Overview of Internet of Medical Things Security Based on Blockchain Access Control

Author:

Liu Yikai1,Ju Fenglan2,Zhang Qunwei1,Zhang Meng1,Ma Zezhong1,Li Mingduo3,Yang Aimin1,Liu Fengchun1

Affiliation:

1. College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China

2. Financial Department, North China University of Science and Technology, Tangshan, China

3. State Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China & Beijing Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China

Abstract

The Internet of Things provides convenience to health systems, especially for remote monitoring of patient physical indicators. While providing convenience, there may be more security vulnerabilities in protecting patient and doctor information and storing health data effectively. As an important research branch in the field of the Internet of Things, the Internet of Medical Things is important for the overall improvement of public health in terms of how to safely conduct technology development and application research and to effectively implement healthcare needs. Blockchain technology is decentralized and untrusted as well as prevents tampering with data and reduces the cost of trust. Its good performance has a strong developmental nature in the healthcare field. This paper analyses how to solve security problems through access control under the Internet of Medical Things, and optimizes three access control methods. The Internet of Medical Things accesses control approach that introduces blockchain technology enhances computational and storage capabilities and is a good solution to the problem of third-party trustworthiness. Even in the face of the rapid growth of end devices, blockchain technology can solve some of the problems arising from access control of massive devices through three directions: hierarchical management, compressed storage and performance optimization. Finally, it provides directions for future research on the security aspects of blockchain technology under the Internet of Medical Things.

Publisher

IGI Global

Subject

Hardware and Architecture,Information Systems,Software

Reference91 articles.

1. Privacy-Preserving Access Control in Cloud Federations

2. A Distributed Access Control System for Cloud Federations

3. Adidos–adaptive and intelligent fully-automatic detection of denial-of-service weaknesses in web services;C.Altmeier;Data Privacy Management, and Security Assurance,2015

4. Alturi, V., & Ferraiolo, D. F. (2011). Role-Based Access Control. Academic Press.

5. Evaluating User Privacy in Bitcoin

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3