Maintaining Security of Patient Data by Employing Private Blockchain and Fog Computing Technologies based on Internet of Medical Things
Abstract
Full Text:
PDFReferences
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "PAX: Using pseudonymization and anonymization to protect patients' identities
and data in the healthcare system," International Journal of Environmental Research and Public Health, vol. 16, no. 9,
p. 1490, 2019. [Online]. Available: https: //doi.org/10.3390/ijerph16091490.
S. A. Yousiff, R. A. Muhajjar, and M. H. Al-Zubaidie, "Designing a Blockchain approach to secure firefighting stations based Internet
of Things," Informatica, vol. 47, no. 10, pp. 09-26, 2023. [Online]. Available: https://doi.org/10.31449/inf.v47i10.5395.
M. A. Rahman, M. S. Hossain, M. S. Islam, N. A. Alrajeh, and G. Muhammad, "Secure and provenance enhanced Internet of health
Things framework: A Blockchain managed federated learning approach," IEEE Access, vol. 8, pp. 205 071-205 087, 2020. [Online]. Available: https://doi.org/10.1109/ACCESS.2020.3037474.
M. Al-Hawawreh and M. S. Hossain, "A privacy-aware framework for detecting cyber attacks on Internet of medical Things systems
using data fusion and quantum deep learning," Information Fusion, vol. 99, p. 101889, 2023. [Online]. Available: https://doi.org/10.1016/j.inffus.2023.101889.
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs," Applied Sciences, vol. 10, no. 6, p. 2007, 2020. [Online]. Available: https://doi.org/10.3390/app10062007.
M. Al-Zubaidie, "Implication of lightweight and robust hash function to support key exchange in health sensor networks," Symmetry, vol. 15, no. 1, p. 152, 2023. [Online]. Available: https://doi.org/10.3390/sym15010152.
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "Efficient and secure ECDSA algorithm and its applications: A survey," International Journal of Communication Networks and Information Security (IJCNIS), vol. 11, pp. 7-35, 2019. [Online]. Available: https://doi.org/10.17762/ijcnis.v11i1.3827.
M. Al-Zubaidie, Z. Zhang, and J. Zhang,"RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare
applications," Security and Communication Networks, vol. 2019, 2019. [Online]. Available: https://doi.org/10.1155/2019/3263902.
F. A. Alzahrani, M. Ahmad, and M. T. J. Ansari, "Towards design and development of security assessment framework for Internet of medical Things," Applied Sciences, vol. 12, no. 16, p. 8148, 2022. [Online]. Available: https://doi.org/10.3390/app12168148.
M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Raq, and W. A. M. Abdullah, "Towards SDN-enabled, intelligent intrusion detection system for Internet of Things (IoT)," IEEE Access, vol. 10,
pp. 22 756-22 768, 2022. [Online]. Available: https://doi.org/10.1109/ACCESS.2022.3153716.
B. Dammak, M. Turki, S. Cheikhrouhou, M. Baklouti, R. Mars, and A. Dhahbi, "LoRaChainCare: An IoT architecture integrating
Blockchain and LORA network for personal health care data monitoring," Sensors, vol. 22, no. 4, p. 1497, 2022. [Online]. Available: https://doi.org/10.3390/s22041497.
P. Bagga, A. K. Das, V. Chamola, and M. Guizani, "Blockchain-envisioned access control for Internet of Things applications: A comprehensive survey and future directions," Telecommunication Sys-
tems, vol. 81, no. 1, pp. 125-173, 2022. [Online]. Available: https://doi.org/10.1007/s11235-022-00938-7.
S. U. A. Laghari, S. Manickam, A. K. Al-Ani, M. A. Al-Shareeda, and S. Karuppayah, "ES-SECS/GEM: An efficient security
mechanism for SECS/GEM communications," IEEE Access, vol. 11, pp. 31 813-31 828, 2023. [Online]. Available: https://doi.org/10.1109/ACCESS.2023.3262310.
