Page 231 - Big Data Analytics for Intelligent Healthcare Management
P. 231
224 CHAPTER 8 BLOCKCHAIN IN HEALTHCARE: CHALLENGES AND SOLUTIONS
[34] M.H. Miraz, M. Ali, Applications of Blockchain Technology Beyond Cryptocurrency, 2018. arXiv preprint
arXiv:1801.03528.
[35] M.M.H. Onik, M.H. Miraz, C.S. Kim, A recruitment and human resource management technique using
blockchain technology for industry 4.0, in: Smart Cities Symposium 2018 (SCS’18), 22–23rd April, Univer-
sity of Bahrain, IET, Bahrain, 2018, pp. 11–16.
[36] M.M.H. Onik, N. Al-Zaben, H.P. Hoo, C.S. Kim, A Novel Approach for Network Attack Classification Based
on Sequential Questions, 2018. arXiv preprint arXiv:1804.00263.
[37] M.M.H. Onik, N. Al-Zaben, J. Yang, C.S. Kim, Privacy of Things (PoT): personally identifiable information
monitoring system for smart homes, in: 국통신회 술대회논문집 Proceedings of the Korean Institute of
Communication Sciences Conference, KICS, Jeju, Korea, 2018, pp. 256–257.
[38] M.M.H. Onik, N. Al-Zaben, J. Yang, N.Y. Lee, C.S. Kim, Risk identification of personally identifiable in-
formation from collective mobile app data, in: Proceeding of International Conference on Computing, Elec-
tronics & Communications Engineering 2018 (iCCECE ’18), University of Essex, Southend, 2018,
pp. 71–76.
[39] N. Al-Zaben, M.M.H. Onik, J. Yang, N.Y. Lee, C.S. Kim, General data protection regulation complied block-
chain architecture for personally identifiable information management, in: Proceeding of International Con-
ference on Computing, Electronics & Communications Engineering 2018 (iCCECE ’18), University of
Essex, Southend, 2018, pp. 77–82.
[40] PwC, Global FinTech Report 2017, Available from:https://www.pwc.com/gx/en/industries/financial-
services/assets/pwc-global-fintech-report-2017.pdf, 2017. Accessed 24 January 2018.
[41] C. Cachin, Architecture of the Hyperledger blockchain fabric, in: Workshop on Distributed Cryptocurrencies
and Consensus Ledgers, July, 2016.
[42] NISTIR, Blockchain Technology Overview, National Institute of Standards and Technology, 2018. Avail-
able from:https://csrc.nist.gov/CSRC/media/Publications/nistir/8202/draft/documents/nistir8202-draft.pdf.
Accessed 27 January 2018.
[43] D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf.
Secur. 1 (1) (2001) 36–63.
[44] A. Castor, A (Short) Guide to Blockchain Consensus Protocols, CoinDesk, 2017.
[45] L.A. Linn, M.B. Koo, Blockchain for health data and its potential use in health it and health care related
research, in: ONC/NIST Use of Blockchain for Healthcare and Research Workshop, ONC/NIST,
Gaithersburg, MD, 2016.
[46] A. Pfitzmann, M. Hansen, A Terminology for Talking about Privacy by Data Minimization: Anonymity,
Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, 2010.
[47] E. McCallister, T. Grance, K.A. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable
Information (PII), 2010. No. Special Publication (NIST SP)-800-122.
[48] M. Kayaalp, Patient privacy in the era of big data, Balkan Med. J. 35 (1) (2018) 8–17.
[49] S. Berinato, There’s No Such Thing as Anonymous Data, Retrieved from:https://hbr.org/2015/02/theres-no-
such-thing-as-anonymous-data, 2015. Accessed 10 June 2018.
[50] A. Abdalaal, M.E. Nergiz, Y. Saygin, Privacy-preserving publishing of opinion polls, Comput. Secur.
37 (2013) 143–154.
[51] L. Sweeney, k-anonymity: a model for protecting privacy, Int. J. Uncertainty Fuzziness Knowledge Based
Syst. 10 (05) (2002) 557–570.
[52] C.C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International
Conference on Very Large Data Bases, VLDB Endowment, 2005, pp. 901–909.
[53] J. Ali, Mechanism for the prevention of password reuse through Anonymized Hashes. PeerJ Prepr. 5 (2017)
e3322v1https://doi.org/10.7287/peerj.preprints.3322v1.
[54] T.S. Gal, T.C. Tucker, A. Gangopadhyay, Z. Chen, A data recipient centered de-identification method to
retain statistical attributes, J. Biomed. Inform. 50 (2014) 32–45.