Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Library Philosophy and Practice (e-journal)

Blockchain

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar May 2021

Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

User privacy has been a topmost priority and one such domain where this is neglected is the area of healthcare. Our solution focuses on the idea of using blockchain to provide a platform for healthcare experts and patients, giving patients full control over the data that will be shared. This paper focuses on identifying current research that has been conducted in this area in the form of a bibliometric analysis. A bibliometric study on a research area involves a detailed analysis of citations and papers across a domain of study. The purpose of this study is a statistical analysis of …


A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R. Mar 2021

A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.

Library Philosophy and Practice (e-journal)

Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …