Latency (s) for YCSB and small bank database

Latency (s) for YCSB and small bank database

Source publication
Article
Full-text available
In recent years, the block chain technology considered as adaptable compared to other techniques. Many of the industry, understanding the block chain technology is utilizing for financial services and its transactions but it also effective in other sectors like healthcare industry. Existing methods are hazardous; where, data stored in outsider serv...

Citations

... As a result, numerous algorithms were applied, including a secret sharing method, a fair blind digital signing scheme, and pseudonyms to preserve anonymity. In order to address health record data transactions between the doctor, patient, institutions, and service providers in a way that protects privacy, the study [51] offers a secure and effective health record transaction utilizing the blockchain (SEHRTB) algorithm. The Trusted Information Project Platform (TIP-Platform), which Lee [52] proposed, makes it simple to check for project duplication, share research findings, and update research findings. ...
Article
Full-text available
A wait-free consensus technique is provided with endless processes utilizing a shared memory model. When a powerful adversary is allowed to view and destroy infinite number of votes, the approach weighted voting can be used to reach consensus with at least constant probability. In asynchronous system, there is no known upper bound to transmit the message from source to destination processor. This paper presents a resilient and message-efficient algorithm by aggregating the votes of individual processors to solve the wait-free consensus in asynchronous systems. We considered an adaptive adversary and message-passing communication system. Our aim is to construct a message-passing algorithm equivalent to a weak shared coin and to provide a message-efficient algorithm for aggregating the votes of individual processors. A processor announces votes to smaller groups before propagating them to larger ones. To limit generated, received, or sent, vote weights are gradually increased. The wait-free consensus problem is optimally solved by our algorithm, which demonstrates an effective message-passing execution of the shared coin. When less than n/2 processes are faulty or crashed, the predicted message complexity of this randomized consensus procedure is O (n2 (log log n)2). This is a linear improvement over the previous best protocol and is close to a message lower bound.
... They use a permissioned blockchain system where they too use on-chain for management metadata, and off-chain will be used to store the encrypted EHR. Mubarakli et al. in [43] use a permissioned blockchain to implement a privacy-preserving access control between the different users who can be patients, doctors, service providers and institutions. Data within the system are encrypted using symmetric keys, and all users have public and private keys. ...
Article
Full-text available
The COVID-19 pandemic further outlined the importance of global healthcare services provisioning for diagnosing and treating patients who tend to travel and live for large periods away from home and can be anywhere at any given time. Advances in technology enable healthcare practitioners to access critical data regarding a person’s health status to provide better services. Medical data are sensitive in nature, and therefore, a reliable mechanism should ensure that only authorized entities can access data when needed. This paper, through a layered consideration of a Globalized Healthcare Provisioning Ecosystem (GHPE), reveals the interdependencies among its major components and suggests a necessary abstraction to identify requirements for the design of an access control suitable for the ecosystem. These requirements are imposed by the nature of the medical data as well as by the newly introduced potentials of Internet of Medical Things (IoMT) devices. As a result, an attribute-based access control framework is proposed aiming to provide prompt and secure access to medical data globally by utilizing state-of-the-art technologies and standards, including Next-Generation Access Control (NGAC), blockchain and smart contracts. Three types of smart contracts are proposed that enable access control to implement attribute and policy stores where policy classes and attributes are decentralized and immutable. In addition, the usage of blockchain-based distributed identities allows patients to be in control of access to their medical data and also enables healthcare service providers to access medical data promptly and reliably through the proposed access control framework. The qualitative characteristics of the proposed approach toward a decentralized and patient-centric access control in GHPE are demonstrated and discussed based on an application paradigm.
... The introduced block chain-enabled digital rights management system has been demonstrated as a promising candidate solution to the block chain-based multimedia data protection in an online education environment. Similarly, Mubarakali et al. (2019) had developed health record transaction using block chain algorithm. In healthcare, this work enables you to securely control and share a patient's health record in cloud storage without infringing on any privacy. ...
Article
Full-text available
Cloud computing is currently playing an important role in the information technology industry because of its improved efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns. To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication (MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security, and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure. After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed methodology is implemented in JAVA and performances are analyzed in terms of different metrics.
... In this work we have analysed the some existing schemes [9], [10], [11], [12], [13], [14]. Use of searchable keyword ABE for storing and retrieving medical records We have used blockchain technology to ensure no tempering of medical record. ...
... In the last few years, researchers are giving more attention to the security and privacy issue of EHD [11]. In 2019 [13], proposed a model called SEHRTB, that provides the (Electronic Health Record) EHR sharing between patients, doctors, service providers, and different medical institutions. The system gives the reduction in latency but there was no estimation of feasibility of the system given. ...
