Advances, Systems and Applications
Security |
1. SA replicated in smartphones, edge devices, and the cloud can protect EHR from malicious assault |
2. The SSEHCET overcomes the computational constraints of IoT devices using the Edge layer |
3. The BCM, which is implemented on the edge layer, provides quicker processing and more security |
4. Access control support using Blockchain improves security at the storage layer |
5. Inserting aberrant medical data from patients into a customized Blockchain improves security |
6. The use of Blockchain to store environmental parameters and event occurrence improves security at several levels |
7. BCM ensures data integrity |
8. A DTL duplicated across numerous servers prevents tampering with a record |
9. Registration of SA performance parameters on the Blockchain improves security |
10. Various Smart contracts for processing EHR prevent a record from being tampered with |
Ease of learning |
1. The practices/technologies recommended for each layer of SSEHCET are simple to grasp. |
2. SSEHCET helps to assess organizations' willingness to secure the transmission of EHR |
3. SSEHCET is easy to understand and unambiguous |
4. Some training is required for the use of SSEHCET |
User Satisfaction |
1. SSEHCET is general and can be applied to most healthcare organizations providing eHealth |
2. Using SSEHCET would identify vulnerabilities in the company regarding the secure transmission of EHR |
3. The user will trust on eHealth system more if SSEHCET is applied by the healthcare organization |
The structure of SSEHCET |
1. All the layers of SSEHCET are self-explanatory |
2. The idea of the SSEHCET is applicable in the healthcare industry |
3. The distribution of technologies at various layers is useful |