Page 165 - {PDF Title}
P. 165
Blockchain for secure e-health data in smart cities
Algorithm 1: Siberian Tiger Integrated Tuna (iv) Access control: The access control to access the
Swarm algorithm sensitive data is given below:
Initializing the population a. Public and private keys: Patients have private
o
Initializing and probability I keys K (optimal key) that allow them to decrypt
co their health records. Health-care providers have
While T <Tmax their keys to access the data as well
Compute fitness b. Permission management: Access to the data is
Update Z T best controlled through a system of permissions. For
For every tuna instance, a patient’s consent is required before a
γ1, γ2, and A are updated health-care provider can access or update their
records. The process of restoring the original
If rnd <I data is discussed below.
Position is updated through Equation IX
Else if rnd ≥I 7. Data restoration
If rnd <0.5
If T < rnd Reversing the steps taken throughout the privacy-
T max preserving stage is the last step in the process of
Position is updated through Equation XV recovering the original data. Recovering sensitive data
else while protecting data privacy requires this procedure.
The formula for obtaining the original data using the
Position is updated through Equation X reverse procedure is given in Equation XXX.
Else if rnd ≥0.5
Position is updated through proposed P P K o (XXX)
d
Equation XXVIII by integrating the update
of STO Using an optimal key generated from ASRs, the
End for XOR operation is crucial in concealing sensitive data
T=T + 1 during data sanitization. The inverse XOR procedure
Return the best solution needs to be used to recover the original sensitive data.
Employing the inverse XOR, the sanitized data are
From STI-TSA, the optimal key K is attained. broken down in this reverse process, guaranteeing an
o
(iv) Sanitization process: The XOR operation among exact reconstruction of the original data. Similar to this,
sensitive data P and the optimum key K yields ASRs that recognize delicate patterns in the data are
o
d
the sanitized data as given in Equation XXIX. By produced using the improved ARM algorithm. Reverse
successfully masking the original data, this bitwise algorithms or processes capable of reversing the impact
operation improves security and privacy. From of these privacy-preserving approaches are used to
Equation XXIX, P implies the output sanitized data. return the original data from its sanitized version. This
*
preserves the sensitive data while guaranteeing that
d
o
Sanitized dataP P K (XXIX) initial medical data D may completely be retrieved for
i
additional examination or use.
6. Blockchain-based sensitive data storage
8. Results and discussion
(i) Block creation: Sanitized data are grouped into blocks. 8.1. Simulation procedure
Each block may contain multiple encrypted records The introduced approach for PP for EHR using BT was
(ii) Hashing: Each block is hashed to generate a unique executed in Python. The simulation was run on a system
digital fingerprint. The hash includes the block’s equipped with an 11 Gen Intel(R) Core (TM) i3-1115G4
th
data and the hash of the previous block, creating a @ 3.00 GHz processor and 8.00 GB (7.74 GB usable) of
chain of blocks RAM. The assessment was conducted using STI-TSA,
(iii) Block addition: The block is added to the blockchain comparing its performance against STO, TSA, Puffer
after being verified by the network’s consensus Fish Optimization (PFO), SBO Algorithm (SBOA), Bat
mechanism Algorithm (BA), EHO-OBL, and BFL-PSO. The
35
34
Volume 22 Issue 1 (2025) 159 doi: 10.36922/AJWEP025040017