Ibook - Pub Applications of Blockchain in Healthcare
Ibook - Pub Applications of Blockchain in Healthcare
Suyel Namasudra
Ganesh Chandra Deka Editors
Applications
of Blockchain
in Healthcare
Studies in Big Data
Volume 83
Series Editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
The series “Studies in Big Data” (SBD) publishes new developments and advances
in the various areas of Big Data- quickly and with a high quality. The intent is to
cover the theory, research, development, and applications of Big Data, as embedded
in the fields of engineering, computer science, physics, economics and life sciences.
The books of the series refer to the analysis and understanding of large, complex,
and/or distributed data sets generated from recent digital sources coming from
sensors or other physical instruments as well as simulations, crowd sourcing, social
networks or other internet transactions, such as emails or video click streams and
other. The series contains monographs, lecture notes and edited volumes in Big
Data spanning the areas of computational intelligence including neural networks,
evolutionary computation, soft computing, fuzzy systems, as well as artificial
intelligence, data mining, modern statistics and Operations research, as well as
self-organizing systems. Of particular value to both the contributors and the
readership are the short publication timeframe and the world-wide distribution,
which enable both wide and rapid dissemination of research output.
The books of this series are reviewed in a single blind peer review process.
Indexed by zbMATH.
All books published in the series are submitted for consideration in Web of Science.
Applications of Blockchain
in Healthcare
Editors
Suyel Namasudra Ganesh Chandra Deka
Department of Computer Science and Directorate General of Training
Engineering Ministry of Skill Development and
National Institute of Technology Patna Entrepreneurship
Patna, Bihar, India Government of India
New Delhi, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore
Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
Nowadays, there are many hackers and malicious users over the internet. So, confi-
dential and sensitive data face security and privacy issues. Blockchain is a novel
technique to solve these issues, which allows a radical way of transaction among
several entities, such as businesses, individuals and machines. Blockchain can be
defined as a Distributed Ledger Technology (DLT) that secures and records transac-
tions in a Peer to Peer (P2P) network instead of using single or many servers. Here,
each record is saved on many interconnected systems, which keep the identical
information. In Blockchain, numerous transactions of value exchange are grouped
into several blocks, and each block is linked to the previous block and information
is immutably recorded across a P2P network by each block. Bitcoin is one of the
well-known applications of Blockchain. Blockchain has many applications, such as
healthcare, finance, Internet of Things (IoT), data storage and many more.
Health information about any patient is very critical, and currently, health records
are saved in the databases controlled by individual user or organization or large
groups of organizations. As there are many malicious users, these information are
not shared with other organizations due to security issues and chance of the data being
modified or tampered. Blockchain can be used to securely exchange healthcare data,
which can be accessed by organizations sharing the same network, allowing doctors
and practitioners to provide better care for patients. The key properties of decentral-
ization, such as immutability and transparency improve healthcare interoperability.
As estimated by BRSofTech (www.brsoftech.com), the healthcare market of DLT
will be worth $829 Million by 2023.
This book discusses the core concepts of Blockchain as well as its applications
in healthcare. Chapter 1 discusses healthcare data management by using Blockchain
technology. Chapter 2 is an analytical study to modernize the healthcare industry by
using Blockchain technology, while Chap. 3 deliberates upon security, privacy, trust
management and performance optimization of Blockchain Technology. Chapter 4
discusses securing healthcare data by using Blockchain. Chapters 5–7 deal with the
case studies of Blockchain in healthcare by using different novel technologies, such
as IoT. Chapter 8 represents a supply chain process to detect fake drug by using
Blockchain technology. Chapter 9 is a study on Blockchain technology to accelerate
v
vi Preface
research in life sciences. Finally, Chap. 10 concludes the book by discussing chal-
lenges and future work directions in healthcare data management using Blockchain
technology.
vii
viii Contents
ix
x Editors and Contributors
Contributors
S. Bittins
Fraunhofer FOKUS, Berlin, Germany
e-mail: [email protected]
G. Kober · M. Masi (B) · A. Miladi
Tiani “Spirit” GmbH, Vienna, Austria
e-mail: [email protected]
G. Kober
e-mail: [email protected]
A. Miladi
e-mail: [email protected]
A. Margheri · V. Sassone
University of Southampton, Southampton, UK
e-mail: [email protected]
V. Sassone
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 1
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_1
2 S. Bittins et al.
1.1 Introduction
start crowdfunding (i.e. creating a financial ecosystem over the selling of cryptocur-
rencies). The variety of such eHealth cases (Shoeb 2018) has not yet led to a clear
impact on the eHealth industry. Blockchain data management solutions are instead
emerging to deal with the integration of data silos. In fact, despite many established
eHealth interoperability initiatives,2 medical record data is still siloed within hos-
pitals (Miriam 2017). Those silos may increase in dimensions (e.g. encompassing
the whole EU continent (European Commission 2019), or the USA (The Sequoia
Project 2019)), but interoperability at global scale is not yet a reality. In such a con-
text, the application of blockchain can support the development of sharing practices
to overcome the challenges posed by the distribution of data. At the same time,
blockchain-based management of healthcare data poses compelling privacy-related
questions (Staff 2019).
