scholarly journals Design and Application of Electronic Rehabilitation Medical Record (ERMR) Sharing Scheme Based on Blockchain Technology

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jing Zhang ◽  
Zhenjing Li ◽  
Rong Tan ◽  
Cong Liu

As the value of blockchain has been widely recognized, more and more industries are proposing their blockchain solutions, including the rehabilitation medical industry. Blockchain can play a powerful role in the field of rehabilitation medicine, bringing a new research idea to the management of rehabilitation medical data. The electronic rehabilitation medical record (ERMR) contains rich data dimensions, which can provide comprehensive and accurate information for assessing the health of patients, thereby enhancing the effect of rehabilitation treatment. This paper analyzed the data characteristics of ERMR and the application requirements of blockchain in rehabilitation medicine. Based on the basic principles of blockchain, the technical advantages of blockchain used in ERMR sharing have been studied. In addition, this paper designed a blockchain-based ERMR sharing scheme in detail, using the specific technologies of blockchain such as hybrid P2P network, block-chain data structure, asymmetric encryption algorithm, digital signature, and Raft consensus algorithm to achieve distributed storage, data security, privacy protection, data consistency, data traceability, and data ownership in the process of ERMR sharing. The research results of this paper have important practical significance for realizing the safe and efficient sharing of ERMR, and can provide important technical references for the management of rehabilitation medical data with broad application prospects

2021 ◽  
pp. 1-16
Author(s):  
Ekaterina Alexandrovna Bakhvalova ◽  
Vladimir Anatolievich Sudakov

In this paper, several consensus algorithms are investigated, a comparative analysis of these algorithms is made, the results of which are important in the context of the active growth of the cryptocurrency market. In addition, in the context of pandemics, the creation of blockchain technologies for the distributed storage of reliable medical data is relevant. The key properties of consensus algorithms are highlighted, and a detailed analysis of the algorithm of the promising Istanbul BFT algorithm is carried out. Using multi-criterion analysis of alternatives, it is shown how you can select the appropriate consensus algorithm for the needs of specific tasks.


2017 ◽  
Vol 26 (03) ◽  
pp. 1750002
Author(s):  
Fouad Hanna ◽  
Lionel Droz-Bartholet ◽  
Jean-Christophe Lapayre

The consensus problem has become a key issue in the field of collaborative telemedicine systems because of the need to guarantee the consistency of shared data. In this paper, we focus on the performance of consensus algorithms. First, we studied, in the literature, the most well-known algorithms in the domain. Experiments on these algorithms allowed us to propose a new algorithm that enhances the performance of consensus in different situations. During 2014, we presented our very first initial thoughts to enhance the performance of the consensus algorithms, but the proposed solution gave very moderate results. The goal of this paper is to present a new enhanced consensus algorithm, named Fouad, Lionel and J.-Christophe (FLC). This new algorithm was built on the architecture of the Mostefaoui-Raynal (MR) consensus algorithm and integrates new features and some known techniques in order to enhance the performance of consensus in situations where process crashes are present in the system. The results from our experiments running on the simulation platform Neko show that the FLC algorithm gives the best performance when using a multicast network model on different scenarios: in the first scenario, where there are no process crashes nor wrong suspicion, and even in the second one, where multiple simultaneous process crashes take place in the system.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lina Zhang ◽  
Xuan Dang ◽  
Li Feng ◽  
Junhan Yang

Due to the widespread adoption and popularity of digital images in distributed storage, Secret Image Sharing (SIS) has attracted much attention. However, preventing the cheating of shares is an important problem that needs to be solved in the traditional SIS scheme. An adversary without image shares may participate in the restoration phase as a share owner. In this phase, the adversary can obtain real shares or prevent recovering real images by submitting fake shadows. Our schemes are based on the original Thien-Lin’s scheme. In the scheme I, we use some XOR operations to get two authentication codes through all secret pixel values to achieve a lightweight and fast-calculated authentication scheme for cheating prevention. This scheme is suitable for small devices with limited resources. In scheme II, we use a hash algorithm to generate the authentication code. This scheme is suitable for environments with larger storage space and higher security levels. Since all pixel values are involved in the authentication in our proposed schemes, it can prevent fake shadow images from cheating. Meanwhile, the shadow size is almost the same as the original Thien-Lin’s scheme. Experimental results and theoretical analysis show that the proposed schemes are feasible and effective.


