4.6 Article

A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Dynamic Computation Offloading and Server Deployment for UAV-Enabled Multi-Access Edge Computing

Zhaolong Ning et al.

Summary: In this paper, a MEC network enabled by UAVs is investigated, considering multi-user computation offloading and edge server deployment to minimize system-wide computation cost under a dynamic environment. The problem is decomposed into two stochastic games and it is proven that each game has at least one Nash Equilibrium. Two learning algorithms are proposed to reach the Nash Equilibriums. These algorithms are further incorporated into an asynchronous updating algorithm to solve the system-wide computation cost minimization problem. Performance evaluations based on real-world data are conducted, showing the proposed algorithms can achieve efficient computation offloading and server deployment under dynamic environments.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Multidisciplinary

EPPDA: An Efficient Privacy-Preserving Data Aggregation Federated Learning Scheme

Jingcheng Song et al.

Summary: Federated learning is a privacy-aware machine learning method that trains models on users' devices and aggregates the updates on a server. However, it is vulnerable to reverse attacks, where adversaries can analyze user-uploaded models to obtain users' data. This paper proposes an efficient privacy-preserving data aggregation mechanism, based on secret sharing, to resist reverse attacks and securely aggregate users' trained models. The mechanism also has efficient fault tolerance and protects users' privacy without compromising efficiency.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Telecommunications

Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

Guangquan Xu et al.

Summary: This paper proposes a new covert browser-based mining attack model and evaluates it in a simulation environment. Additionally, a detection system based on mining process features is built and real network mining activity is tested.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Information Systems

Layer-Based Communication-Efficient Federated Learning with Privacy Preservation

Zhuotao Lian et al.

Summary: This paper proposes a layer-based federated learning system with privacy preservation to address the challenges of communication cost and privacy protection in federated learning. The system achieved better performance in model accuracy and training time compared to existing methods, as evaluated on three datasets in a non independently and identically distributed scenario.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2022)

Article Computer Science, Information Systems

Blockchain for Edge of Things: Applications, Opportunities, and Challenges

Thippa Reddy Gadekallu et al.

Summary: This article reviews the latest developments in BEoT technology and explores its opportunities in various application domains. The survey starts with an introduction to blockchain and EoT, followed by discussions on the application of BEoT in industries such as smart transportation, smart city, smart healthcare, smart home, and smart grid. It also analyzes the security challenges and key services in the BEoT paradigm.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Theory & Methods

SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles

Guangquan Xu et al.

Summary: In this paper, we propose SG-PBFT, a secure and efficient distributed consensus algorithm for blockchain applications in the Internet of Vehicles (IoV). The algorithm addresses the security issues of centralized authentication and single-node attacks by reducing the pressure on the central server and optimizing the consensus process. Experimental results show significant improvements in consensus efficiency and prevention of single-node attacks compared to the state-of-the-art PBFT consensus algorithm.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)

Article Computer Science, Information Systems

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

Weizheng Wang et al.

Summary: This article introduces a lightweight and reliable authentication protocol for WMSN, based on blockchain technology and physically unclonable functions (PUFs). A fuzzy extractor scheme is used to handle biometric information, and two security evaluation methods are employed to prove the high reliability of the proposed scheme. Performance evaluation experiments demonstrate that the proposed mutual authentication protocol has the least computation and communication cost among the compared schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices

Weizheng Wang et al.

Summary: The Industrial Internet of Things (IIoT) has significantly transformed personal lifestyles and society operations, sparking interest in areas such as intelligent logistics, smart grids, and smart cities. To address security concerns in IIoT, researchers have proposed a novel certificateless signature scheme using blockchain technology and smart contracts, demonstrating its advantages in security and efficiency.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Engineering, Multidisciplinary

DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems

Zhuotao Lian et al.

Summary: The rapid development of IoT has led to innovations in health-related devices, but potential patient data leaks raise privacy and security concerns. To address these issues, we propose DEEP-FEL, a decentralized, efficient, and privacy-enhanced federated edge learning system that enables collaborative training of global models without exchanging raw data among medical institutions.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

A blockchain-based medical data preservation scheme for telecare medical information systems

Tian-Fu Lee et al.

Summary: With the advancement of mobile computing and wireless transmission technologies, sharing medical records on social networks has become feasible. To ensure data security, a blockchain-based medical data preservation scheme is proposed in this study, which utilizes medical sensor area authentication and social network information transfer protocols to achieve secure data transfer and storage.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Engineering, Multidisciplinary

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks

Yang Xu et al.

Summary: The emergence of beyond 5G mobile networks has enriched our lives with a variety of services, but also raised security concerns such as malware stealing private information. This paper proposes an approach to detect malicious domain names using deep neural networks, which has been experimentally proven to be effective and superior compared to traditional algorithms.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Engineering, Electrical & Electronic

FPDP: Flexible Privacy-Preserving Data Publishing Scheme for Smart Agriculture

Jingcheng Song et al.

Summary: The development of IoT and 5G is driving smart agriculture forward, but it also raises concerns about security and privacy. This article proposes a privacy-preserving data aggregation scheme using the ElGamal Cryptosystem to address these issues.

IEEE SENSORS JOURNAL (2021)

Article Automation & Control Systems

Lightweight Searchable Encryption Protocol for Industrial Internet of Things

Ke Zhang et al.

Summary: The article presents a lightweight searchable attribute-based encryption scheme (LSABE) suitable for resource-constrained IoT devices, which can reduce computing costs and support multi-keyword searching. Additionally, it is extended to multi-authority scenarios to efficiently handle the generation and management of public/secret keys.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system

Renpeng Zou et al.

Summary: The sharing of electronic medical records (EMRs) has great positive significance for research on disease and epidemic prevention. Blockchain-based eHealth systems face challenges, with designs based on permissioned and public blockchains. However, data retrieval efficiency is low.

INFORMATION PROCESSING & MANAGEMENT (2021)

Article Computer Science, Information Systems

A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services

Yang Xu et al.

Summary: This article proposes a blockchain-based deduplicatable data auditing mechanism, which designs a client-side data deduplication scheme using bilinear-pair techniques to solve the problems of high cost and reliance on trusted third parties in traditional approaches. By utilizing both blockchain technique and bilinear pairing cryptosystem, a trustworthy and efficient data auditing mechanism is achieved to ensure data integrity.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Engineering, Multidisciplinary

Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services

Yang Xu et al.

Summary: The emergence of 5G technology has improved the efficiency and openness of vertical industries, especially in content-sharing services. Blockchain technology provides a solution to ensure accountability and prevent information leakage in these industries, overcoming limitations of existing schemes.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

Yinbin Miao et al.

Summary: This paper introduces a secure Multi-authority CP-ABKS (MABKS) system to address limitations in existing CP-ABKS schemes and minimize the computation and storage burden on resource-limited devices in cloud systems. The MABKS system is selectively secure in both selective-matrix and selective-attribute models, demonstrating efficiency and utility in practical applications.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Privacy Preserving Searchable Encryption with Fine-Grained Access Control

Payal Chaudhari et al.

Summary: Searchable encryption allows cloud servers to search encrypted data without decryption. Single keyword-based encryption enables users to access subsets of documents containing specific keywords. The scheme presented in this paper uses attribute-based encryption to grant access to selective data subsets while maintaining user privacy.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things

K. Sowjanya et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

Security and privacy of UAV data using blockchain technology

Rupa Ch et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service

Yang Xu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Chemistry, Multidisciplinary

MedChain: Efficient Healthcare Data Sharing via Blockchain

Bingqing Shen et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Information Systems

Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

Jianghong Wei et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

AKSER: Attribute-based keyword search with efficient revocation in cloud computing

Jie Cui et al.

INFORMATION SCIENCES (2018)

Article Engineering, Electrical & Electronic

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities

Zhitao Guan et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Attribute-Based Encryption with Expressive and Authorized Keyword Search

Hui Cui et al.

INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I (2017)

Proceedings Paper Computer Science, Information Systems

An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends

Zibin Zheng et al.

2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017) (2017)

Article Computer Science, Information Systems

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing

Xingliang Yuan et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2016)

Article Health Care Sciences & Services

Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control

Xiao Yue et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Information Systems

Healthcare-Related Data in the Cloud: Challenges and Opportunities

Valentina Casola et al.

IEEE CLOUD COMPUTING (2016)

Proceedings Paper Computer Science, Information Systems

Server-Aided Revocable Attribute-Based Encryption

Hui Cui et al.

COMPUTER SECURITY - ESORICS 2016, PT II (2016)

Article Computer Science, Theory & Methods

Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage

Kaitai Liang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

A general transformation from KP-ABE to searchable encryption

Fei Han et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Information Systems

A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds

Assad Abbas et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2014)

Article Computer Science, Hardware & Architecture

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage

Dongyoung Koo et al.

COMPUTERS & ELECTRICAL ENGINEERING (2013)

Article Computer Science, Theory & Methods

CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

Huang Lin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Health Care Sciences & Services

A Secure EHR System Based on Hybrid Clouds

Yu-Yi Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Computer Science, Information Systems

Aspects of privacy for electronic health records

Sebastian Haas et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)