Submit Search
Upload
IRJET- Transaction of Healthcare Records using Blockchain
•
0 likes
•
25 views
IRJET Journal
Follow
https://blog.irjet.net/archives/V6/i4/IRJET-V6I406.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid Services
Martin Szomszor
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
cscpconf
IRJET- A Secure Healthcare System using Blockchain Technology
IRJET- A Secure Healthcare System using Blockchain Technology
IRJET Journal
Survey on An effective database tampering system with veriable computation a...
Survey on An effective database tampering system with veriable computation a...
IRJET Journal
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
idescitation
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
14894
Blockchain for healthcare 2018
Blockchain for healthcare 2018
Ashwin P
User friendly pattern search paradigm
User friendly pattern search paradigm
Migrant Systems
Recommended
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid Services
Martin Szomszor
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
cscpconf
IRJET- A Secure Healthcare System using Blockchain Technology
IRJET- A Secure Healthcare System using Blockchain Technology
IRJET Journal
Survey on An effective database tampering system with veriable computation a...
Survey on An effective database tampering system with veriable computation a...
IRJET Journal
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
idescitation
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
14894
Blockchain for healthcare 2018
Blockchain for healthcare 2018
Ashwin P
User friendly pattern search paradigm
User friendly pattern search paradigm
Migrant Systems
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
Painting the Future of Big Data with Apache Spark and MongoDB
Painting the Future of Big Data with Apache Spark and MongoDB
MongoDB
Cda accesscontrol-final2 (1)
Cda accesscontrol-final2 (1)
eyetech
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
Kato Mivule
Incentive Compatible Privacy Preserving Data Analysis
Incentive Compatible Privacy Preserving Data Analysis
rupasri mupparthi
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Kato Mivule
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Kato Mivule
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
IJCNCJournal
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
IJCSIS Research Publications
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
acijjournal
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
Kato Mivule
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
Editor IJCATR
Association rule visualization technique
Association rule visualization technique
mustafasmart
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
Kato Mivule
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Narendra Dhadhal
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
Kato Mivule
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
IEEEFINALYEARSTUDENTPROJECTS
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
rahulmonikasharma
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IJTRET-International Journal of Trendy Research in Engineering and Technology
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
IRJET Journal
More Related Content
What's hot
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
Painting the Future of Big Data with Apache Spark and MongoDB
Painting the Future of Big Data with Apache Spark and MongoDB
MongoDB
Cda accesscontrol-final2 (1)
Cda accesscontrol-final2 (1)
eyetech
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
Kato Mivule
Incentive Compatible Privacy Preserving Data Analysis
Incentive Compatible Privacy Preserving Data Analysis
rupasri mupparthi
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Kato Mivule
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Kato Mivule
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
IJCNCJournal
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
IJCSIS Research Publications
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
acijjournal
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
Kato Mivule
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
Editor IJCATR
Association rule visualization technique
Association rule visualization technique
mustafasmart
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
Kato Mivule
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Narendra Dhadhal
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
Kato Mivule
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
IEEEFINALYEARSTUDENTPROJECTS
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
rahulmonikasharma
What's hot
(20)
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
Painting the Future of Big Data with Apache Spark and MongoDB
Painting the Future of Big Data with Apache Spark and MongoDB
Cda accesscontrol-final2 (1)
Cda accesscontrol-final2 (1)
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
Incentive Compatible Privacy Preserving Data Analysis
Incentive Compatible Privacy Preserving Data Analysis
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
CLIENT PERFORMANCE PREDICTIONS FOR PRIVATE BLOCKCHAIN NETWORKS
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
Association rule visualization technique
Association rule visualization technique
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
Similar to IRJET- Transaction of Healthcare Records using Blockchain
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IJTRET-International Journal of Trendy Research in Engineering and Technology
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
IRJET Journal
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
IRJET Journal
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
WaterFalls2
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
IRJET Journal
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET Journal
IRJET- Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
IRJET Journal
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt
bansalvvinayak832
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
Priyanka Aash
blockhain in telihealth doctore apoinment system
blockhain in telihealth doctore apoinment system
Rajesh Rajesh.Bca.McA9
Block chain explained
Block chain explained
Washiqur Rahman
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Sai Sriharsha Sudulaguntla
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
Block-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing Approach
IRJET Journal
Blockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
BHANU281672
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
domenicacullison
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
IJECEIAES
Similar to IRJET- Transaction of Healthcare Records using Blockchain
(20)
