Skip to main content

2022 | OriginalPaper | Buchkapitel

7. PalCom Middleware-Based Blockchain Challenges on Healthcare System

verfasst von : Sonali S. Dash, V. Rajasekar, Sam Goundar

Erschienen in: Convergence of Internet of Things and Blockchain Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Blockchain is an emerging technology with decentralized (Nakamoto, S., Bitcoin, A. (2008). Peer-to-peer electronic cash system. BN Publishing, La Vergne, TN, USA) and distributed technology utilized in third trusted party (TTP) for securing and solving cyberattacks. Healthcare system is a potential application having a strong impact on trustless and transparent system. The scope of PalCom middleware is to enable the GUI development and maintains the huge data values using blockchain. The PalCom directives use the commands/parameters in a limited version to access online patients. It aims to deliver a compiled working of blockchain to keep secure and safe digital relationships using private key cryptography and authentication. The challenges include fragmented patient data, medical record integrity, smart contract security, and privacy. This work includes using the Hyperledger and authentication algorithm. To solve the issues of provided data-intensive domain, i.e., healthcare system, the research shows the benefit and performance based on the cryptography algorithm and provided with the adherence to data regulations and standards.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. La Vergne, TN: BN Publishing. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. La Vergne, TN: BN Publishing.
2.
Zurück zum Zitat Malina, L., Hajny, J., Dzurenda, P., & Ricci, S. (2018, July 26–28). Lightweight ring signatures for decentralized privacy- preserving transactions. In Proceedings of the 15th international joint conference on e-business and telecommunications, Porto, Portugal (pp. 526–531). Malina, L., Hajny, J., Dzurenda, P., & Ricci, S. (2018, July 26–28). Lightweight ring signatures for decentralized privacy- preserving transactions. In Proceedings of the 15th international joint conference on e-business and telecommunications, Porto, Portugal (pp. 526–531).
3.
Zurück zum Zitat Mettler, M. (2016, September 14–17). Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany. Mettler, M. (2016, September 14–17). Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany.
4.
Zurück zum Zitat Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March 13–17). Blockchain for IoT security and privacy: The case study of a smart home. In In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA (pp. 618–623).CrossRef Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March 13–17). Blockchain for IoT security and privacy: The case study of a smart home. In In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA (pp. 618–623).CrossRef
5.
Zurück zum Zitat Zhang, J., Xue, N., & Huang, X. A. (2016). Secure system for pervasive social network-based healthcare. IEEE Access, 4, 9239–9250.CrossRef Zhang, J., Xue, N., & Huang, X. A. (2016). Secure system for pervasive social network-based healthcare. IEEE Access, 4, 9239–9250.CrossRef
6.
Zurück zum Zitat Zhu, X., & Badr, Y. (2018). Identity management systems for the internet of things: A survey towards blockchain solutions. Sensors, 18, 4215.CrossRef Zhu, X., & Badr, Y. (2018). Identity management systems for the internet of things: A survey towards blockchain solutions. Sensors, 18, 4215.CrossRef
7.
Zurück zum Zitat Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: Found healthcare intelligence on Blockchain with novel privacy risk control. Journal of Medical Systems, 40, 218.CrossRef Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: Found healthcare intelligence on Blockchain with novel privacy risk control. Journal of Medical Systems, 40, 218.CrossRef
8.
Zurück zum Zitat Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafifito, A. (2018). Blockchain and IoT integration: A systematic survey. Sensors, 18, 2575.CrossRef Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafifito, A. (2018). Blockchain and IoT integration: A systematic survey. Sensors, 18, 2575.CrossRef
9.
Zurück zum Zitat Srivastava, G., Dwivedi, A. D., & Singh, R. (2018). PHANTOM protocol as the new crypto-democracy. In K. Saeed & W. Homenda (Eds.), Computer information systems and industrial management (pp. 499–509). Cham, Switzerland: Springer International Publishing.CrossRef Srivastava, G., Dwivedi, A. D., & Singh, R. (2018). PHANTOM protocol as the new crypto-democracy. In K. Saeed & W. Homenda (Eds.), Computer information systems and industrial management (pp. 499–509). Cham, Switzerland: Springer International Publishing.CrossRef
10.
Zurück zum Zitat Srivastava, G., Dwivedi, A. D., & Singh, R. (2018, July 26–28). Crypto-democracy: A decentralized voting scheme using Blockchain technology. In Proceedings of the 15th international joint conference on e-business and telecommunications, Porto, Portugal (pp. 508–513). Srivastava, G., Dwivedi, A. D., & Singh, R. (2018, July 26–28). Crypto-democracy: A decentralized voting scheme using Blockchain technology. In Proceedings of the 15th international joint conference on e-business and telecommunications, Porto, Portugal (pp. 508–513).
11.
Zurück zum Zitat Buccafurri, F.; Fotia, L.; Lax, G. Social signature: Signing by tweeting. In Electronic government and the information systems perspective; Andrea Kő, Francesconi, E, Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 1–14. Buccafurri, F.; Fotia, L.; Lax, G. Social signature: Signing by tweeting. In Electronic government and the information systems perspective; Andrea Kő, Francesconi, E, Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 1–14.
12.
Zurück zum Zitat Buccafurri, F., Fotia, L., & Lax, G. (2015). A privacy-preserving e-participation framework allowing citizen opinion analysis. Electronic Government, an International Journal, 11, 185–206.CrossRef Buccafurri, F., Fotia, L., & Lax, G. (2015). A privacy-preserving e-participation framework allowing citizen opinion analysis. Electronic Government, an International Journal, 11, 185–206.CrossRef
13.
Zurück zum Zitat Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.CrossRef Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.CrossRef
14.
Zurück zum Zitat Qu, C., Tao, M., & Yuan, R. A. (2018). Hypergraph-based Blockchain model and application in internet of things-enabled smart homes. Sensors, 18, 2784.CrossRef Qu, C., Tao, M., & Yuan, R. A. (2018). Hypergraph-based Blockchain model and application in internet of things-enabled smart homes. Sensors, 18, 2784.CrossRef
16.
Zurück zum Zitat Kumar, T., Ramani, V., Ahmad, I., Braeken, A., Harjula, E., & Ylianttila, M. Blockchain utilization in healthcare: Key requirements and challenges. In 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom). 978–1–5386-4294-8/18/$31.00 ©2018 IEEE. Kumar, T., Ramani, V., Ahmad, I., Braeken, A., Harjula, E., & Ylianttila, M. Blockchain utilization in healthcare: Key requirements and challenges. In 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom). 978–1–5386-4294-8/18/$31.00 ©2018 IEEE.
17.
Zurück zum Zitat Irving, G., & Holden, J. (2016). How blockchain-timestamped protocols could improve the trustworthiness of medical science. F1000Research, 5. Irving, G., & Holden, J. (2016). How blockchain-timestamped protocols could improve the trustworthiness of medical science. F1000Research, 5.
18.
Zurück zum Zitat He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. P. D. A. (2007, May 6–12). Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE INFOCOM 2007—26th IEEE International Conference on Computer Communications, Anchorage, AK, USA (pp. 2045–2053).CrossRef He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. P. D. A. (2007, May 6–12). Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE INFOCOM 2007—26th IEEE International Conference on Computer Communications, Anchorage, AK, USA (pp. 2045–2053).CrossRef
19.
Zurück zum Zitat Li, N., Zhang, N., Das, S. K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7, 1501–1514.CrossRef Li, N., Zhang, N., Das, S. K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7, 1501–1514.CrossRef
20.
Zurück zum Zitat Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient- centric and fine-grained data access control in multi-owner settings. In S. Jajodia & J. Zhou (Eds.), Security and Privacy in Communication Networks (pp. 89–106). Berlin/Heidelberg, Germany: Springer Berlin Heidelberg.CrossRef Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient- centric and fine-grained data access control in multi-owner settings. In S. Jajodia & J. Zhou (Eds.), Security and Privacy in Communication Networks (pp. 89–106). Berlin/Heidelberg, Germany: Springer Berlin Heidelberg.CrossRef
21.
Zurück zum Zitat Mandl, K. D., Markwell, D., MacDonald, R., Szolovits, P., & Kohane, I. S. (2001). Public standards and patients’ control: How to keep electronic medical records accessible but private. BMJ, 322, 283–287.CrossRef Mandl, K. D., Markwell, D., MacDonald, R., Szolovits, P., & Kohane, I. S. (2001). Public standards and patients’ control: How to keep electronic medical records accessible but private. BMJ, 322, 283–287.CrossRef
22.
Zurück zum Zitat Wu, J., Dong, M., Ota, K., Li, J., & Guan, Z. (2018). Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Transactions on Network and Service Management, 15, 27–38.CrossRef Wu, J., Dong, M., Ota, K., Li, J., & Guan, Z. (2018). Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Transactions on Network and Service Management, 15, 27–38.CrossRef
23.
Zurück zum Zitat Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet of Things Journal, 4, 601–610.CrossRef Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet of Things Journal, 4, 601–610.CrossRef
24.
Zurück zum Zitat Wu, J., Ota, K., Dong, M., & Li, C. A. (2016). Hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.CrossRef Wu, J., Ota, K., Dong, M., & Li, C. A. (2016). Hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.CrossRef
25.
Zurück zum Zitat Dwivedi, A. D., Morawiecki, P., & Wójtowicz, S. (2018). Finding differential paths in ARX ciphers through nested Monte-Carlo search. International Journal of Electronics and Telecommunications, 64, 147–150. Dwivedi, A. D., Morawiecki, P., & Wójtowicz, S. (2018). Finding differential paths in ARX ciphers through nested Monte-Carlo search. International Journal of Electronics and Telecommunications, 64, 147–150.
26.
Zurück zum Zitat Dwivedi, A. D., Morawiecki, P., Singh, R., & Dhar, S. (2018). Differential-linear and related key cryptanalysis of round-reduced scream. Information Processing Letters, 136, 5–8.MathSciNetCrossRef Dwivedi, A. D., Morawiecki, P., Singh, R., & Dhar, S. (2018). Differential-linear and related key cryptanalysis of round-reduced scream. Information Processing Letters, 136, 5–8.MathSciNetCrossRef
27.
Zurück zum Zitat Dwivedi, A. D., & Srivastava, G. (2018). Differential cryptanalysis of round-reduced LEA. IEEE Access. Dwivedi, A. D., & Srivastava, G. (2018). Differential cryptanalysis of round-reduced LEA. IEEE Access.
28.
Zurück zum Zitat Dhar Dwivedi, A., Morawiecki, P., & Wójtowicz, S. (2017, July 24–26). Differential and Rotational Cryptanalysis of Round-reduced MORUS. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain (pp. 275–284).CrossRef Dhar Dwivedi, A., Morawiecki, P., & Wójtowicz, S. (2017, July 24–26). Differential and Rotational Cryptanalysis of Round-reduced MORUS. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain (pp. 275–284).CrossRef
Metadaten
Titel
PalCom Middleware-Based Blockchain Challenges on Healthcare System
verfasst von
Sonali S. Dash
V. Rajasekar
Sam Goundar
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-76216-2_7

Neuer Inhalt