Page 165 - {PDF Title}
P. 165

Blockchain for secure e-health data in smart cities

                 Algorithm 1: Siberian Tiger Integrated Tuna        (iv) Access  control:  The  access control  to  access the
                 Swarm algorithm                                        sensitive data is given below:

                 Initializing the population                               a.  Public and private keys: Patients have private
                                                                                 o
                 Initializing  and probability I                           keys K  (optimal key) that allow them to decrypt
                         co                                                their health records. Health-care providers have
                 While T <Tmax                                             their keys to access the data as well
                   Compute fitness                                         b.  Permission management: Access to the data is
                   Update   Z T best                                       controlled through a system of permissions. For

                   For every tuna                                          instance, a patient’s consent is required before a
                      γ1, γ2, and A are updated                            health-care provider can access or update their
                                                                           records. The process of restoring the original
                      If rnd <I                                            data is discussed below.
                      Position is updated through Equation IX
                      Else if rnd ≥I                                7. Data restoration
                        If rnd <0.5
                           If  T  < rnd                             Reversing the steps taken throughout the privacy-
                                T max                               preserving stage is the last step in the process of
                              Position is updated through Equation XV  recovering the original data. Recovering sensitive data
                           else                                     while protecting data privacy requires this procedure.
                                                                    The formula for obtaining the original data using the
                              Position is updated through Equation X  reverse procedure is given in Equation XXX.
                        Else if rnd ≥0.5

                           Position is updated through proposed      P   P  K o                              (XXX)
                                                                      d
                           Equation XXVIII by integrating the update
                           of STO                                      Using an optimal  key generated  from  ASRs, the
                   End for                                          XOR operation is crucial in concealing sensitive data
                 T=T + 1                                            during data  sanitization. The inverse XOR procedure
                 Return the best solution                           needs to be used to recover the original sensitive data.
                                                                    Employing the inverse XOR,  the sanitized data are
                  From STI-TSA, the optimal key K  is attained.     broken down in this reverse process, guaranteeing an
                                                 o
                (iv) Sanitization process:  The XOR operation among   exact reconstruction of the original data. Similar to this,
                   sensitive  data  P   and  the  optimum  key  K   yields   ASRs  that recognize delicate  patterns in the data are
                                                          o
                                  d
                   the sanitized data as given in Equation XXIX. By   produced using the improved ARM algorithm. Reverse
                   successfully masking the original data, this bitwise   algorithms or processes capable of reversing the impact
                   operation improves security and privacy. From    of these privacy-preserving  approaches  are used to
                   Equation XXIX, P  implies the output sanitized data.  return the original data from its sanitized version. This
                                   *
                                                                    preserves  the  sensitive  data  while  guaranteeing  that
                                     d
                                           o

                Sanitized dataP     P   K             (XXIX)    initial medical data D  may completely be retrieved for
                                                                                       i
                                                                    additional examination or use.
                6. Blockchain-based sensitive data storage
                                                                    8. Results and discussion
                (i)  Block creation: Sanitized data are grouped into blocks.   8.1. Simulation procedure
                   Each block may contain multiple encrypted records  The introduced approach for PP for EHR using BT was
                (ii)  Hashing: Each block is hashed to generate a unique   executed in Python. The simulation was run on a system
                   digital  fingerprint.  The  hash  includes  the  block’s   equipped with an 11  Gen Intel(R) Core (TM) i3-1115G4
                                                                                     th
                   data and the hash of the previous block, creating a   @ 3.00 GHz processor and 8.00 GB (7.74 GB usable) of
                   chain of blocks                                  RAM. The assessment was conducted using STI-TSA,
                (iii) Block addition: The block is added to the blockchain   comparing its performance against STO, TSA, Puffer
                   after  being  verified  by  the  network’s  consensus   Fish Optimization (PFO), SBO Algorithm (SBOA), Bat
                   mechanism                                        Algorithm  (BA), EHO-OBL,  and  BFL-PSO.  The
                                                                                                               35
                                                                                               34

                Volume 22 Issue 1 (2025)                       159                           doi: 10.36922/AJWEP025040017
   160   161   162   163   164   165   166   167   168   169   170