Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (38)

Search Parameters:
Keywords = distributed personal data store

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 8110 KB  
Article
A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption
by Xin Li, Minsheng Tan and Wenlong Tian
Future Internet 2026, 18(1), 47; https://doi.org/10.3390/fi18010047 - 12 Jan 2026
Viewed by 478
Abstract
A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are characterized by strong identity binding, the need for long-term [...] Read more.
A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are characterized by strong identity binding, the need for long-term retention, frequent cross-institutional verification, and sensitive information. Compared with electronic health records and government archives, they face more complex security, privacy protection, and storage scalability challenges during sharing. These records not only contain sensitive data such as personal identity and academic performance but also serve as crucial evidence in key scenarios such as further education, employment, and professional title evaluation. Leakage or tampering could have irreversible impacts on a student’s career development. Furthermore, traditional blockchain technology faces storage capacity limitations when storing massive academic records, and existing general electronic record sharing solutions struggle to meet the high-frequency verification demands of educational authorities, universities, and employers for academic data. This study proposes a dedicated sharing framework for students’ electronic academic records, leveraging PRE technology and the distributed ledger characteristics of blockchain to ensure transparency and immutability during sharing. By integrating the InterPlanetary File System (IPFS) with Ethereum Smart Contract (SC), it addresses blockchain storage bottlenecks, enabling secure storage and efficient sharing of academic records. Relying on optimized ZKP technology, it supports verifying the authenticity and integrity of records without revealing sensitive content. Furthermore, the introduction of gate circuit merging, constant folding techniques, Field-Programmable Gate Array (FPGA) hardware acceleration, and the efficient Bulletproofs algorithm alleviates the high computational complexity of ZKP, significantly reducing proof generation time. The experimental results demonstrate that the framework, while ensuring strong privacy protection, can meet the cross-scenario sharing needs of student records and significantly improve sharing efficiency and security. Therefore, this method exhibits superior security and performance in privacy-preserving scenarios. This framework can be applied to scenarios such as cross-institutional academic certification, employer background checks, and long-term management of academic records by educational authorities, providing secure and efficient technical support for the sharing of electronic academic credentials in the digital education ecosystem. Full article
Show Figures

Graphical abstract

24 pages, 8692 KB  
Article
APDP-FL: Personalized Federated Learning Based on Adaptive Differential Privacy
by Feng Guo, Ruoxu Wang, Jiuru Wang, Chen Yang, Zhuo Liu and Hongtao Li
Symmetry 2025, 17(12), 2023; https://doi.org/10.3390/sym17122023 - 24 Nov 2025
Viewed by 1047
Abstract
Frequent gradient exchange and heterogeneous data distribution in federated learning can lead to serious privacy leakage risks. Traditional privacy-preserving strategies fail to meet the personalized privacy needs from different users and may cause a decrease in model accuracy and convergence difficulties. The symmetry [...] Read more.
Frequent gradient exchange and heterogeneous data distribution in federated learning can lead to serious privacy leakage risks. Traditional privacy-preserving strategies fail to meet the personalized privacy needs from different users and may cause a decrease in model accuracy and convergence difficulties. The symmetry of federated learning may lead to the insufficiency of contribution evaluation mechanisms in protecting the privacy of sensitive data holders. However, federated learning avoids the risk of privacy leakage caused by data centralization because the raw data is always stored on the local device during the training process, and only encrypted model parameters or gradient updates are exchanged. To address these issues, this paper proposes an adaptive personalized differential privacy federated learning scheme APDP-FL. First, we propose an adaptive noise addition method that scores each round of training based on the parameters generated during training and dynamically adjusts the noise level for the next round. This method adds larger noise scales in the early stages of training, consuming less privacy budget, and gradually reduces noise addition during training to accelerate model convergence. Second, we design a personalized privacy protection strategy that adds noise tailored to individual needs for participating clients based on their privacy preferences. This solves the problem of insufficient or excessive privacy protection for some participants due to identical privacy budget sets for all clients, achieving personalized privacy protection for clients. Finally, we conduct extensive experimental simulations, comparisons, and analyses on three real federated datasets, MNIST, FMNIST, and CIFAR-10, verifying the advantages of APDP-FL in terms of privacy protection, model accuracy, and convergence speed. Full article
Show Figures