Author(s):  
Neng Huang ◽  
Junxing Zhu ◽  
Chaonian Guo ◽  
Shuhan Cheng ◽  
Xiaoyong Li

With the rapid development of mobile Internet, there is a higher demand for the real-time, reliability and availability of information systems and to prevent the possible systemic risks of information systems, various business consistency standards and regulatory guidelines have been published, such as Recovery Time Object (RTO) and Recovery Point Object (RPO). Some of the current related researches focus on the standards, methods, management tools and technical frameworks of business consistency, while others study the data consistency algorithms in the cases of large data, cloud computing and distributed storage. However, few researchers have studied on how to monitor the data consistency and RPO of production-disaster recovery, and what architecture and technology should be applied in the monitoring. Moreover, in some information systems, due to the complex structures and distributions of data, it is difficult for traditional methods to quickly detect and accurately locate the first error data. Besides, due to the separation of production data center (PDC) and disaster recovery data center (DRDC), it is difficult to calculate the data difference and RPO between the two centers. This paper first discusses the architecture of remote distributed DRDCs. The architecture can make the disaster recovery (DR) system always online and the data always readable, and support the real-time monitoring of data availability, consistency as well as other related indicators, in this way to make DRDC out-of-the-box in disasters. Second, inspired by blockchain, this paper proposes a method to realize real-time monitoring of data consistency and RTO by building hash chains for PDC and DRDC. Third, this paper evaluates the hash chain operations from the algorithm time complexity, the data consistency, and the validity of RPO monitoring algorithms and since DR system is actually a kind of distributed system, the proposed approach can also be applied to the data consistency detection and data difference monitoring in other distributed systems.


Mathematics ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 448 ◽  
Author(s):  
Zhen Wu ◽  
Yining Liu ◽  
Xingxing Jia

With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store their private images in the cloud. Secret image sharing as a significant method has been widely applied in protecting images in the cloud, which reduces the risks of data leakage and data loss. Generally, the secret image sharing scheme would encrypt the secret image into a series of shares and then stored these shares in a cloud. However, when this cloud has been attacked, the secret may meet a risk of leakage. A solution to solve the problem is that the generated shares are distributed storage in multiple clouds. Each cloud is independent and all clouds can have a collaboration to manage the secret image. To address this issue, a novel hierarchical secret image sharing scheme with multi-group joint management is proposed in this paper, which is suitable for protecting the security of the secret image by distributed storage over multiple clouds. In the proposed scheme, the secret image would be shared among multiple groups with different thresholds. The number of each group’s shareholders is determined by a sequence of thresholds. Therefore, the proposed scheme is a hierarchical secret image sharing scheme in which the secret image can be reconstructed if and only if the number of shares has met all threshold conditions. In addition, the generated shares have the same weight, which is more suitable for universal applicability. Both the system analysis and the simulation results prove that the proposed scheme is efficient and practical.


1983 ◽  
Vol 8 (4) ◽  
pp. 307-314 ◽  
Author(s):  
STEPHEN R. ASH ◽  
DANIEL K. ULRICH

