Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology

نویسندگان

چکیده

Blockchain technology is critical in cyber security. The most recent cryptographic strategies may be hacked as efforts are made to build massive electronic circuits. Because of the ethical and legal implications a patient’s medical data, security challenging problem healthcare. image secrecy highly vulnerable various types attacks. As result, designing model for healthcare applications necessitates extra caution terms data protection. To resolve this issue, paper proposes Lionized Golden Eagle based Homomorphic Elapid Security (LGE-HES) algorithm cybersecurity blockchain networks. preserves by performing hash function. execution research carried out MATLAB software. suggested framework was tested utilizing Computed Tumor (CT) pictures MRI datasets, simulation results revealed proposed model’s profound implications. During simulation, 94.9% malicious communications were recognized identified effectively, according total outcomes statistics. performance also compared that standard approaches Root Mean Square Error (RMSE), Peak Signal Noise Ratio (PSNR), (MSE), time complexity, other factors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum-secured blockchain

E.O. Kiktenko, 2 N.O. Pozhar, M.N. Anufriev, A.S. Trushechkin, 2 R.R. Yunusov, Y.V. Kurochkin, A.I. Lvovsky, 3 and A.K. Fedorov 4 Russian Quantum Center, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Institute for Quantum Science and Technology, University of Calgary, Calgary AB T2N 1N4, Canada LPTMS, CNRS, Univ. Paris-Sud, ...

متن کامل

Proposal for Chapter 3 Blockchain Technology Use Cases in Healthcare

Blockchain technology alleviates the reliance on a centralized authority to certify information integrity and ownership, as well as mediate transactions and exchange of digital assets, while enabling secure and pseudo-anonymous transactions along with agreements directly between interacting parties. It possesses key properties, such as immutability, decentralization, and transparency, that pote...

متن کامل

Reimagining KYC Using Blockchain Technology

The Know Your Customer (KYC) process is an integral part of client onboarding and requires banks to validate and verify primary documents. The market today, though, is flooded with KYC utilities that help manage these documents and share them with multiple entities, but they provide little value addition. Blockchain technology, with its concept of distributed, time-stamped ledgers, can effectiv...

متن کامل

A Security Analysis of Cyber-Physical Systems Architecture for Healthcare

This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible ...

متن کامل

Cyber Security for Remote Patient Monitoring System

The Internet of Things is an emerging topic of technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way we work, live, and play. Projections for the impact of IoT on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2023

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2023.028850