Calibration of chaos medichain by non-functional testing approaches

https://doi.org/10.53730/ijhs.v6nS4.9090

Authors

  • Durga R Department of Computing Technology SRM Institute of Science and Technology, Kattankulathur, India - 603203
  • Poovammal E Department of Computing Technology SRM Institute of Science and Technology, Kattankulathur, India - 603203

Keywords:

calibration, blockchain networks, non-functional testing approaches

Abstract

The evolution of blockchain networks extends with the proliferation of the Internet of Medical Things devices. These devices require stupendous storage space which enlarges the maintenance cost. It raises undermined data security & Privacy, risk of failure, dishonest interlopes access to the centralized system. The propitious solution against these challenges of an extensive centralized system is decentralized-based blockchain technology. This paper implements decentralized-based blockchain architecture deployed with chaotic encryption and proof of consensus mechanism for mining. The disintermediate architecture as an enchanting target for Denial of Service (DoS) attacks. To covenant the trust, testers must certify that all the components of the blockchain network are employing flawlessly. The performance of non-functional testing assured the quality assurance services is a decisive aspect of the proposed blockchain architecture. The proposed decentralized-based blockchain framework is calibrated by injecting various malicious attacks. Moreover, the attacks are injected with other encryption-based blockchains to correlate the high effective scheme for medical data security. The evaluation reveals that the Proposed chaos medicine architecture shows 14% lower latency than SHA and 18 % lower latency than AES on all attacks and deliberate to be safe from malicious attack.

Downloads

Download data is not yet available.

References

B. Community, “The 51% attack,” October 2017. [Online]. Available: https learncryptography .com /cryptocurrency/51-attack

Y. Marcus , et al,“Low-resource eclipse attacks on ethereum’s peer-to-peer network,” IACR Cryptology ePrint Archive, vol. 2018, p. 236, 2018. [Online]. Available: http://eprint.iacr.org/2018/236

A. Azaria, et al, “Medrec: Using blockchain for medical data access and permission management,” in 2016 2nd International Conference on Open and Big Data (OBD), Aug 2016, pp. 25–30

Q. Xia, et al, “Medshare: Trustless medical data sharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14 757–14 767, 2017

A. Greenberg, “Hacker redirects traffic from 19 internet providers to steal bitcoins,” Jun 2017. [Online]. Available: https://www.wired.com/ 2014/08/isp-bitcoin

M. Castro, et al, “Practical byzantine fault tolerance and proactive recovery,” ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398– 461, 2002.

https://www.seba.swiss/research/are-blockchains -safe-how-to-attack-them-and-prevent-attacks.

R.Durga, et al,” Generation of RAESSES Hash Function for Medical Blockchain Formation Based on High Dynamic Chaotic Systems”. International Journal of Advanced Science and Technology, 2020,29(06), 8427-8440.

Saqib Hakak, et al” Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges”,2020, Published in: IEEE Network

Khan, Prince W, et al, "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things" ,2020, Entropy 22, no. 2: 175. doi.org/10.3390/e22020175

J. Indumathi et al., "Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U6 HCS)," 2020, IEEE Access, vol. 8, pp. 216856-216872, doi: 10.1109/ACCESS.2020.3040240

Choi, Y.J et al,” Scalable and Secure Internet of Things Connectivity”. Electronics 2019, 8, 752

H.Liu, et al, “Construction of a new 2D Chebyshev-Sine map and its application to color image encryption”. Multimed Tools Appl 78, 15997–16010 (2019)

Xing yuan Wang ,et al , “A chaotic image encryption scheme based on cat map and MMT permutation”, Modern Physics Letters B VOL. 33, NO. 27, https://doi.org/10.1142/S0217984919503263

Shenyong Xiao, et al "Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism", Security and Communication Networks, vol. 2020, Article ID 7913061, 12 pages, 2020.

B.Aruna, et al” Security Analysis on Block Chain using the Ecc and Sha Algorithms”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8, June 2019

P.Nivethini., et al,” Data Security using Blockchain Technology”, Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA),2017 279-

Zhai, Sheping et al.” Research on the Application of Cryptography on the Blockchain”, 2020, Journal of Physics: Conference Series. 1168. 032077. 10.1088/1742-6596/1168/3/032077

Donia Fadhil Chalob, Amal Abdulbaqi Maryoosh, Zainab Mohammed Essa, Elaf Nassir abbud,” A new block cipher for image encryption based on multi chaotic systems”, TELKOMNIKA Telecommunication, Computing, Electronics and ControlVol. 18, No. 6, December 2020, pp. 2983~2991

S. Hakak, W. Z. Khan, G. A. Gilkar, M. Imran, and N. Guizani, “Securing smart cities through blockchain technology: Architecture, requirements, and challenges,” IEEE Network, vol. 34, no. 1, pp. 8–14, 2020

G. Kothai, E. Poovammal, Gaurav Dhiman, Kadiyala Ramana, Ashutosh Sharma, Mohammed A. AlZain, Gurjot Singh Gaba, Mehedi Masud, "A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities", Wireless Communications and Mobile Computing, vol. 2021, Article ID 5583874, 13 pages, 2021. https://doi.org/10.1155/2021/5583874

Alam, Tanweer. (2018) "A reliable framework for communication in internet of smart devices using IEEE 802.15.4." ARPN Journal of Engineering and Applied Sciences 13(10), 3378- 3387

Balasubramanian, Sowmiya & E., Poovammal. (2019). Blockchain Technology Is a Boost to Cyber Security. 10.4018/978-1-5225-8241-0.ch013.

Joan S. Muthu, P. Murali,A new chaotic map with large chaotic band for a secured image cryptosystem,Optik,Volume 242,2021,167300,ISSN 0030-4026,https://doi.org/10.1016/j.ijleo.2021.167300.

R. Durga, E. Poovammal, K. Ramana, R. H. Jhaveri, S. Singh and B. Yoon, "CES Blocks—A Novel Chaotic Encryption Schemes-Based Blockchain System for an IoT Environment," in IEEE Access, vol. 10, pp. 11354-11371, 2022, doi: 10.1109/ACCESS.2022.3144681.

Rinartha, K., & Suryasa, W. (2017). Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-4). IEEE.

Rinartha, K., Suryasa, W., & Kartika, L. G. S. (2018). Comparative Analysis of String Similarity on Dynamic Query Suggestions. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 399-404). IEEE.

Susilo, C. B., Jayanto, I., & Kusumawaty, I. (2021). Understanding digital technology trends in healthcare and preventive strategy. International Journal of Health & Medical Sciences, 4(3), 347-354. https://doi.org/10.31295/ijhms.v4n3.1769

Published

16-06-2022

How to Cite

Durga, R., & Poovammal, E. (2022). Calibration of chaos medichain by non-functional testing approaches. International Journal of Health Sciences, 6(S4), 4456–4468. https://doi.org/10.53730/ijhs.v6nS4.9090

Issue

Section

Peer Review Articles