ABSTRACT
The core concept of electronic money is blockchain, which can be regarded as a decentralized database. It is a decentralized storage service that does not rely on third-party storage. It records each transaction information on the block. Related applications include electronic ledgers, which further extend smart contracts. In storage, not only record transactions, but the extended smart contract can be used in medical treatment, recording the patient's medical records. However, there is a need for privacy in medical records, and it must be able to be accessed by appropriate people in accordance with the authority. So it needs a technology like Enigma to achieve it. Enigma uses multi-party computation (hereinafter referred to as MPC) and distributed hash-table (hereinafter referred to as DHT) technology, combined with the blockchain to divide the data to be stored into public blocks and private parts The blockchain has an existing way of computing and storing, and private data is Enigma's method of computing and storing by using the method called Off-Chain. Only authenticated users can access private data. However, many applications have the need for group sharing and decentralized records. This study uses Enigma to encrypt the data that requires privacy using the key of the encrypted file and then uploads it to DHT for storage, so that the owner of the private data can further share the data securely.
- Bela Gipp, Norman Meuschke, and André Gernandt. 2015. Decentralized trusted time stamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015 (2015).Google Scholar
- James Heather and David Lundin. 2008. The append-only web bulletin board. In International Workshop on Formal Aspects in Security and Trust. Springer, 242--256.Google Scholar
- Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, and Yacine Challal. 2020. A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things. Journal of Network and Computer Applications 150 (2020), 102480.Google ScholarDigital Library
- C. Liao, Y. Lu, A. Pang, and T. Kuo. 2008. A Secure Routing Protocol for Wireless Embedded Networks. In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. 421--426.Google Scholar
- Yung-Feng Lu and Chin-Fu Kuo. 2013. Robust and flexible tunnel management for secure private cloud. ACM SIGAPP Applied Computing Review 13, 1 (2013), 41--50.Google ScholarDigital Library
- Yung-Feng Lu, Jun Wu, and Chin-Fu Kuo. 2014. A Path Generation Scheme for Real-Time Green Internet of Things. ACM SIGAPP Applied Computing Review 14 (06 2014), 45--58. https://doi.org/10.1145/2656864.2656868Google ScholarDigital Library
- Erik Meijering. 2002. A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90, 3 (2002), 319--342.Google ScholarCross Ref
- Keju Meng, Fuyou Miao, and Yue Yu. 2019. A secure and efficient on-line/off-line group key distribution protocol. Designs, Codes and Cryptography 87, 7 (2019), 1601--1620.Google ScholarDigital Library
- Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.Google Scholar
- Sandro Rafaeli and David Hutchison. 2003. A survey of key management for secure group communication. ACM Computing Surveys (CSUR) 35, 3 (2003), 309--329.Google ScholarDigital Library
- Nakamoto Satoshi. 2008. Bitcoin: A peer-to-peer electronic cash system. Consulted 1, 2012 (2008), 28.Google Scholar
- Melanie Swan. 2015. Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.".Google ScholarDigital Library
- R Velumadhava Rao, K Selvamani, S Kanimozhi, and A Kannan. 2019. Hierarchical group key management for secure data sharing in a cloud-based environment. Concurrency and Computation: Practice and Experience 31, 12 (2019), e4866.Google Scholar
- Andrew C Yao. 1982. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 160--164.Google ScholarDigital Library
- Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015).Google Scholar
Index Terms
- Enhanced Privacy with Blockchain-based Storage for Data Sharing
Recommendations
Privacy-preserving data sharing in cloud computing
Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and ...
Sharing Health Records in Senegal Using Blockchain
ICBTA '21: Proceedings of the 2021 4th International Conference on Blockchain Technology and ApplicationsElectronic Health Records offer real advantages for accessing and storing patient health information, which can improve the management of patient care. However, the attractive features of electronic records (accessibility, portability, and portability ...
hChain: Blockchain Based Healthcare Data Sharing with Enhanced Security and Privacy Location-Based-Authentication
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023In smart healthcare, blockchain technology addresses existing concerns with security, privacy, and electronic healthcare records. In addition, utilizing edge devices with IoMT devices is very advantageous for addressing security, computing, and storage ...
Comments