An Efficient Authentication Scheme for Electronic Health Records based Block Chain


Authors : Swati Laxmeshwar; Deepak N.R

Volume/Issue : Volume 5 - 2020, Issue 6 - June

Google Scholar : http://bitly.ws/9nMw

Scribd : https://bit.ly/31lPfPI

DOI : 10.38124/IJISRT20JUN530

Abstract : This paper presents our current electronic health record ( EHR) systems with a blockchain based architecture.Designed on top of established databases held by health care organizations, the framework incorporates a blockchain approach to ensure data record accuracy and enhance network interoperability by monitoring all incidents that occurt on top of existing health service provider-maintained databases, the architecture implements a blockchain solution to ensure data record integrity and improve system interoperability by tracking all events that occur in database data. We 're also implementing a new reward system in this revised design to build new blocks on the blockchain. The design is autonomous of any particular blockchain network and accessible to more extensions; it may also be combined with other electronic storage structures needing security. It will then theoretically tie in with other electronic storage schemes needing protection from data misuse.

This paper presents our current electronic health record ( EHR) systems with a blockchain based architecture.Designed on top of established databases held by health care organizations, the framework incorporates a blockchain approach to ensure data record accuracy and enhance network interoperability by monitoring all incidents that occurt on top of existing health service provider-maintained databases, the architecture implements a blockchain solution to ensure data record integrity and improve system interoperability by tracking all events that occur in database data. We 're also implementing a new reward system in this revised design to build new blocks on the blockchain. The design is autonomous of any particular blockchain network and accessible to more extensions; it may also be combined with other electronic storage structures needing security. It will then theoretically tie in with other electronic storage schemes needing protection from data misuse.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe