Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Trust-Based Neighbor Selection Protocol to Elect Leader in Blockchain using zk-SNARKs Algorithms
Abstract
INTRODUCTION
Proposed Model
Results
Conclusion and Future Scope
Enhanced Security Mechanisms
Energy Efficiency
REFERENCES
Electronic Healthcare Data Security Using Blockchain
Abstract
INTRODUCTION
Research Motivation
Research Gaps
Contribution
Literature Review
Proposed model
Survey Creation
Consent Form
Survey Completion
CONCLUSION
REFERENCES
E-cops - An Online Crime Reporting System
Abstract
Introduction
Related Works
Overview
PROCESS METHODOLOGY
Design
Development
Data Collection
Data Preprocessing
Data Analysis
Results and Analysis
Conclusion
REFERENCES
Diabetic Eye Disease Classification by Residual Network based Feature Mapping with Support Vector Machine
Abstract
INTRODUCTION
Related Works
Diabetic Retinopathy
Diabetic Retinopathy Stages
Diabetic Macular Edema
Glaucoma
Limitations of Traditional Feature Extraction Methods
Construction of CNN-SVM
Construction of CNN-GMM-SVM
E-ophthalmic Dataset
Conclusion
REFERENCES
Evaluation of Performance of a Person using Virtual Stock Market
Abstract
INTRODUCTION
Related Works
LITERATURE REVIEW
Stock Trading Actions
Online Virtual Stock Trading System
E-Learning
DESIGN AND IMPLEMENTATION
Research Design
Methodology
Working of the Project By Diagram
Research Design Used in the Study
FINDINGS OF THE RESEARCH
LIMITATIONS
CONCLUSION
REFERENCES
GIS Mapping of High Sewage Areas in India and Sustainable Design of Sewage Disposal System
Abstract
INTRODUCTION
Related Works
Literature Review
IMPORTANCE OF THE PRESENT STUDY
METHODOLOGY
Sustainable Design
CONCLUSION
REFERENCES
iGot Garbage
Abstract
INTRODUCTION
Related Works
LITERATURE REVIEW
EXISTING SYSTEM
PROPOSED SYSTEM
METHODOLOGY
WORKING
FLOW CHART
CONCLUSION
REFERENCES
Examining the Viability of Integrating Blockchain Technology into IoT Devices for the Supply Chain
Abstract
INTRODUCTION
Research Review
Results and Discussion
Conclusion and Future Work
REFERENCES
Blockchain-Based Secure Storage for IoT Management with Edge Computing
Abstract
INTRODUCTION
Similar Works
Current Research Work
Situational Statement
Design of the Proposed Framework's Prototype
Evaluation and Discussion of Concepts
Recommendations and Next Steps
Upcoming Works
CONCLUSION
REFERENCES
A Review of Applications Combining Blockchain Technology with Artificial Intelligence
Abstract
INTRODUCTION
Research Techniques
Research Approach
Selection results
The Benefits of Automation Using Blockchain and AI
Augmentation
Authenticity
AI and blockchain use cases
Chain of Supply
Monetary Services
Health Sciences
Healthcare
Analysis of social networks
Why Combine Blockchain and AI
Understanding AI Thought Processes
Safety Enhancement
Gaining Access to and Control over the Data Sector
Intelligent Contract Improvement
Increased Energy Efficiency
AI Applications Powered by Blockchain
Modern Grid
Farming-related aspects
Medical Aspect
CONCLUSION
REFERENCES
Decentralized Application for Fundraising in Healthcare Using Blockchain Technology
Abstract
INTRODUCTION
Literature Review
Proposed System
Methodology
Blockchain
Polygon
Solidity
Module Details
System Working
Create and Donate Via Blockchain
Creating a Health Campaign
Donating to health campaigns
CONCLUSION
REFERENCES
Investigating Technology Adoption and Consumer Behaviour in Digital Age
Abstract
INTRODUCTION
Theoretical Framework
Consumer Information Behavior
Analysis
CONCLUSION
REFERENCES
Comprehensive Life Cycle Methodology for the Development of Product Metrics
Abstract
INTRODUCTION
Life cycle Assessment
Total Life Cycle Consideration toward Product Metrics Development
Step 1: PID Phase
Step 2: Manufacturing Phase
Step 3: Transportation Phase
Step 4: User Experience Phase
Step 5: Post-use and End-of-Life Cycle Phase
Recent Reviews on Product Sustainability
Metrics Clusters and Product Metrics
Challenges in Sustainable Product to Create Product Metrics
CONCLUSION
REFERENCES
Detailed Overview of the Internet of Things and Its Amalgamation with Artificial Intelligence
Abstract
INTRODUCTION
Sensors
IoT for Smart Homes
Benefits of IoT in Home Automation
Disadvantages of IoT in Smart Home Technology
Related Works
Literature Review
Challenges
Experiment
Combining IOT and AI
Technology Used in Smart Homes
PIR Sensor
CONCLUSION
Future Scope of IoT
REFERENCES
A Dual Transfer Learning Based Model for Mammogram Images Enhancement and Classification
Abstract
INTRODUCTION
Literature Review
Proposed Model
Image Acquisition and Pre-processing
Algorithm I: Input: Dataset (MIAS)
Learning Networking Training and Testing
Algorithm 2 (DTL): Input: MIAS (Preprocessed)
Conclusion and Future Work
REFERENCES
Empirical Analysis of Face Mask Detection Using Deep Learning
Abstract
INTRODUCTION
Related Work
System Architecture
Data Collection
Models Used
Library Used
Training and Testing
Results and Discussion
Conclusion and Future Scope
REFERENCES
Estimation of the Price of Used Cars Using Machine Learning
Abstract
Introduction
Lasso Regression
Software Requirement Properties
Related Works
Methodology
Dataset Collection
Data Preparation
Algorithms KNN
Regression
Random Forest Regression
Linear Regression
XG Boost Regression
Decision Tree Regression
Future Scope
Conclusion
References
Crop Recommendation System
Abstract
INTRODUCTION
Definition
Scope
Related Works
Literature Review
Proposed Methodology
Data Acquisition
Values Input
ML Model Training and Creating .pkl File
Crop Recommendation
Conclusion And Results
REFERENCES
A Smart System for Tracking and Analyzing Human Hand Movements using MediaPipe Technology and TensorFlow
Abstract
INTRODUCTION
Related Work
Working of the Proposed Model
Landmark Model by Hand
Experimental Work
Procedure
Algorithm of the Model
Code-breakdown
Results and Description
Conclusion and Future Scope
REFERENCES
Initiatives for Challenges Faced By Developed Countries and India on Green Growth and Sustainable Development in the World
Abstract
INTRODUCTION
Relative Works
Challenges in green growth and sustainable development
Air-Pollution
Carbon Productivity
Land Resources
Climate Change
Bio-diversity
Water
Energy
Initiatives to Overcome the Challenges in Green Growth and Sustainable Development
Improved Air
Reduction of Carbon Productivity Gases
Proper Utilization of Land Resources
Decline in the Rate of Climate Change
Preservation of Biodiversity
Save Water
Clean Energy
CONCLUSION
REFERENCES
The Impact of Green Marketing on Consumer Purchasing Behaviour: A Study of the Attitudes, Beliefs, and Behaviours of Consumers towards Environmentally-Friendly Products
Abstract
INTRODUCTION
Related Works
Literature Review
Objectives
Research Methodology
Demographic Profile of the Respondents
Result and Discussion
Awareness of Eco-Friendly Items
Attitude Toward Eco-Friendly Products
Willingness to Sacrifice
Marketing Mix Decision
Suggestion and Conclusion
REFERENCES
An IoT Based RFID Enabled Automatic Waste Segregator and Monitoring System
Abstract
INTRODUCTION
Related Works
Literature Review
Experimental Method
Entry System
Metal Detection System
Wet Detection System
Rotating Disc System
Monitoring System
Proposed System Workflow
Arduino UNO
IR Sensor
Servomotor
Metal Sensors
Moisture Sensor
Liquid Crystal Display
RFID Card Reader
Results and Discussion
CONCLUSION
REFERENCES
How to Reduce Environmental Cost by Green Accounting
Abstract
INTRODUCTION
Related Works
Review of Literature
Research Methodology
Demographic Profile
Explanation
Analysis and Findings
Discussion and Conclusion
Recommendations
REFERENCES
Comparison of the Efficiency of K-Means, GMM and EM Algorithms in Image Processing
Abstract
INTRODUCTION
Related Works
Literature Review
Methodology
Results and Discussion
Conclusion and Future-scope
REFERENCES
Green Technology to Achieve Environmental Safety and Sufficient Development
Abstract
INTRODUCTION
Related Works
Literature Review
Green Technology Strategies
Green Consumer Behaviour
CONCLUSION
REFERENCES
Electrical Insulating Properties of Epoxy Modified Shellac Polyamide Resin Blends
Abstract
INTRODUCTION
Experimental
Dilution Ability or Compatibility
Effect of Varnish on Enameled Wire
Tracking Resistance Test
Dielectric Strength Tests
Results and Conclusion
References
Electrical Insulating Properties of Epoxy-Modified Shellac Alkyd Resin Blends
Abstract
Introduction
Experimental
Dilution Ability or Compatibility
Effect of Varnish on Enameled Wire
Dielectric Strength Tests
Tracking Resistance Test
Results and Conclusion
References
Recognition of Characters of New-born Baby's Fingerprinting Using Machine Learning
Abstract
Introduction
Dataset Collection and Preprocessing
Feature Extraction
Related works
Literature Review
Machine Learning Model
Evaluation Metrics
Challenges
Result discussion with references
Comparison chart with references
Applications
Conclusion
References
Exploring Deep Learning Techniques for Accurate 3D Facial Expression Recognition
Abstract
INTRODUCTION
Related Works
Background
Literature review
Methodology
RESULTS
CONCLUSION
REFERENCES
Health Screening Analysis Using Machine Learning
Abstract
INTRODUCTION
Related Works
Algorithms
Logistic Regression
SVM
Random Forest
RESULTS
Random Forest
Logistic Regression
Support Vector Machine
K nearest Neighbor
Accuracy Table
CONCLUSION
Future Work
Codes
REFERENCES
Blockchain Based Academic Certificate Authentication System
Abstract
INTRODUCTION
Related Works
Existing system
Literature survey
System design
Proposed Approach
Implementation
RESULTS
CONCLUSION
REFERENCES
Hydroponics in Agriculture
Abstract
INTRODUCTION
Related Works
Methods of Hydroponics
Growing Medium
Materials Used in the Experiment
Vegetables
Amount of water
Minerals Used
Procedure
Soil Culture
Hydroponic Culture
Results
Transpiration Rates
Photosynthesis Rate
CONCLUSION
REFERENCES
An Augmentation in Energy Efficiency for Grid-Coupled PV System by IT3FLC Controller-Based MPPT
Abstract
INTRODUCTION
Related Works
Photovoltaic Energy System
PV array model
IT3FLC for MPPT Tracking
Results and Analysis
CONCLUSION
REFERENCES
Python in Finance: Introduction and Basic Strategy
Abstract
INTRODUCTION
Why Python?
