在医疗保健系统中实施机器学习和区块链

Sohil C, Siva Subramaniam D, Gowtham R, Sundareswari K
{"title":"在医疗保健系统中实施机器学习和区块链","authors":"Sohil C, Siva Subramaniam D, Gowtham R, Sundareswari K","doi":"10.1109/ICECAA55415.2022.9936405","DOIUrl":null,"url":null,"abstract":"Insider attacks on the electronic healthcare device category can result in a deceptive inspection of patients' fitness information, ensuing in unaccountability of records intake along with huge low-budget prices as an outcome of facts fissures in the Digital-Healthcare device without an effective detection technique. As a result, several health centers have confronted prison and reputational implications. A green technique must be proposed to address this challenge, especially for eHealth structures inside the cloud surroundings, in which activities are now carried out via cloud be cloud-based as a result of it. Even as anticipating such options proposed, health records may be centered, which may additionally bring about poorly affected person remedy thanks to disinformation, and accordingly individual mortality. This research is being driven by way of this necessity. This paper proposes a brand-new context for figuring out insider threats upon the usage of extraction in watermarking and detection in logging strategies which is primarily based on Cloud-based health care systems. The method generated a file that included numerous acts carried out through users as well as an audit path of criminal and un legal entries into the device. The technique displayed an immoderate degree of precision, recall, and accuracy inside the assessment finished at the cease of the studies, indicating that its performance is extremely good to undertake. Keywords: Watermarking Extraction, Logging Detection technique.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementing Machine Learning Adoption and Blockchain in the Health Care System\",\"authors\":\"Sohil C, Siva Subramaniam D, Gowtham R, Sundareswari K\",\"doi\":\"10.1109/ICECAA55415.2022.9936405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Insider attacks on the electronic healthcare device category can result in a deceptive inspection of patients' fitness information, ensuing in unaccountability of records intake along with huge low-budget prices as an outcome of facts fissures in the Digital-Healthcare device without an effective detection technique. As a result, several health centers have confronted prison and reputational implications. A green technique must be proposed to address this challenge, especially for eHealth structures inside the cloud surroundings, in which activities are now carried out via cloud be cloud-based as a result of it. Even as anticipating such options proposed, health records may be centered, which may additionally bring about poorly affected person remedy thanks to disinformation, and accordingly individual mortality. This research is being driven by way of this necessity. This paper proposes a brand-new context for figuring out insider threats upon the usage of extraction in watermarking and detection in logging strategies which is primarily based on Cloud-based health care systems. The method generated a file that included numerous acts carried out through users as well as an audit path of criminal and un legal entries into the device. The technique displayed an immoderate degree of precision, recall, and accuracy inside the assessment finished at the cease of the studies, indicating that its performance is extremely good to undertake. Keywords: Watermarking Extraction, Logging Detection technique.\",\"PeriodicalId\":273850,\"journal\":{\"name\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA55415.2022.9936405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA55415.2022.9936405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

针对电子医疗设备类别的内部攻击可能导致对患者健康信息的欺骗性检查,导致对记录的不负责以及由于数字医疗设备存在事实缺陷而导致的巨额低预算价格,而没有有效的检测技术。结果,几家医疗中心面临牢狱之灾和声誉问题。必须提出一种绿色技术来应对这一挑战,特别是对于云环境中的电子卫生结构,其中的活动现在通过云或基于云的方式进行。即使预期提出的这些选择,健康记录也可能集中,这可能会由于虚假信息而给不良患者带来补救,并相应地导致个人死亡。这项研究是由这种必要性推动的。本文提出了一种全新的基于云医疗系统的内部威胁识别环境,即利用水印提取和日志策略检测来识别内部威胁。该方法生成了一个文件,其中包括通过用户执行的许多行为,以及对进入设备的犯罪和非法条目的审计路径。在研究结束时完成的评估中,该技术显示出极高的精确度、召回率和准确性,表明其性能非常好。关键词:水印提取;测井检测技术;
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementing Machine Learning Adoption and Blockchain in the Health Care System
Insider attacks on the electronic healthcare device category can result in a deceptive inspection of patients' fitness information, ensuing in unaccountability of records intake along with huge low-budget prices as an outcome of facts fissures in the Digital-Healthcare device without an effective detection technique. As a result, several health centers have confronted prison and reputational implications. A green technique must be proposed to address this challenge, especially for eHealth structures inside the cloud surroundings, in which activities are now carried out via cloud be cloud-based as a result of it. Even as anticipating such options proposed, health records may be centered, which may additionally bring about poorly affected person remedy thanks to disinformation, and accordingly individual mortality. This research is being driven by way of this necessity. This paper proposes a brand-new context for figuring out insider threats upon the usage of extraction in watermarking and detection in logging strategies which is primarily based on Cloud-based health care systems. The method generated a file that included numerous acts carried out through users as well as an audit path of criminal and un legal entries into the device. The technique displayed an immoderate degree of precision, recall, and accuracy inside the assessment finished at the cease of the studies, indicating that its performance is extremely good to undertake. Keywords: Watermarking Extraction, Logging Detection technique.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信