Article
Full-text available
Health records of any type should be confidential, but simultaneously they should be accessible to an authorized user. In the current conventional health care system, health records are processed in the local database. Only authorized hospital staff can have access to the patient health records kept in health centers. The flow of information in this kind of system is center-restricted. One technology that can potentially overcome this problem is Blockchain. Blockchain technology allows sharing of data in a distributed way with benefits like privacy-preserving and secure access control. To achieve secure access control and privacy of electronic healthcare data (EHD), a secure framework for distributed sharing of the health record is proposed. The use of blockchain will remove the requirement of a trusted 3rd party for data storage. The framework uses searchable key attribute-based encryption (ABE) for achieving fine-grain access control. The simulation results indicate that our scheme is quite effective and secure.
... Blockchains are categorized into three categories: blockchain community, blockchain corporate, and blockchain collaboration. In a broad context, the proprietary blockchain and the consortium blockchain are individual chains [12,26]. A shared blockchain refers to any entity or community who shares a blockchain. ...
... Authorized node knowledge is transferred to the processing chain. Since the cluster head node is closely linked to the ground station, the entire cluster knowledge list is taken online from the central server node when configuring in the local node [25,26]. ...
Article
Full-text available
The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The blockchain technology is an effective way of protecting data handled and possessed by the wireless sensor networks. Many of the existing approaches are following conventional security approaches. But such traditional approaches are very prone to failures of the nodes more often. In this paper, a novel efficient approach for authentication in wireless sensor networks that uses blockchain technology for security. The nodes of the wireless sensor networks are from IoT network and they are being formulated by the base station, cluster heads and normal sensor nodes. The building of a blockchain network will shape a hierarchical blockchain model, including small chain and global chain, among various network nodes. Nodes in this hybrid model in different communication situations, identity secure connection is realized, normal node identification user authentication is in the blockchain network, local block chain technology and selected cluster node identification verification is done. Analyzation of the protection and results demonstrate that there is robust protection and higher results in the system. The experimental results are showing that the computational capability of over 300 bytes per phase has been achieved using the proposed approach.
... In general, using blockchain to design MedBlock ensured efficient privacy for the data shared among authorized users. Other authors, such as in [19], propose a secure medical record solution based on a blockchain called 'SEHRTB,' which controls medically sensitive information based on a proposed framework that allows authorized users smart contract to compare the requirements of requested access. The authors evaluated the SEHRTB method found that it reduced execution time by 1.08 seconds. ...
Article
- In the last decade, blockchain technology has gained significant attention as an innovative tool that allows cloud storage decentralization. It comprises lists of records and possesses the following key properties: integrity, confidentiality, security, and openness. Blockchain technology has been notably applied in many fields, such as the financial industry, insurance, supply chain management, transportation, and healthcare. It brings numerous benefits to these applications, such as reducing transactional costs, preserving privacy, improving application security, and enhancing application resilience. Despite these myriad applications, blockchain technology implementation has not been comprehensively reviewed. Thus, this paper focuses on the healthcare sector, discussing the potential contexts in which blockchain technology has been applied and how it enhances such applications' operation process.
... The blockchain is used in various fields outside the domain of cryptocurrencies because of its unique features, such as immutability of data, public verification, transparency, auditability, security, and privacy [53]. Some of the application fields of blockchain are intelligent transport system [54], IoT systems [55], supply chain management, various types of industry [56], food supply chain [57], smart energy [58], healthcare [59], and many more. ...
Article
Full-text available
With the rapid evolution in wireless communications and autonomous vehicles, intelligent and autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications provides driving safety, traffic efficiency, and road information in real-time in vehicular networks. V2X has evolved by integrating cellular 5G and New Radio (NR) access technology in V2X communications (i.e., 5G NR V2X); it can fulfill the ever-evolving vehicular application, communication, and service demands of connected vehicles, such as ultra-low latency, ultra-high bandwidth, ultra-high reliability, and security. However, with the increasing number of intelligent and autonomous vehicles and their safety requirements, there is a backlash in deployment and management because of scalability, poor security and less flexibility. Multi-access Edge Computing (MEC) plays a significant role in bringing cloud services closer to vehicular nodes, which reduces the scalability and flexibility issues. In addition, blockchain has evolved as an effective technology enabler to solve several security, privacy, and networking issues faced by the current 5G-based MEC systems in vehicular networks. Blockchain can be integrated as a strong security mechanism for securing and managing 5G V2X along with MEC. In this survey, we discuss, in detail, state-of-the-art V2X, its evolution based on cellular 5G technology and non-cellular 802.11bd. We investigate the integration of blockchain in 5G-based MEC vehicular networks for security, privacy protection, and content caching. We present the issues and challenges in existing edge computing and 5G V2X and, then, we shed some light on future research directions in these integrated and emerging technologies.
