Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

University of Nebraska - Lincoln

Blockchain

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar May 2021

Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

User privacy has been a topmost priority and one such domain where this is neglected is the area of healthcare. Our solution focuses on the idea of using blockchain to provide a platform for healthcare experts and patients, giving patients full control over the data that will be shared. This paper focuses on identifying current research that has been conducted in this area in the form of a bibliometric analysis. A bibliometric study on a research area involves a detailed analysis of citations and papers across a domain of study. The purpose of this study is a statistical analysis of …


A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R. Mar 2021

A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.

Library Philosophy and Practice (e-journal)

Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …


Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang Jan 2018

Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang

Department of Electrical and Computer Engineering: Faculty Publications

Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their …


Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang Jan 2018

Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang

Department of Electrical and Computer Engineering: Faculty Publications

Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their …