Professional Documents
Culture Documents
BlockChian Healthcare Synopsis
BlockChian Healthcare Synopsis
Infrastructure
Introduction
The blockchain network as a decentralized system is more resilient in that there is no single-
point attack or failure compare to centralized systems. However, since all the bitcoin transactions
are public and everybody has access, there already exist analytics tools that identify the
participants in the network based on the transaction history. With popularity analytics, similarity
or closeness among topics within large volume of data can be detected. Groups of items or topics
can be system generated using closeness relationship formulation. As information flows among
different nodes in bitcoin network, Bitcoin transaction is slow due to the fact that information
needs to be propagated across the network to synchronize the ledger replicas. The slow
dissemination of information exposes a potential security hole for the malicious attacks. Some
measures have been implemented to mitigate the number of the blockchain forks in the network
by 50%. However, a long-term solution is still needed. Like any other networks, Bitcoin network
is no exception when it comes to malicious attacks. One of the notable form of attack against
Bitcoin network topology is eclipsing attack by using information propagation knowledge.
Bitcoin peer-to-peer network topology can be inferred and utilized by malicious attackers to
perform precise attacks such as eclipsing attack. By observing the flooding process of the
information flow, a flooding network’s topology can be inferred. A network topology inference
method has been proposed along with a proof of concept in real network. The critical players of
bitcoin transactions can be identified use various network centrality metrics. Blockchain might
replace conventional methods of keeping track of valuable information such as contracts,
intellectual-property rights, and corporate accountings. Personal healthcare records need to be
protected with the highest standard. With the increasing number of data breach incidents in the
past several years, the awareness of the general public about the personal data privacy will
continue to increasing. The necessity for data privacy will grow stronger with an increasing
number of services and device collecting our personal data associated with our personal identity.
There are techniques that obfuscate the linking of pseudonymous address and the real person
such as Coin Join.
Literature Survey
Methodology: - It was first conceptualized in 2008 which implemented in the successive year as
a core component of the digital currency bitcoin, which works as a public ledger of all
transactions. Digital voting through block chain technology has some issues and effectiveness
but our concern is to focused that how much system make this technique more effective. Here,
our main focus is that how system can implement this technique in our daily life. Our country
India is deeply interested for future use and lots of efforts are being done to overcome the
security issues as early as possible.
2: Title: Electronic voting machine based on Blockchain technology and Aadhar verification
Author: Navya A., Roopini R., SaiNiranjan A. S. et. Al
Description:-Systempresented in the Electronic voting machine based on Blockchain technology
and Aadhar verification that A nation with less voting percentage will struggle to develop as
choosing a right leader for the nation is very essential. Our proposed system designed to provide
a secure data and a trustworthy election amongst the people of the democracy. Since aadhar card
is the most needed for a person identity hence deploying an election process using it is highly
recommendable. Blockchain will be publicly verifiable and distributed in a way that no one will
be able to corrupt it.
Methodology: -The proposed system is mainly designed for our country based on Aadhar
verification where the details of the persons who are above 18years are extracted from aadhar
card database since it had become mandatory in the present scenario. To ensure more security,
finger print of voter is used as the main authentication resource. The system will allow the voter
to vote through his finger print. As soon as they cast their vote, blockchain technology comes
into existence which is integrated inside EVM. By adopting Blockchain in the distribution of
databases can reduce one of the cheating sources of database manipulation. This research
discusses the recording of the voting result in blockchain algorithm from every place of election.
3: Title: E-Voting with Blockchain: An E-Voting Protocol with Decentralization and Voter
Privacy
Author: Hardwick, Freya Sheer, Raja NaeemAkram, and KonstantinosMarkantonakis
Description:- E-Voting with Blockchain: An E-Voting Protocol with Decentralization and Voter
Privacy that a potential solutionto the lack of interest in voting amongst the young tech
savvypopulation. For e-voting to become more open, transparent, and independently auditable, a
potential solution would be base it on block chain technology. This paper explores the potential
of the block chain technology and its usefulness in the e-voting scheme. an e-voting scheme,
which is then implemented.
Methodology: -The implementation and related performance measurements are given in the
paper along with the challenges presented by the block chain platform to develop a complex
application like e-voting. The paper highlights some shortcomings and presents two potential
paths forward to improve the underlying platform (block chain technology)to support e-voting
and other similar applications. Block chain technology has a lot of promise; hosystemver, in its
current state it might not reach its full potential. There needs to be concerted effort in the core
block chain technology research to improve is features and support for complex applications that
can execute within the block chain network.
Methodology: - This is hard to achieve, because electronic voting systems need a strong
encryption to guarantee security, integrity and anonymity of the vote. This must be ensured and
still result in a user-friendly application, which is often hard to achieve. But to assume that
traditional elections are completely secure and correct is also questionable, as system already so,
this is a good opportunity to think about reinventing elections with the help of computers and
cryptography.
