Skip to main content

Advances, Systems and Applications

Table 1 Questions for SSEHCET Evaluation

From: Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency

Security

 1. SA replicated in smartphones, edge devices, and the cloud can protect EHR from malicious assault

 2. The SSEHCET overcomes the computational constraints of IoT devices using the Edge layer

 3. The BCM, which is implemented on the edge layer, provides quicker processing and more security

 4. Access control support using Blockchain improves security at the storage layer

 5. Inserting aberrant medical data from patients into a customized Blockchain improves security

 6. The use of Blockchain to store environmental parameters and event occurrence improves security at several levels

 7. BCM ensures data integrity

 8. A DTL duplicated across numerous servers prevents tampering with a record

 9. Registration of SA performance parameters on the Blockchain improves security

 10. Various Smart contracts for processing EHR prevent a record from being tampered with

Ease of learning

 1. The practices/technologies recommended for each layer of SSEHCET are simple to grasp.

 2. SSEHCET helps to assess organizations' willingness to secure the transmission of EHR

 3. SSEHCET is easy to understand and unambiguous

 4. Some training is required for the use of SSEHCET

User Satisfaction

 1. SSEHCET is general and can be applied to most healthcare organizations providing eHealth

 2. Using SSEHCET would identify vulnerabilities in the company regarding the secure transmission of EHR

 3. The user will trust on eHealth system more if SSEHCET is applied by the healthcare organization

The structure of SSEHCET

 1. All the layers of SSEHCET are self-explanatory

 2. The idea of the SSEHCET is applicable in the healthcare industry

 3. The distribution of technologies at various layers is useful