Blockchain-Enabled Smart Surveillance System with Artificial Intelligence

Author:

Jain Paras1ORCID,Dwivedi Sunita2,Alharbi Adel R.3,Sureshbabu R.4,Singh Devesh Pratap5,Jamal Sajjad Shaukat6ORCID,Krah Daniel7ORCID

Affiliation:

1. School of Computing Science and Engineering, VIT Bhopal University, Kothrikalan, Sehore, Madhya Pradesh-466114, India

2. Department of Computer Science and Applications Makhanlal Chaturvedi National University of Journalism and Communication Bhopal, 462011, Madhya Pradesh, India

3. College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia

4. Department of ECE, Kamaraj College of Engineering and Technology, Virudhunagar, India

5. Department of Computer Science & Engineering, Graphic Era Deemed to be University, Dehradun, Uttarakhand 248002, India

6. Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia

7. Tamale Technical University, Ghana

Abstract

Through the use of blockchain technology, sensitive information may be securely communicated without the need to replicate it, which can assist in decreasing medical record mistakes and saving time by eliminating the need to duplicate information. Furthermore, the information is timestamped, which further enhances the security of the data even further. The deployment of blockchain technology in a range of healthcare situations may enhance the security and efficiency of payment transactions. In this way, only those who have been allowed access to patient medical information can see or modify such information. It is proposed in this study that blockchain technology be used to provide an accessible data storage and retrieval mechanism for patients and healthcare professionals in a healthcare system that is both safe and efficient. As of 1970, a variety of traditional knowledge-based approaches such as Personal Identification Recognition Number (PIRN), passwords, and other similar methods have been made available; however, many token-based approaches such as drivers’ licenses, passports, credit cards, bank accounts, ID cards, and keys have also been made available; however, they have all failed to establish a secure and reliable transaction channel. Because they are easily misplaced, stolen, or lost, they are usually unable to protect secrecy or authenticate the identity of a legitimate claimant. Aside from that, personally identifiable information such as passwords and PINs is very prone to fraud since they are easily forgotten or guessed by an imposter. Biometric identification and authentication (commonly known as biometrics) are attracting a great deal of attention these days, particularly in the realm of information security systems, due to its inherent potential and advantages over other conventional ways for identifying and authenticating. As a result of the device’s unique biological characteristics, which include features such as fingerprints, facepalms, hand geometry (including the iris), and the device’s iris, it can be used in a variety of contexts, such as consumer banking kiosks, airport security systems, international ports of entry, universities, office buildings, and forensics, to name a few. It is also used in several other contexts, including forensics and law enforcement. Consequently, every layer of the system—sensed data, computation, and processing of data, as well as the storage and administration of data—is susceptible to a broad variety of threats and weaknesses (cloud). There does not seem to be any suitable methods for dealing with the large volumes of data created by the fog computing architecture when normal data storage and security technologies are used. Because of this, the major objective of this research is to design security countermeasures against medical data mining vulnerabilities that originate from the sensing layer and data storage in the Internet of Things’ cloud database, both of which are discussed in more depth further down. A key allows for the creation of a distributed ledger database and provides an immutable security solution, transaction transparency, and the prohibition of tampering with patient information. This mechanism is particularly useful in healthcare settings, where patient information must be kept confidential. When used in a hospital environment, this method is extremely beneficial. As a result of incorporating blockchain technology into the fog paradigm, it is possible to alleviate some of the current concerns associated with latency, centralization, and scalability.

Funder

King Khalid University

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3