Figure 1

16 pages, 1949 KB  
Article
Secure Integration of Sensor Networks and Distributed Web Systems for Electronic Health Records and Custom CRM
by Marian Ileana, Pavel Petrov and Vassil Milev
Sensors 2025, 25(16), 5102; https://doi.org/10.3390/s25165102 - 17 Aug 2025
Cited by 2 | Viewed by 1219
Abstract
In the context of modern healthcare, the integration of sensor networks into electronic health record (EHR) systems introduces new opportunities and challenges related to data privacy, security, and interoperability. This paper proposes a secure distributed web system architecture that integrates real-time sensor data [...] Read more.
In the context of modern healthcare, the integration of sensor networks into electronic health record (EHR) systems introduces new opportunities and challenges related to data privacy, security, and interoperability. This paper proposes a secure distributed web system architecture that integrates real-time sensor data with a custom customer relationship management (CRM) module to optimize patient monitoring and clinical decision-making. The architecture leverages IoT-enabled medical sensors to capture physiological signals, which are transmitted through secure communication channels and stored in a modular EHR system. Security mechanisms such as data encryption, role-based access control, and distributed authentication are embedded to address threats related to unauthorized access and data breaches. The CRM system enables personalized healthcare management while respecting strict privacy constraints defined by current healthcare standards. Experimental simulations validate the scalability, latency, and data protection performance of the proposed system. The results confirm the potential of combining CRM, sensor data, and distributed technologies to enhance healthcare delivery while ensuring privacy and security compliance. Full article
(This article belongs to the Special Issue Privacy and Security in Sensor Networks)
Show Figures

Figure 1

18 pages, 12587 KB  
Article
Indirect Electrostatic Discharge (ESD) Effects on Shielded Components Installed in MV/LV Substations
by Giuseppe Attolini, Salvatore Celozzi and Erika Stracqualursi
Energies 2025, 18(5), 1056; https://doi.org/10.3390/en18051056 - 21 Feb 2025
Cited by 1 | Viewed by 1425
Abstract
Standards describing the test procedures recommended to investigate the shielding effectiveness of enclosures have two major issues: they generally prescribe the assessment of the electromagnetic field of empty cavities, and they do not deal with very small enclosures. However, the dimensions of some [...] Read more.
Standards describing the test procedures recommended to investigate the shielding effectiveness of enclosures have two major issues: they generally prescribe the assessment of the electromagnetic field of empty cavities, and they do not deal with very small enclosures. However, the dimensions of some very common shielded apparatus are smaller than those considered in the standards and the electromagnetic field distribution inside the shielded structure is strongly affected by the enclosure content. In this paper, both issues have been investigated for two components commonly used in medium voltage/low voltage (MV/LV) substations: a mini personal computer used to store, process, and transmit relevant data on the status of the electric network, with these aspects being essential in smart grids, and an electronic relay which is ubiquitous in MV/LV substations. Both components are partially contained in a metallic enclosure which provides a certain amount of electromagnetic shielding against external interferences. It is observed that an electrostatic discharge may cause a failure and/or a loss of data, requiring an improvement of shielding characteristics or a wise choice of the positions where the most sensitive devices are installed inside the enclosure. Since the dimensions of very small enclosures, fully occupied by their internal components, do not allow for the insertion of sensors inside the protected volume, numerical analysis is considered as the only way for the appraisal of the effects induced by a typical source of interference, such as an electrostatic discharge. Full article
(This article belongs to the Section F3: Power Electronics)
Show Figures

Figure 1

34 pages, 1906 KB  
Essay
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
by Chaoyue Song, Lifeng Chen, Xuguang Wu and Yu Li
Sensors 2025, 25(1), 160; https://doi.org/10.3390/s25010160 - 30 Dec 2024
Cited by 1 | Viewed by 1901
Abstract
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain [...] Read more.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions. Nevertheless, the centralized storage architecture of traditional cloud servers is susceptible to single points of failure, potentially leading to system outages. To achieve secure data sharing, access control, and verification auditing, we propose a data security sharing scheme based on blockchain technology and attribute-based encryption, applied within the InterPlanetary File System (IPFS). This scheme employs multi-agent systems and attribute-based signcryption algorithms to process data, thereby enhancing privacy protection and verifying data holdership. The encrypted data are then stored in the distributed IPFS, with the returned hash values and access control policies uploaded to smart contracts, facilitating automated fine-grained access control services. Finally, blockchain data auditing is performed to ensure data integrity and accuracy. The results indicate that this scheme is practical and effective compared to existing solutions. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

