Preferred Language
Articles
/
4RjNspQBVTCNdQwC5h4P
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (17)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Fri Apr 18 2025
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Middle East Research Journal
Evolution of medical risks and the standard for informing patients about them
...Show More Authors

The right of the patient to know the medical risks surrounding the medical intervention is one of the most prominent rights based on the principle of "physical safety", which has undergone several stages of development until it reached the development of the patient's independence in making medical decision without relying on the doctor, The patient's prior informed consent is informed of his / her medical condition. We will study this development in accordance with the French March 4, 2002 legislation on the rights of patients in the health system, whether it was earlier and later. We will highlight the development of the patient's right to "know the medical risks surrounding medical intervention" The legislation and its comparison with th

... Show More
View Publication
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
((The extent of the obligation of the Federal Board of supreme Audit to apply the INTOSAI 3000 standard))
...Show More Authors

Abstract

The research aims to demonstrate the commitment of the Federal Financial Supervisory Bureau to meet the requirements of the International Organization of Supreme Audit Institutions (INTOSAI) 3000, the general and private supervision of performance as the highest supervisory authority in Iraq, which is the only authorized to carry out the process of monitoring the performance of government work and activities. To analyze and present the results of the survey questionnaire prepared for the compliance of the Bureau with the requirements of the general and specific criteria related to the performance control process. The researcher reached a number of conclusions, the most important of which is the commitment of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref