By Topic

Development of data authenticity verification system in regional health information network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Zhou Tian-shu ; Healthcare Inf. Eng. Res. Center, Zhejiang Univ., Hangzhou, China ; Li Jing-song ; Zhang Xiao-guang ; Hu Zhen
more authors

A diverse child nodes hash tree method was proposed to make the digest structure more flexible, improving the data authenticity verification efficiency in regional health information network which has a great number of medical documents. The new hash tree method changes the former hash list from one-layer digest to a tree structure, using category search to enormously accelerate verification processes, and locating multi-ldquoerror filerdquo at the same time. According to the current hardware, we designed experiments to obtain the curves of ldquohash tree computing time-child nodesrdquo and ldquohash tree verification time-child nodesrdquo. Based on the two curves, a weight analysis method was proposed to determine the number of child nodes, making the entire system more efficient. By increasing a small amount of data redundancy, the diverse child nodes hash tree method greatly enhances the verification efficiency.

Published in:

IT in Medicine & Education, 2009. ITIME '09. IEEE International Symposium on  (Volume:1 )

Date of Conference:

14-16 Aug. 2009