Author(s):  
Костянтин Вікторович Павлов ◽  
Сергій Юрійович Ільїн

The problems of assessing the economic security of organizations on the basis of creating an integral system of final (resulting) and intermediate (factor) indicators related to indicators of determining its level in a state of statics and dynamics, given the current situation in the modern era, seem to be very relevant. The purpose of the study is to form an organic system of indicators economic security, providing organizations with the definition of all reserves of economic growth and identification of advantages over competitors on the basis of the current economic mechanism. The methodological basis of the study was the modern legislative and normative legal acts regulating the economic activities of organizations. Research tasks, goal achievement and problem solving are focused on the use of methods of chain substitutions and mathematical analysis, which, complementing each other, provide accurate information about the degree of influence of factor indicators on the resulting indicators, which is necessary for organizations to rank areas that enhance economic security. The main hypothesis of the study was the assumption about the possibility and feasibility of forming a system of indicators for assessing the economic security of organizations. Presentation of the main material. This article is devoted to the analysis of the approach proposed by the authors to assessing economic security as the core of the economic potential of organizations based on the creation of an integral system of final (resulting) and intermediate (factor) indicators related to indicators of determining its level in a state of statics and dynamics. The originality and practical significance is confirmed by our proposed toolkit, which includes factor and resulting indicators in their organic interaction, which makes it possible to objectively assess the economic security of organizations. The practical significance of the study also lies in the fact that these methods are applicable in all organizations, regardless of their economic and legal status, since they are built on general economic postulates and provide for the specifics of the current economic situation. Conclusions and prospects for further research. Having the tools created by the authors, presented by methods for calculating economic security indicators, organizations will qualitatively analyze its general and particular indicators, objectively assessing the final and intermediate desired benchmarks for the effectiveness and cost of activities and the strength of the impact of each of them on the result and costs, objectively subject to an increment in during a certain time interval. In the future, it is planned to develop and expand the proposed system of indicators for assessing economic security, including using a generalized version of this system in relation to other taxonomic objects at the meso-level - to regions and industries.


Author(s):  
Stanislav Vasylishyn ◽  
Oleksandr Ulyanchenko ◽  
Tetiana Bochulia ◽  
Yuliia Herasymenko ◽  
Oleksandr Gorokh

Purpose. Under the conditions of strengthening of the destructive effects of the global economic crisis and the growing number of risks of agribusiness, there is a problem in finding the ways to improve accounting and analytical support as the only reliable source of the relevant and accurate information needed for economic security management. The purpose of the article is to substantiate the directions to improve the analytical basis as a component of accounting and analytical support of economic security management of the agricultural enterprises. Methodology / approach. The methodological basis of the research is a dialectical method of cognition of the complex economic phenomena. Consideration of the analytical support of complex management processes took place using a systematic approach, analysis and synthesis. Using an integral approach, a methodology for assessing and analyzing economic security of the agricultural enterprises is developed. This methodology approach includes the parameters of financial, social, resource and environmental security. Results. The analysis of the theoretical and methodological foundations of accounting and analytical support of economic security management showed a variety of the approaches to the choice of the indicators that describe the level of economic security. The situation is complicated by the need to analyze the information that may be relevant for management decisions in conditions of uncertainty. Under these conditions, it is proposed to implement a model of analytical support for economic security management under conditions of uncertainty and growing risks and threats to the business environment of the agricultural enterprises, which should be based on the use of general economic, statistical, integral and econometric approaches. It is determined that in the process of counteracting the risks and threats of the external and internal environment of the agrarian business the use of the integral methods of assessing economic security of the agricultural enterprises becomes crucial. It is substantiated that the most expedient in terms of achieving strategic goals of the enterprise, maintaining its competitive advantages and ensuring sustainable development is the use of integral assessment of economic security, which should be based on a synergistic approach to analysis of 25 indicators of financial, social, resource and environmental components. The approach was tested on the example of 24 agricultural enterprises of Kharkiv region (Ukraine) of crop specialization (2019). The model is also used to analyze the dynamics of the level of economic security under conditions of individual agricultural enterprises of different organizational and legal forms of management (2014–2019).  Originality / scientific novelty. According to the results of the research, a methodological approach to determination of the integral level of economic security of the agricultural enterprises has been improved, based on the impact of the indicators of its individual components, which, at the same time, improves the analytical support of economic security management and strengthens verification, forecasting, preventive, planning and control functions of accounting and analytical support of management mechanisms. Practical value / implications. The practical significance of the proposed approaches consists of the possibility of positioning the enterprises in terms of optimal, satisfactory, shaky and crisis economic security zones, as well as analyzing the dynamics of the integral level of economic security, which takes into consideration the causal relations of the key areas of the agrarian business under conditions of uncertainty.


1971 ◽  
Vol 10 (03) ◽  
pp. 138-142 ◽  
Author(s):  
M. F. COLLEN ◽  
L. S. DAVIS ◽  
E. E. VAN BRUNT

Computerized data banks require very complex patient record files. Our method of storing medical data from a multiphasic health screening program is described in detail, induding the mechanics for providing on-line medical record linkage.


Sign in / Sign up

Export Citation Format

Share Document