A centralized data validation approach for distributed healthcare systems in dew-fog computing environment using blockchain
| dc.contributor.author | Simpson G. | |
| dc.contributor.author | Quist-Aphetsi K. | |
| dc.date.accessioned | 2025-03-06T18:11:43Z | |
| dc.date.accessioned | 2025-03-06T18:58:55Z | |
| dc.date.issued | 2019 | |
| dc.description.abstract | Patients healthcare data should be securely available and accessible to authorized users when needed to facilitate healthcare professionals to make a decision regarding patients. Data from dew systems should be synchronized with the data in the cloud when there is connectivity. Validation of data from the dew system should be done by the cloud server to ensure patients data integrity. This paper proposes an adoption of a framework that validates centralized data for distributed healthcare systems in a dew-fog computing environment using tiger hash function to provide integrity to patient data. � 2019 IEEE. | |
| dc.identifier.doi | 10.1109/ICSIoT47925.2019.00006 | |
| dc.identifier.isbn | 978-172817417-4 | |
| dc.identifier.uri | http://162.250.124.58:4000/handle/123456789/353 | |
| dc.language.iso | en | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.source | Proceedings - 2019 International Conference on Cyber Security and Internet of Things, ICSIoT 2019 | |
| dc.subject | Blockchain | |
| dc.subject | Centralized data | |
| dc.subject | Cloud computing | |
| dc.subject | Dew computing | |
| dc.subject | Fog computing | |
| dc.subject | Tiger hash functions | |
| dc.title | A centralized data validation approach for distributed healthcare systems in dew-fog computing environment using blockchain | |
| dc.type | Other | |
| oaire.citation.conferenceDate | 29 May 2019 through 31 May 2019 | |
| oaire.citation.conferencePlace | Accra |
