dc.contributor.author |
Jaber, Mohammad |
|
dc.date.accessioned |
2022-06-15T09:26:39Z |
|
dc.date.available |
2022-06-15T09:26:39Z |
|
dc.date.copyright |
2020 |
en_US |
dc.date.issued |
2020-12-28 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/13686 |
|
dc.description.abstract |
The improvement of information technology in the past few years has been encouraging the healthcare sector to share medical data online without any barriers and between different parties. Many research works have been done to achieve this goal, and blockchain-based approaches have proved to be decent solutions. However, security challenges can put such distributed databases storing sensitive healthcare data under threat. For example, attackers can access highly sensitive data, altering or deleting some records, or violating the integrity of the database. Many preventive measures have been applied to protect the databases from attacks.
However, no one can be confident that the system is safe and secure. Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. Numerous damage assessment and recovery algorithms have been proposed
in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. The proposed algorithm is compared with different previous works and experimental results are recorded. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Medical informatics -- Data processing |
en_US |
dc.subject |
Medical informatics -- Security measures |
en_US |
dc.subject |
Electronic data processing -- Distributed processing |
en_US |
dc.subject |
Blockchains (Databases) |
en_US |
dc.subject |
Lebanese American University -- Dissertations |
en_US |
dc.subject |
Dissertations, Academic |
en_US |
dc.title |
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Fall |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201605721 |
en_US |
dc.author.commembers |
Mourad, Azzam |
|
dc.author.commembers |
Athithan, Senthil |
|
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.description.physdesc |
1 online resource (x, 53 leaves): col. ill. |
en_US |
dc.author.advisor |
Haraty, Ramzi |
|
dc.keywords |
Information Warfare |
en_US |
dc.keywords |
Distributed Databases |
en_US |
dc.keywords |
Blockchain Technology |
en_US |
dc.keywords |
Damage Assessment |
en_US |
dc.keywords |
Database Recovery |
en_US |
dc.keywords |
Transactional Dependency |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references (leaf 50-53) |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2022.226 |
|
dc.author.email |
mohammad.jaber@lau.edu |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |