2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) 2022
DOI: 10.1109/icaccs54159.2022.9785125
|View full text |Cite
|
Sign up to set email alerts
|

Securing Medical Big data through Blockchain technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(4 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Devi et al [22] proposed a technique for applying blockchain to the big data generated in the healthcare industry. The data can be classified into structured data, such as patient information, diagnosis results, and prescription details, which are stored on the blockchain, and unstructured data, such as medical images, and voice files, which are stored on IPFS.…”
Section: Related Workmentioning
confidence: 99%
“…Devi et al [22] proposed a technique for applying blockchain to the big data generated in the healthcare industry. The data can be classified into structured data, such as patient information, diagnosis results, and prescription details, which are stored on the blockchain, and unstructured data, such as medical images, and voice files, which are stored on IPFS.…”
Section: Related Workmentioning
confidence: 99%
“…As the volume and complexity of data continue to grow, DM has become increasingly important. The ability to extract useful insights from data has become a critical component of business success in the 21st century [13]. With advances in technology, DM has evolved, and new algorithms and techniques are continually being developed to improve its effectiveness.…”
Section: Data Mining Technology Modelmentioning
confidence: 99%
“…Healthcare organizations must invest in up-to-date digital security measures to protect data and systems from malicious attackers, and must have comprehensive incident response processes in place in the event of a security incident [1]. Security measures should include network segmentation, encryption, and authentication, as well as the use of cutting-edge data analytics and monitoring tools to detect suspicious behavior [2].…”
Section: Introductionmentioning
confidence: 99%