[45] |
Public blockchain |
Details about the algorithm are provided. |
multi-tier, public |
Implemented |
PBEDA, ECDH, MVP, and ECDSA |
[46] |
MAM is used for real-time broadcasting activity via wearable’s |
Algorithm details are provided. |
IOTA |
Implemented |
Masked Authenticated Messaging for Tangle, Merkle hash technique, Merkle signature scheme, One-time signature |
[47] |
Computing Edge |
There was little information available on the outcomes and efficiency. |
The channel was Ethereum |
Proposed |
WSN and Wireless sensor network controller v.2, computing Edge |
[48] |
Not Available |
MedRec was used to do a cost analysis, but no algorithm or data were given. |
The channel was Ethereum |
Proposed |
Ethereum Go-client, QuorumChain algorithm, classification, smart contracts, cipher manager, proxy re-encryption |
[49] |
UID system |
Details about the algorithm are not provided. |
Ethereum channel |
Proposed |
UID system, analytics of Big Data, history & registration contract |
[50] |
Not Available |
Details of the algorithm are provided, along with security margins that have been verified against defined criteria. |
The channel was Bitcoin |
Proposed |
Internet of Things, Merkle tree, Diffie–Hellman key exchange, and digital ring signature |
[51] |
Not Available |
Details about the algorithm are provided. |
The channel was Consortium |
Implemented |
Practical Byzantine fault tolerance consensus mechanism, |
[52] |
PSO |
Performance results from a static study based on specific assessment criteria |
N/A |
Implemented |
ADB, boosting for ML, reverse engineering, feature selection & extraction |
[53] |
Not Available |
Details about the algorithm are not provided. no experiments. |
Federated blockchain |
Proposed |
IoT sensors WBANs, oracle |
[54] |
Proposed signature scheme based on Attribute |
Details of mathematical and computational notations given for execution of scheme, performance, and security evaluation |
Not Available |
Implemented |
Diffie-Hellman computational bilinear, MA-ABS scheme |
[55] |
With the support of a genetic algorithm Proposed access control method based on blockchain |
In terms of input and output strings, block creation, time processing, detailed simulation results are provided. |
N/A |
Implemented |
Genetic algorithm, hash key cryptography, MD5 strings, discrete wavelet transforms. |
[56] |
The proposed Blockchain-based eHealth Integrity Model uses a design-science methodology. |
The integrity-verification algorithm’s details and test results have been released. |
Permissioned blockchain |
Implemented |
Byzantine Fault in Practice Algorithm for tolerant consensus |
[57] |
(HAR) Methods for recognizing human activity based on a uni model |
Some mathematical notations and comprehensive findings for performance reassessment studies on three datasets have been given. |
N/A |
Implemented |
For HAR (ECOC) framework, (SVM), Multi-class cooperative categorization technique, fog computing |
[33] |
Not Available |
For performance evaluation, precise mathematical and algorithmic notations are supplied, as well as the outcomes of experiments. |
N/A |
Implemented |
The Merkle tree with order-preserving encryption |
[59] |
Not Available |
The applicability of blockchain in healthcare is discussed using a concept-based approach. |
N/A |
Proposed |
Environment based on the blockchain |
[60] |
Preprocessing of images |
Details on the experimental results, classification training, and testing outcomes were given. |
Bitcoin |
Implemented |
HOG, LBP, SVM, RFT, DNN |
[61] |
Pearson’s correlation, compression ratio technique |
The compression ratio and stability performance testing results were given. |
N/A |
Implemented |
(BAQALC) proposed, (NGS), (SRA), LZW modification |
[62] |
Methods of authentication |
Details on the algorithm and how it performs in areas of operational costs were given. |
Ethereum |
Implemented |
primitiveness verification (PV), preservation Submission |
[63] |
Method of the primal-dual Varangian |
The performance study results of a strategy for achieving Stackelberg equilibrium were disclosed. |
N/A |
Implemented |
three-layer (Hierarchical architecture), edge computing |
[64] |
Machine Learning(ML) |
In place of simulation, experiment-based assessment, the proposed architecture is presented through workflow examples. |
Exonum |
Proposed |
Inbreeding coefficient, DNN predictor, data temporal value, LifePound (utility crypto token) |
[65] |
Not Available |
There are just a few algorithmic notations, but comprehensive findings for Apache JMeter performance evaluation are supplied. |
N/A |
Implemented |
Merkle tree, timestamped algorithm, Keyless signature infrastructure |
[66] |
Not Available |
Code scripts, access control methods, and performance assessment findings for access control and network overheads are all shared. |
Permissioned blockchain on Ethereum |
Implemented |
(IPFS), (ABE), mobile cloud |
[67] |
Not Available |
For performance evaluation on many parameters, details of algorithmic notations are given together with findings. |
Permissioned blockchain on Ethereum |
Implemented |
MediBChain protocol, (ECC) |
[68] |
Not Available |
For performance parameters, there are just a few algorithmic notations, but extensive simulation results are supplied |
N/A |
Implemented |
The one-time transaction, Ring signature algorithm, stealth address, Cryptonote protocol |
[69] |
Not Available |
For numerous parameters, with the discussion of outcomes, there are few algorithmic notations from experiment-based and theoretical mathematical results |
Permissioned blockchain |
Implemented |
consensus algorithm BFT smart, ECC, MedChain, modified digest algorithm |
[70] |
Not Available |
For simulated security analysis and performance evaluation, few explained algorithmic notation results are used. |
Blockchain technology Hyper ledger |
Implemented |
SIFF |
[71] |
Generating Sessional symmetric key |
An in-depth look into simulated performance and security assessments. |
Custom bitcoin and Ethereum |
Implemented |
PUA, Trei tree, mutual authentication protocol, HMAC |
[72] |
Not Available |
There are no experimental or simulation test results, but algorithmic notations and the syntax are described with analysis of specified security. |
Consortium blockchain |
Implemented |
ABE and IBE, proposed d identity-based combine attribute, identity-based signature, signature, and encryption |
[73] |
Not Available |
There was only a brief discussion of the outcomes of simulated blockchain-based clinical trials. There is no explanation for the algorithm or syntax. |
N/A |
Implemented |
artificial healthcare, Parallel healthcare system, IVRS, parallel execution |
[74] |
Not Available |
There is only a brief explanation of the method and the findings of the prototype implementation, which is mostly theoretical. |
Consortium blockchain technology |
Proposed |
proposed proof of familiarity(PoF), API |
[75] |
Proposed protocol privacy-preserving and Secure PHI sharing BSPP |
Algorithm notations, system architecture, and protocol implementation, and performance assessment findings are all detailed. |
Private, Consortium |
Implemented |
Bilinear maps, Consensus mechanism |
[28] |
Case study involves |
Through a case study, a detailed explanation of the proposed architecture and process is provided. There are no experiments or discussions on the algorithm or syntax. |
Ethereum technology |
Proposed |
Oauth, Public-key cryptography—sign then encrypt mechanism, Solidity smart contract, FHIR, |
[76] |
Not Available |
There is not much explanation of the algorithm, but there are a lot of details about the experiment that was done to verify the system’s feasibility. |
IOTA Tangle (DLT) |
Implemented |
(MAM) Masked authenticated messaging, GPS, IoT integration |
[77] |
Not Available |
Algorithm creation and performance assessment for processing time and transaction verification are discussed. |
Ethereum technology |
Implemented |
MIStore, PBFT |