16 pages, 785 KB  
Article
Information and Computing Ecosystem’s Architecture for Monitoring and Forecasting Natural Disasters
by Valeria Gribova and Dmitry Kharitonov
Computers 2024, 13(12), 334; https://doi.org/10.3390/computers13120334 - 13 Dec 2024
Viewed by 6087
Abstract
Monitoring natural phenomena using a variety of methods to predict disasters is a trend that is growing over time. However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and [...] Read more.
Monitoring natural phenomena using a variety of methods to predict disasters is a trend that is growing over time. However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and information systems for data processing. As part of a large project to create a planetary observatory that combines data from spatially distributed geosphere monitoring systems, the efforts of leading institutes of the Russian Academy of Sciences are also aimed at creating an information and computing ecosystem to unite researchers processing and analyzing the data obtained. This article provides a brief overview of the current state of publications on information ecosystems in various applied fields, and it also proposes a concept for an ecosystem on a multiagent basis with unique technical features. The concept of the ecosystem includes the following: the ability to function in a heterogeneous environment on federal principles, the parallelization of data processing between agents using Petri nets as a mechanism ensuring the correct execution of data processing scenarios, the concept of georeferenced alarm events requiring ecosystem reactions and possible notification of responsible persons, and multilevel information protection allowing data owners to control access at each stage of information processing. Full article
(This article belongs to the Section Cloud Continuum and Enabled Applications)
Show Figures

Graphical abstract

20 pages, 902 KB  
Article
Pharmacists’ Knowledge, Perception, and Prescribing Practice of Probiotics in the UAE: A Cross-Sectional Study
by Maram O. Abbas, Hanan Ahmed, Eisha Hamid, Dyshania Padayachee, Menah Talla Abdulbadia, Sohila Khalid, Ahmed Abuelhana and Bazigha K. Abdul Rasool
Antibiotics 2024, 13(10), 967; https://doi.org/10.3390/antibiotics13100967 - 13 Oct 2024
Cited by 3 | Viewed by 5044
Abstract
Background: The human body is a complex and interconnected system where trillions of microorganisms, collectively known as the gut microbiota, coexist with these cells. Besides maintaining digestive health, this relationship also impacts well-being, including immune function, metabolism, and mental health. As frontline healthcare [...] Read more.
Background: The human body is a complex and interconnected system where trillions of microorganisms, collectively known as the gut microbiota, coexist with these cells. Besides maintaining digestive health, this relationship also impacts well-being, including immune function, metabolism, and mental health. As frontline healthcare providers, pharmacists are pivotal in promoting the benefits of probiotics for immune support. This study explored pharmacists’ knowledge, perception, and practice behavior in the UAE towards the implication of probiotic application beyond digestive health, such as cardiovascular and mental health impacts and their diverse dosage forms. Method: An online self-administered survey was distributed among pharmacists in the UAE. Data were collected through personal visits to pharmacies, where pharmacists were approached and asked to complete the questionnaire. The sample size included 407 pharmacists, determined using the formula for proportions with a 95% confidence level and a 5% margin of error. Statistical analysis was performed using SPSS version 29. Descriptive statistics were used to summarize demographic characteristics and survey responses. The knowledge levels were categorized into poor, moderate, and good. Chi-square analysis was employed to investigate associations between demographic factors and knowledge levels, with a significance level set at p < 0.05, enhancing the robustness of the study’s findings. Results: This study included 407 completed eligible responses. About 63.56% of participants were female, with 52.1% employed in pharmacy chains. While 91.2% of pharmacists recognized probiotics’ role in immune support, only 30% were aware of their cardiovascular benefits. Moreover, chewing gum was the least known dosage form of probiotics, recognized by only 16.7% of respondents. Additionally, only 57% of the participants recognized liposomes as a dosage form. In practice, most pharmacists recommended storing probiotics at room temperature, accounting for 66.6%. The most prevalent misconception encountered in the pharmacy setting was the belief that probiotics are primarily intended for gastrointestinal tract problems, at 79.1% of the respondents. Regarding perception, the agreement was observed regarding the safety of probiotics for all ages. Perceived barriers included the high cost of probiotics, with the majority (86.5%) indicating this as a significant obstacle, while lack of demand was identified as the minor barrier by 64.6%. Additionally, an association was found at a significance level of p < 0.05 with knowledge, gender, educational level, type and location of pharmacy, and source of information. Conclusions: The study highlights knowledge gaps in pharmacists’ understanding of probiotic applications beyond digestive health, particularly cardiovascular health and depression. Targeted educational interventions are necessary to address these gaps. The findings underscore the importance of ongoing professional development for pharmacists, enhancing their role in patient education and the promotion of probiotics for overall health. Full article
Show Figures