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET- Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
blockhain in telihealth doctore apoinment system
blockhain in telihealth doctore apoinment system
Block chain explained
Block chain explained
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
Block-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing Approach
Blockchain Security and Demonstration
Blockchain Security and Demonstration
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
31075.31076.202030-COMBINED-FULLTERM - SUMMER 2020 - INFOTECH .docx
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Recently uploaded
(20)
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
IRJET- Transaction of Healthcare Records using Blockchain
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 32 TRANSACTION OF HEALTHCARE RECORDS USING BLOCKCHAIN Mrs. S. Kavitha1, S. Abinaya2, V. Ramya3, S. Famidha Sabnam4 1Assistant Professor, Velammal College of Engineering and Technology, Madurai 2,3,4UG Scholar, Department of CSE, Velammal College of Engineering and Technology, Madurai -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract:- The major crucial portion of any field is to maintain the large set of data that is being collected from various distributed areas and to protect those data from the interventions of the third party.One such field is Healthcare which faces many problems in maintaining the patient’s records. One of the best solutions for the above mentioned problem is creating blockchains. This paper involves the creation and implementation of the private Blockchain for healthcare using Proof of work algorithm and analysing the performance. Keywords—Third party intervention, Distributed, Secure, Blockchain, Healthcare. I. INTRODUCTION Healthcare systems faces many challenges in case of security, flexibility of the data records.Blockchain is one of the most important Technologies and acts as a better platform that maintains large, enormous set of data and also solves the above problem. [1]One of the best examples that implemented blockchain is Bitcoin. It involves in many transactions that transfers money between two parties without the help of any third party intervention. Data are present in the form of blocks which cannot be altered by anyone[2].This helps in maintaining the Sensitive data and also provide Data integrity, Reliability, Secure transactions for the trust worthy patients.[3] II. BASIC COMPONENTS OF BLOCKCHAIN There are many components that are involved in blockchain in which each of the components have its own role in the implementations of the blockchain that involves many transactions. A. Block The Block is a container and a structure that holds many components such as Data, hash of previous block and Timestamp. B. Chain It is the sequence of blocks that connects the multiple blocks to form a chain just like a Data Structure, Linked list. C. Data Large set of medical records of the patients that has to be maintained, transferred and the integrity of the data has to be maintained between two parties or within an Organisation. D. Hash It is a function that converts the input into the output of fixed length. The output are in the form of the encrypted text using some cryptographic algorithms[4]. III. USE CASES OF HEALTHCARE IN BLOCKCHAIN There are various possible use cases of Blockchain in Healthcare industry. This involves the data exchange, Interoperability among data, Cyber security handling, Clinical trial management, Integrity of supply chain. A. Interoperability and exchange of clinical data This provides a good solution for problems that are face by the healthcare industry in managing large set of data, data interoperability, data integrity and security. This helps in accessing the historical data anywhere and anytime. B. Healthcare IoT and Cyber security handling This ensures the data security, privacy and reliability that should not be affected by hackers or third party vendors. C. Provenance and Integrity of Drug Supply chain This process in which blockchain helps in gaining trust and confidence among the customers in order to supply the drugs and prevent the fake drug distribution.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 33 D. Clinical trials and Research result management Clinical trials can vary in size and cost, and they can involve a single research center or multiple centers, in one country or in multiple countries. Clinical study design aims to ensure the scientific validity and reproducibility of the results[5]. IV. PROOF OF WORK ALGORITHM Consensus algorithms are a decision-making process for a group. Blockchain consensus models are methods to create equality and fairness in the online world. One of the consensus algorithms is Proof of work(PoW). Proof of work is the first Blockchain algorithms introduced in the blockchain network. Many blockchain Technologies uses this Blockchain consensus models to confirm all of their transactions and produce relevant blocks to the network chain.[6] A. Rise of Proof of work At its core, the Byzantine Generals’ Problem is achieving a consensus across a distributed network of devices, some of which could be potentially faulty, while also being weary of any attackers attempting to undermine the network. Byzantine Fault Tolerance means an incoming message is repeated to other recipients of that incoming message. All of the nodes make the assumption that the act of repeating a message rules out the issue of Byzantine nodes.Thus, the proof of work protocol deals with the above problem through nonces and combining messages into blocks. Each block has its own distinct nonce. They are only used once in order to add another element of difficulty in generating valid hashes, specifically to prevent precomputation and ensure fairness.[8] B. Purpose of PoW: PoW offers Distributed Denial of Service(DDoS) protection and lowers the overall of stake mining. This blockchain algorithms offer a fair deal of difficulty for the hackers. The system requires a lot of computational power and effort[6]. This combines the concepts of cryptography and computational power to validate the records that are involved in the transaction and it tries to ensure the authenticity and security of the data in the blocks[7]. C. Steps: Actually the proof of work comes in the form of answers to the mathematical problems.The only way to solve these mathematical riddles is through nodes on the network, running a long and random process that presents answers on a trial and error basis.This means that the problem could be solved on first attempt, although this is extremely unlikely, to the point where it is practically impossible. [8] 1)Block creation: Initially the blocks of the block chain will created with the data that has been sent by various sections of the hospital management. The Block will contain the hash of the current block, hash of the previous block and the timestamp that indicates the time at which the block has been created. 