This chapter reports the analysis and design of a blockchain-based architecture for
healthcare systems. By building on established international standards for healthcare
data sharing (e.g. Fast Healthcare Interoperability Resources (FHIR) and Integrat-
ing the Healthcare Enterprise (IHE)), the requirements to drive the development
of a blockchain-based architecture for health data exchange are discussed. These
requirements are put in practice on a blockchain data sharing architecture featur-
ing automated data provenance and credential verification. The presented high-level
architecture is then applied to organ transplant scenario in order to enhance trans-
parency and accountability of current practices. The current legal frameworks are
discussed to contextualise the blockchain challenges and opportunities with respect
to the emerging needs of the health sector.
Structure of the Chapter. Section 1.2 introduces the technology underpinning
the management and sharing of health information. Section 1.3 reports on how
blockchain complements and innovates such foundational technology. Section 1.4
outlines a healthcare case study on organ transplant. Section 1.5 presents the
blockchain architecture for enhanced healthcare services, its specialisation on the
case study and an implementation roadmap. Section 1.6 discusses upon legal aspects
and patient centricity in deploying blockchain-based services. Section 1.7 touches
upon future work and concludes.
Research on innovative and more efficient ways to share medical data among clin-
ics and hospitals started in the 1960s (Kim et al. 2019). After several decades of
research efforts and results, techniques and technologies have been consolidated.
Hence, standardisation organisations started to build interoperable services for the
exchange of medical data. However, after many years of standardisation efforts, we
2 See the IHE (Integrating the Healthcare Enterprise 2020), HL7 (Health Level 7 2020), DICOM (The
are far from achieving global Electronic Health Record (EHR) sharing: data is still
locked in silos (Miriam 2017).
It is also worth noting that healthcare return of investments is typically over a multi-
year period. For example, the design of the European sharing of patient summary
started in 2008, with first production deployment in 2018. Indeed, the healthcare
context requires incremental innovation so not to affect already existing services.
In the following, the EHRs and relevant standards are introduced (Sect. 1.2.1).
Then, the main challenges of dealing with data silos are discussed (Sect. 1.2.2),
followed by the main international initiatives in this context (Sect. 1.2.3).
3A domain is an application context of IHE profiles. At the moment of writing, IHE is composed
by 11 domains, including eye care, cardiology, quality, research and public health.
1 Healthcare Data Management by Using Blockchain Technology 5
The profiles are grouped according to their domain into technical frameworks and,
when published, are implemented by vendors. Connect-a-thons events are organised
by IHE to experimentally validate the interoperability of the implementation of the
profile between vendors’ products. Information on successfully integrated products is
released to the public and typically used by health sector policymakers, IT architects
and project managers to use and create tenders.
The IHE methodology is endorsed by (i) the European Commission (Decision
2015/1302 and Recommendation 2019/800) as the European Electronic Health
Record Exchange Format; (ii) the World Health Organization with the guide-
line: “Recommendations on Digital Interventions for Health System Strengthening”
(World Health Organisation 2019); and (iii) the USA by the Department of Health
and Human Services Interoperability Standards Advisory (Official Website of The
Office of the National Coordinator for Health Information Technology (ONC) 2020).
Cross-Enterprise Document Sharing. The core of the IHE IT infrastructure is
the Cross-Enterprise Document Sharing (XDS) model. Logically, the XDS model
defines (i) a registry containing searchable meaningful (meta)data of documents; (ii)
a repository of where the documents are physically stored; and (iii) consumers and
sources of the (meta)data and documents. Figure 1.2 shows the interactions between
the XDS profile actors. Interactions, known as transactions, define the messaging
between actors of the architecture.
XDS is an IHE profile upon which secure medical document exchanges can be
defined. XDS, together with the IHE security architectures, defines the technical
and integration requirements for laboratories and hospitals, for both facility and
6 S. Bittins et al.
national document exchanges. The key concept pursued by XDS is the so-called
affinity domain (IHE 2019): all enterprises participating in the document exchange
have agreed to work together using a common set of policies and share a common
infrastructure.
Challenge 1 Discovering the origin, and the full chain of custody of a medical
data handled by clinics spread across different siloed communities
In such distributed scenario, establishing trust across communities is a complex
issue. At the same time, outsourcing medical analysis (e.g. tissue and blood analysis)
to other laboratories is a common task for hospitals. Third-party accreditation can
guarantee trust on the medical processes carried out by each party. However, to
trust document sources and exchanged identities and credentials, a set of validation
processes must be in place.
Several national initiatives worldwide use IHE, including XDS and XCA, to manage
and exchange healthcare information. Some of them are outlined below.
