General Article
P.T. Harshad, Decentralization and health system performance-a focused review of dimensions, difficulties, and derivatives in India. BMC Health Services Research. 16 (2016), 561.
10.1186/s12913-016-1784-928185593PMC5103245N. Sultan, Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management. 34(2) (2014), pp. 177-184.
10.1016/j.ijinfomgt.2013.12.011S. Rahmadika and K.-H. Rhee, Toward Privacy‐Preserving Shared Storage in Untrusted Blockchain P2P Networks. Wireless Communications and Mobile Computing. (2019).
10.1155/2019/6219868I. Primary and D.S.I., Patient Information [Online], 2006. Available at: http://www.coastalspineandpaincenter.com/wp-content/uploads/2015/01/2015NewPatientPacket.pdf [Accessed 12/02/2025].
R. Frederic, HIPAA Effects on Health Research and PBM Functions in Drug Utilization Review. Journal of Managed Care Pharmacy. 9(1) (2003). DOI: https://doi.org/10.18553/jmcp.2003.9.1.95.
10.18553/jmcp.2003.9.1.9514613376PMC10437169V. Malik, The history and the future of Bitcoin [Online], 2016. Available at: https://is.ambis.cz/th/txwrv/The_future_and_the_history_of_Bitcoin.pdf [Accessed 12/12/2024].
N, Rane, S. Choudhary, and J. Rane, Blockchain and Artificial Intelligence (AI) integration for revolutionizing security and transparency in finance. SSRN. (2023). Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4644253.
10.2139/ssrn.4644253A. Salman, D. Luc, G. Nitin, N. Petr, O. Anthony, and R. Venkatraman, Hands-on blockchain with Hyperledger: building decentralized applications with Hyperledger Fabric and composer. Packt Publishing Ltd [Online], 2018. Available at: https://books.google.com/books?hl=en&lr=&id=wKdhDwAAQBAJ&oi=fnd&pg=PP1&dq=ntermediaries.+Blockchain+era+serves+as+a+foundational+records+structure+for+growing+decentralized+ledgers,+prepared+in+a+serialized+layout&ots=5jGfIahor1&sig=dDMucXVmNRNtUpS-spRFzJKafNg [Accessed 12/12/2024].
M. Muzammal, Q. Qu, and B. Nasrulin, Renovating blockchain with distributed databases: An open source system. Future Generation Computer Systems. 90 (2019), pp. 105-117.
10.1016/j.future.2018.07.042UN Trade and Development UNCTAD, Use of the Internet for efficient international trade [Online], 2003. Available at: https://unctad.org/system/files/official-document/sdtetib20033_en.pdf [Accessed 12/12/2024].
S. Ransbotham, S. Mitra, and J. Ramsey, Are markets for vulnerabilities effective? MIS Quarterly. 36(1) (2012), pp. 43-64.
10.2307/41410405I.J. Taylor, From P2P to Web services and grids: peers in a client/server world. 2005, Berlin, Germany: Springer Science Business Media.
H. Si, C. Sun, Y. Li, H. Qiao, and L. Shi, IoT information sharing security mechanism based on blockchain technology. Future Generation Computer Systems. 101 (2019), pp. 1028-1040.
10.1016/j.future.2019.07.036R.G. Hiran, Collaborative Network Security: Targeting Wide-Area Routing and Edge-network Attacks, Doctoral thesis, Linköping University, 2016. Available at: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1045752.
10.3384/diss.diva-131959T. Qiu, J. Chi, X. Zhou, Z. Ning, M. Atiquzzaman, and D.O. Wu, Edge computing in industrial internet of things: Architecture, advances and challenges. IEEE Communications Surveys & Tutorials. 22(4) (2020), pp. 2462-2488.
10.1109/COMST.2020.3009103A.R. Naik and B.N. Keshavamurthy, Next level peer-to-peer overlay networks under high churns: a survey Bettahally. Peer-to-Peer Networking and Applications. 13 (2020), pp. 905-931.
10.1007/s12083-019-00839-8D. Berdik, S. Otoum, N. Schmidt, and D. Porter, A survey on blockchain for information systems management and security. Information Processing & Management. 58(1) (2021), 102397.
10.1016/j.ipm.2020.102397I. Yaqoob, K. Salah, R. Jayaraman, and Y. AL-Hammadi, Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications. 34 (2022), pp. 11475-11490.
10.1007/s00521-020-05519-wS. Siripurapu, N.K. Darimireddy, A. Chehri, B. Sridhar, and A.V. Paramkusam, Technological Advancements and Elucidation Gadgets for Healthcare Applications: An Exhaustive Methodological Review-Part-I (AI, Big Data, Block Chain, Open-Source Technologies, and Cloud Computing). Electronics. 12(3) (2023), 750.
10.3390/electronics12030750A. Farnood, B. Johnston, and F.S. Mair, An analysis of the diagnostic accuracy and peer-to-peer health information provided on online health forums for heart failure. Original Research: Empirical Research - Qualitative. 78(1) (2022), pp. 187-200.
