  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Fusion: Practice and Applications</full_title>
  <abbrev_title>FPA</abbrev_title>
  <issn media_type="print">2692-4048</issn>
  <issn media_type="electronic">2770-0070</issn>
  <doi_data>
   <doi>10.54216/FPA</doi>
   <resource>https://www.americaspg.com/journals/show/2787</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2018</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2018</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia </organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sultan</given_name>
    <surname>Sultan</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Technology, University of the Cumberlands, Williamsburg, KY, USA</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Santosh Reddy</given_name>
    <surname>Addula</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Olayan</given_name>
    <surname>Alharbi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, Faculty of Computer and Information Systems, Islamic University of Madinah, Medinah, 42351, Saudi Arabia </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Zaid</given_name>
    <surname>Alzaid</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">IT Programs Center, Faculty of IT Department, Institute of Public Administration, Riyadh, 11141, Saudi Arabia </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Yasser M.</given_name>
    <surname>Hausawi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author"> Department of Computer Science, College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jaber</given_name>
    <surname>Almutairi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The Internet of Medical Things (IoMT) has paved the way for innovative approaches to collecting and managing medical data. With the large and sensitive medical data being processed hence, the need for a strong identity and privacy become necessary. The present paper suggests a comprehensive method of PriMedGuard which aims at protection of the personal medical information. The first stage will be data collection from devices and sensors, then data cleaning to transform the data into the required format. There is also a safety system in the system that registers and authenticates authorized entities as well as ETDO (Enhanced Tasmanian Devil Optimization algorithm) is used for generating asymmetric cryptographic keys. The data is encrypted using the Secure Bit-Count Transmutation (SBCT) Data Encryption Algorithm and then put in the locations provided by the InterPlanetary File System (IPFS), a decentralized and distributed storage system. A safe smart contract on the blockchain is created so that the data retrieval is secure and MedSecEnsemble Detection is proposed as an intrusion detection technique in the IoMT network. By using this method, data will stay available while at the same time integrity, confidentiality and protection against vulnerabilities are ensured. Hence, the Internet of Medical Things ecosystem will be secured from unauthorized access and possible security threats…</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>152</first_page>
   <last_page>170</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/FPA.160111</doi>
   <resource>https://www.americaspg.com/articleinfo/3/show/2787</resource>
  </doi_data>
 </journal_article>
</journal>