... In [15] discussed BLOCK BENCH, benchmarking technique to estimate the evaluation of private blockchains in terms of data processing workloads. The methods work based integrations of Ethereum, Parity, and Hyperledger Fabric to cover the gaps between blockchain and healthcare record storage systems [16]. In [17] introduced the Security Algorithm, which reduces the encryption and decryption time of the record retrieval process. ...
... The success rate has calculated in Eq. ð4:3Þ Table 1 expresses the deployment result of the SRHB approach with conventional methods in a tabular format. Table 1 result shows the comparative result with various traditional approaches namely as Ethereum [15], Parity [15] and Hyperledger [15,16] with Success Rate(SR) in (%), Average Delay(AD) and System Execution Time(SET) values that obtained from various research articles. Finally, it shows that the Proposed SRHB approach produces the best outcome against existing methods based on the observation on multiple parameters like a success rate (%), average delay(sec), and system execution time(sec) for YCSB and Small Bank dataset. ...
... According to Figs. 3, 4 and 5, it is observed that the proposed SRHB estimates success rate, system execution time, and average delay. The proposed SRHB has analyzed with Ethereum [15], Parity [15], and Hyperledger [15,16] conventional methods in terms of system execution time, success rate and average delay. The Hyperledger [15,16] produces better than Ethereum and Parity over the testbeds. ...
Article
Full-text available
Health Electronic Records (HER) share the data to improve the quality and decrease the cost of Healthcare. It is challenging because of techniques complexities and privacy compatibilities issues. The existing system is more popular to use the cloud-based healthcare system. However, the healthcare system is affected by content privacy and secure data transformation during data gathering and analyzing personal health records in cloud environments. The patient’s records shared with patients, healthcare organizations, and insurance agents in a cloud environment. To offer a better solution for the above issues, a secure and Robust Healthcare-based Blockchain (SRHB) the approach proposes with Attribute-based Encryption to transmit the healthcare data securely. The proposed technique collects the data from the patient by using wearable devices in a centralized healthcare system. It observes patient health condition while in sleeping, heartbeat as well as walking distance. The patient obtained data is uploaded and stored in a cloud storage server. The doctor reviews the patient’s clinical test, genetic information, and observation report to prescribe the medicine and precaution for a speedy recovery. Meantime, an insurance agent also evaluates the patient’s clinical test, genetic information, and observation report to release the insurance amount for medical treatments. Blockchain concept implemented to maintain privacy in individual patient records. Each time it creates a separate block as a chain. Any changes in the block will be added as a new entry. Based on the experimental evaluation, SRHB reduces 2.85 AD (Average Delay) in seconds, 1.69 SET (System Execution Time) in seconds, and improves 28% SR (Success Rate) compared to conventional techniques.
... Putting intelligence in the system, in contrast to the cloud, allows fog computing resources to perform low-latency processing, away from the cloud, near the edge, whereas latency-tolerant applications can still be performed in the core of the cloud. In Refs., 3,4 fog computing could not be replacement of cloud, but supplements the cloud for the most time-critical aspects of network operations. The system required fog computing because of the following characteristics, namely low latency, geographic distribution, rapid real-time interaction, and intelligent endpoints. ...
Article
Fog computing is playing a vital role in data transmission to distributed devices in the Internet of Things (IoT) and another network paradigm. The fundamental element of fog computing is an additional layer added between an IoT device/node and a cloud server. These fog nodes are used to speed up time-critical applications. Current research efforts and user trends are pushing for fog computing, and the path is far from being paved. Unless it can reap the benefits of applying software-defined networks and network function virtualization techniques, network monitoring will be an additional burden for fog. However, the seamless integration of these techniques in fog computing is not easy and will be a challenging task. To overcome the issues as already mentioned, the fog-based delay-sensitive data transmission algorithm develops a robust optimal technique to ensure the low and predictable delay in delay-sensitive applications such as traffic monitoring and vehicle tracking applications. The method reduces latency by storing and processing the data close to the source of information with optimal depth in the network. The deployment results show that the proposed algorithm reduces 15.67 ms round trip time and 2 seconds averaged delay on 10 KB, 100 KB, and 1 MB data set India, Singapore, and Japan Amazon Datacenter Regions compared with conventional methodologies.