Skip to main content

Systematic Literature Review of Methods for Maintaining Data Integrity

  • Conference paper
  • First Online:
Advances in Model and Data Engineering in the Digitalization Era (MEDI 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1481))

Included in the following conference series:

Abstract

Diverse data is collected in health care for secondary usage. However, this data is collected by various parties and processed by numerous information systems. Hence, to get reliable results, the data integrity must be maintained. This paper aims to discover applications that are introduced to ensure the integrity of the data collected in different fields including the medical field. The Systematic Literature Review method is used in this research to map the appropriate methods for future studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abu Rayyan, L., Hacid, H., Leoncé, A.: Towards an end-user layer for data integrity. In: IEEE/WIC/ACM International Conference on Web Intelligence, WI 2019, pp. 317–320. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3350546.3352538

  2. Ajayi, O., Abouali, M., Saadawi, T.: Secure architecture for inter-healthcare electronic health records exchange. In: 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–6 (2020). https://doi.org/10.1109/IEMTRONICS51293.2020.9216336

  3. Al-Abbasi, L., El-Medany, W.: Blockchain security architecture: a review technology platform, security strength and weakness. In: 2nd Smart Cities Symposium (SCS 2019), pp. 1–5 (2019). https://doi.org/10.1049/cp.2019.0190

  4. Ashraf Uddin, M., Stranieri, A., Gondal, I., Balasubramanian, V.: Dynamically recommending repositories for health data: a machine learning model. In: Proceedings of the Australasian Computer Science Week Multiconference. ACSW 2020, Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3373017.3373041

  5. Cherupally, S.R., Boga, S., Podili, P., Kataoka, K.: Lightweight and scalable DAG based distributed ledger for verifying IoT data integrity. In: 2021 International Conference on Information Networking (ICOIN), pp. 267–272 (2021). https://doi.org/10.1109/ICOIN50884.2021.9334000

  6. Garagad, V.G., Iyer, N.C., Wali, H.G.: Data integrity: a security threat for internet of things and cyber-physical systems. In: 2020 International Conference on Computational Performance Evaluation (ComPE), pp. 244–249 (2020). https://doi.org/10.1109/ComPE49325.2020.9200170

  7. Ismail, L., Materwala, H.: BlockHR: a blockchain-based framework for health records management. In: Proceedings of the 12th International Conference on Computer Modeling and Simulation, ICCMS 2020, pp. 164–168. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3408066.3408106

  8. Ismail, L., Materwala, H., Khan, M.A.: Performance evaluation of a patient-centric blockchain-based healthcare records management framework. In: Proceedings of the 2020 2nd International Electronics Communication Conference, IECC 2020, pp. 39–50. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3409934.3409941

  9. Jabbar, R., Fetais, N., Krichen, M., Barkaoui, K.: Blockchain technology for healthcare: enhancing shared electronic health record interoperability and integrity. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 310–317 (2020). https://doi.org/10.1109/ICIoT48696.2020.9089570

  10. Kanimozhi, E.A., Suguna, M., Mercy Shalini, S.: Immediate detection of data corruption by integrating blockchain in cloud computing. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), pp. 1–4 (2019). https://doi.org/10.1109/ViTECoN.2019.8899394

  11. Kim, D., Jo, J., Kwak, J.: KSI based sensitive data integrity validation method for precision medicine system. In: 2019 International Conference on Platform Technology and Service (PlatCon), pp. 1–5 (2019). https://doi.org/10.1109/PlatCon.2019.8668964

  12. Kim, J., Kim, M.: Intelligent mediator-based enhanced smart contract for privacy protection. ACM Trans. Internet Technol. 21(1) (2021). https://doi.org/10.1145/3404892

  13. Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering (2007)

    Google Scholar 

  14. Koscina, M., Manset, D., Negri Ribalta, C., Perez, O.: Enabling trust in healthcare data exchange with a federated blockchain-based architecture. In: IEEE/WIC/ACM International Conference on Web Intelligence - Companion Volume, WI 2019 Companion, pp. 231–237. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3358695.3360897

  15. Lai, C., Wan, J., Zheng, D.: Dual privacy-preserving health data aggregation scheme assisted by medical edge computing. In: 2020 IEEE/CIC International Conference on Communications in China (ICCC), pp. 154–159 (2020). https://doi.org/10.1109/ICCC49849.2020.9238932

  16. Li, Y., Yu, Y., Chen, R., Du, X., Guizani, M.: IntegrityChain: provable data possession for decentralized storage. IEEE J. Sel. Areas Commun. 38(6), 1205–1217 (2020). https://doi.org/10.1109/JSAC.2020.2986664

    Article  Google Scholar 

  17. Manu, S.R., Bhaskar, G.: Securing sensitive data in body area sensor network using blockchain technique. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 1–5 (2020). https://doi.org/10.1109/ICCES48766.2020.9137912

  18. Morano, F., Ferretti, C., Leporati, A., Napoletano, P., Schettini, R.: A blockchain technology for protection and probative value preservation of vehicle driver data. In: 2019 IEEE 23rd International Symposium on Consumer Technologies (ISCT), pp. 167–172 (2019). https://doi.org/10.1109/ISCE.2019.8900982