The Austrian nationwide electronic health record sharing programme, ELGA
(Elektronische Gesundheitsakte) (ELGA GmbH 2017), is built upon IHE profiles and
connects regions across the country. Each hospital, doctor, pharmacy and care facility
having treatment relationships are connected and share medical data electronically.
ELGA is a distributed system, where each region is identified by an XCA gateway
acting as trust broker (Masi and Maurer 2010).
The Albanian Nationwide Electronic Health Record programme started in 2014
(Niaksu et al. 2017). Starting from a fragmented existing health information system
of poor quality and with no IT expertise, it successfully delivered a production-
state implementation in 2016. Similarly to the Austrian project, Albania uses XDS
and XCA over the public Internet to share records from the centralised data centre
located in the premises of the Ministry of Health, with other 79 organisations over
the country. It is worth noting that in this model the centralised data centre has a
view of different communities, including the European Space: Europe is seen as yet
another community to share data with, enabling Albanian patients to travel across
Europe potentially having access to their health data.
8 S. Bittins et al.
Seamless support for patient mobility across Europe is the aim of the pan-
European exchange of patient summaries. The European Commission started a plan
to establish the cross-border exchange of patient summaries and e-prescriptions
among member states (including Albania, Turkey, Switzerland and other stakehold-
ers) in the early 2000s. The first project that laid down the technical specifications
was the European Patients Smart Open Services (epSOS) project. With 25 mem-
ber states participating and more than 50 beneficiaries (Cross-border health project
epSOS 2014) (mostly governmental), epSOS was carried out between 2008 and 2014
and set up 16 pilots that exchanged test data.
In detail, the European architecture works similarly to the systems illustrated
above: each member state has an XCA gateway, named National Contact Point
for eHealth (NCPeH) (OpenNCP Community Home 2020). The trust is direct and
brokered: each hospital trusts only its own NCPeH, and every NCPeH is trusted
against the others. By using the NCPeH-to-NCPeH communication channels, the
member states can locate the data of a patient in their home country and use them in a
remote member state. The NCP network is under production, and it is governed by the
eHealth Digital Service Infrastructure (European Commission 2019) to coordinate
activities among member states.
In the USA, the introduction of the Healthcare Insurance Portability and Account-
ability Act(HIPAA) (Centers for Medicare & Medicaid Services 1996) of 1996, and
the Health Information Technology for Economic and Clinical Health (HITECH)
(HITECH Act Enforcement Interim Final Rule 2009) Act of 2009, established the
legal foundation for eHealth services. Many initiatives started to address the data silos
challenges; e.g. the BlueButton (Mohsen and Aziz 2015) had the aim to allow patients
to download all their medical history onto removable media. Despite the remark-
able innovation, the solution was error-prone and lacking usability (i.e. patients are
required to bring the removable media along). In 2011, the first implementation of the
Nationwide Health Information Network (NwHIN) was made available (Bouhaddou
et al. 2012; Kuperman et al. 2010) to enable seamless healthcare document shar-
ing across the USA. Similarly to the European Architecture, it is a fully distributed
network where each NwHIN community is an XCA community.
Given the similarities among the two projects, the European Commission and
the Department of Homeland Security started the Trillium Bridge project (Trillium
Bridge II 2020), whereby two gateways implement the necessary semantic transla-
tions to achieve interoperability between the European and North American health-
care systems.4
Therefore, IHE is a set of worldwide technical and organisational guidelines
widely applied in production in many countries and unions.
4 This is now achieved by using the International Patient Summary (IHE Developing Integration
Profile for the International Patient Summary 2020).
1 Healthcare Data Management by Using Blockchain Technology 9
5 See
the HL7 FHIR standard that uses a mapping to PROV to embody provenance information in
FHIR resources.
10 S. Bittins et al.
sor in distributed sensor network) is key assets for offering a trustworthy service
by other system entities. In healthcare, provenance is defined by the US Office
of the National Coordinator for Health Information Technology, “attributes about
the origin of health information at the time it is first created and tracks the uses
and permutations of the health information over its lifecycle” (Data Provenance
Glossary 2016). Thus, provenance can offer the means to reconstruct the clinical
context within which medical documents were created or updated.
Figure 1.3 illustrates how blockchain can be applied and integrated with existing
healthcare systems to introduce a transparent provenance management (Margheri
et al. 2020). The architecture integrates with XDS to annotate all XDS transactions
(i.e. all exchanged medical documents) with provenance documents written in PROV.
The creation and retrieval of the provenance documents are fully transparent and
automated. By introducing the so-called PROV Proxy, all the XDS read (Query and
Retrieve) and write (Provide and Register) document transactions are intercepted
and manipulated.
When PROV Proxy intercepts write transactions (i.e. the “Provide and Register”
arrow in Fig. 1.3), it collects the metadata of the document (e.g. author, hash, locality,
action performed) and triggers the creation of the corresponding PROV document.
The PROV documents so generated are based on standard templates compiled by a
smart contract and stored on the blockchain. The use of templates is advocated to
tailor provenance annotation to the needs of each project (Curcin et al. 2017), e.g. to
enable ontology-based processing and reasoning.
The provenance documents stored on a blockchain do not contain any patient-
related medical information. Instead, the blockchain smart contract only uses hash
indexes that correspond to the canonicalised signatures of the medical documents. It
follows that when the PROV Proxy intercepts a read transaction (i.e. the “Query and
Retrieve” arrow in Fig. 1.3), it computes the hash index of the contained document
1 Healthcare Data Management by Using Blockchain Technology 11
and uses it to query the blockchain to retrieve the corresponding PROV document.
Notably, these provenance functionalities are controlled and regulated by patient-
informed consent authorisation policies of XDS. In this way, provenance documents
can be linked to a patient’s medical document only if the consumer of the document
(say a doctor) is entitled to retrieve the said document.
Therefore, this blockchain architecture enhances siloed communities with auto-
mated creation and retrieval of provenance information to attach clinical context to
exchanged patients’ records. These functionalities contribute to addressing Chal-
lenge 1 above by reconstructing the full medical documents’ custody chain.
source validation for healthcare bodies and patients. More specifically, integrating
SSI with XCA gateways allows to address Challenge 2 by introducing a distributed
mechanism to verify, in an automated manner and with confidence, the credentials
of, say, laboratories and professionals across communities.
Data sharing has become fundamental to enable new and innovative healthcare ser-
vices. Data sharing has indeed enabled ubiquitous care services, from remote mon-
itoring to multi-country healthcare networks. Development of such networks for
organ donation and transplant processes are recent and prominent initiatives.
Organ donation is when a person consents to remove legally organs of theirs,
either lively (by donating a portion of an organ like liver or kidneys), or in case of
death (deceased donation), by the next of kin. Donated organs are given to someone
in the need of transplant, eventually saving their lives.
Organs are donated mostly from deceased donors (4 out of 5). In case of a deceased
donor died of accidental causes (e.g. a car accident), a prompt response is required:
1 Healthcare Data Management by Using Blockchain Technology 13
the first responder shall immediately inform the social services about a potential
organ donation, so that they can organise a safe donation without having the risk
to deteriorate the tissue or the organ. Efficiency is therefore crucial. Determining
whether someone is a candidate for organ donations depends on a multitude of
factors. The purely medical indicators are well documented with robust procedures in
place, backed by a stable legal framework and frequent significant legal adjustments
to assure a transparent, fair and successful transplant. However, before the medical
procedures can be properly invoked, first responders have to quickly and safely
identify someone’s qualification and determine authorisation for organ donation.
Although organ donation is an essential treatment, it suffers from severe chal-
lenges (Reza and Kenari 2014), in particular organ shortage. Indeed, transplant wait-
ing list is outstanding; e.g. in Germany (EurotransplantWeb Page 2020), more than ten
thousand patients were in a transplant waiting list in 2017, and only one-third of them
received an organ donation, and similarly in 2018 (Weigand 2018). In order to max-
imise the possible match between donors and receivers, international organisations
such as Eurotransplant (EurotransplantWeb Page 2020) and BaltTransplant (Rosental
et al. 1997) were started. For instance, the Eurotransplant network coordinates organ
transplants across Austria, Belgium, Germany and other East European countries.
Continuous interactions between accredited laboratories dramatically help reducing
the receiver’s waiting list. However, laboratories face organisational challenges: they
have to show continuous compliance with the standards, and they have to demon-
strate transparency on their operations, to maintain trust in the process (Almassi et al.
2014; Schulte et al 2018).
On the other hand, the development of such pan-European data sharing initiatives
has magnified interoperability and privacy challenges. Enabling secure, yet account-
able and transparent exchanges of healthcare data across facilities located in different
countries can support the improvement of the current transplantation processes.
Transplant Standards: the European Federation for Immunogenetics (EFI)/
American Society for Histocompatibility and Immunogenetics (ASHI). The basic
rules for coordination and cooperation of transplant laboratories are set by interna-
tional standards.
In Europe, the European Federation for Immunogenetics (EFI) identifies “min-
imal criteria, which all histocompatibility laboratories must meet if their services
are to be considered acceptable” (EFI 2017), which are then used for laboratory
accreditation and enrolment in transplantation networks, e.g. the Eurotransplant.
Similarly, in the USA, the American Society for Histocompatibility and Immuno-
genetics (ASHI) defines analogous rules. For the sake of presentation, only the EFI
rules are commented.
The EFI guidelines are paper-based, and the laboratory accreditation programme
consists of on-site and documental inspection of conformity with the guidelines. At
the time of writing, over 260 laboratories are accredited in 36 countries. Further-
more, as organs and stem cells are exchanged across national boundaries (Harmer
et al. 2018), a continuous improvement programme is in place across the transplant
network. Such regulatory requirements prompt the need to have full control on the
14 S. Bittins et al.
custody chain of documents, even during interactions and collaboration with third
parties located in different countries.
