Enhanced Security Framework for E-Health Systems using Blockchain


Mohan Kubendiran, Satyapal Singh, Arun Kumar Sangaiah, Journal of Information Processing Systems Vol. 15, No. 2, pp. 239-250, Apr. 2019  

10.3745/JIPS.04.0106
Keywords: Blockchain, Cloud Computing, Data Integrity, Data Provenance, E-Health System
Fulltext:

Abstract

An individual’s health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Kubendiran, M., Singh, S., & Sangaiah, A. (2019). Enhanced Security Framework for E-Health Systems using Blockchain. Journal of Information Processing Systems, 15(2), 239-250. DOI: 10.3745/JIPS.04.0106.

[IEEE Style]
M. Kubendiran, S. Singh, A. K. Sangaiah, "Enhanced Security Framework for E-Health Systems using Blockchain," Journal of Information Processing Systems, vol. 15, no. 2, pp. 239-250, 2019. DOI: 10.3745/JIPS.04.0106.

[ACM Style]
Mohan Kubendiran, Satyapal Singh, and Arun Kumar Sangaiah. 2019. Enhanced Security Framework for E-Health Systems using Blockchain. Journal of Information Processing Systems, 15, 2, (2019), 239-250. DOI: 10.3745/JIPS.04.0106.