both theoretically practically. solution appropriate option institutions since offers strong defense against range cyber threats, including targeted espionage assaults.

Язык: Английский

Optimization Solution Proposal for Smart Transaction Security of Smart Blockchain Contracts in E-Banking Applications DOI
Mishall Al-Zubaidie, Wid Alaa Jebbar

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 295 - 320

Опубликована: Фев. 28, 2025

This chapter makes use of the concept micro-segmenting whole system into distinct zones, each with its own set regulations and restrictions. A smart contract controls these rules, determining whether or not they have been observed to confirm customer's identity. To define kind e-banking request, two-phase commit algorithm (2PC) was first applied. The micro-segmentation technique then used isolate e-transaction procedure in a different segment. Next, it determined if conditions were optimized by applying yellow saddle goatfish (YSGA) situation. With help blockchain technology, can handle lot users decentralized way. Using hash block stops attackers from doing fraudulent transactions. has tested against number well-known, recent assaults shown itself be resilient them. When compared existing research, execution time, complexity, memory, disk drive findings are deemed low terms performance evaluation.

Язык: Английский

Процитировано

0

Combining Fog Computing and Blockchain Based on the Internet of Medical Things to Preserve Patient Information Privacy DOI
Mishall Al-Zubaidie, Rasha Halim Razzaq

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 525 - 546

Опубликована: Фев. 28, 2025

This chapter proposes an encrypted internet of medical things (IoMT) privacy system (EIPS). To create strong security measures, the suggested EIPS uses techniques decision tree (DT), naive bayes (NB), twofish, and jellyfish inside private blockchain (PBC) fog computing. Medical data is kept anonymous by using twofish encryption technique. study DT to make precise recommendations based on gathered data, while NB utilized swiftly classify patient data. The algorithm was employed in improve transmission identifying patterns algorithms from NB, DT, are made function well with PBC. Peer-to-peer IoMT distributed managed via EIPS. Fog computing (FC) has advantage accelerating decision-making without requiring user go far-off clouds. authors examined performance our system. findings show that can handle extensive measures lightweight operations, making it suitable for use health organizations.

Язык: Английский

Процитировано

0

Security Cooperation in the Protection Concerns of Agriculture Data Using Efficient Signatures and Artificial Bee Colony Manner DOI
Mishall Al-Zubaidie, Duaa Hammoud Tahayur

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 439 - 460

Опубликована: Фев. 28, 2025

This chapter first suggests a security mechanism to prohibit block data tampering in internet of things (IoT) by combining consortium blockchain blocks with Edwards25519 (Ed25519) signatures. Secondly, the study that is being suggested makes use an artificial bee colonizer (ABC) technique maintain unpredictability Ed25519 signatures while finding best answer and maximizing range intricate problems. The optimizer system uses advanced deep learning (ADL) technology as model monitor assess things. authors have evaluated solution terms performance overhead security. most damaging applications, like obfuscation, selfish mining, blocking, ignoring, blind heuristic attacks, can be prevented system, according tests been done on it. defends against these attacks using test Scyther. It also monitors metrics, such network throughput rate, entropy, scalability, which indicate how well performs comparison other systems.

Язык: Английский

Процитировано

0

Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things DOI Creative Commons
Rasha Halim Razzaq, Mishall Al-Zubaidie,

Rajaa Ghali Atiyah

и другие.

Deleted Journal, Год журнала: 2024, Номер 4(3), С. 152 - 165

Опубликована: Дек. 5, 2024

Protecting patient data in the Internet of Medical Things (IoMT) is one major challenges facing healthcare organizations because increasing threats to privacy and security. Although there are many existing protocols solutions, such as Rivest–Shamir–Adleman (RSA) El-Gamal cryptographies or centralized methods, that aim protect data, they suffer from weaknesses slow performance inability handle large volumes data. The issue security medical records has become an urgent need, use methods can expose them single-point failure. In this paper, we present efficient approach securing information (EASPI), which depends on blockchain integrates innovative techniques advanced encryption algorithm (AES), reverse word frequency analysis (TF-IDF), Lemplel-Ziv-Welch (LZW), decision tree model (DTM), naive Bayes classifier (NBC). EASPI seeks improve by storing it encrypted securely via technology, providing a high level reliability. experimental results indicate reduces execution time 0.2 ms decryption 0.3 while improving accuracy diagnosis. potential suggested for systems further demonstrated fact TF-IDF attained 0.004 ms, blockchain's greatest was 0.014 ms. Additionally, using formal verification Scyther tool, system examined both theoretically practically. solution appropriate option institutions since offers strong defense against range cyber threats, including targeted espionage assaults.

Язык: Английский

Процитировано

1