Organisation part of multi-country transplant networks must meet all these require-
ments. This requires high coordination and cooperation to share data with all network
members. These processes are complex and contain aspects which are not yet digi-
talised: attesting trust and reviewing paper- and electronic-based documents, showing
compliance to the standards and sharing audit results.
These are examples of tasks that can be automatised by using blockchain technol-
ogy as a trustworthy mechanism to securely share results without the intervention of
any trusted third party, yet guaranteeing the necessary transparency and accountabil-
ity. In Sect. 1.5.2 is shown how these case studies can be implemented by relying on
a blockchain architecture for enhanced data sharing.
To overcome the distribution of healthcare data across data silos, data is made avail-
able through the EHR approach. The use of IHE profiles enabled an interoperable
health information exchange, from the syntactic to the semantic level. It is not only
the preferred approach to share data among the different actors of a community, but it
became also the de facto solution to integrate distant communities. In addition, many
countries rely on it to build their national infrastructure. Built upon well-established
IHE Integration Profiles, these infrastructures are on production and allowed to create
secure and resilient nationwide healthcare exchanges. The usage of these Integration
Profiles, which rely on mature technical standards, ensures the architecture sus-
tainability. However, the advent of blockchain technology allowed to envision new
possibilities.
More specifically, blockchain can provide the decentralised means to enable
secluded healthcare organisations operating in data silos to achieve not only inter-
operable but also trustworthy exchanges of medical documents. Blockchain acts as
a decentralised, yet controlled repository of information to build trust in the inter-
actions among organisations, e.g. in collaborative cooperation across countries such
as the Organ Donation European networks.
Our proposal of a healthcare blockchain integrates provenance tracking and SSI
credential management. The solution is offered ‘as-a-service’ and can be deployed
in multiple healthcare contexts, because of its transparent integration with the XDS
document management systems.
Below, it is reported the main requirements that should steer the design and deploy-
ment of a blockchain system for health care (Sect. 1.5.1). Then, it introduced our
blockchain architecture (Sect. 1.5.2) and commented on its application to organ
transplant (Sect. 1.5.3).
1 Healthcare Data Management by Using Blockchain Technology 15
Blockchain is being explored for healthcare applications by both academia and indus-
try (Hardin and Kotz 2019; Krishnan et al. 2020; McGhin et al. 2019). When dealing
with exchange of medical documents, the set of legal and technical requirements is
substantial. Therefore, in order to address the need of enhancing document exchanges
across siloed communities, it is needed to set precise requirements that take into
account the key challenges and stakeholders: the role of privacy, the patients and the
systems already deployed.
The blockchain architecture for health data sharing is composed of two modular
blocks: provenance management and SSI blockchain. Figure 1.5 reports the high-
level architecture.
The EBSI and provenance blockchains provide the means to enhance the trust rela-
tionships established by the XCA communities. The EBSI, via the eIDAS bridge,
permits notarising and verifying credential claims (e.g. accreditation and qualifica-
tions), while provenance allows via the PROV Proxy to create provenance documents
to validate the quality of the exchanged medical data.
These blockchain functions are designed to be modular and interoperable with
legacy systems. The integration with XDS and its Security Assertion Markup Lan-
guage (SAML)/eXtensible Access Control Markup Language (XACML) (IT Techni-
16 S. Bittins et al.
Fig. 1.5 Healthcare blockchain high-level architecture (trust among XCS communities is enhanced
by using the blockchain systems)
cal Committee 2009) authentication and authorisation frameworks allow the enforce-
ment of patient-informed consent. In particular, consent declaration (e.g. opt-in/opt-
out or advance directive) can be enforced to regulate the application of blockchain-
based services.
Therefore, the integration of blockchain functionalities in routine document
exchanges enables to increase the trust among communities’ members on the cre-
dentials (via SSI) and documents (via provenance) of their counterparts.
Fig. 1.6 Blockchain architecture functions at work on organ transplant processes (between brackets
the references to the corresponding EFI standard sections)
The deployment of blockchain systems just presented can offer many opportunities
in multiple healthcare scenarios. Due to the sensitivity of the health data, the deploy-
ment of blockchain in such data-intensive applications must take into account legal
requirements related to patient centricity when exchanging data.
In this section, it presented the role of patients in health data exchanges
(Sect. 1.6.1), then the outstanding privacy challenges to address for responsible
design and deployment of blockchain-based healthcare services (Sect. 1.6.2).
