preview

The Authentication Process Between The Ems And The PHR

Decent Essays

To access the information stored in a requested PHR, an EMT sends a request message to the EmS. Then, the authentication process between the EmS and the EMT occurs. Once the authentication succeeds, the EMS broadcasts the request message along with the encrypted secret key to each corresponding pre-selected trusted user If a trusted member accepts the request, he/she decrypts the encrypted secret key with his/her private key and sends the secret key to the EmS through a secure channel. If the number of approvals is more than or equal to the pre-determined threshold (variable t), the EMS can decrypt the encrypted unique emergency key, which is encrypted using the threshold cryptosystem. Then, the EMS downloads the requested encrypted PHR …show more content…

The block header plays a significant role in the blockchain network by ensuring immutability. Without changing a block header, an attacker should not have to change all block headers starting from the genesis block in order to falsify a block’s record. This significantly ensures security on the network since there is a maximum assurance of an impossibility of achieving this task. Block mismatch will alert the system of a suspicious ongoing event, which triggers data forensics.
The block header contains the version number, which indicates the validation rules to follow. The header is also made up of the previous block’s hash which is a sha256 (sha256()) hash whose function is to ensure that no previous block header can be changed without changing this block’s header. The Merkle root hash forms part of the header by ensuring that none of the blocks in the blockchain network can be modified without modifying the header. This is achieved by taking the hashes of all the events in the blockchain network and appending the output to the current block. The final result is a sha256 (sha256()). The header contains a timestamp of when the block was created. The header contains target difficulty which is a value of how processing is achieved by the EmS. This is unique to the system to make processing difficult for malicious nodes but efficient and solvable by verified EmS in the system. Finally, the header

Get Access