2023
DOI: 10.1016/j.aej.2023.04.037
|View full text |Cite
|
Sign up to set email alerts
|

An efficient privacy-preserving control mechanism based on blockchain for E-health applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…The algorithm uses Pedersen's commitment to mask transaction amounts and ensures their correctness through zero-knowledge proof. Alsuqaih et al [34] proposed an effective access control framework to address the issue of personal information data and medical privacy data leakage in the medical field caused by the use of blockchain technology. This framework enables patients to determine the access permissions to their data.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…The algorithm uses Pedersen's commitment to mask transaction amounts and ensures their correctness through zero-knowledge proof. Alsuqaih et al [34] proposed an effective access control framework to address the issue of personal information data and medical privacy data leakage in the medical field caused by the use of blockchain technology. This framework enables patients to determine the access permissions to their data.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…They rely on the financial incentives of honest participation, such as mining rewards, to deter malicious actors. However, a defensive mechanism, Byzantine Fault Tolerance, is still required to guard against malevolent participants and maintain the blockchain's functionality, depending on consensus rules [24]. Information and access to patient records are essential in the healthcare industry.…”
Section: Introductionmentioning
confidence: 99%
“…16 Further, the blockchain infrastructure may assist in resolving issues with authorization for data exchange, which can significantly impede establishing a methodology for exchanging patient data. 17 Finally, the technology can employ time stamping to confirm database changes, which is ideal for dealing with EHR data, especially when several individuals have the authority to alter a record. A considerable proportion of health data is sent across IoT sensor nodes due to the growth of the IoT medical systems, exposing them to safety issues such as eavesdropping and data tampering.…”
Section: Introductionmentioning
confidence: 99%