Affiliation:
1. Zayed University
2. Lebanese American University
3. Taif University
Abstract
Abstract
The enhancement of the information technology in many domains has had a positive impact on the healthcare sector. The ability to share medical data is one of the positive outcomes. However, this improvement comes with a number of threats. Although many threat preventive measures have been applied yet, no one can be confident that the system is safe from attacks. Thus, an algorithm needs to assess the damage occurring as a result of an attack before recovering the database. In this work, we present a distributed algorithm that uses hash tables to deal with the “information warfare” problem in healthcare systems. Hash tables astoundingly improve recovery time by delivering swift access to transactions. Moreover, the only needed data is stored within the hash table; this greatly decreases memory and resources exploitation. The proposed algorithm - implemented in Java - is compared with previous works, and demonstrated superior effects.
Publisher
Research Square Platform LLC
Reference25 articles.
1. Azaria A, Ekblaw A, Vieira T, Lippman A (2016) “MedRec: Using Blockchain for Medical Data Access and Permission Management,” Proceedings of the Second International Conference on Open and Big Data (OBD), pp. 25–30, doi: 10.1109/OBD.2016.11,
2. Strategic Information Warfare: A New Face of War;Molander RC,1996
3. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability;Gordon WJ;Comput Struct Biotechnol J,2018
4. Controlled Alternate Quantum Walks Based Privacy Preserving Healthcare Images in Internet of Things;Abd EL-Latif AA,2020
5. DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems;Abou-Nassar EM;IEEE Access,2020