A. Sivasangari, V. K. Sonti, P. Ajitha, D. Deepa, R. Vignesh
{"title":"使用区块链和雾计算的医疗保健集成安全框架","authors":"A. Sivasangari, V. K. Sonti, P. Ajitha, D. Deepa, R. Vignesh","doi":"10.1109/PARC52418.2022.9726539","DOIUrl":null,"url":null,"abstract":"Edge computing is a promising paradigm that enhances the capabilities of cloud computing in healthcare. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Edge computing is a promising model for improving cloud computing’s capabilities. It is important to maintain a positive climate free of all forms of protection and privacy violations in order to continue using computing services. The edge computing environment’s security and privacy concerns have hampered the technology’s overall acceptance as a reliable paradigm.The blockchain technology emerges as a viable solution because it provides influential features such as continuous secrecy, authentication, and robustness. This proposed work propose a blockchain-enabled distributed security architecture based on edge cloud. Security attacks are detected at the cloud layer, and as a result, security attacks at the IoT network’s edge layer are decreased. The gateway provides dynamic network traffic flow management, which aids in the detection of security attacks by identifying suspicious network traffic flows and reducing security attacks by blocking suspicious flows.For the next-generation IoT, the proposed security architecture has specified state-of-the-art contributions. The proposed algorithm is based on ECC based proxy encryption technique. Proxy re-encryption is a modern encryption scheme designed for protection in a distributed environment, including such smart applications that use the Internet of Things.","PeriodicalId":158896,"journal":{"name":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Integrated Security Framework for Healthcare Using Blockchain and Fog Computing\",\"authors\":\"A. Sivasangari, V. K. Sonti, P. Ajitha, D. Deepa, R. Vignesh\",\"doi\":\"10.1109/PARC52418.2022.9726539\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Edge computing is a promising paradigm that enhances the capabilities of cloud computing in healthcare. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Edge computing is a promising model for improving cloud computing’s capabilities. It is important to maintain a positive climate free of all forms of protection and privacy violations in order to continue using computing services. The edge computing environment’s security and privacy concerns have hampered the technology’s overall acceptance as a reliable paradigm.The blockchain technology emerges as a viable solution because it provides influential features such as continuous secrecy, authentication, and robustness. This proposed work propose a blockchain-enabled distributed security architecture based on edge cloud. Security attacks are detected at the cloud layer, and as a result, security attacks at the IoT network’s edge layer are decreased. The gateway provides dynamic network traffic flow management, which aids in the detection of security attacks by identifying suspicious network traffic flows and reducing security attacks by blocking suspicious flows.For the next-generation IoT, the proposed security architecture has specified state-of-the-art contributions. The proposed algorithm is based on ECC based proxy encryption technique. Proxy re-encryption is a modern encryption scheme designed for protection in a distributed environment, including such smart applications that use the Internet of Things.\",\"PeriodicalId\":158896,\"journal\":{\"name\":\"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PARC52418.2022.9726539\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PARC52418.2022.9726539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrated Security Framework for Healthcare Using Blockchain and Fog Computing
Edge computing is a promising paradigm that enhances the capabilities of cloud computing in healthcare. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Edge computing is a promising model for improving cloud computing’s capabilities. It is important to maintain a positive climate free of all forms of protection and privacy violations in order to continue using computing services. The edge computing environment’s security and privacy concerns have hampered the technology’s overall acceptance as a reliable paradigm.The blockchain technology emerges as a viable solution because it provides influential features such as continuous secrecy, authentication, and robustness. This proposed work propose a blockchain-enabled distributed security architecture based on edge cloud. Security attacks are detected at the cloud layer, and as a result, security attacks at the IoT network’s edge layer are decreased. The gateway provides dynamic network traffic flow management, which aids in the detection of security attacks by identifying suspicious network traffic flows and reducing security attacks by blocking suspicious flows.For the next-generation IoT, the proposed security architecture has specified state-of-the-art contributions. The proposed algorithm is based on ECC based proxy encryption technique. Proxy re-encryption is a modern encryption scheme designed for protection in a distributed environment, including such smart applications that use the Internet of Things.