11 research outputs found

    Securing medical records based on inter-planetary file system and blockchain

    Get PDF
    In general, health records include important information like the patient’s history, findings of examinations and assessments, diagnosis reports, documentation of consent, and treatment plans. Sharing this information has grown to be a challenge concerning data security, as it could result in compromising patient privacy. Therefore, the patient's information should not be misused or tampered with. In this paper, a full process of storing and retrieving medical records is proposed using a decentralized system through the integration of two emerging technologies: Blockchain and Inter-Planetary File System (IPFS). The system provides solutions for the major security concerns associated with medical files, including authentication and authorization, database breaches, data integrity of local and cloud storage, and data availability. The obtained results indicate a high level of safety by adding security layers such as confidentiality, authentication, authorization and access control, based on different factors. All these aspects contribute to reaching the aim of the proposed system, which is storing and retrieving medical records in a decentralized and safe manner

    Multi-Format Document Verification System

    Get PDF
    The spread of fake documents claiming to be from official sources on social media has led to increasing levels of skepticism and uncertainty in modern society. Currently, there is no easy access method of verification for documents that can be adopted by the public. This paper proposes a method of a multi-format document verification scheme using digital signatures and blockchain. We employ digital signature algorithms to sign document contents extracted using Optical Character Recognition (OCR) methods and attach this signature to the document by converting it into a 2D barcode format. This code can then be used on a shared document to retrieve the document’s digital signature and OCR can be used to verify the signature. In addition to this, we also provide an alternative method of verification in the form of forgery detection techniques. These signed documents are stored in a decentralized storage solution backed by blockchain technology, increasing the solution's overall reliability and security

    A Proposed Secure Framework for Supply-Chain Management using Blockchain Technology

    Get PDF
    Decentralization increases the performance of the Supply Chain by distributing financial choices more evenly. The technology that is causing the biggest upheaval is the aforementioned challenges that are hampering today's supply chain are addressed by block chain, which is a cost-effective and realistic solution. Many autonomous networks, self-sufficient persons and institutions can emerge and operate in a distributed, dispersed operating environment thanks to block chain. Theblock chain’s data is unchangeable, transparent, and recorded in a distributed ledger that adheres to consensus mechanisms throughout.Hence, the data stored in it cannot be edited and forged i.e., it is trusted if the writer is trusted. Block chain also has its own advantages and setbacks: decentralized network operating in centralized computing devices. Web pages are used to captured changes in original data to malicious data, network synchronization, service outages, and other challenges are some of the issues that could arise in block chain.Thereare several entities and modules involved in the model of this Supply Chain which are tested using an efficient top-down manner in this article. The proposed supply chain management model can be adaptive to various supply chains like food, textile, healthcare and also educational institutions. A comprehensive analysis of the major-cause of numerous threats, susceptibility, and hazards is assisted on the system of supply chain management as imitated in different scenarios

    DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network

    Get PDF
    Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems

    A Model For Collaborative Creation And Ownership Of Digital Products

    Get PDF
    This thesis presents Axone, a system that enables decentralized collaborative creation of digital products through interconnected digital content blocks. Axone provides the provenance of a digital product by storing its history since creation in an immutable Directed Acyclic Graph (DAG) data structure. This history comprises digital content blocks used in its creation, including how they referenced each other in the development of the final digital product. Through referencing, credit attribution is achieved and royalty fees due to the referenced content block are recorded and enforced. Content creators can concurrently work on a succeeding content block to produce various versions of unique digital products from the same original content block. Axone focuses on written work enabling different authors to contribute to a book (the digital product) in the form of chapters (digital content blocks), until its completion. Axone uses blockchain technology and web monetization to provide provenance for each chapter and to stream payments to authors

    DNS-IdM:a blockchain identity management system to secure personal data sharing in a network

    Get PDF
    [EN] Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.Kassem, JA.; Sayeed, S.; Marco-Gisbert, H.; Pervez, Z.; Dahal, K. (2019). DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network. Applied Sciences. 9(15):1-19. https://doi.org/10.3390/app9152953S11991

    Blockchain-based auditing of legal decisions supported by explainable AI and generative AI tools

    Get PDF
    Generative AI tools powered by Large Language Models (LLMs) have demonstrated advanced capabilities in understanding and articulating legal facts closer to the level of legal practitioners. However, scholars hold contrasting views on the reliability of the reasoning behind a decision derived from LLMs due to its black-box nature. Law firms are vigilant in recognizing the potential risks of violating confidentiality and inappropriate exposure of sensitive legal data through the prompt sent to Generative AI. This research attempts to find an equilibrium between responsible usage and control of human legal professionals over content produced by Generative AI through regular audits. It investigates the potential of Generative AI in drafting correspondence for pre-litigation decisions derived from an eXplainable AI (XAI) algorithm. This research presents an end-to-end process of designing the architecture and methodology for a blockchain-based auditing system. It detects unauthorized alterations of data repositories containing the decisions by an XAI model and automated textual explanation by Generative AI. The automated auditing by blockchain facilitates responsible usage of AI technologies and reduces discrepancies in tracing the accountability of adversarial decisions. It conceptualizes the two algorithms. First, strategic on-chain (within blockchain) and off-chain (outside blockchain) data storage in compliance with the data protection laws and critical requirements of stakeholders in a legal firm. Second, auditing by comparison of the unique signature as Merkle roots of files stored off-chain with their immutable blockchain counterpart. A case study on liability cases under tort law demonstrates the system implementation results
    corecore