4.6 Article

Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems

Journal

SENSORS
Volume 22, Issue 4, Pages -

Publisher

MDPI
DOI: 10.3390/s22041371

Keywords

blockchain; Information Hiding Techniques; medical supply chain; privacy; security

Funding

  1. Defense Acquisition Program Administration and Agency for Defense Development [UD210029TD]
  2. National Research Foundation of Korea (NRF)
  3. Korea government [NRF-2019R1A2B5B0107041613]

Ask authors/readers for more resources

This paper proposes the use of information hiding techniques with blockchain and smart contract to enhance the security and privacy of data communication in healthcare supply chain networks. The feasibility of the framework with the desired security level is demonstrated using Hyperledger smart contract.
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain. In recent years, multiple cyber-attacks have targeted medical supply chain communication networks due to their lack of security measures. In the era where cyber-attacks are cheaper and easier due to the computational power and various algorithms available for malicious uses, security, and data privacy requires intensive and higher measures. On the other hand, Information Hiding Techniques (IHT) compromise various advanced methods to hide sensitive information from being disclosed to malicious nodes. Moreover, with the support of Blockchain, IHT can bring higher security and the required privacy levels. In this paper, we propose the implementation of Blockchain and smart contract with the information hiding technique to enhance the security and privacy of data communication in critical systems, such as smart healthcare supply chain communication networks. Results show the feasibility of the framework using Hyperledger smart contract along with the desired security level.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available