Skip to main content
. 2022 Apr 11;17(4):e0266462. doi: 10.1371/journal.pone.0266462

Table 3. Comprehensive description of reviewed studies.

Ref Methods Description Channel Proposed / Implemented Components
[45] Public blockchain Details about the algorithm are provided. multi-tier, public Implemented PBEDA, ECDH, MVP, and ECDSA
[46] MAM is used for real-time broadcasting activity via wearable’s Algorithm details are provided. IOTA Implemented Masked Authenticated Messaging for Tangle, Merkle hash technique, Merkle signature scheme, One-time signature
[47] Computing Edge There was little information available on the outcomes and efficiency. The channel was Ethereum Proposed WSN and Wireless sensor network controller v.2, computing Edge
[48] Not Available MedRec was used to do a cost analysis, but no algorithm or data were given. The channel was Ethereum Proposed Ethereum Go-client, QuorumChain algorithm, classification, smart contracts, cipher manager, proxy re-encryption
[49] UID system Details about the algorithm are not provided. Ethereum channel Proposed UID system, analytics of Big Data, history & registration contract
[50] Not Available Details of the algorithm are provided, along with security margins that have been verified against defined criteria. The channel was Bitcoin Proposed Internet of Things, Merkle tree, Diffie–Hellman key exchange, and digital ring signature
[51] Not Available Details about the algorithm are provided. The channel was Consortium Implemented Practical Byzantine fault tolerance consensus mechanism,
[52] PSO Performance results from a static study based on specific assessment criteria N/A Implemented ADB, boosting for ML, reverse engineering, feature selection & extraction
[53] Not Available Details about the algorithm are not provided. no experiments. Federated blockchain Proposed IoT sensors WBANs, oracle
[54] Proposed signature scheme based on Attribute Details of mathematical and computational notations given for execution of scheme, performance, and security evaluation Not Available Implemented Diffie-Hellman computational bilinear, MA-ABS scheme
[55] With the support of a genetic algorithm Proposed access control method based on blockchain In terms of input and output strings, block creation, time processing, detailed simulation results are provided. N/A Implemented Genetic algorithm, hash key cryptography, MD5 strings, discrete wavelet transforms.
[56] The proposed Blockchain-based eHealth Integrity Model uses a design-science methodology. The integrity-verification algorithm’s details and test results have been released. Permissioned blockchain Implemented Byzantine Fault in Practice Algorithm for tolerant consensus
[57] (HAR) Methods for recognizing human activity based on a uni model Some mathematical notations and comprehensive findings for performance reassessment studies on three datasets have been given. N/A Implemented For HAR (ECOC) framework, (SVM), Multi-class cooperative categorization technique, fog computing
[33] Not Available For performance evaluation, precise mathematical and algorithmic notations are supplied, as well as the outcomes of experiments. N/A Implemented The Merkle tree with order-preserving encryption
[59] Not Available The applicability of blockchain in healthcare is discussed using a concept-based approach. N/A Proposed Environment based on the blockchain
[60] Preprocessing of images Details on the experimental results, classification training, and testing outcomes were given. Bitcoin Implemented HOG, LBP, SVM, RFT, DNN
[61] Pearson’s correlation, compression ratio technique The compression ratio and stability performance testing results were given. N/A Implemented (BAQALC) proposed, (NGS), (SRA), LZW modification
[62] Methods of authentication Details on the algorithm and how it performs in areas of operational costs were given. Ethereum Implemented primitiveness verification (PV), preservation Submission
[63] Method of the primal-dual Varangian The performance study results of a strategy for achieving Stackelberg equilibrium were disclosed. N/A Implemented three-layer (Hierarchical architecture), edge computing
[64] Machine Learning(ML) In place of simulation, experiment-based assessment, the proposed architecture is presented through workflow examples. Exonum Proposed Inbreeding coefficient, DNN predictor, data temporal value, LifePound (utility crypto token)
[65] Not Available There are just a few algorithmic notations, but comprehensive findings for Apache JMeter performance evaluation are supplied. N/A Implemented Merkle tree, timestamped algorithm, Keyless signature infrastructure
[66] Not Available Code scripts, access control methods, and performance assessment findings for access control and network overheads are all shared. Permissioned blockchain on Ethereum Implemented (IPFS), (ABE), mobile cloud
[67] Not Available For performance evaluation on many parameters, details of algorithmic notations are given together with findings. Permissioned blockchain on Ethereum Implemented MediBChain protocol, (ECC)
[68] Not Available For performance parameters, there are just a few algorithmic notations, but extensive simulation results are supplied N/A Implemented The one-time transaction, Ring signature algorithm, stealth address, Cryptonote protocol
[69] Not Available For numerous parameters, with the discussion of outcomes, there are few algorithmic notations from experiment-based and theoretical mathematical results Permissioned blockchain Implemented consensus algorithm BFT smart, ECC, MedChain, modified digest algorithm
[70] Not Available For simulated security analysis and performance evaluation, few explained algorithmic notation results are used. Blockchain technology Hyper ledger Implemented SIFF
[71] Generating Sessional symmetric key An in-depth look into simulated performance and security assessments. Custom bitcoin and Ethereum Implemented PUA, Trei tree, mutual authentication protocol, HMAC
[72] Not Available There are no experimental or simulation test results, but algorithmic notations and the syntax are described with analysis of specified security. Consortium blockchain Implemented ABE and IBE, proposed d identity-based combine attribute, identity-based signature, signature, and encryption
[73] Not Available There was only a brief discussion of the outcomes of simulated blockchain-based clinical trials. There is no explanation for the algorithm or syntax. N/A Implemented artificial healthcare, Parallel healthcare system, IVRS, parallel execution
[74] Not Available There is only a brief explanation of the method and the findings of the prototype implementation, which is mostly theoretical. Consortium blockchain technology Proposed proposed proof of familiarity(PoF), API
[75] Proposed protocol privacy-preserving and Secure PHI sharing BSPP Algorithm notations, system architecture, and protocol implementation, and performance assessment findings are all detailed. Private, Consortium Implemented Bilinear maps, Consensus mechanism
[28] Case study involves Through a case study, a detailed explanation of the proposed architecture and process is provided. There are no experiments or discussions on the algorithm or syntax. Ethereum technology Proposed Oauth, Public-key cryptography—sign then encrypt mechanism, Solidity smart contract, FHIR,
[76] Not Available There is not much explanation of the algorithm, but there are a lot of details about the experiment that was done to verify the system’s feasibility. IOTA Tangle (DLT) Implemented (MAM) Masked authenticated messaging, GPS, IoT integration
[77] Not Available Algorithm creation and performance assessment for processing time and transaction verification are discussed. Ethereum technology Implemented MIStore, PBFT