Figure 1

23 pages, 4202 KB  
Article
An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing
by Dong Yang and Wei-Tek Tsai
Entropy 2024, 26(8), 690; https://doi.org/10.3390/e26080690 - 15 Aug 2024
Cited by 5 | Viewed by 2905
Abstract
In recent years, with the rapid development of blockchain technology, the issues of storage load and data security have attracted increasing attention. Due to the immutable nature of data on the blockchain, where data can only be added and not deleted, there is [...] Read more.
In recent years, with the rapid development of blockchain technology, the issues of storage load and data security have attracted increasing attention. Due to the immutable nature of data on the blockchain, where data can only be added and not deleted, there is a significant increase in storage pressure on blockchain nodes. In order to alleviate this burden, this paper proposes a blockchain data storage strategy based on a hot and cold block mechanism. It employs a block heat evaluation algorithm to assess the historical and correlation-based heat indicators of blocks, enabling the identification of frequently accessed block data for storage within the blockchain nodes. Conversely, less frequently accessed or “cold” block data are offloaded to cloud storage systems. This approach effectively reduces the overall storage pressure on blockchain nodes. Furthermore, in applications such as healthcare and government services that utilize blockchain technology, it is essential to encrypt stored data to safeguard personal privacy and enforce access control measures. To address this need, we introduce a blockchain data encryption storage mechanism based on threshold secret sharing. Leveraging threshold secret sharing technology, the encryption key for blockchain data is fragmented into multiple segments and distributed across network nodes. These encrypted key segments are further secured through additional encryption using public keys before being stored. This method serves to significantly increase attackers’ costs associated with accessing blockchain data. Additionally, our proposed encryption scheme ensures that each block has an associated encryption key that is stored alongside its corresponding block data. This design effectively mitigates vulnerabilities such as weak password attacks. Experimental results demonstrate that our approach achieves efficient encrypted storage of data while concurrently reducing the storage pressure experienced by blockchain nodes. Full article
(This article belongs to the Special Issue Cryptography and Data Security Based on Information Theory)
Show Figures

Figure 1

11 pages, 579 KB  
Review
Revolutionizing Cancer Research: The Impact of Artificial Intelligence in Digital Biobanking
by Chiara Frascarelli, Giuseppina Bonizzi, Camilla Rosella Musico, Eltjona Mane, Cristina Cassi, Elena Guerini Rocco, Annarosa Farina, Aldo Scarpa, Rita Lawlor, Luca Reggiani Bonetti, Stefania Caramaschi, Albino Eccher, Stefano Marletta and Nicola Fusco
J. Pers. Med. 2023, 13(9), 1390; https://doi.org/10.3390/jpm13091390 - 16 Sep 2023
Cited by 30 | Viewed by 5618
Abstract
Background. Biobanks are vital research infrastructures aiming to collect, process, store, and distribute biological specimens along with associated data in an organized and governed manner. Exploiting diverse datasets produced by the biobanks and the downstream research from various sources and integrating bioinformatics and [...] Read more.
Background. Biobanks are vital research infrastructures aiming to collect, process, store, and distribute biological specimens along with associated data in an organized and governed manner. Exploiting diverse datasets produced by the biobanks and the downstream research from various sources and integrating bioinformatics and “omics” data has proven instrumental in advancing research such as cancer research. Biobanks offer different types of biological samples matched with rich datasets comprising clinicopathologic information. As digital pathology and artificial intelligence (AI) have entered the precision medicine arena, biobanks are progressively transitioning from mere biorepositories to integrated computational databanks. Consequently, the application of AI and machine learning on these biobank datasets holds huge potential to profoundly impact cancer research. Methods. In this paper, we explore how AI and machine learning can respond to the digital evolution of biobanks with flexibility, solutions, and effective services. We look at the different data that ranges from specimen-related data, including digital images, patient health records and downstream genetic/genomic data and resulting “Big Data” and the analytic approaches used for analysis. Results. These cutting-edge technologies can address the challenges faced by translational and clinical research, enhancing their capabilities in data management, analysis, and interpretation. By leveraging AI, biobanks can unlock valuable insights from their vast repositories, enabling the identification of novel biomarkers, prediction of treatment responses, and ultimately facilitating the development of personalized cancer therapies. Conclusions. The integration of biobanking with AI has the potential not only to expand the current understanding of cancer biology but also to pave the way for more precise, patient-centric healthcare strategies. Full article
(This article belongs to the Section Methodology, Drug and Device Discovery)
Show Figures

Figure 1

41 pages, 772 KB  
Article
Empowering Precision Medicine: Unlocking Revolutionary Insights through Blockchain-Enabled Federated Learning and Electronic Medical Records
by Aitizaz Ali, Bander Ali Saleh Al-rimy, Ting Tin Tin, Saad Nasser Altamimi, Sultan Noman Qasem and Faisal Saeed
Sensors 2023, 23(17), 7476; https://doi.org/10.3390/s23177476 - 28 Aug 2023
Cited by 52 | Viewed by 5607
Abstract
Precision medicine has emerged as a transformative approach to healthcare, aiming to deliver personalized treatments and therapies tailored to individual patients. However, the realization of precision medicine relies heavily on the availability of comprehensive and diverse medical data. In this context, blockchain-enabled federated [...] Read more.
Precision medicine has emerged as a transformative approach to healthcare, aiming to deliver personalized treatments and therapies tailored to individual patients. However, the realization of precision medicine relies heavily on the availability of comprehensive and diverse medical data. In this context, blockchain-enabled federated learning, coupled with electronic medical records (EMRs), presents a groundbreaking solution to unlock revolutionary insights in precision medicine. This abstract explores the potential of blockchain technology to empower precision medicine by enabling secure and decentralized data sharing and analysis. By leveraging blockchain’s immutability, transparency, and cryptographic protocols, federated learning can be conducted on distributed EMR datasets without compromising patient privacy. The integration of blockchain technology ensures data integrity, traceability, and consent management, thereby addressing critical concerns associated with data privacy and security. Through the federated learning paradigm, healthcare institutions and research organizations can collaboratively train machine learning models on locally stored EMR data, without the need for data centralization. The blockchain acts as a decentralized ledger, securely recording the training process and aggregating model updates while preserving data privacy at its source. This approach allows the discovery of patterns, correlations, and novel insights across a wide range of medical conditions and patient populations. By unlocking revolutionary insights through blockchain-enabled federated learning and EMRs, precision medicine can revolutionize healthcare delivery. This paradigm shift has the potential to improve diagnosis accuracy, optimize treatment plans, identify subpopulations for clinical trials, and expedite the development of novel therapies. Furthermore, the transparent and auditable nature of blockchain technology enhances trust among stakeholders, enabling greater collaboration, data sharing, and collective intelligence in the pursuit of advancing precision medicine. In conclusion, this abstract highlights the transformative potential of blockchain-enabled federated learning in empowering precision medicine. By unlocking revolutionary insights from diverse and distributed EMR datasets, this approach paves the way for a future where healthcare is personalized, efficient, and tailored to the unique needs of each patient. Full article
(This article belongs to the Special Issue Data Privacy, Security, and Trust in New Technological Trends)
Show Figures

Figure 1

14 pages, 905 KB  
Article
A CNN-Based Adaptive Federated Learning Approach for Communication Jamming Recognition
by Ningsong Zhang, Yusheng Li, Yuxin Shi and Junren Shen
Electronics 2023, 12(16), 3425; https://doi.org/10.3390/electronics12163425 - 13 Aug 2023
Cited by 5 | Viewed by 2499
Abstract
The effective and accurate recognition of communication jamming is crucial for enhancing the anti-jamming capability of wireless communication systems. At present, a significant portion of jamming data is decentralized, stored in local nodes, and cannot be uploaded directly for network training due to [...] Read more.
The effective and accurate recognition of communication jamming is crucial for enhancing the anti-jamming capability of wireless communication systems. At present, a significant portion of jamming data is decentralized, stored in local nodes, and cannot be uploaded directly for network training due to its sensitive nature. To address this challenge, we introduce a novel distributed jamming recognition method. This method leverages a distributed recognition framework to achieve global optimization through federated learning. Each node independently trains its local model and contributes to the comprehensive global model. We have devised an adaptive adjustment mechanism for the mixed weight parameters of both local and global models, ensuring an automatic balance between the global model and the aggregated insights from local data across devices. Simulations indicate that our personalization strategy yields a 30% boost in accuracy, and the adaptive weight parameters further enhance the recognition accuracy by 1.1%. Full article
(This article belongs to the Special Issue Multi-Scale Communications and Signal Processing)
Show Figures

Figure 1

32 pages, 9377 KB  
Article
Toward Patient-Centric Healthcare Systems: Key Requirements and Framework for Personal Health Records Based on Blockchain Technology
by Ohud Aldamaeen, Waleed Rashideh and Waeal J. Obidallah
Appl. Sci. 2023, 13(13), 7697; https://doi.org/10.3390/app13137697 - 29 Jun 2023
Cited by 15 | Viewed by 4117
Abstract
Healthcare data are considered sensitive and confidential, and storing these sensitive data in traditional (i.e., centralized) databases may expose risks, such as penetration or data leaks. Furthermore, patients may have incomplete health records since they visit various healthcare centers and leave their data [...] Read more.
Healthcare data are considered sensitive and confidential, and storing these sensitive data in traditional (i.e., centralized) databases may expose risks, such as penetration or data leaks. Furthermore, patients may have incomplete health records since they visit various healthcare centers and leave their data scattered in different places. One solution to resolve these problems and permit patients to own their records is a decentralized personal health record (PHR); this can be achieved through decentralization and distribution systems, which are fundamental attributes of blockchain technology. Additionally, the requirements for this solution should be identified to provide practical solutions for stakeholders. This study aims to identify the key requirements for PHRs. A design science methodology was utilized to meet the study objectives, and thirteen healthcare experts were interviewed to elicit the requirements and the previous studies. Thirty-three requirements are defined, and based on these, high- and low-level architectures are developed and explained. The result illustrates that the developed solution-based Hyperledger Fabric framework is a promising method for the achievement of PHRs that guarantee security aspects, such as integrity, confidentiality, privacy, traceability, and access control. Full article
(This article belongs to the Special Issue Blockchain and Intelligent Networking for Smart Applications)
Show Figures

Figure 1

23 pages, 6802 KB  
Article
Non-Face-to-Face P2P (Peer-to-Peer) Real-Time Token Payment Blockchain System
by Hyug-Jun Ko, Seong-Soo Han and Chang-Sung Jeong
Appl. Sci. 2023, 13(13), 7364; https://doi.org/10.3390/app13137364 - 21 Jun 2023
Cited by 4 | Viewed by 3312
Abstract
With the increase in intelligent voice phishing and the increasing reliance on open banking systems, there has been a rise in cases where individuals’ personal information has been exposed, resulting in significant financial losses for the victims. Non-face-to-face transactions in the financial sector [...] Read more.
With the increase in intelligent voice phishing and the increasing reliance on open banking systems, there has been a rise in cases where individuals’ personal information has been exposed, resulting in significant financial losses for the victims. Non-face-to-face transactions in the financial sector face challenges such as customer identification, ensuring transaction integrity and preventing transaction rejection. Blockchain-based distributed ledgers have been proposed as a solution but their adoption is limited due to the difficulty of managing private keys and the burden of gas fees management. This paper proposes a non-face-to-face P2P real-time token payment system that minimizes the risk of key loss by storing private keys in a keystore file and database through a server-based key management module. The proposed system simplifies token creation and management through a server-based token management module and implements an automatic gas-charging function for smooth token transactions. Transaction integrity and non-repudiation are ensured through a transaction confirmation module that uses transaction IDs without exposing personal information. Furthermore, advanced security measures such as blocking foreign IP access and DDoS defense are implemented to securely protect user data. The proposed system aims to provide a convenient, secure and accessible online payment solution to the public by implementing a self-authentication function using a web application that is not limited to smartphones or application platforms. Full article
(This article belongs to the Special Issue Blockchain and Intelligent Networking for Smart Applications)
Show Figures

Figure 1

16 pages, 1751 KB  
Perspective
Aligning Federated Learning with Existing Trust Structures in Health Care Systems
by Imrana Yari Abdullahi, René Raab, Arne Küderle and Björn Eskofier
Int. J. Environ. Res. Public Health 2023, 20(7), 5378; https://doi.org/10.3390/ijerph20075378 - 3 Apr 2023
Cited by 2 | Viewed by 3129
Abstract
Patient-centered health care information systems (PHSs) on peer-to-peer (P2P) networks (e.g., decentralized personal health records) enable storing data locally at the edge to enhance data sovereignty and resilience to single points of failure. Nonetheless, these systems raise concerns on trust and adoption in [...] Read more.
Patient-centered health care information systems (PHSs) on peer-to-peer (P2P) networks (e.g., decentralized personal health records) enable storing data locally at the edge to enhance data sovereignty and resilience to single points of failure. Nonetheless, these systems raise concerns on trust and adoption in medical workflow due to non-alignment to current health care processes and stakeholders’ needs. The distributed nature of the data makes it more challenging to train and deploy machine learning models (using traditional methods) at the edge, for instance, for disease prediction. Federated learning (FL) has been proposed as a possible solution to these limitations. However, the P2P PHS architecture challenges current FL solutions because they use centralized engines (or random entities that could pose privacy concerns) for model update aggregation. Consequently, we propose a novel conceptual FL framework, CareNetFL, that is suitable for P2P PHS multi-tier and hybrid architecture and leverages existing trust structures in health care systems to ensure scalability, trust, and security. Entrusted parties (practitioners’ nodes) are used in CareNetFL to aggregate local model updates in the network hierarchy for their patients instead of random entities that could actively become malicious. Involving practitioners in their patients’ FL model training increases trust and eases access to medical data. The proposed concepts mitigate communication latency and improve FL performance through patient–practitioner clustering, reducing skewed and imbalanced data distributions and system heterogeneity challenges of FL at the edge. The framework also ensures end-to-end security and accountability through leveraging identity-based systems and privacy-preserving techniques that only guarantee security during training. Full article
(This article belongs to the Special Issue Intelligent Systems for One Digital Health)
Show Figures

Figure 1

23 pages, 3548 KB  
Article
Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability
by N. Sangeeta and Seung Yeob Nam
Electronics 2023, 12(7), 1545; https://doi.org/10.3390/electronics12071545 - 24 Mar 2023
Cited by 42 | Viewed by 15321
Abstract
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized [...] Read more.
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of storing data on the blockchain, on the other hand, is prohibitively expensive. We can have decentralized and cost-effective storage with the interplanetary file system (IPFS) project. It is a file-sharing protocol that stores and distributes data in a distributed file system. We propose a decentralized IPFS and blockchain-based application for distributed file storage. It is possible to upload various types of files into our decentralized application (DApp), and hashes of the uploaded files are permanently saved on the Ethereum blockchain with the help of smart contracts. Because it cannot be removed, it is immutable. By clicking on the file description, we can also view the file. DApp also includes a keyword search feature to assist us in quickly locating sensitive information. We used Ethers.js’ smart contract event listener and contract.queryFilter to filter and read data from the blockchain. The smart contract events are then written to a text file for our DApp’s keyword search functionality. Our experiment demonstrates that our DApp is resilient to system failure while preserving the transparency and integrity of data due to the immutability of blockchain. Full article
(This article belongs to the Special Issue Advancement in Blockchain Technology and Applications)
Show Figures

Figure 1

Back to TopTop