5: Title: A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
Author: Panja, Somnath, and Bimal Kumar Roy
Description:- Systempresented in the secure end-to-end verifiable e-voting system using zero
knowledge based blockchain that present a cryptographic technique for an authenticated, end-to-
end verifiable and secret ballot election. Voters should receive assurance that their vote is cast as
intended, recorded as cast and tallied as recorded. The election system as a whole should ensure
that voter coercion is unlikely, even when voters are willing to be influenced. Currently, almost
all verifiable e-voting systems require trusted authorities to perform the tallying process. An
exception is the DRE-i and DRE-ip system. The DRE-ip system removes the requirement of
tallying authorities by encrypting ballot in such a way that the election tally can be publicly
verified without decrypting cast ballots. Hosystemver, the DRE-ip system necessitates a secure
bulletin board (BB) for storing the encrypted ballot as without it the integrity of the system may
be lost and the result can be compromised without detection during the audit phase.
Methodology: - System have modified the DRE-ip system so that if any recorded ballot is
tempered by an adversary before the tallying phase, it will be detected during the tallying phase.
In addition, system have described a method using zero knowledge based public blockchain to
store these ballots so that it remains tamper proof. To the best of our knowledge, it is the first
end-to end verifiable Direct-recording electronic (DRE) based e-voting system using blockchain.
In our case, system assume that the bulletin board is insecure and an adversary as read and write
access to the bulletin board. System have also added a secure biometric with government
provided identity card based authentication mechanism for voter authentication. System is able
to encrypt ballot in such a way that the election tally can be publicly verified without decrypting
cast ballots maintaining end-to-end verifiability and without requiring the secure bulletin board.
Problem Statement
In the propsoed research work to design and implement a system for health care data, where user
can store all information in single blockchain without any Trusted Third Party (TTP) in fog
computing environment. The system also carried out data integrity, confidentiality as well as
eliminate the incinsistency for end user.
Objectives
To deisign appraoch for health insurance company where system store all hostorical data
into block chain manner.
To create a fog computing environment hierarcy for paralel data processing for end users
applications.
To design impelement own SHA family block for whole blockchain.
Each transaction has stored on dependant blockchain in cloud environment.
To design and implement a new mining technique for generate new block for each
transaction.
To imepement a varification algorithm which can validate each peer on every access
request.
Proposed System architecture
References
[1]Gupta A, Patel J, Gupta M, Gupta H., (2017), Issues and Effectiveness of Blockchain
Technology on Digital Voting.International Journal of Engineering and Manufacturing Science,
Vol. 7, No. 1
[2] Navya A., Roopini R., SaiNiranjan A. S. et. Al, Electronic voting machine based on
Blockchain technology and Aadhar verification, International Journal of Advance Research,
Ideas and Innovations in Technology, (Volume 4, Issue 2)
[3] Hardwick, Freya Sheer, Raja NaeemAkram, and KonstantinosMarkantonakis. "E-Voting with
Blockchain: An E-Voting Protocol with Decentralization and Voter Privacy." arXiv preprint
arXiv:1805.10258 (2018).
[6] Martin A Makary and Michael Daniel. Medical error-the third leading cause of death in the
us. BMJ: British Medical Journal (Online), 353, 2016
[7] Paul TakShing Liu. Medical record system using blockchain, big data and tokenization. In
International Conference on Information and Communications Security, pages 254–261.
Springer, 2016.[8] Christian Decker and Roger Wattenhofer.Information propagation in the
bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International
Conference on, pages 1–10. IEEE, 2013.
[9] Till Neudecker, Philipp Andelfinger, and Hannes Hartenstein. Timing analysis for inferring
the topology of the bitcoin peer-to-peer network. In Ubiquitous Intelligence & Computing,
Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big
Data Computing, Internet of People, and Smart World Congress
(UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 Intl IEEE Conferences, pages 358–367.
IEEE, 2016.
[12] Dongsheng Zhang and James P.G. Sterbenz.Modelling critical node attacks in MANETs. In
Self-Organizing Systems, volume 8221 of Lecture Notes in Computer Science, pages 127–138.
Springer Berlin Heidelberg, 2014.
[13] Dongsheng Zhang and James P. G. Sterbenz. Analysis of Critical Node Attacks in Mobile
Ad Hoc Networks. In Proceedings of the 6th IEEE/IFIP International Workshop on Reliable
Networks Design and Modeling (RNDM), pages 171–178, Barcelona, Spain, November 2014.
[14] Dongsheng Zhang, Santosh AjithGogi, Dan S. Broyles, Egemen K. C¸ etinkaya, and James
P.G. Sterbenz.Modelling Wireless Challenges. In Proceedings of the 18th ACM Annual
International Conference on Mobile Computing and Networking (MobiCom), pages 423–425,
Istanbul, August 2012. Extended Abstract.
[15] Dongsheng Zhang, Santosh AjithGogi, Dan S. Broyles, Egemen K. C¸ etinkaya, and James
P.G. Sterbenz.Modelling Attacks and Challenges to Wireless Networks. In Proceedings of the
4th IEEE/IFIP International Workshop on Reliable Networks Design and Modeling (RNDM),
pages 806–812, St. Petersburg, October 2012.
[16] Dongsheng Zhang and James P. G. Sterbenz.Measuring the Resilience of Mobile Ad Hoc
Networks with Human Walk Patterns.In Proceedings of the 7th IEEE/IFIP International
Workshop on Reliable Networks Design and Modeling (RNDM), Munich, Germany, October
2015.
[18] Dongsheng Zhang and James P. G. Sterbenz. Robustness analysis of mobile ad hoc
networks using human mobility traces. In Proceedings of the 11th International Conference on
Design of Reliable Communication Networks (DRCN), Kansas City, USA, March 2015.