One fundamental issue of health data exchange is the lack of immediate patient
involvement and focus. Although health systems are claiming to embody the princi-
ple of patient centricity throughout the entire life cycle of medical data, all industry
standards and best practices focus exclusively on health providers (for instance,
hospitals and laboratory), rather than meaningfully including patients. The patient-
facing health data exchange landscape is scattered and inherently incompatible in
itself. Recent developments in health frameworks, in particular the FHIR-based elec-
tronic health records of Google Fit (Google Fit 2020) and Apple Health Kit (Apple
HealthKit 2020), address this issue and move towards re-integrating the patient into
established data exchanges. However, additional regulatory, statutory and ethical
challenges remain to be addressed.
Patient Authorisation for Health Proceedings. In too many cases, healthcare-
related activities require patients’ notarised or certified documents (e.g. patient dec-
larations, informed consents and authorisations). Capturing and making such docu-
ments available electronically suffer from the continued need to be primarily paper-
based and necessitate a third party—such as a notary public or a health professional—
to acknowledge form, circumstances and validity of the patient’s assertion.
There are several means of stating ones wishes electronically, for instance the
qualified electronic signature, that are regulated by public authorities such as the
European Union. Their practical usability and cost are disfavourable compared to
readily available smartphone applications already integrated with health records.
These applications enable fine-grained sharing of medical data, as well as easing the
access and use of electronic health services.
Patient Remote Monitoring. Governments and health authorities have widely inves-
tigated the application of remote monitoring of patients to maintain and improve
public health. Several factors related to the (privacy) law and ethics have hindered
wide deployment of healthcare tracing applications. In the light of the COVID-19
pandemic, all these factors have been effectively devoid of any applicability.
1 Healthcare Data Management by Using Blockchain Technology 21
The entirely new category of health applications for contact tracing has spawned
new cooperation between governments, health authorities and private telecommu-
nication services to create, manage and share patients’ medical properties. For
instance, these applications enable management of immediate, current and authen-
ticated evidence about being either immune or non-contagious (so-called immunity
passport (Robert and Lukasz 2020), which are requested by authorities as a pre-
requisite for being authorised to continue with regular life activities. The latter is
not only a fundamental potential infringement of human rights, but also a principal
shift of how health information is consumed, from infrequent access in very narrow
circumstances to the need of being available at any given moment with a very short
“best before” date.
This challenge has been even magnified with the development of healthcare solu-
tions integrated into social media (Bock et al. 2020) and mobile devices (Apple
2020). This poses an even bigger challenge to the public health systems (George-
town University Medical Center 2020): How to transport a particular compilation
of medical data authenticated, promptly, legitimately, reliably, transparent and fully
traceable throughout all relevant stakeholders for legitimate purposes?
Therefore, smartphone applications may become the next-generation health pass-
port for patients that can be used to promptly present health credentials. However,
they require privacy-aware, fully digital system to rely on. Blockchain health data
platform can be leveraged to offer this service. Its decentralised platform is devoted
to digitally represent with tamper-proof guarantees physical artefacts, e.g. national
health insurance cards, immunisation attestation, etc. More importantly, the close
coupling with the EBSI SSI infrastructure provides reliable yet almost anonymous
proof of someone’s identity trait while retaining full control by the data subject. One’s
attributes, e.g. non-contagious attribute of the immunity passport, can be proved with-
out releasing the whole passport.
• Anonymity versus Public Health: When tracing patients, all geolocation infor-
mation and specific proof are collected and processed under the assumption of full
anonymity. As emergent public health needs can arise (e.g. the COVID-19 pan-
demic), the need for more exhaustive information rises exponentially. Applications
like the contact tracing ones are fundamentally incompatible with a truly anony-
mous data collection. Similarly, businesses and organisations need to demonstrate
sufficient compliance with imposed restrictions, for instance, occupancy limits
22 S. Bittins et al.
References
Allen, D., Berg, C., Davidson, S., Novak, M., & Potts, J. (2019 May). Asia and the Pacific Policy
Studies: International policy coordination for blockchain supply chains, p. 6
Almassi, B. (2014). Trust and the duty of organ donation. Bioethics, 8(28), 275–83.
Apple (2020, April). Apple and Google partner on COVID-19 contact tracing technology. https://
www.healthit.gov/topic/health-it-initiatives/blue-button.
Apple HealthKit. (2020). Apple. https://developer.apple.com/health-fitness/.
Behind the Architecture of Hyperledger Fabric. (2018). IBM. https://www.ibm.com/blogs/research/
2018/02/architecture-hyperledger-fabric/.
24 S. Bittins et al.
Benchoufi, M., & Ravaud, P. (2017, July). Blockchain technology for improving clinical research
quality. Trials, 18(1), 335. ISSN: 1745–6215. https://doi.org/10.1186/s13063-017-2035-z.
Bock, K., Ricardo, C., Kühne, R., Mühlhoff, M. R. Ost, J. P., & Rehak, R. (2020 April) Datenschutz-
folgenabschätzung (DSFA) für eine corona-app.
Boone, K. W. (2011). The CDA TM book (1st ed.). London: Springer-Verlag.
Bouhaddou, O., Bennett, J., Teal, J., Pugh, M., Sands, M., Fontaine, F., et al. (2012). Toward a virtual
lifetime electronic record: The department of veterans affairs experience with the nationwide
health information network. In: AMIA. Annual Symposium proceedings/AMIA Symposium, 2012
(pp. 51–60).
Boyens, J., Paulsen, C., Moorthy, R., & Bartol, N. (2015). Supply chain risk management practices
for federal information systems and organizations.
Cadzow, S., Giannopoulous, G., Merle, A., Storch, T., Vishik, C., Gorniak, S., & Ikonomou D.
(2015). Supply chain integrity. An overview of the ICT supply chain risks and challenges, and
vision for the way forward.
Centers for Medicare & Medicaid Services. (1996). The Health insurance portability and account-
ability act of 1996 (HIPAA). Online at http://www.cms.hhs.gov/hipaa/.
Chang, S. E. & Chen, Y. (2020, March). When blockchain meets supply chain: A systematic
literature review on current development and potential applications. IEEE Access 1–1.
Cross-border health project epSOS: What has it achieved? (2014). EU commission. https://
ec.europa.eu/digital-single-market/en/news/cross-border-health-project-epsos-what-has-it-
achieved.
Curcin, V., Fairweather, E., Danger, R., & Corrigan D. (2017). Templates as a method for imple-
menting data provenance in decision support systems. Journal of Biomedical Informatics, 65,
1–21. ISSN: 1532-0464.
Data Provenance Glossary. (2016). S & I framework. http://wiki.siframework.org/
Data+Provenance+Glossary.
EFI. (2017). Standards for histocompatibility and immunogenetics testing. European Federation for
Immunogenetics: Tech. rep.
Electronic Cross-Border Health Services. (2020). EU Commission. https://ec.europa.eu/health/
ehealth/electronic_crossborder_healthservices_en.
ELGA GmbH. (2017). Gesamtarchitektur. Technical Report ELGA. https://www.elga.gv.at/
fileadmin/user_upload/Dokumente_PDF_MP4/Technisches/ELGA_Gesamtarchitektur_2.30a.
pdf.
European Blockchain Service Infrastructure (EBSI). (2020). EU commission. https://ec.europa.eu/
cefdigital/wiki/display/CEFDIGITAL/EBSI.
European Commission. (2020a). Communication from the commission to the European parliament,
the council, the European economic and social committee, and the committee of the regions—a
European strategy for data.
European Commission. (2020b). Communication from the commission to the European parliament,
the council, the European economic and social committee, and the committee of the regions—
shaping Europe’s digital future.
European Commission. (2020c). EBSI technical details. https://ec.europa.eu/cefdigital/
wiki/display/CEFDIGITAL/Minimum+Technical+Requirements+for+an+EBSI+v1.
0+NODE+Deployment.
European Commission. (2020d). White paper on artificial intelligence—A European approach to
excellence and trust.
European Commission. DG SANTE (2019). The eHealth digital service infrastructure (eHDSI).
https://ec.europa.eu/cefdigital/wiki/display/EHOPERATIONS.
European Interoperability Reference Architecture (EIRA). (2020). EU Commission. https://joinup.
ec.europa.eu/solution/eira.
European Parliament and the Council. (2016). Directive (EU) 2016/1148 of the 6th July 2016
concerning measures for a high common level of security of network and information systems
across the union.
1 Healthcare Data Management by Using Blockchain Technology 25
European Union Agency for Fundamental Rights. (2020). How concerned are Europeans about their
personal data online? https://fra.europa.eu/en/news/2020/how-concerned-are-europeans-about-
their-personal-data-online.
EurotransplantWeb Page. (2020). Eurotransplant. https://www.eurotransplant.org/.
Fabric. (2020). Hyperledger. https://www.hyperledger.org/use/fabric.
Georgetown University Medical Center. (2020). Immunity passports to vaccination certificates for
COVID-19: Equitable and legal challenges. https://fra.europa.eu/en/news/2020/how-concerned-
are-europeans-about-their-personal-data-online.
Google Fit. (2020). Google. https://www.google.com/fit/.
Guidelines 04/2020 on the use of location data and contact tracing tools in the context of the
COVID-19 outbreak (2020, April). European Data Protection Board. http://edpb.europa.eu/sites/
edpb/files/files/file1/edpb_guidelines_20200420_contact_tracing_covid_with_annex_en.pdf.
Gulhan, I. (2020). A unique e-health and telemedicine implementation: European Reference Net-
works for rare diseases. Journal of Public Health, 28, 223–225.
Hardin, T., & Kotz, D. (2019). Blockchain in health data systems: A survey. In 2019 sixth inter-
national conference on internet of things: Systems, management and security (IOTSMS), pp.
490–497.
Harmer, A., Mascaretti, L., & Petershofen, E. (2018). Accreditation of histocompatibility and
immunogenetics laboratories: Achievements and future prospects from the European federation
for immunogenetics accreditation programme. HLA, 92(2), 67–73.