10.1111/jan.1500934369604S. Cao, G. Zhang, P. Liu, X. Zhang, and F. Neri, Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Information Sciences. 485 (2019), pp. 427-440.
10.1016/j.ins.2019.02.038S. Li, Y. Zhang, C. Xu, N. Cheng, Z. Liu, Y. Du, Healthfort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain. IEEE Transactions on Mobile Computing. 22(11) (2023), pp. 6508-6525.
10.1109/TMC.2022.3199048S. Alzahrani, T. Daim, and K.K.R. Choo, Assessment of the blockchain technology adoption for the management of the electronic health record systems Kim-Kwang. IEEE Transactions on Engineering Management. 70(8) (2023), pp. 2846-2863.
10.1109/TEM.2022.3158185T.T. Kuo, H.E. Kim, and L. Ohno-Machado, Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association. 24(6) (2017), pp. 1211-1220.
10.1093/jamia/ocx06829016974PMC6080687S. Papavasiliou, C. Reaiche, and S. Papacasiliou, Digital health and patient‐centred care: A digital systems view. Systems Research and Behavioral Science. 38(2) (2021), pp. 231-245.
10.1002/sres.2726C.C. Agbo, Q.H. Mahmoud, and J.M. Eklund, Blockchain technology in healthcare: a systematic review. Healthcare. 7(2) (2019), 56.
10.3390/healthcare702005630987333PMC6627742S. Angraal, H.M. Krumholz, W.L. Schulz, Blockchain technology: applications in health care. Circulation: Cardiovascular Quality and Outcomes. 10(9) (2017).
10.1161/CIRCOUTCOMES.117.00380028912202H. Saeed, H. Malik, U. Bashir, A. Ahmad, S. Riaz, M. Ilyas, W.A. Bukhari, and M.I.A. Khan, Blockchain technology in healthcare: A systematic review. PLos one. (2022). DOI: https://doi.org/10.1371/journal.pone.0266462.
10.1371/journal.pone.026646235404955PMC9000089E.G. Spanakis, S. Sfakianakis, S. Bonomi, C. Ciccotelli, S. Magalini, and V. Sakkalis, Emerging and established trends to support secure Health Information Exchange. Frontiers in Digital Health. 3 (2021). DOI: https://doi.org/10.3389/fdgth.2021.636082.
10.3389/fdgth.2021.63608234713107PMC8521812J. Rajyaguru and D. Lakshmi, Transforming Healthcare Management: Combining Blockchain, P2P Networks, and Digital Platforms, Technological Advancement in Internet of Medical Things and Blockchain for Personalized Healthcare. 2024, Florida, USA: CRC Press, Taylor & Francis Group.
10.1201/9781003405450-5R. Thangamani, G.K. Kamalam, and M. Vimaladevi, Revolutionizing Healthcare Processes: The Dynamic Role of Blockchain Innovation, Blockchain for Biomedical Research and Healthcare. 2024, Berlin, Germany: Springer Nature. pp. 229-267.
10.1007/978-981-97-4268-4_10Z.A. Al-Sulami, N.A. Ali, and R. Ramli, Blockchain adoption in Healthcare: Models, Challenges, and Future Work. Journal of Basrah Researches (Sciences). 49(2) (2023). DOI: https://doi.org/10. 56714/bjrs.49.2.8.
10.56714/bjrs.49.2.8U. Agarwal, V. Rishiwal, S. Tanwar, R. Chaudhary, G. Sharma, and P.N. Bokoro, Blockchain technology for secure supply chain management: A comprehensive review. Browse Journals & Magazines, IEEE Access. 10 (2022).
10.1109/ACCESS.2022.3194319A.K. Yadav, Shweta, and D. Kumar, Blockchain technology and vaccine supply chain: Exploration and analysis of the adoption barriers in the Indian context. International Journal of Production Economics. 255 (2023), 108716.
10.1016/j.ijpe.2022.108716S. Shrestha, D.S. Kim, S. Lee, and J.S. Park, A peer-to-peer RFID resolution framework for supply chain network.2010 Second International Conference on Future Networks. (2010).
10.1109/ICFN.2010.98K. Zile and R. Strazdina, Blockchain use cases and their feasibility. Applied Computer Systems. 23(1) (2018).
10.2478/acss-2018-0002D.P. Sharma, A.H. Lashkari, and M. Parizadeh, Understanding Cybersecurity Management in Healthcare. 2024, Berlin, Germany: Springer Nature.
10.1007/978-3-031-68034-2V. Rao, S. Pillai, P. Pathak, and V. Yadav, DivingDeep into thePrivacy and Security on the Internet of Medical Things, ICICC [Online], 2024. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4836669 [Accessed 08/01/2025].
10.2139/ssrn.4836669A. Garbagnati, Creating competitive advantage: privacy and security by design in mhealth and digital health products[Online], 2022. Available at: https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/healaw34§ion=22 [Accessed 08/01/2025].
J. Buford, H. Yu, and E.K. Lua, P2P networking and applications. 2008, Massachusetts, USA: Morgan Kaufmann.
L. Luu, R. Saha, I, Parameshwaran, P. Saxena, and A. Hobor, On power splitting games in distributed computation: The case of bitcoin pooled mining. 2015 IEEE 28th Computer Security Foundations Symposium. (2015).
10.1109/CSF.2015.34I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review. 31(4) (2001), pp. 149-160.
10.1145/964723.383071I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking. 11(1) (2003). DOI: 10.1109/TNET.2002.808407.
10.1109/TNET.2002.808407H. Beitollahi and G. Decouninck, Analyzing the chord peer-to-peer network for power grid applications. [Online], 2008. Available at: https://www.researchgate.net/profile/Hakem-Beitollahi/publication/228899625_Analyzing_the_Chord_Peer-to-Peer_Network_for_Power_Grid_Applications/links/00b7d528a21be806b7000000/Analyzing-the-Chord-Peer-to-Peer-Network-for-Power-Grid-Applications.pdf [Accessed 08/01/2025].
C. DeCusatis, Network Architectures and Overlay Networks. Handbook of Fiber Optic Data Communication. (2013), pp. 321-337. DOI: https://doi.org/10.1016/B978-0-12-401673-6.00013-1.
10.1016/B978-0-12-401673-6.00013-1Z. Qin and L. Lannario, Towards design of an overlay architecture in the multinetwork management system [Online], 2012. Available at: http://www.ics.uci.edu/~dsm/cypress/paper/minareport.pdf [Accessed 17/12/2024].
T. Muhammad, Overlay Network Technologies in SDN: Evaluating Performance and Scalability of VXLAN and GENEVE [Online], 2021. Available at: https://www.researchgate.net/profile/Tayyab-Muhammad-2/publication/375413428_Overlay_Network_Technologies_in_SDN_Evaluating_Performance_and_Scalability_of_VXLAN_and_GENEVE/links/6549123ab86a1d521bbfb264/Overlay-Network-Technologies-in-SDN-Evaluating-Performance-and-Scalability-of-VXLAN-and-GENEVE.pdf [Accessed 17/12/2024].
B. Shrimali and H.B. Patel, Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities. Journal of King Saud University - Computer and Information Sciences. 34(9) (2022), pp. 6793-6807.
10.1016/j.jksuci.2021.08.005J. Madir, Smart Contracts - Self-Executing Contracts of the Future?. International In-House Counsel Journal. 13(51) (2020). Available at: https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/iihcj13§ion=37.
H. Shen and C.Z. Xu, Leveraging a compound graph-based DHT for multi-attribute range queries with performance analysis. IEEE Transactions on Computers. 61(4) (2011), pp. 433-447. DOI: 10.1109/TC.2011.30.
10.1109/TC.2011.30A.-A. Kwabena, Analysis of security vulnerabilities in wifi-protected access pre-shared key [Online], 2019. Available at: https://www.academia.edu/download/58334960/IRJET-V6I196.pdf [Accessed 17/12/2024].
K.A. Adbeib, Comprehensive Study on Wi-Fi Security Protocols by Analyzing WEP, WPA, and WPA2. African Journal of Advanced Pure and Applied Sciences. 2(4) (2023).
J. Jean, M. Naya-Plasencia, and T. Peyrin, Improved Cryptanalysis of AES-like Permutations. Journal of Cryptology. 27 (2014), pp. 772-798. Available at: https://link.springer.com/article/10.1007/s00145-013-9156-7
10.1007/s00145-013-9156-7L. Zhang, H. Gao, and O. Kaynak, Network-induced constraints in networked control systems-A survey. IEEE Transactions on Industrial Informatics. 9(1) (2012). DOI: 10.1109/TII.2012.2219540.
10.1109/TII.2012.2219540K. Zhang, X. Liang, R. Lu, and X. Shen, Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal. 1(5) (2014). DOI: 10.1109/JIOT.2014.2344013.
10.1109/JIOT.2014.2344013H.-T. Huynh, T.-P. Dang, T.-T. Hoang, C.-K. Pham, and T.-K. Tran, An efficient cryptographic accelerators for IoT system based on elliptic curve digital signature. Intelligent Systems and Data Science, Conference paper, pp. 109-118. Available at: https://link.springer.com/chapter/10.1007/978-981-99-7666-9_9
- Publisher :Sustainable Building Research Center (ERC) Innovative Durable Building and Infrastructure Research Center
- Publisher(Ko) :건설구조물 내구성혁신 연구센터
- Journal Title :International Journal of Sustainable Building Technology and Urban Development
- Volume : 16
- No :1
- Pages :88-110
- Received Date : 2025-03-01
- Accepted Date : 2025-03-17
- DOI :https://doi.org/10.22712/susb.20250007