Calibration of chaos medichain by non-functional testing approaches
Keywords:
calibration, blockchain networks, non-functional testing approachesAbstract
The evolution of blockchain networks extends with the proliferation of the Internet of Medical Things devices. These devices require stupendous storage space which enlarges the maintenance cost. It raises undermined data security & Privacy, risk of failure, dishonest interlopes access to the centralized system. The propitious solution against these challenges of an extensive centralized system is decentralized-based blockchain technology. This paper implements decentralized-based blockchain architecture deployed with chaotic encryption and proof of consensus mechanism for mining. The disintermediate architecture as an enchanting target for Denial of Service (DoS) attacks. To covenant the trust, testers must certify that all the components of the blockchain network are employing flawlessly. The performance of non-functional testing assured the quality assurance services is a decisive aspect of the proposed blockchain architecture. The proposed decentralized-based blockchain framework is calibrated by injecting various malicious attacks. Moreover, the attacks are injected with other encryption-based blockchains to correlate the high effective scheme for medical data security. The evaluation reveals that the Proposed chaos medicine architecture shows 14% lower latency than SHA and 18 % lower latency than AES on all attacks and deliberate to be safe from malicious attack.
Downloads
References
B. Community, “The 51% attack,” October 2017. [Online]. Available: https learncryptography .com /cryptocurrency/51-attack
Y. Marcus , et al,“Low-resource eclipse attacks on ethereum’s peer-to-peer network,” IACR Cryptology ePrint Archive, vol. 2018, p. 236, 2018. [Online]. Available: http://eprint.iacr.org/2018/236
A. Azaria, et al, “Medrec: Using blockchain for medical data access and permission management,” in 2016 2nd International Conference on Open and Big Data (OBD), Aug 2016, pp. 25–30
Q. Xia, et al, “Medshare: Trustless medical data sharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14 757–14 767, 2017
A. Greenberg, “Hacker redirects traffic from 19 internet providers to steal bitcoins,” Jun 2017. [Online]. Available: https://www.wired.com/ 2014/08/isp-bitcoin
M. Castro, et al, “Practical byzantine fault tolerance and proactive recovery,” ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398– 461, 2002.
https://www.seba.swiss/research/are-blockchains -safe-how-to-attack-them-and-prevent-attacks.
R.Durga, et al,” Generation of RAESSES Hash Function for Medical Blockchain Formation Based on High Dynamic Chaotic Systems”. International Journal of Advanced Science and Technology, 2020,29(06), 8427-8440.
Saqib Hakak, et al” Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges”,2020, Published in: IEEE Network
Khan, Prince W, et al, "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things" ,2020, Entropy 22, no. 2: 175. doi.org/10.3390/e22020175
J. Indumathi et al., "Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U6 HCS)," 2020, IEEE Access, vol. 8, pp. 216856-216872, doi: 10.1109/ACCESS.2020.3040240
Choi, Y.J et al,” Scalable and Secure Internet of Things Connectivity”. Electronics 2019, 8, 752
H.Liu, et al, “Construction of a new 2D Chebyshev-Sine map and its application to color image encryption”. Multimed Tools Appl 78, 15997–16010 (2019)
Xing yuan Wang ,et al , “A chaotic image encryption scheme based on cat map and MMT permutation”, Modern Physics Letters B VOL. 33, NO. 27, https://doi.org/10.1142/S0217984919503263
Shenyong Xiao, et al "Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism", Security and Communication Networks, vol. 2020, Article ID 7913061, 12 pages, 2020.
B.Aruna, et al” Security Analysis on Block Chain using the Ecc and Sha Algorithms”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8, June 2019
P.Nivethini., et al,” Data Security using Blockchain Technology”, Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA),2017 279-
Zhai, Sheping et al.” Research on the Application of Cryptography on the Blockchain”, 2020, Journal of Physics: Conference Series. 1168. 032077. 10.1088/1742-6596/1168/3/032077
Donia Fadhil Chalob, Amal Abdulbaqi Maryoosh, Zainab Mohammed Essa, Elaf Nassir abbud,” A new block cipher for image encryption based on multi chaotic systems”, TELKOMNIKA Telecommunication, Computing, Electronics and ControlVol. 18, No. 6, December 2020, pp. 2983~2991
S. Hakak, W. Z. Khan, G. A. Gilkar, M. Imran, and N. Guizani, “Securing smart cities through blockchain technology: Architecture, requirements, and challenges,” IEEE Network, vol. 34, no. 1, pp. 8–14, 2020
G. Kothai, E. Poovammal, Gaurav Dhiman, Kadiyala Ramana, Ashutosh Sharma, Mohammed A. AlZain, Gurjot Singh Gaba, Mehedi Masud, "A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities", Wireless Communications and Mobile Computing, vol. 2021, Article ID 5583874, 13 pages, 2021. https://doi.org/10.1155/2021/5583874
Alam, Tanweer. (2018) "A reliable framework for communication in internet of smart devices using IEEE 802.15.4." ARPN Journal of Engineering and Applied Sciences 13(10), 3378- 3387
Balasubramanian, Sowmiya & E., Poovammal. (2019). Blockchain Technology Is a Boost to Cyber Security. 10.4018/978-1-5225-8241-0.ch013.
Joan S. Muthu, P. Murali,A new chaotic map with large chaotic band for a secured image cryptosystem,Optik,Volume 242,2021,167300,ISSN 0030-4026,https://doi.org/10.1016/j.ijleo.2021.167300.
R. Durga, E. Poovammal, K. Ramana, R. H. Jhaveri, S. Singh and B. Yoon, "CES Blocks—A Novel Chaotic Encryption Schemes-Based Blockchain System for an IoT Environment," in IEEE Access, vol. 10, pp. 11354-11371, 2022, doi: 10.1109/ACCESS.2022.3144681.
Rinartha, K., & Suryasa, W. (2017). Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-4). IEEE.
Rinartha, K., Suryasa, W., & Kartika, L. G. S. (2018). Comparative Analysis of String Similarity on Dynamic Query Suggestions. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 399-404). IEEE.
Susilo, C. B., Jayanto, I., & Kusumawaty, I. (2021). Understanding digital technology trends in healthcare and preventive strategy. International Journal of Health & Medical Sciences, 4(3), 347-354. https://doi.org/10.31295/ijhms.v4n3.1769
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.