Benefits of Python
Related Works
Literature review
METHODOLOGY & IMPLEMENTATION
Famous Libraries in Python for Algorithmic Trading
Finmarketpy
Chartpy
VISPY
Findatapy
Numpy
Pandas
CONCLUSION
REFERENCES
Empowering Sustainability: Leveraging Green Technology to Drive Environmental Responsibility in Organizational Behavior
Abstract
INTRODUCTION
Related Works
Green Technology
Leveraging Green Technology in Organizational Behavior
Relationship between Green Technology and Organizational Behavior
Encouragement of Eco-friendly Norms
Enhanced Employee Motivation
Improved Corporate Image
Cost Savings
Strategic Advantage
Objective Of the Research
Data Collection
Data Analysis and Interpretation
Inference
Analysis of Effectiveness of Green Technology Practices in Improving Organization Culture
Inference
Factors Why Organizations Need to Adopt Green Technology Practices
Findings of the Study
Benefits of Green Technology and Challenges to Overcome
CONCLUSION
REFERENCES
IoT Based on Accident Detection and Alert System
Abstract
INTRODUCTION
Related Works
Literature survey
PROBLEM statement
Proposed work
Algorithm
Implementation
Results
Experimental setup
Performance Analysis
CONCLUSION
REFERENCES
Performance Evaluation of Tools Made of Super Hard Material CBN during the Renovation of Components of Harvester Machinery
Abstract
INTRODUCTION
Related Works
Experimental
Performance Evaluation of Tools
Results and Conclusion
REFERENCES
A Comparative Study of Worklife Balance Trends and Challenges
Abstract
INTRODUCTION
Related Works
Review of Literature
RMSI
Google India
Marriott Hotels India
Research Methodology
Analysis and Findings
Findings
CONCLUSION
REFERENCES
Chronic Kidney Disease Prediction Using Machine Learning: Feature Selection
Abstract
INTRODUCTION
Literature Survey
Methodology
RESULTS
CONCLUSION
REFERENCES
Blockchain for Electronic Health Record
Abstract
INTRODUCTION
BACKGROUND AND RELATED WORK
Background
Electronic Health Records (EHRs)
Blockchain Technology
The Blockchain Platforms
Related Work
DIFFERENCE BETWEEN EXISTING SYSTEM AND PROPOSED SYSTEM
Existing System
Proposed System
BLOCKCHAIN ARCHITECTURE FOR EHR
RESULT AND DISCUSSION
CONCLUSION AND FUTURE WORK
REFERENCES
A Systematic Review: Technology for Battery Management System
Abstract
INTRODUCTION
Battery Management System
BMS in use
BMS Functions
Operations of BMS
Estimating the State of Charge
Calculation of Resistance of Battery
Battery Temperature Calculation
Battery Management System
SOC Determination in Battery
Coulomb Counting Method Verification:
Blockchain Technology
Structure of Blockchain
The flow of work in Blockchain
Blockchain Features
Blockchain for Battery Swapping/Charging
Battery and SOC of Battery Monitoring
Ethereum Blockchain
Creating Web Application:
CONCLUSION
REFERENCES
An Intuitionistic Fuzzy EOQ Model Based on Trapezoidal Intuitionistic Fuzzy Numbers to Maintain a Green Environment by Disposing of Waste
Abstract
INTRODUCTION
Related Works
Preliminaries
Definition
Definition
Definition
Mathematical Model and Formulation
Notations
Assumptions
Mathematical Models
Model in Crisp Sense:
Model in Intuitionistic Fuzzy Sense:
Numerical Example
CONCLUSION
REFERENCES
Foliar Disease Detection Using ML and Deep Learning
Abstract
INTRODUCTION
Related Works
Existing Work
Dataset
The model consists of 5 phases:
Feature Extraction and Data Pre-processing
Image Pre-Processing
Resize
Noise Restoration
Image Enhancement
Disease detection and classification
Image Segmentation
Image Analysis and Diagnosis
Implementation work
Results and Discussion
CONCLUSION
REFERENCES
Emerging Trends in Computation Intelligence and Disruptive Technologies
(Volume 3)
Demystifying Emerging Trends in Green Technology
Edited By
Pankaj Kumar Mishra
Hi-Tech Institute of Engineering and Technology
Ghaziabad, UP
India
&
Satya Prakash Yadav
School of Computer Science Engineering and Technology (SCSET)
Bennett University, Greater Noida
U.P., India
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.
Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].
Usage Rules:
All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.
Disclaimer:
Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.
Limitation of Liability:
In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.
General:
Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.
Bentham Science Publishers Pte. Ltd.
80 Robinson Road #02-00
Singapore 068898
Singapore
Email: [email protected]
PREFACE
This book titled, Emerging Trends in Computational Intelligence and Disruptive Technologies, is revolutionizing the way we approach the ecological footprint of computer networks. Communication systems, and other IT infrastructures are growing due to high energy consumption and greenhouse gas emissions. Addressing these issues and creating a sustainable environment require new energy models, algorithms, methods, platforms, tools, and systems to support next-generation computing and communication infrastructure.
The chapters within this volume serve as portals to diverse domains where these trends intersect, offering insights, analyses, and projections to innovative ideas. Through these contributions, readers will embark on a journey through cutting-edge developments, envisioning a future where computational intelligence and disruptive technologies intertwine to revolutionize the way we live, work, and interact.
In this book, we explore the role of Disruptive Technologies and Computational Intelligence which aims to bring together leading academic scientists, researchers, and research scientists to exchange and share their experiences and research results in various aspects of green technology and energy science. It also provides a major interdisciplinary platform for researchers, practitioners, and educators to present and discuss the latest innovations, trends, and issues in computational intelligence and disruptive technologies, as well as practical challenges and adopted solutions.
This book is a comprehensive guide for anyone interested in learning about the role of emerging trends in computational intelligence and disruptive technologies in various sectors.