T. M. Ghazal, M. K. Hasan, S. N. H. Abdallah, and K. A. Abubakkar, "Secure IoMT pattern recognition and exploitation for multimedia information processing using private blockchain and fuzzy logic," Transactions on Asian and Low-Resource Language Information Processing, 2022. [Online]. Available: http://dx.doi.org/10.1145/3523283.
A. Lakhan, M. A. Mohammed, K. H. Abdulkareem, M. khanapi Abd Ghani, H. A. Marhoon, J. Nedoma, R. Martinek, and B. Garcia-Zapirain, "Secure blockchain assisted Internet of medical Things architecture for data fusion enabled cancer workflow," Internet of Things, vol. 24, p. 100928, 2023. [Online]. Available: https://doi.org/10.1016/j.iot.2023.100928.
A. Ali, B. A. S. Al-Rimy, F. S. Alsubaei, A. A. Almazroi, and A. A. Almazroi, "Healthlock: Blockchain-based privacy preservation using homomorphic encryption in Internet of Things healthcare applications," Sensors, vol. 23, no. 15, p. 6762, 2023. [Online]. Available: https://doi.org/10.3390/s23156762.
A. Raj and S. Prakash, "Privacy preservation of the Internet of medical Things using Blockchain," Health Services and Outcomes Research Methodology, pp. 1-28, 2023. [Online]. Available: https://doi.org/10.1007/s10742-023-00306-1.
A. Djeddai and R. Khemaissia, "Privykg: Security and privacy preservation of knowledge graphs using blockchain technology,"
Informatica, vol. 47, no. 5, 2023. [Online]. Available: https://doi.org/10.31449/inf.v47i5.4698.
S. Ahamad, P. Gupta, P. B. Acharjee, K. P. Kiran, Z. Khan, and M. F. Hasan, "The role of block chain technology and Internet of Things (IoT) to protect financial transactions in crypto currency market," Materials Today: Proceedings, vol. 56, pp. 2070-2074, 2022. [Online]. Available: https://doi.org/10.1016/j.matpr.2021.11.405.
B. Gbadamosi, R. O. Ogundokun, E. A. Adeniyi, S. Misra, and N. F. Stephens, Medical data analysis for IoT-based datasets in the cloud using Naïve Bayes classifier for prediction of heart disease," in New frontiers in cloud computing and Internet of Things. Springer, 2022, pp. 365-386, ISBN: 978-3-031-05527-0.
G. S. Shyaa and M. Al-Zubaidie, "Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography," Applied Sciences, vol. 13, no. 12, p. 7085, 2023. [Online]. Available: https://doi.org/10.3390/app13127085.
W. Haryono, "Comparison encryption of how to work caesar cipher, hill cipher, Blowfish and Twofish," Data Science: Journal of Computing and Applied Informatics, vol. 4, no. 2, pp. 100-110, 2020. [Online]. Available: https://doi.org/10.32734/jocai.v4.i2-4004.
A. Khare, G. M. Kakandikar, and O. K. Kulkarni, "An insight review on Jellyfish optimization algorithm and its application in engineering," Journal homepage: http://iieta. org/journals/rces, vol. 9, no. 1, pp. 31-40, 2022. [Online]. Available: https://doi.org/10.18280/rces.090103.
F. E. Botchey, Z. Qin, and K. Hughes-Lartey, "Mobile money fraud prediction--a cross-case analysis on the efficiency of support
vector machines, gradient boosted decision trees, and Naïve Bayes algorithms," Information, vol. 11, no. 8, p. 383, 2020. [Online]. Available: https://doi.org/10. 3390/info11080383.
M. Al-Zubaidie and G. S. Shyaa, "Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps," Future Internet, vol. 15, no. 8, p. 262, 2023. [Online]. Available: https://doi.org/10.3390/fi15080262.
R. Matzutt, B. Kalde, J. Pennekamp, A. Drichel, M. Henze, and K. Wehrle, "Coinprune: Shrinking bitcoin's Blockchain retrospectively," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, 2021. [Online]. Available: https://doi.org/10.1109/TNSM.2021.3073270.
DOI: https://doi.org/10.31449/inf.v48i12.6047
This work is licensed under a Creative Commons Attribution 3.0 License.