2021
DOI: 10.22266/ijies2021.1031.34
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Management System with Three Layer of Security for E-Health Record using Improved 16-bit XOR Cryptography

Abstract: Blockchain system has various advantages in transaction data storage. Due to the distributed nature of blockchain, security becomes a concern to store private data. In literature, many techniques to maintain security in the blockchain is proposed. But the conventional data security schemes are not alone sufficient to incorporate complete security in blockchain. Hence in this paper, a blockchain management system with three layers of security is proposed. The proposed blockchain system is suggested for E-health… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 23 publications
0
0
0
Order By: Relevance
“…It is a method of stricter access controls that consists of customizing access for each user [27] Authentication Verifies the identity of someone or something to allow access to a system and obtain information [24], [28]- [30] Access control It is a method that determines who has permission to access certain data [30], [31] Bulletin It is a distributed and secure database that contains encrypted information about a transaction on the network, which prevents data manipulation.…”
Section: Software Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…It is a method of stricter access controls that consists of customizing access for each user [27] Authentication Verifies the identity of someone or something to allow access to a system and obtain information [24], [28]- [30] Access control It is a method that determines who has permission to access certain data [30], [31] Bulletin It is a distributed and secure database that contains encrypted information about a transaction on the network, which prevents data manipulation.…”
Section: Software Securitymentioning
confidence: 99%
“…On the other hand, Ramamurthy and Pushpa [28] raise the possibility of implementing a blockchain management system with three levels of security to protect health data. This approach involves the use of a user authentication mechanism that verifies identity through a unique combination of identification, password, and usage pattern.…”
Section: Rq2: What Computer Security Mechanisms Are Most Commonly Imp...mentioning
confidence: 99%
See 1 more Smart Citation