  19. Nirjhor, M.K.I., Yousuf, M.A., Mhaboob, M.S.: Electronic medical record data sharing through authentication and integrity management. In: 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 308–313 (2021). https://doi.org/10.1109/ICREST51555.2021.9331010

  20. Parthiban, K., Nataraj, R.V.: An efficient architecture to ensure data integrity in ERP systems. In: 2019 5th International Conference on Advanced Computing Communication Systems (ICACCS), pp. 236–241 (2019). https://doi.org/10.1109/ICACCS.2019.8728352

  21. Patil, A., Jha, A., Mulla, M.M., Narayan, D.G., Kengond, S.: Data provenance assurance for cloud storage using blockchain. In: 2020 International Conference on Advances in Computing, Communication Materials (ICACCM), pp. 443–448 (2020). https://doi.org/10.1109/ICACCM50413.2020.9213032

  22. Rahman, M.S., Khalil, I., Mahawaga Arachchige, P.C., Bouras, A., Yi, X.: A novel architecture for tamper proof electronic health record management system using blockchain wrapper. In: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2019, pp. 97–105. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3327960.3332392

  23. Ramkumar, M.: A blockchain based framework for information system integrity. China Commun. 16(6), 1–17 (2019). https://doi.org/10.23919/JCC.2019.06.001

  24. Reniers, V., et al.: Authenticated and auditable data sharing via smart contract. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, SAC 2020, pp. 324–331. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3341105.3373957

  25. Kumar, N.: Cloud-based secure personal health record management system using mixnode and blockchain. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 70–75 (2020). https://doi.org/10.1109/WorldS450073.2020.9210317

  26. Roisum, H., Urizar, L., Yeh, J., Salisbury, K., Magette, M.: Completeness integrity protection for outsourced databases using semantic fake data. In: 2019 4th International Conference on Communication and Information Systems (ICCIS), pp. 222–228 (2019). https://doi.org/10.1109/ICCIS49662.2019.00046

  27. Shekhawat, H., Sharma, S., Koli, R.: Privacy-preserving techniques for big data analysis in cloud. In: 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), pp. 1–6 (2019). https://doi.org/10.1109/ICACCP.2019.8882922

  28. Shrivastava, S., Srikanth, T.K., Dileep, V.S.: E-governance for healthcare service delivery in india: challenges and opportunities in security and privacy. In: Proceedings of the 13th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2020, pp. 180–183. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3428502.3428527

  29. Shu, J., Zou, X., Jia, X., Zhang, W., Xie, R.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. (2021). https://doi.org/10.1109/TCC.2021.3051622

  30. Sivagnanam, S., Nandigam, V., Lin, K.: Introducing the open science chain: Protecting integrity and provenance of research data. In: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), PEARC 2019. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3332186.3332203

  31. Sun, J., Yao, X., Wang, S., Wu, Y.: Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8, 59389–59401 (2020). https://doi.org/10.1109/ACCESS.2020.2982964

    Article  Google Scholar 

  32. Verma, G.K., Singh, B.B., Kumar, N., Kaiwartya, O., Obaidat, M.S.: PFCBAS: Pairing free and provable certificate-based aggregate signature scheme for the e-healthcare monitoring system. IEEE Syst. J. 14(2), 1704–1715 (2020). https://doi.org/10.1109/JSYST.2019.2921788

    Article  Google Scholar 

  33. Wang, H., Xu, C., Zhang, C., Xu, J.: Vchain: A blockchain system ensuring query integrity. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. SIGMOD 2020, pp. 2693–2696. Association for Computing Machinery, New York (2020).https://doi.org/10.1145/3318464.3384682

  34. Wang, Q., Zhou, F., Zhou, B., Xu, J., Chen, C., Wang, Q.: Privacy-preserving publicly verifiable databases. IEEE Trans. Dependable and Secur. Comput. (2020). https://doi.org/10.1109/TDSC.2020.3032961

  35. Wang, S., Zhang, D., Zhang, Y.: Blockchain-based personal health records sharing scheme with data integrity verifiable. IEEE Access 7, 102887–102901 (2019). https://doi.org/10.1109/ACCESS.2019.2931531

    Article  Google Scholar 

  36. Wibowo, S., Sandikapura, T.: Improving data security, interoperability, and veracity using blockchain for one data governance, case study of local tax big data. In: 2019 International Conference on ICT for Smart Society (ICISS), vol. 7, pp. 1–6 (2019). https://doi.org/10.1109/ICISS48059.2019.8969805

  37. Yang, Y., Wei, L., Wu, J., Long, C.: Block-SMPC: a blockchain-based secure multi-party computation for privacy-protected data sharing. In: Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, ICBCT 2020, pp. 46–51. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3390566.3391664

Download references

Acknowledgements

This work has been partially conducted in the project “ICT programme” which was supported by the European Union through the European Social Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marten Kask .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kask, M., Piho, G., Ross, P. (2021). Systematic Literature Review of Methods for Maintaining Data Integrity. In: Bellatreche, L., Chernishev, G., Corral, A., Ouchani, S., Vain, J. (eds) Advances in Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481. Springer, Cham. https://doi.org/10.1007/978-3-030-87657-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87657-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87656-2

  • Online ISBN: 978-3-030-87657-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics