Abstract
In developed countries, it is frequent for family members do not have the time, knowledge, or live in a close distance of their senior loved ones, so that many institutions offer their services to provide a good quality of life of older adults. To enable distributed local support, there is the need of digital platforms to allow the exchange of information. These platforms need to create trustful environments and to guarantee the integrity of the information exchanged. In this paper, it is presented a solution for a Logging Service that was developed for the SOCIAL platform, based on FHIR, which aims to solve the interoperability and data integrity of the platform user’s activity logs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chiarini, G., Ray, P., Akter, S., Masella, C., Ganz, A.: MHealth technologies for chronic diseases and elders: A systematic review. IEEE J. Sel. Areas Commun. 2(9), 6–18 (2013)
Abegunde, D.O., Mathers, C.D., Adam, T., Ortegon, M., Strong, K.: The burden and costs of chronic diseases in low-income and middle-income countries. Lancet 370(9603), 1929–1938 (2007)
WHO global strategy on people-centred and integrated health services. WHO (2015)
Blobel, B.: Co-production of health enabled by next generation personal health systems. Stud. Health Technol. Inform. 177, 52–58 (2012)
Hägglund, M., Scandurra, I., Koch, S.: Studying intersection points - an analysis of information needs for shared homecare of elderly patients. J. Inf. Technol. Healthc. 7(1), 23–42 (2009)
Sousa, M., Arieira, L., Queirós, A., Martins, A.I., Rocha, N.P., Augusto, F., Duarte, F., Neves, T., Damasceno, A.: SOCIAL platform. In: Advances in Intelligent Systems and Computing, vol. 746, pp. 1162–1168 (2018)
Rigby, M.: Integrating health and social care informatics to enable holistic health care. Stud. Health Technol. Inform. 177, 41–51 (2012)
King, J., Williams, L.: Log your CRUD: design principles for software logging mechanisms. In: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS 2014), pp. 5–15, ACM, Raleigh (2014)
Zhao, X., Rodrigues, K., Luo, Y., Stumm, M., Yuan, D., Zhou, Y.: The game of twenty questions: do you know where to log? In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS 2017), pp. 125–131. ACM, Whistler (2017)
Yang, K.: Aggregated containerized logging solution with Fluentd, Elasticsearch and Kibana. Int. J. Comput. Appl. 150(3), 29–31 (2016)
Stackify, Retrace. https://stackify.com/retrace/. Accessed 22 Oct 2018
Sekharan, S.S., Kandasamy, K.: Profiling SIEM tools and correlation engines for security analytics. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 717–721. IEEE, Chennai (2017)
Okumura, M., Fujimura, S.: Constructing a log collecting system using using splunk and its application for service support. In: Proceedings of the 2016 ACM on SIGUCCS Annual Conference (SIGUCCS 2016), pp. 103–106. ACM, Denver (2016)
Hartung, G.: Secure audit logs with verifiable excerpts. In: Topics in Cryptology - CT-RSA, pp. 183–199. Springer International Publishing (2016)
Ning, F., et al.: Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. In: 36th IEEE International Performance Computing and Communications Conference, pp. 1–9. IEEE, San Diego (2017)
Lin, C.-Y., et al.: Secure logging framework integrating with cloud database. In: 2015 International Carnahan Conference on Security Technology, pp. 13–17. IEEE, Taipei (2015)
Aniello, L., Baldoni, R., Gaetani, E., Lombardi, F., Margheri, A., Sassone, V.: A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. In: 13th IEEE European Dependable Computing Conference, pp. 151–154. IEEE, Geneva (2017)
Zawoad, S., et al.: FAL: a forensics aware language for secure logging. In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, pp. 1579–1586 (2013)
Rajalakshmi, J., et al.: Anonymizing log management process for secure logging in the cloud. In: 2014 International Conference on Circuit, Power and Computing Technologies, pp. 1559–1564. IEEE, Kanyakumari (2014)
Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)
Magyar, G.: Blockchain: solving the privacy and research availability tradeoff for EHR data: a new disruptive technology in health data management. In: IEEE 30th Neumann Colloquium (NC), pp. 135–140. IEEE, Budapest (2017)
Zhang, P., et al.: FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)
Acknowledgements
This work was supported by Sistema de Incentivos à Investigação e Desenvolvimento Tecnológico (SI I&DT) of the Programa Portugal 2020, through Programa Operacional Competitividade e Internacionalização and/or Programa Operacional do Centro do FEDER - Fundo Europeu de Desenvolvimento Regional, under Social Cooperation for Integrated Assisted Living (SOCIAL), project number 017861.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Rosa, M., Barraca, J.P., Rocha, N.P. (2019). Logging Integrity with Blockchain Structures. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 932. Springer, Cham. https://doi.org/10.1007/978-3-030-16187-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-16187-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16186-6
Online ISBN: 978-3-030-16187-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)