Pankaj Kumar Mishra
Hi-Tech Institute of Engineering and Technology
Ghaziabad, UP
India
&Satya Prakash Yadav
School of Computer Science Engineering and Technology (SCSET)
Bennett University, Greater Noida
U.P., India
List of Contributors
A.K. JainDepartment Electrical Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaAnubhav SharmaComputer Science and Engineering, IMS Engineering College, Ghaziabad, IndiaAnkit GargManagement Department, Ajay Kumar Garg Institute of Management, Ghaziabad, Uttar Pradesh, IndiaAshish PandeySchool of Computer Science & Application, IIMT University, Meerut, Uttar Pradesh, IndiaAshish DiwakarDepatment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaArunima JaiswalDepartment of Computer Science & Engineering, Indira Gandhi Delhi Technical University For Women, IndiaAruna IppiliDepartment of Computer Science & Engineering, Indira Gandhi Delhi Technical University For Women, IndiaAshutosh SaxenaDepartment of Computer Science and Engineering, ABES Engineering College, Ghaziabad, IndiaAditya GargDepartment of Computer Science and Engineering, ABES Engineering College, Ghaziabad, IndiaArun Kumar SinghGreater Noida Institute of Technology Gr Noida-201306, Uttar Pradesh, IndiaAkhilesh Kumar SinghSchool of Computing and Technology, Galgotias University, Greater Noida 201306, Uttar Pradesh, IndiaAbhishek AnandDepartment of Computer Science Engineering Sharda University, Greater Noida, Uttar Pradesh 201310, IndiaAbhinav ShrivastavDepartment of Computer Science Engineering Sharda University, Greater Noida, Uttar Pradesh 201310, IndiaArun Kumar SinghDepartment of Computer Science and Engineering, Greater Noida Institute of Technology, Greater Noida, 201310, Uttar Pradesh, IndiaAdarsh KumarHi-Tech Institute of Engineering and Technology, Ghaziabad, Uttar Pradesh, IndiaAnupam SinghDepartment of ECE, HI-Tech Institute of Engineering and Technology, Gzb, UPTU, IndiaAnuja GuptaDepartment of ECE, HI-Tech Institute of Engineering and Technology, Gzb, UPTU, IndiaAvinash Kumar SharmaDeartment of CSE, ABES Institute of Technology, Ghaziabad, Uttar Pradesh, IndiaAsjad Moiz KhanComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaAyu Kumar JainDepartment of Applied Science & Humanities, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaAman ShrivastavaDepartment Electrical Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaB. ShajahanSchool of Computer Science and Engineering, GB Nagar, Uttar Pradesh, IndiaBobbin PreetECE Department, Chandigarh University, Uttar Pradesh, IndiaBhaskar SharmaDepartment Electrical Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaDeepanshu SinghKiet Group of Institutions, Delhi-Ncr, Ghaziabad, Uttar Pradesh 201206, IndiaDhruv VermaComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaDivya G.Electrical and Electronics Engineering, CVR College of Engineering, Telangana, Hyderabad, IndiaGautam JaiswalSchool of Business Management, NOIDA International University, Gr Noida, Uttar Pradesh, IndiaGunjan AggrawalDepartment of Computer Science Engineering Sharda University, Greater Noida, Uttar Pradesh 201310, IndiaHarsh DevDepartment of Computer Science & Engineering, Pranveer Singh Institute of Technology, Kanpur, Uttar Pradesh, IndiaHimanshu MongaECE Department JLN Government Engineering College Sundar Nagar, Mandi, IndiaHoshiyar Singh KanyalDepatment of Computer Science & Engg., Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P), IndiaHimanshu KumarDepatment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaHarsh PanwarComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaHimanshi MittalHi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaHoor FatimaComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaIstakbal KhanDepartment of Applied Science & Humanities, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaJullyDepartment of Management, Hi-tech Institute of Engineering & Technology, Ghaziabad, IndiaJyoti RaiDepatment of Applied Science and Humanities R.D. Engineering College, Ghaziabad, (U.P.), IndiaKhushboo KemDepartment of Computer Science & Engineering, Indira Gandhi Delhi Technical University For Women, IndiaLaxmi AhujaAIIT Amity University Noida, Noida, Uttar Pradesh 201313, IndiaLydia Nenghoithem HaokipDepartment of Computer Science & Engineering, Indira Gandhi Delhi Technical University For Women, IndiaManish AggarwalDepartment of Applied Science & Humanities, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaManish KumarDepartment of Civil Engineering, Greater Noida Institute of Technology, Greater Noida, U.P., IndiaMeenu KhuranaChitkara University Institute of Engineering and Technology Chitkara University, Himachal Pradesh, IndiaManu SinghDepartment of Computer Science and Engineering, ABES Engineering College, Ghaziabad, IndiaMahesh Kumar SinghDronacharya Group of Institutions, Greater Noida-201306, Uttar Pradesh, IndiaMansi SinghalDepartment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaMohd. Naushad AliDepartment of Management, Hi-tech Institute of Engineering & Technology, Ghaziabad, IndiaManasvi AgarwalComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaMansi JainComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaNamrata DhandaDepartment of Computer Science & Engineering, Amity University, Uttar Pradesh, IndiaNeha KapurCSE, Chandigarh University, Uttar Pradesh, IndiaNitin SachdevaIT Department,, Galgotias College of Engineering, Greater Noida, IndiaNitin VeraComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaOmkar Singh KardamHi-Tech Institute of Engineering and Technology, Ghaziabad, Uttar Pradesh, IndiaPriyankaDepartment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaParul VermaDepatment of Applied Science and Humanities, Ajay Kumar Garg. Engineering College, Ghaziabad, (U.P.), IndiaPraveen Chandra JhaDepatment of Applied Science and Humanities, ITS Engineering College, Greater Noida (U.P.), IndiaPriyansha SinghDeartment of CSE, ABES Institute of Technology, Ghaziabad, Uttar Pradesh, IndiaPragya AgarwalHi-Tech Institute of Engineering and Technology, Ghaziabad, IndiaPushpa ChoudharyGalgotias College of Engineering and Technology, Greater Noida-201306, Uttar Pradesh, IndiaPushpendra SinghSRMIST Delhi NCR Campus Modi Nagar Ghaziabad UP 201204, Uttar Pradesh, IndiaPiyush SharmaComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaPankaj Kumar MishraDepartment of Mechanical Engineering, HI-Tech Institute of Engineering and Technology, Ghaziabad-201009, IndiaPraveen Chandra JhaDepartment of Applied Science, I.T.S., Greater Noida-201306, IndiaPragya AgarwalHi-Tech Institute of Engineering & Technology, Ghaziabad, Uttar Pradesh, IndiaPreeti DubeyComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaPratyush PrasharBachelor of Technology (Information Technology) Sharda University, Plot No. 32-34, Knowledge Park III, Greater Noida, Uttar Pradesh 20131, , IndiaPriyanka TyagiBachelor of Technology (Information Technology) Sharda University, Plot No. 32-34, Knowledge Park III, Greater Noida, Uttar Pradesh 20131, , IndiaRamashankarDepartment of Civil Engineering, Greater Noida Institute of Technology, GNIOT, Greater Noida, Uttar Pradesh, IndiaRanvee KashyapSchool of Computer Science and Engineering, GB Nagar, Uttar Pradesh, IndiaRohit KumarSchool of Computer Science and Engineering, GB Nagar, Uttar Pradesh, IndiaRamander SinghComputer Science and Engineering, Amity University, Haryana, Uttar Pradesh, India
Depatment of Computer Science and Engineering, IMS Engineering College, Ghaziabad, (U.P.), IndiaRitesh Kumar SinghalAjay Kumar Garg Institute of Management, Ghaziabad, Uttar Pradesh 201206, IndiaRiti RathoreDepartment of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad-201009, IndiaRama Krishna ChallaChitkara University Institute of Engineering and Technology, Chitkara University Punjab, IndiaRashmi SharmaDepartment of Information Technology, Ajay Kumar Gag Engineering College, Ghaziabad, UP, IndiaRitik MangaComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaRishabh KumarComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaRitesh GautamaComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaRavi RamanDepartment of Civil Engineering, Greater Noida Institute of Technology, GNIOT, Greater Noida, Uttar Pradesh, IndiaRaj Gopal MishraHi-Tech Institute of Engineering and Technology, Ghaziabad, Uttar Pradesh, IndiaRam Kishor GuptaDepartment of Mechanical Engineering, HI-Tech Institute of Engineering and Technology, Ghaziabad-201009, IndiaSachinComputer Science ABES Engineering College, Ghaziabad, IndiaSatpal SinghDepartment of Computer Science, Punjabi University, Patiala, IndiaSubhash ChanderDepartment of Computer Science, University College Jaito, Jaito, IndiaSharda TiwariDepartment of Computer Science & Engineering, Amity University, Uttar Pradesh, IndiaSatyam Kumar NikhilSchool of Computer Science and Engineering, GB Nagar, Uttar Pradesh, IndiaShreyansh GuptaComputer Science ABES Engineering College, Ghaziabad, IndiaSonia VermaComputer Science ABES Engineering College, Ghaziabad, IndiaSachin KumarDepartment of Civil Engineering, Greater Noida Institute of Technology, Greater Noida, U.P., IndiaShreeja KackerDepartment of Civil Engineering, Greater Noida Institute of Technology, Greater Noida, U.P., IndiaShruti GuptaABES Engineering College, Ghaziabad, IndiaSatish KumarManagement Department, Ajay Kumar Garg Institute of Management, Ghaziabad, IndiaShikha JainKiet Group of Institutions, Delhi-Ncr, Ghaziabad, Uttar Pradesh 201206, IndiaSwasti SinghalAIIT Amity University Noida, Noida, Uttar Pradesh 201313, IndiaShiva TyagiDepartment of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad-201009, IndiaSamyak JainDepartment of Computer Science and Engineering, ABES Engineering College, Ghaziabad, IndiaShalin KumarDepartment of Applied Science, Greater Noida Institute of Technology, Greater Noida, (U.P), India
Hi Tech Institute of Engineering and Technology, Ghaziabad, Uttar Pradesh, IndiaSurbhi AgarwalDepatment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaSiddhartha SrivastavaDepartment of Information Technology, Ajay Kumar Gag Engineering College, Ghaziabad, UP, IndiaSantosh KumarDepartment of Management, Hi-tech Institute of Engineering & Technology, Ghaziabad, IndiaShubhangi SinghComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaShivam RajDepartment of Civil Engineering, Greater Noida Institute of Technology, GNIOT, Greater Noida, Uttar Pradesh, IndiaSachin GautamDepartment of Civil Engineering, Greater Noida Institute of Technology, GNIOT, Greater Noida, Uttar Pradesh, IndiaSumit KumarHi-Tech Institute of Engineering and Technology, Ghaziabad, Uttar Pradesh, IndiaSomya GoelDepartment of ECE, HI-Tech Institute of Engineering and Technology, Ghaziabad, UPTU, IndiaShilpa ChaudharyHi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaSheelesh Kumar SharmaDeartment of CSE, ABES Institute of Technology, Ghaziabad, Uttar Pradesh, IndiaSrishti GargDeartment of CSE, ABES Institute of Technology, Ghaziabad, Uttar Pradesh, IndiaSujoy MondolComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaSyed Mohammad Moiez Ur RahmanComputer Science & Technology, Sharda University, Greater Noida, (U.P.), IndiaShubham Kumar MishraInformation Technology Sharda University, Plot No. 32-34, Knowledge Park III, Greater Noida, Uttar Pradesh 20131, IndiaSurendra SinghDepartment of Applied Science & Humanities, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaSomaya GoelDepartment Electrical Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaTusharABES Engineering College, Ghaziabad, IndiaTanvi AgarwalDepartment of Management, Hi-tech Institute of Engineering & Technology, Ghaziabad, IndiaTanu GuptaDepartment of ECE, HI-Tech Institute of Engineering and Technology, Gzb, UPTU, IndiaUday TyagiComputer Science ABES Engineering College, Ghaziabad, IndiaV.V. KolomietsAgriculture University, Kharkov, UkraineVarun UpadhayayABES Engineering College, Ghaziabad, IndiaVartika SrivastavaABES Engineering College, Ghaziabad, IndiaVandana SainiChitkara University Institute of Engineering and Technology Chitkara University, Himachal Pradesh, IndiaVipul KumarDepartment of Management Studies, Hi-Tech Institute of Engineering and Technology, Ghaziabad, (U.P.), IndiaVinay Kumar AgarwalDepartment of Management, Hi-tech Institute of Engineering & Technology, Ghaziabad, IndiaVipin Kumar PalComputer Science and Engineering, Hi-Tech Institute of Engineering & Technology, Ghaziabad, U.P, IndiaVipin Kumar TomerHi-Tech Institute of Engineering & Technology, Ghaziabad, (U.P), IndiaVijay KumarDepartment of Mechanical Engineering, I.M.T., Greater Noida-201306, IndiaVipin TomerHi-Tech Institute of Engineering & Technology, Ghaziabad, Uttar Pradesh, IndiaVenkata Padmavathi S.Gitam School of Technology, Gitam Deemed to be University Telangana, Hyderabad, IndiaYashaswiDeartment of CSE, ABES Institute of Technology, Ghaziabad, Uttar Pradesh, IndiaYashraj MishraKiet Group of Institutions, Delhi-Ncr, Ghaziabad, Uttar Pradesh 201206, IndiaYash ModiKiet Group of Institutions, Delhi-Ncr, Ghaziabad, Uttar Pradesh 201206, India
Trust-Based Neighbor Selection Protocol to Elect Leader in Blockchain using zk-SNARKs Algorithms
Satpal Singh1,*,Subhash Chander2
1 Department of Computer Science, Punjabi University, Patiala, India
2 Department of Computer Science, University College Jaito, Jaito, India
Abstract
Blockchain stores and writes all the transactions because of the unlimited storage capacity. Leader election is the process of electing a node as an overall in-charge of the distributed network. Leader election is a complicated task as we have to choose a leader by giving equal opportunity to all the nodes. We implement all the algorithms of the DONS protocol in order to elect a leader but in our TBNS (Trust Based Neighbor Selection) protocol, we add zk-SNARKs proof to enhance the security of Blockchain. zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) is a type of proof used in cryptography to prove the authenticity of information without revealing any additional information. It allows one party to prove to another that they know a certain piece of information without actually revealing the information itself. In the end, the results of our proposed model are compared with RTT-NS and DONS.
Keywords: Blockchain, TBNS, zk-SNARK.
*Corresponding author Satpal Singh: Department of Computer Science, Punjabi University, Patiala, India; E-mail:
[email protected]REFERENCES
[1]Tan T.G., Sharma V., Zhou J.. 2020Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader, International Conference on Blockchain and Cryptocurrency (ICBC). : 1-9.
[CrossRef][2]Esgin M.F., Ersoy O., Kuchta V., Loss J., Sakzad A., Steinfeld R., Yang W., Zhao R.K.. , . (2022), A New Look at Blockchain Leader Election : Simple, Efficient, Sustainable and Post-Quantum. Cryptology ePrint Archive, Paper 2022/993. https://eprint.iacr.org/2022/993[3]Jingjing, Zhou; Tongyu, Yang; Jilin, Zhang; Guohao, Zhang; Xuefeng, Li; Xiang, Pan. Intrusion Detection Model for Wireless Sensor Networks Based on MC-GRU., In the preceding of Wireless Communications and Mobile Computing.2022: 1-11.
[CrossRef][4]Saraswat D., Verma A., Bhattacharya P., Tanwar S., Sharma G., Bokoro P.N., Sharma R.. Blockchain-Based Federated Learning in UAVs Beyond 5G Networks: A Solution Taxonomy and Future Directions., IEEE Access.2022; 10: 33154-33182.
[CrossRef][5]Baniata H., Anaqreh A., Kertesz A.. DONS: Dynamic Optimized Neighbor Selection for smart blockchain networks., Future Gener. Comput. Syst..2022; 130: 75-90.
[CrossRef][6]Abraham I., Dolev D., Halpern J.Y.. Distributed protocols for leader election: A game-theoretic perspective, International Symposium on Distributed Computing.2013: 61-75.
[CrossRef][7]Al Refai M.. A new leader election algorithm in hypercube networks, Symposium Proceedings. 22006;[8]Al Refai, Mohammed. Leader election algorithm in hypercube netwok when the id number is not distinguished., Inf. Commun. Syst..2011: 229-237.[9]Biswas A., Maurya A.K., Tripathi A.K., Aknine S.. FRLLE: a failure rate and load-based leader election algorithm for a bidirectional ring in distributed systems., J. Supercomput..2021; 77(1): 751-779.
[CrossRef][10]Alslaity A.N., Alwidian S.A.. A k-neighbor-based, energy aware leader election algorithm (kelea) for mobile ad hoc networks., Int. J. Comput. Appl..2012; 975: 8887.[11]Yakira D., Asayag A., Cohen G., Grayevsky I., Leshkowitz M., Rottenstreich O., Tamari R.. Helix: A Fair Blockchain Consensus Protocol Resistant to Ordering Manipulation., IEEE Trans. Netw. Serv. Manag..2021; 18(2): 1584-1597.
[CrossRef][12]Yakira D., Asayag A., Cohen G., Grayevsky I., Leshkowitz M., Rottenstreich O., Tamari R.. Helix: A Fair Blockchain Consensus Protocol Resistant to Ordering Manipulation., IEEE Trans. Netw. Serv. Manag..2021; 18(2): 1584-1597.
[CrossRef][13]Gebremariam, Gebrekiros Gebreyesus. Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning., In the preceding of Wireless Communications and Mobile Computing, Hindawi..2023: 1530-8669.
[CrossRef]Electronic Healthcare Data Security Using Blockchain
Sharda Tiwari1,*,Namrata Dhanda1,Harsh Dev2
1 Department of Computer Science & Engineering, Amity University, Uttar Pradesh, India
2 Department of Computer Science & Engineering, Pranveer Singh Institute of Technology, Kanpur, Uttar Pradesh, India
Abstract
In this paper, a blockchain-based healthcare security system as a solution for preventing data forging is proposed. The proposed model for healthcare data security is based on blockchain and its smart contract execution in a secure way. We proposed a system where users can access the open surveys and participate in these surveys. Moreover, their answers cannot be changed by anonymous or 3rd party people with smart contract control. At the same time, to ensure the confidentiality of the patient’s data, we kept the hashed value of the information we collected from the patient’s survey data as evidence and the encrypted version so that data can be used for the evaluation, in the relevant storage units of the generated decentralized application.
Keywords: Component, Formatting, Insert (key words), Style, Styling.
*Corresponding author Sharda Tiwari: Department of Computer Science & Engineering, Amity University, Uttar Pradesh, India; E-mail:
[email protected]INTRODUCTION
Technology is quickly advancing every day. Many tasks were previously completed physically in real life and then shifted to the digital workflow because of this advancement [1-5]. For instance, technology has an impact on finance, trade, multimedia, and advertising. At the same time, another area affected by these technological developments is the health field. Especially with the spread of the internet, the strengthening of computer technologies, and the learning of technology by people working in the field, most health-related data transactions began to be stored in digital areas. During these transitions, databases were used as the first solution for storing health data. As a result of this transition, the amount of data stored electronically has increased day by day. Due to both speed and memory requirements, distributed database structures were established. These
accomplishments and transitions have been very beneficial for healthcare and many other sectors [6-10]. However, it is an undeniable fact that there are parts of technology that cause difficulties in the field of health, as in every field. The most concerning subject among these challenges is the security of healthcare data. The medical operations and their results may contain sensitive or private data that is not desired to be captured or exposed by others. Therefore, ensuring the security of healthcare data is significantly necessary. Due to the necessity of providing security, many studies have been achieved about e-healthcare data protection, since the beginning of healthcare data processing in digital areas. The solution to the security concerns relies on the fundamentals of cryptography as confidentiality, integrity, and authentication. Many techniques have already been developed to provide these cryptographic fundamentals. These security problems can be eliminated with the combination of cryptographic techniques such as authorization control, encryption, masking, anonymization, etc. [11-15].
Research Motivation
The motivation behind the research is the need to revolutionize healthcare systems and improve patient outcomes.
One of the main motivations is the potential to detect diseases at an early stage. Early disease detection can lower healthcare expenditures and significantly improve treatment outcomes [16-20].Another motivation is the ability to remotely monitor and manage patients' health conditions. Remote monitoring allows healthcare providers to track patients' health status in real time, enabling early intervention and personalized care plans. Additionally, IoT Based Disease Prediction systems can contribute to the development of personalized medicine [21-23].A further driving force behind research has been the need to solve issues with existing healthcare systems, like excessive wait times, restricted access to care, and underutilization of available resources. IoT Based Disease Prediction systems have the potential to overcome these challenges by providing timely and accurate health monitoring, early detection of diseases, and efficient resource allocation.
Furthermore, research improved population health management. By utilizing IoT devices and predictive models, healthcare providers can gain insights into population health trends, identify high-risk individuals or communities, and implement preventive measures to reduce the prevalence of diseases.
Research Gaps
While there have been significant advancements in the field of IoT-based Disease Prediction and management using Blockchain technology, there are still some research gaps that need to be addressed.
Integration of IoT devices and sensors: Although IoT devices play a crucial role in collecting real-time health data; there is a need for further research on the integration of a wider range of IoT devices and sensors. This integration will allow for more comprehensive and accurate data collection, leading to better disease prediction and management.Standardization and interoperability: One of the challenges in implementing IoT Based Disease Prediction systems is the absence of common frameworks and protocols for data interchange and interoperability among various IoT platforms and devices. This research gap highlights the need for developing standardized protocols and frameworks that enable seamless interoperability between IoT devices, ensuring effective data sharing and analysis for disease predictionData security and privacy: Another research gap in the field of IoT Based Disease Prediction and management using Blockchain is the need for robust data security and privacy mechanisms. The security and privacy of patient data are becoming more and more important as healthcare data becomes more digital. Blockchain technology can help by enabling the decentralized and unchangeable storage of medical records.Integration with Electronic Health Records: EHR systems play a significant role in healthcare data management. However, there is a research gap in understanding how IoT Based Disease Prediction systems can effectively integrate with existing EHR systems. This integration would allow for seamless data sharing and analysis between IoT devices and EHR systems, leading to more accurate disease prediction and management.Scalability and performance: The scalability and performance of IoT Based Disease Prediction systems using Blockchain technology are important considerations. Research is needed to explore ways to optimize the performance of Blockchain-based IoT systems, addressing issues such as transaction processing speed and scalability to handle large amounts of data.
Contribution
Data preservation and data immutability are the main requirements for electronic health record systems. In this paper, a system has been designed that aims to save the e-health record data and their results as evidence. Since proof immutability is the main requirement of these kinds of systems, an immutable ledger mechanism is an ideal solution for this requirement. Therefore, we have designed a system that can work in sync with the blockchain. The proposed model aims to provide a scalable, fast, and secure healthcare-proof system to users. While designing this model, we used cryptographic algorithms that comply with the standards. In addition, we chose to use parameters according to the specified standards for these algorithms. After this design, we propose an interface and works synchronously with the preferred blockchain structure.
Literature Review
Azaria et al. offered a blockchain-based user access control system named MedRec. They used the Ethereum blockchain and its smart contract mechanism. They used nodes with two roles as patient and provider nodes. In MedRec’s solution, there are three smart contract designs. The registrar contract ensures the relation between the Ethereum address and the system user. The summary contract provides a record history for each patient, and the patient-provider contract provides access control between patients and related providers. Rajput et al. proposed a blockchain-based control management system for the patient healthcare data. In Rajput’s system, Hyperledger Fabric was used for the blockchain mechanism. Business logic was implemented with the smart contract such as registering and retrieving data operations. In addition, they used an API connection between the application and the blockchain side. Moreover, they determined access control rules according to the roles of the users in the system for preventing unauthorized user activities on patients, doctors, or staff data. Shahnaz et al. developed a pure blockchain system with role-based authorization for ensuring the privacy of healthcare data. In this system, they used Ethereum and its smart contract mechanism Solidity. In their system, there are two types of smart contracts. The first one is the patient record contract, and the other one is for roles. The first one contains all create, read, update and delete (CRUD) functions such as patient record saving, viewing, grant or revoke access controls. The role contract is predefined via the Open Zeppelin library. Their user definitions are based on only Ethereum users. Therefore, the blockchain provides interaction between smart contracts and users. Xu et al. studied blockchain-based approach to IoT-based healthcare system named Health Chain. They constructed two related chains. The first one is a public blockchain named User chain and the second one is a consortium blockchain named Do chain. The user chain stores the user information data in Unblock. For the confidentiality of the user’s IoT data, they have used AES symmetric encryption. In addition, for storing the encryption key and encrypted user’s IoT data separately, they have used two different transactions. Doc-chain, on the other hand, stores the diagnostics of the related users in their block named D-block. As a consensus mechanism, the User chain has a PoW mechanism. However, they prefer the PoS-based Byzantine Fault Tolerance for the Doc chain. Furthermore, the encrypted data are stored on IPFS in storage nodes. Fan et al. suggested another blockchain-based electronic medical data-sharing solution named MedBlock. In this solution, they constructed a private blockchain. In parallel, they use a hybrid consensus mechanism for reducing resource wasting and improving the network speed. The data security is provided by a signature-based access control protocol. Accordingly, if the user signature is not among the signature collections in their system, user access is blocked. The studies we have mentioned so far are mostly blockchain studies based on providing access control. Li et al. suggested a blockchain-based medical data preservation system with Ethereum. They developed a three-layer application as many solutions have been proposed. These layers are the user layer, the application layer, and the blockchain layer. Briefly, they retrieve the data from the user layer, process, read, or update it at the application layer, and submit the encrypted and hashed data to the blockchain layer. In this process, they used algorithms such as AES and SHA-256 to preserve data confidentiality and integrity. Pavel et al. specified the problem as medical data transferring and proposed a blockchain-based solution to their PoS-based blockchain structure. They used signature-based authorization for the image transfer, retrieval, or viewing.
Proposed model
The proposed model consists of three main parts. The first part is the web application of the project. The web server provides the connection with the database and constructs all transaction data with the Algorand API in Python. In addition, the survey operations are creation, filling, and consent processed by the web application. During these operations, all requested body data are converted into designed back-end class objects. The other one is the blockchain side. On the blockchain, all types of transaction data are sent by the web server via Algorand API. Then the validity of the transactions is checked by the system. In this case, if the sent data is valid then the data is committed to the blockchain. Moreover, on the blockchain side, we use smart contracts and asset technology. The last part is the database module. For each generated survey, we create a new executable decentralized application with a unique ID. With this unique ID, we create a new register in the database and map this register with the smart contract ID. In addition, the survey data such as questions, options, descriptions, etc. are stored in the database. Most of the time, the database operations are quicker than backend data operations. However, due to the cryptographic library methods, database encryption is faster than back-end encryption. Hence, we use a database for sending survey data more quickly to the patient side instead of back-end operations. The overview of the general structure is given in Fig. (1) below.
Fig. (1))
Mechanism for smart contract execution.
The smart contract initially verifies the kind of application transaction when it is performed by any application transaction. A new application will be produced if the application ID is equal to zero. When creating surveys, this control is utilized. There is already an application if it is not equal to zero. The smart contract then determines if the user has authorization after those controls. The user's MST balance is checked in order to implement this control. If the user's MST balance is more than zero, it is successful. If not, this user's smart contract automatically completes. Both the filling out of permission forms and survey requests use this control. The smart contract has now split into two branches. The permission form approval is handled by this one. The other is used to complete surveys. The smart contract is called when the consent form is filled out. The preceding stages are checked once more. If all requirements are met, the application first looks at the kind of smart contract that was invoked. If it is an opt-in kind, it offers a check to see if the user has already registered. In the event that one is given, the smart contract records the argument sent for the consent form as key-value pairs in the user's local storage. Otherwise, the agreement was broken by the smart contract. The cancellation causes the transaction to fail. When filling out a survey, the smart contract is contacted once again and the attributes are checked again. The smart contract checks two parameters if all requirements are satisfied. The first step is to determine whether or not the user is registered. The presence of previously recorded survey data is examined for the second. If the contract breaches the agreement and discovers any registration-related data that has been saved, the transaction will again fail. In the absence of this, the contract accepts the argument given for the encrypted survey responses and hashed survey data, and saves them as key-value pairs in the user's local smart contract storage as in the consent form procedure.
Survey Creation
Once a survey is created, the blockchain and application sides cooperate. The creation of smart contracts and transforming them into blockchain-compatible agreements are the most important aspects of this stage. Each survey generation activates the new decentralized application with a distinct ID in the blockchain. The doctor is the creator of the survey. Therefore, he prepares the survey and sends it to the application side with his mnemonic key. In this step, the system requires survey data in JSON format. Once the survey data reaches the application, it is adapted to the designed object class for processing. Then, the contract transaction creation process is performed. This transaction is named Application Call Transaction. After validation of the 31 blockchain, if there is not an invalid parameter or operation request, the transaction is committed to the system. And our smart contract is executed in the AVM. Otherwise, the transaction fails. In the successful case, we adapt the survey data to the data transfer object. After that, we save the survey information to our database. During registration in the database, we encrypt the survey data with the AES algorithm with the CBC mode (Fig. 2).
Fig. (2))
Mechanism of survey creation.
Consent Form
Medical surveys are widely used in many areas of healthcare. These surveys can be done incrementally, once, continuously, or both before and after some medical operations. The answers or the results of the survey might contain sensitive data. Due to the principle of doctor-patient confidentiality, both doctors and patients avoid the disclosure of this data. Moreover, some tests might have unexpected consequences. Therefore, the consent form is filled out by the patients for the data confidentiality agreements and a disclaimer for unpredictable results. Because of these requirements in the medical surveys, we construct a consent form structure. Since the consent form is an agreement between the doctor and the patient, we store this consent form on the blockchain side for immutable proof of agreement. Fig. (3) explains the generation of transactions and the execution of the smart contract mechanism for the consent form. Once the participant requests to fill out the determined survey, the consent form first appears to the patients before the survey has been sent. The participant reads the terms and conditions. If the patient declines the terms and conditions, he redirects to the main page, and the survey is canceled until he accepts the consent form. Once he confirms the consent form, the consent data is constructed with the server-side functions and generates the designed object class. Then the hash value of the consent data H(C) is generated via the SHA-256 hash function. After this step, the contract transaction generation process begins. The flow chart of consent operation is given in Fig. (3) below.
Fig. (3))
Consent form mechanism.
Survey Completion