2020
DOI: 10.2139/ssrn.3565922
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cloud Storage Architecture for Digital Medical Record in Cloud Environment Using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Because of these features, the blockchain is the most likely candidate to deliver cloud data security. According to the findings of this study, blockchain technology can be used in the cloud for secure transmission of healthcare data [20][21][22][23]. The health sector is a major concern for both developing and developed countries, as this sector is directly related to people's social well-being and life.…”
Section: Introductionmentioning
confidence: 99%
“…Because of these features, the blockchain is the most likely candidate to deliver cloud data security. According to the findings of this study, blockchain technology can be used in the cloud for secure transmission of healthcare data [20][21][22][23]. The health sector is a major concern for both developing and developed countries, as this sector is directly related to people's social well-being and life.…”
Section: Introductionmentioning
confidence: 99%
“…The multi-objective function achieves optimal key generation. Equation ( 13) represents the parameters such as data preservation, hiding ratio, and modification degree [25].…”
Section: Last Objective Functionmentioning
confidence: 99%
“…Hyunsang Choi [5] in the paper, IN this paper they are using black box which detect the XSS in both the way static and dynamic also in this paper we can login to give a proper input in URLs does not need to crawl or fuzz URLs. Phantoms, a headless browser to execute a JavaScript and detect XSS vulnerabilities…”
Section: Literature Reviewmentioning
confidence: 99%
“…This review paper is based on XSS attacker, XSS attacker sent the malicious link in the web application, and with the help of that malicious link, all the personal data of the victim's come to the attacker web site. This XSS attacker can steal the data from the abuse of the browser, and also stealing the data from cookie's data (which can be used to supplant the client's session) and many other actions [4][5][6].…”
Section: Introductionmentioning
confidence: 99%