B. Shickel, P. J. Tighe, A. Bihorac and P. Rashidi, "Deep EHR: A Survey of Recent Advances in Deep Learning Techniques for Electronic Health Record (EHR) Analysis," in IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 5, pp. 1589-1604, Sept. 2018.
Dharavath Ramesh;Rahul Mishra;Pradeep K. Atrey;Damodar Reddy Edla;Sanjay Misra;Lianyong Qi.Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage[J].Alexandria Engineering Journal,2023,Vol.68: 205–226.
S. Alshehri, S. P. Radziszowski and R. K. Raj, "Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption," 2012 IEEE 28th International Conference on Data Engineering Workshops, 2012, pp. 143-146.
Y. Yang and M. Ma, “Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds,” in IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 746–759, April 2016.
Huang C, Lu R X, Zhu H, Shao J, Lin X D. FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system. In: Proceedings of ASIA CCS′16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. 95 – 106.
M. B. Mollah, K. R. Islam and S. S. Islam, “Next generation of computing through cloud computing technology,” 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012, pp. 1–6.
Mishra, Rahul;Ramesh, Dharavath;Edla, Damodar Reddy;Qi, Lianyong.DS-Chain: A secure and auditable multi-cloud assisted EHR storage model on efficient deletable blockchain[J].Journal of Industrial Information Integration,2022,Vol.26: 100315.
Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System [Online], available: https://bitcoin.org/bitcoin.pdf, January 1, 2009.
Yuan Yong, Wang Fei-Yue. Editable blockchain: Models, techniques and methods. Acta Automatica Sinica, 2020, 46(5): 831–846.
Han Xuan, Yuan Yong, Wang Fei-Yue. Security problems on blockchain: The state of the art and future trends. Acta Auto matica Sinica, 2019, 45(1): 206–225.
Esposito C, Santis A D, Tortora G, Chang H, Choo K R. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing, 2018, 5(1): 31–37.
Haddad, Alaa;Habaebi, Mohamed Hadi;Suliman, Fakher Eldin M.;Elsheikh, Elfatih A. A.;Islam, Md Rafiqul;Zabidi, Suriza Ahmad.Generic Patient-Centered Blockchain-Based EHR Management System[J].Applied Sciences (Switzerland),2023,Vol.13(3): 1761.
Akarca D, Xiu P Y, Ebbitt D, Mustafa B, Al-Ramadhani H, Al-beyatti A. Blockchain secured electronic health records: Patient rights, privacy and cybersecurity. In: Proceedings of the 10th International Conference on Dependable Systems, Services and Technologies (DESSERT), Leeds, United Kingdom, 2019. 108 – 111.
A. Azaria, A. Ekblaw, T. Vieira and A. Lippman, "MedRec: Using Blockchain for Medical Data Access and Permission Management," 2016 2nd International Conference on Open and Big Data (OBD), 2016, pp. 25-30.
Wood G. Ethereum: a secure decentralised generalised transaction ledger [EB/OL] (2018) 2018-08-19. https://gavwood.com/paper.pdf.
Xia Q, Sifah E B, Asamoah K O, Gao J B, Du X J, Guizani M. Medshare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access, 2017, 5: 14757−14767.
Shrier A A, Chang A, Diakun-thibault N, et al. Blockchain and health IT: algorithms, privacy, and data [EB/OL] (2018) [2018-08- 19] https://www.truevaluemetrics.org/DBpdfs/Technology/Blockchain/1-78-blockchainandhealthitalgorithmsprivacydatawhitepaper.pdf.
Fan K, Wang S, Ren Y, et al. Medblock: Efficient and secure medical data sharing via blockchain[J]. Journal of medical systems, 2018, 42: 1–11.
Usman M, Qamar U. Secure electronic medical records storage and sharing using blockchain technology[J]. Procedia Computer Science, 2020, 174: 321–327.
