A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence

A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence

Yogesh Sharma, Balamurugan Balusamy
DOI: 10.4018/IJMCMC.289164
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Blockchain-based technique is developed for privacy protection using tensor product and a hybrid swarm intelligence-based coefficient generation. Initially, the blockchain data with mixed attributes was subjected to the privacy preservation process, in which the raw data matrix and solitude and utility (SU) coefficient were multiplied through the tensor product. Thus, the derivation of the SU coefficient, which handles both sensitive information and utility, was formulated as a searching problem. Then, the proposed algorithm was introduced to evaluate the SU coefficient. The performance of the developed technique was evaluated by means of accuracy and information loss. The achieved results have shown that the developed hybrid sward intelligence reached a maximal accuracy of 0.840 and minimal information loss of 0.159 using dataset-2 compared to the existing system.
Article Preview
Top

1. Introduction

EMR is considered a fundamental form of health care data which gained popularity since ancient times. Health care data sharing is the critical method for enhancing the healthcare quality service and for reducing the medical cost. Although EMRs contain highly sensitive information that is necessary for clinical treatment and diagnosis, EMR needs a more effective approach to enhance the medical services (Liu et al., 2018). The World Health Organization (WHO) has previously determined that sharing of the health data goes much beyond the primary clinical use (Amofa et al., 2018). Sharing of health care data has numerous benefits, such as maximizing the knowledge of the trends and pattern in their public health care and also it determines the diseases by effective medical quality care (Bordea et al., 2015) and provides doctors easy access of information to provide better recommendations for treatment plans (Catani et al., 2021), making budgets for the national health-based service to promote the comfort and health of patients (Zhang et al., 2016). Medical information (Fusini et al., 2016) is scattered among various clinical institutions, and the data standards considered in the various clinical institutions are different, thereby causing a low level of interoperability for the clinical services. There is no assurance provided for the reliability and integrity of patient’s medical information. The issues based on the clinical data loss are inevitable. The loss of personal data particularly a loss in medical data or privacy leaks which may lead to numerous threats, such as malicious attacks, hacking and natural-based disasters. In clinical institutions, the clinical data are arranged in a centralized manner, which is more prone to numerous issues, namely attacks, natural-based disasters, and hacking, thereby resulting in a loss of medical data.

In medical organizations, the information based on the health services can be shared securely so that the data can be efficiently handled. But, numerous challenges are raised concerning security, interoperability, and privacy-based operations. Initially, health data is collected from personal wearable devices, medical devices, and manual input using the mobile application. And then, the centralized architecture is utilized for the trust-based services. However, there are different challenges to security, privacy, and interoperability. The users having limited control for the information remain as an issue (Liang et al., 2017). There may arise numerous issues based on the processing of data (Xu, 2020), security of data, the privacy of the data since the industry based on health care depends on many records. Privacy-based health care provides the processing and accessing of the data (Wang, 2020) efficiently and securely. Moreover, security-based services are provided to protect the data from intruders and listeners (Omar et al., 2017). In addition, block chain-bases services are utilized to provide the secure handling of the data (Arul et al., 2019) and the level of security can be improved in various applications. Blockchain methods are capable of facilitating the protection for the data transmission in the decentralized smart grids trading scheme. The series of blockchain methods are used to successfully provide anonymous-based encryption and flexible energy trading, privacy-based security in the multi-signature, and various applications. Blockchain can also be utilized to handling content delivery (Zhu et al., 2019).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing