Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 5 Sayı: 1, 1 - 7, 15.06.2019

Öz

Kaynakça

  • [1] Y. L. Simmhan, B. Plale, D. Gannon, “A survey of data provenance in e-science,” ACM Sigmod Record, vol. 34, no. 3, 2005:pp. 31–36.
  • [2] L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems vol:10, no:05 2002: pp. 557-570.
  • [3] A. Machanavajjhala, D. Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam, “L-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol:1, no:1, 2007:pp.1-52.
  • [4] N. Li, T. Li, S. Venkatasubramanian. "t-closeness: Privacy beyond k-anonymity and l-diversity," IEEE 23rd International Conference onData Engineering, 2007:pp.106–115.
  • [5] C. Gentry, "Fully homomorphic encryption using ideal lattices,” Proceedings of the 41st annual ACM symposium on Symposium on theory of computing-STOC'09. Vol. 9, 2009:pp. 169–178.
  • [6] B. Lee, A. Awad, M. Awad, “Towards secure provenance in the cloud: A survey,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015:pp. 577–582.
  • [7] Lin, Iuon-Chang, Tzu-Chun Liao, "A Survey of Blockchain Security Issues and Challenges," International Network Security Vol:19, No:5, 2017:pp:653-659.
  • [8] Junqueira, Flavio P., Benjamin C. Reed, Marco Serafini, "Zab: High-performance broadcast for primary-backup systems," IEEE/IFIP 41st International Conference on Dependable Systems and Networks (DSN), 2011:pp. 245-256.
  • [9] T. Swanson, "Consensus-as-a-service: a Brief Report on the Emergence of Permissioned," Distributed Ledger Systems2015:pp:1-66.
  • [10] D. Tosh, S. Sengupta, C. A. Kamhoua, and K. A. Kwiat, “Establishing evolutionary game models for cyber security information exchange (cybex),” Journal of Computer and System Sciences, vol:98, 2016:pp.27-52.
  • [11] D. K. Tosh, S. Sengupta, S. Mukhopadhyay, C. Kamhoua, and K. Kwiat, “Game theoretic modeling to enforce security information sharing among firms,” in IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud),2015:pp. 7–12.
  • [12] I. Eyal, E.G. Sirer, “Majority is not enough: Bitcoin Mining is vulnerable, in: Financial Cryptography and Data Security”, 18th International Conference, in: Lecture Notes in Computer Science, vol:8437, 2014:pp. 436–454.
  • [13] Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q., “A survey on the security of blockchain systems.” Future Generation Computer Systems, 2017:http://dx.doi.org/10.1016/j.future.2017.08.020.

MEDİKAL VERİLERİN BLOK ZİNCİRİ MİMARİSİYLE GÜVENLİĞİNİN SAĞLANMASI

Yıl 2019, Cilt: 5 Sayı: 1, 1 - 7, 15.06.2019

Öz



Günümüz teknolojik
cihazlarının ve sosyal medyanın hayatımıza girmesiyle kişisel verilerde müthiş
bir artış olmuştur. Veri miktarındaki bu artış, depolama ve yönetim
süreçlerinde bulut ortamını önemli hale getirmektedir. Kişiye ait medikal
veriler, hassas verilerdir. Bu verilerinin bulut ortamında saklanması ve
korunması kritik öneme sahiptir. Bu problemin çözümünde farklı yaklaşımlar olsa
da Blok Zinciri mimarisi, verilerin bloklar halinde saklanmasını sağlayarak bir
denetim sürecini etkin kılmaktadır. Çalışmada oluşturulan blok zinciri ile
medikal veriler, blok zinciri içerisinde tutularak kayıtların güvenli bir
şekilde oluşturulması, erişilmesi ve paylaşılmasını kontrol bloğu ile mümkün hale
getirmektedir.




Kaynakça

  • [1] Y. L. Simmhan, B. Plale, D. Gannon, “A survey of data provenance in e-science,” ACM Sigmod Record, vol. 34, no. 3, 2005:pp. 31–36.
  • [2] L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems vol:10, no:05 2002: pp. 557-570.
  • [3] A. Machanavajjhala, D. Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam, “L-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol:1, no:1, 2007:pp.1-52.
  • [4] N. Li, T. Li, S. Venkatasubramanian. "t-closeness: Privacy beyond k-anonymity and l-diversity," IEEE 23rd International Conference onData Engineering, 2007:pp.106–115.
  • [5] C. Gentry, "Fully homomorphic encryption using ideal lattices,” Proceedings of the 41st annual ACM symposium on Symposium on theory of computing-STOC'09. Vol. 9, 2009:pp. 169–178.
  • [6] B. Lee, A. Awad, M. Awad, “Towards secure provenance in the cloud: A survey,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015:pp. 577–582.
  • [7] Lin, Iuon-Chang, Tzu-Chun Liao, "A Survey of Blockchain Security Issues and Challenges," International Network Security Vol:19, No:5, 2017:pp:653-659.
  • [8] Junqueira, Flavio P., Benjamin C. Reed, Marco Serafini, "Zab: High-performance broadcast for primary-backup systems," IEEE/IFIP 41st International Conference on Dependable Systems and Networks (DSN), 2011:pp. 245-256.
  • [9] T. Swanson, "Consensus-as-a-service: a Brief Report on the Emergence of Permissioned," Distributed Ledger Systems2015:pp:1-66.
  • [10] D. Tosh, S. Sengupta, C. A. Kamhoua, and K. A. Kwiat, “Establishing evolutionary game models for cyber security information exchange (cybex),” Journal of Computer and System Sciences, vol:98, 2016:pp.27-52.
  • [11] D. K. Tosh, S. Sengupta, S. Mukhopadhyay, C. Kamhoua, and K. Kwiat, “Game theoretic modeling to enforce security information sharing among firms,” in IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud),2015:pp. 7–12.
  • [12] I. Eyal, E.G. Sirer, “Majority is not enough: Bitcoin Mining is vulnerable, in: Financial Cryptography and Data Security”, 18th International Conference, in: Lecture Notes in Computer Science, vol:8437, 2014:pp. 436–454.
  • [13] Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q., “A survey on the security of blockchain systems.” Future Generation Computer Systems, 2017:http://dx.doi.org/10.1016/j.future.2017.08.020.
Toplam 13 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Yapay Zeka
Bölüm Makaleler
Yazarlar

Ömer Kasım

Yayımlanma Tarihi 15 Haziran 2019
Gönderilme Tarihi 2 Ocak 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 5 Sayı: 1

Kaynak Göster

IEEE Ö. Kasım, “MEDİKAL VERİLERİN BLOK ZİNCİRİ MİMARİSİYLE GÜVENLİĞİNİN SAĞLANMASI”, UBGMD, c. 5, sy. 1, ss. 1–7, 2019.