Zhang Chao, Li Qiang, Chen Zi-Hao, Li Zu-Rui, Zhang Zhen. Medical chain: alliance medical blockchain system. Acta Auto matica Sinica, 2019, 45(8): 1495–1510.
Liu Ge-Chang, Li Qiang. Blockchain data privacy protection mechanism based on searchable encryption. Journal of Computer Applications, 2019, 39(S2): 140–146.
ZHANG A, LIN X. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J]. Journal of Medical Systems, 2018,42(8): No.140.
Kuo T T, Ohno-Machado L. Modelchain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks[J]. arXiv preprint arXiv:1802.01746, 2018.
Shevkar S, Patel P, Majumder S, et al. EMRs with blockchain: a distributed democratised electronic medical record sharing platform[J]. arXiv preprint arXiv:2012.05141, 2020.
Omar A, Rahman M S, Basu A, et al. Medibchain: A blockchain based privacy preserving platform for healthcare data[C]//International conference on security, privacy and anonymity in computation, communication and storage. Springer, Cham, 2017: 534–543.
Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System[J/OL]. Decentralized Business https://bitcoin.org/bitcoin.pdf
K. Zheng, Y. Liu, C. Dai, Y. Duan and X. Huang, “Model Checking PBFT Consensus Mechanism in Healthcare Blockchain Network,” 2018 9th International Conference on Information Technology in Medicine and Education (ITME), 2018, pp. 877–881.
U. Bodkhe et al., "Blockchain for Industry4.0: A Comprehensive Review," in IEEE Access, vol. 8, pp.79764-79800, 2020.
Ferdous M S, Chowdhury M J M, Hoque M A. A survey of consensus algorithms in public blockchain systems for crypto-currencies[J]. Journal of Network and Computer Applications, 2021, 182: 103035.
B. Cao, X. Wang, W. Zhang, H. Song and Z. Lv, “A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain,” in IEEE Network, vol. 34, no. 5, pp. 78–83, September/October 2020.
P. Zheng, Q. Xu, Z. Zheng, Z. Zhou, Y. Yan and H. Zhang, “Meepo: Sharded Consortium Blockchain,” 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021, pp. 1847–1852.
Thomas K C, Fran C, Patsakis C. Blockchain meets smart health: Towards next generation healthcare service. In: Proceedings of the 9th International Conference on Information, Intelligence, Systems and Applications(IISA), Zakynthos, Greece. 2018. 1 − 8
Wu, Guangfu, et al. "A comprehensive survey of smart contract security: State of the art and research directions." Journal of Network and Computer Applications (2024): 103882.
John F, Gopinath S, Sherly E. A decentralized framework for efficient storage and processing of big data using HDFS and IPFS[J]. International Journal of Humanitarian Technology, 2020, 1(2):131.
Benet J. IPFS - Content Addressed, Versioned, P2P File System[J]. Eprint Arxiv, 2014:1–11.
Y. Psaras and D. Dias, "The InterPlanetary File System and the Filecoin Network," 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks Supplemental Volume (DSN-S), 2020, pp. 80-80.
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C]//International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1998: 127–144
Erukala Suresh Babu ;B. V. Ram Naresh Yadav;A. Kousar Nikhath;Soumya Ranjan Nayak & Waleed Alnumay.MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns[J].Cluster Computing,2023,Vol.26(4): 2217–2244.
J. Shao, G. Wei, Y. Ling and M. Xie, “Identity-Based Conditional Proxy Re-Encryption,” 2011 IEEE International Conference on Communications (ICC), 2011, pp. 1–5.
Xiong H, Wang Y, Li W, et al. Flexible, efficient, and secure access delegation in cloud computing[J]. ACM Transactions on Management Information Systems (TMIS), 2019, 10(1): 1–20.
Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption[C]//Proceedings of the 14th ACM conference on Computer and communications security. 2007: 185–194.
Liang K, Chu C K, Tan X, et al. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts[J]. Theoretical Computer Science, 2014, 539: 87–105.
Comments (0)