2023
DOI: 10.3390/app13063970
|View full text |Cite
|
Sign up to set email alerts
|

Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System

Abstract: Healthcare comprises the largest revenue and data boom markets. Sharing knowledge about healthcare is crucial for research that can help healthcare providers and patients. Several cloud-based applications have been suggested for data sharing in healthcare. However, the trustworthiness of third-party cloud providers remains unclear. The third-party dependency problem was resolved using blockchain technology. The primary objective of this growth was to replace the distributed system with a centralized one. There… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Blockchain-based access control mechanisms have been implemented to secure the access shared resources. The public key infrastructure is widely used for authentication where a user public key can be leveraged to authorize the access if this public key is specified in the authorized policy list [23]. To secure access to healthcare data in emergency situations, the smart contracts are leveraged to implement the Role-Based Access Control (RBAC) model [24].…”
Section: A Access Control Mechanismsmentioning
confidence: 99%
“…Blockchain-based access control mechanisms have been implemented to secure the access shared resources. The public key infrastructure is widely used for authentication where a user public key can be leveraged to authorize the access if this public key is specified in the authorized policy list [23]. To secure access to healthcare data in emergency situations, the smart contracts are leveraged to implement the Role-Based Access Control (RBAC) model [24].…”
Section: A Access Control Mechanismsmentioning
confidence: 99%
“…1) Field of application. It encompasses various typical application fields, including Business/Finance Management, Energy, Governance, Healthcare, Industrial Management, Smart Cities/Smart Homes, Transport, and others [17], [26], [50]- [52] (see Figure 7). 2) Scenario.…”
Section: ) Extraction Criteriamentioning
confidence: 99%
“…This criterion outlines different FN configurations, encompassing base stations, cloudlets, gateways, micro data centers, MEC nodes, routers, servers, switches, virtual machines, virtual switches, vehicles, and other customized designs. Each node type corresponds to specific functionalities and roles within the FC architecture, contributing to the ecosystem's overall efficiency and performance [8], [17], [50], [54]. 3) Node Tasks.…”
Section: ) Use Case It Outlines Specific Instances or Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…With the development of virtual communication, users can safely communicate and share information with other systems worldwide [1]. Cryptography is a key topic for secure data transfer.…”
Section: Introductionmentioning
confidence: 99%