Advanced Unified Encrypting Methodology to Enhance The Security of Health Information in Cloud Storage Employing Blockchain
نویسندگان
چکیده
Security of health information has been a major issue in the care industry. Health exchange have help doctors, patients, and other healthcare providers to securely access share medical information. Cloud computing led easier safer sharing records. To provide additional security cloud employ encryption techniques blockchain. In this method develop mobile application enhance storage using various blockchain.Base64 encoding AES algorithm are used for providing more Blockchain transactions occur within peer-to-peer network patient SHA-256 is implementing This system protects confidentiality data stored on storage.
منابع مشابه
overview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملanalysis of reading comprehension needs of the students of paramedical studies: the case of the students of health information management (him)
چکیده ندارد.
15 صفحه اولA Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage
Cloud computing is growing at a rapid pace, because of its promising low investment practices and the ease of access to data and services. But the security of sensitive data is an open challenge in untrusted cloud environments. Due to the single point failure model, single clouds possess the risk of service unavailability. The possibility of insider attacks in single clouds is also worrying clo...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملfrom linguistics to literature: a linguistic approach to the study of linguistic deviations in the turkish divan of shahriar
chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of scientific research in computer science, engineering and information technology
سال: 2022
ISSN: ['2456-3307']
DOI: https://doi.org/10.32628/cseit228416