Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana
{"title":"健康信息系统的去中心化加密区块链方法","authors":"Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICCMA.2019.00027","DOIUrl":null,"url":null,"abstract":"With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Decentralized Cryptographic Blockchain Approach for Health Information System\",\"authors\":\"Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana\",\"doi\":\"10.1109/ICCMA.2019.00027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.\",\"PeriodicalId\":413965,\"journal\":{\"name\":\"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMA.2019.00027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMA.2019.00027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Decentralized Cryptographic Blockchain Approach for Health Information System
With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.