2) Hash calculation: Hash is being calculated by using the SHA-256 algorithms which provides the output as a message digest. This algorithms usually takes input of any size and produces an output of fixed size. 3) Chain validation: After the creation of the blocks, the entire chain is validated by comparing the registered hash and the hash that has been calculated for the block. The same process is done for the current as well as the previous block. If the hashes are same then the Chain is a valid one. The Current block’s previous hash and the previous block’s current hash is checked, whether they are equal. if(previousBlock.hash.equals(currentBlock.previousHash)) { return true; } 4)Mining of blocks: Target hash will be generated. Target hash is the hash that has to be lower the hash of the current block. Lower the target hash, lower the creation of new blocks. The block will be mined with their hash values. V. STRUCTURE OF BLOCKCHAIN The above diagram shows the implementation of the healthcare in Blockchain, in which each block contains data that is being sent by the doctor. Blocks in the chain cannot be tampered any third person and it can be retrieved whenever wanted. Doctor will send his/her medicinal prescription with the digital signature to the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 34 patients through a private Blockchain. At the receiver end, patient can ensure the validity of the information by the signature of the doctor that is provided in the data before mining the medicinal data. Data that is being added to the blocks by the doctor that involves the generation of new hash value for each block in the blockchain. Then the blocks will be connected by their previous hashes that is, current block will have the hash of its own as well as the hash of the previous block. If there is any changes/modification done by the third party in any of the block, then new hash will be created. If someone want tamper the data, he/she has to change the data of the entire blockchain. During validation part, the hashes are checked, newly generated hash by the tampered block will not match with current node’s previous hash and hence sender can easily find that the data has been tampered by someone, can conclude that the chain is not the valid one. If the chain is valid, then the blocks will be mined by the user for the further steps. 1) Sender: The Doctor acts as a Sender. This contains the form which has the information that is being sent by the doctor to the patient. The information contains the medicinal prescription like tablet details. 2) Receiver: Patient acts as a Receiver. Patient will mine the information that is being sent by the doctor. Before mining, the blocks are being validated by using the SHA Algorithm. BLOCKCHAIN ON HEALTHCARE VI. BENEFITS The main benefit of the Proof of Work algorithms is for deterring cyber-attacks such as a distributed denial-of- service attack (DDoS) which has the purpose of exhausting the resources of a computer system by sending multiple fake requests. This algorithms is also being used by various cyptocurrencies like Bitcoin, Ethereum, Litecoin, Monero as they consider the algorithm to be very safe for performing money related transactions. It does not need any third person to look after/monitor the processes that are involved in the transaction. It involves various type of blockchains like pivate or public blockchains.. VII. LIMITATIONS Like the saying,’Coin has the two sides’, PoW algorithms has some limitations eventhough it has advantages. 1) Greater Energy Consumption: The security level of blockchain network based on PoW needs more energy. If the system needs to be more secure, then the energy consumption will be more. 2) Cost of Electricity: The greater consumption is becoming a problem where we are running out of energy – miners on the system have to face a large sum of cost due to the electricity consumption. 3) 51% attack: A 51 percent attack, or majority attack, is a case when a user or a group of users control the majority ofmining power.The attackers get enough power to control most events in the network.They can monopolize generating new blocks and receive rewards since they’re able to prevent other miners from completing blocks.They can reverse transactions. VIII. CONCLUSION Block chain may be considered as one of the best technologies in case of transactions. It uses multiple algorithms in which the first and foremost algorithm used by it was PoW. The proof of work(PoW) algorithms helps better in creation of blockchain based on the storage and maintenance of the data. This algorithms works better in case of making the health related data to be protected with the help blockchain. This data will be present forever in the chain. Even we can retrieve the historical data from the blocks and can view it whenever we want to refer the data.This would create greater impact in the field of Healthcare. IX.FUTURE CONSIDERATION Though there are lot of advantages, there are some disadvantages related to the consumption of computation
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 35 power and cost that has been spent over the electricity bills. Hence, the next process of the project will step towards the implementation of the algorithms that works better than the above algorithms by ensuring that the enhanced algorithm will overcome the disadvantages of the Proof of Work algorithms. REFERENCES [1]Advanced Block-Chain Architecture for e-Health Systems by W. Liu,School of Science and Technology,G.G.C,S.S. Zhu.Department of Computer Science,Shantou University, T. Mundie,School of Science and Technology,G.G.C,U. Krieger,Computer Science in Communication and Networks,University of Bamberg [2] Blockchain Technology beyond Bitcoin by Michael Crosby, Google, Nachiappan, Yahoo, PradhanPattanayak, Yahoo, SanjeevVerma, Samsung Research America,VigneshKalyanaraman, Fairchild Semiconductor. [3]https://insights.daffodilsw.com/blog/possible-use- cases-of-blockchain-in-healthcare-industry [4] A Systematic Review of the Use of Blockchain in Healthcare by Marko Hölbl, Marko Kompara, Aida Kamišali´c and LiliNemecZlatolas, University of Maribor, Faculty of Electrical Engineering and Computer Science, Maribor, Slovenia. [5]https://insights.daffodilsw.com/blog/possible-use- cases-of-blockchain-in-healthcare-industry [6]https://101blockchains.com/consensus-algorithms- blockchain/ [7] Proof of Work and Proof of Stakeconsensus protocols: a blockchain applicationfor local complementary currencies Sothearath SEANG_ Dominique TORRE_February 2018 [8] https://lisk.io/academy/blockchain-basics/how-does- blockchain-work/proof-of-work
Download now