期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
1
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol
2
作者 Akram A.Almohammedi Vladimir Shepelev +2 位作者 Sam Darshi Mohammed Balfaqih Fayad Ghawbar 《Computers, Materials & Continua》 SCIE EI 2022年第8期3929-3943,共15页
The widespread use of the Internet of Things(IoT)applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel.As a result,the security of... The widespread use of the Internet of Things(IoT)applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel.As a result,the security of the IoT has become a serious challenge in the field of information security.Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication.The primary purpose of steganography is to conceal sensitive information in any form of media such as audio,video,text,or photos,and securely transfer it through wireless networks.In this paper,we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks(HCCNETs)for hiding sensitive data.This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks(WLANs),specifically in the IEEE 802.11ah IoT protocol.The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel.Additionally,the model considers packet arrival rate,back-off timer freezing,back-off stages,and short retry limit to ensure compliance with IEEE 802.11ah requirements.It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system.These parameters often result in a high precise channel access estimation,a more accurate and efficient accuracy measurements system,efficient channel utilisation,avoidance of throughput saturation overestimation,and ensuring that no packet is served endlessly.Evaluated results demonstrate that HCCNETs is an effective approach at low cost. 展开更多
关键词 IOT HCCNETs STEGANOGRAPHY markov chain model
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部