Health Level 7. (2020). HL7 https://www.hl7.org.
HIMSS. (2020). Blockchain in healthcare. https://www.himss.org/resources/blockchain-
healthcare.
HITECH Act Enforcement Interim Final Rule. (2009). Department of health and human
services. https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-
interim-final-rule/index.html.
HL7. (2018). FHIR: Fast healthcare interoperability resources. https://hl7.org/fhir.
IHE. (2019). The IHE IT Infrastructure (ITI) Technical Framework, Volume 1. Technical Report
IHE. https://www.ihe.net/uploadedFiles/
IHE Developing Integration Profile for the International Patient Summary. (2020). IHE. https://
www.ihe.net/news/ihe-developing-integration-profile-for-the-international-patient-summary/.
Integrating the Healthcare Enterprise. (2020). IHE. https://www.ihe.net.
IT Technical Committee. (2009). IHE IT-infrastructure white paper: Access control. https://ec.
europa.eu/eip/ageing/standards/ict-and-communication/data/ihe-it-infrastructure-white-paper-
access-control_en.
Kim, E., Rubinstein, S. M., Nead, K. T., Wojcieszynski, A. P., Gabriel, P. E., & Warner, J. L.
(2019). The evolving use of electronic health records (EHR) for research. Seminars in Radiation
Oncology, 29(4), 354–361. ISSN: 1053-4296.
Krishnan, S., Balas, V. E., Julie, E. G., Robinson, Y. H., Balaji, S., & Kumar, R. (eds.) (2020).
Handbook of research on blockchain technology. Elsevier.
Kuperman, G. J., Blair, J. S., Franck, R. A., Devaraj, S., & Low, A. F. H. (2010). Developing
data content specifications for the nationwide health information network trial implementations.
Journal of the American Medical Informatics Association: JAMIA, 17, 6–12.
Laboratory Barcode Labeling. (2020). IHE. https://wiki.ihe.net/index.php/Laboratory_Barcode_
Labeling.
Margheri, A. (2018, May). Decentralised provenance for healthcare exchange services.
https://medium.com/cybersoton/decentralised-provenance-for-healthcare-exchange-services-
b900cd96136c.
Margheri, A., Masi, M., Miladi, A., Sassone, V., & Rosenzweig, J. (2020). Decentralised provenance
for healthcare data. International Journal of Medical Informatics, 141, 104197. ISSN: 1386-5056.
Masi, M. (2018). Chaincode for the provenance tracking. https://github.com/mascanc.
Masi, M., & Maurer, R. (2010). On the usage of SAML delegate assertions in an healthcare scenario
with federated communities. In M. Szomszor & P. Kostkova (Eds.), Electronic Healthcare-Third
26 S. Bittins et al.
International Conference, eHealth 2010, Casablanca, Morocco, December 13–15, 2010, Revised
Selected Papers (Vol. 69, pp. 212–220). Lecture Notes of the Institute for Computer Sciences,
Social Informatics and Telecommunications Engineering: Springer.
McGhin, T., Raymond Choo, K.-K., Liu, C. Z., & He, D. (2019). Blockchain in healthcare appli-
cations: research challenges and opportunities. Journal of Network and Computer Applications,
135, 62–75. ISSN: 1084-8045.
Mehra, M. R. Ruschitzka, F., & Patel, A .N. (2020). Retraction-hydroxychloroquine or chloroquine
with or without a macrolide for treatment of COVID-19: A multinational registry analysis. The
Lancet, 395(10240), 1820. ISSN: 0140-6736.
Missier, P. Belhajjame, K., & Cheney J. (2013). The W3C PROV family of specifications for
modelling provenance.
Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: Asurvey
on applications and security privacy Challenges. Internet of Things, 8, 100107. ISSN: 2542-6605.
Mohsen, M. O., & Aziz, H. A. (2015). The blue button project: Engaging patients in healthcare by
a click of a button. Perspectives in health information management, 12.
Mühle, A., Grüner, A., Gayvoronskaya, T., & Meinel, C. (2018). A survey on essential components
of a self-sovereign identity. Computer Science Review, 30, 80–86.
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandom, A. H. (2020, May). The
revolution of blockchain: State-of-the-art and research challenges. Archives of Computational
Methods in Engineering.
Niaksu, O., Kodra, P., Pina, M., & Grabenweger, J. (2017). Implementation of nationwide electronic
health record in Albania: A Case Study. Studies in health technology and informatics, 236, 111–
120.
Official Website of The Office of the National Coordinator for Health Information Technology
(ONC). (2020). Appendix I - sources of security standards and security patterns. http://www.
healthit.gov/isa/ISA_Document/Appendix_I.
OpenNCP Community Home. (2020). EU commission. https://ec.europa.eu/cefdigital/wiki/
display/EHNCP/OpenNCP+Community+Home.
Pavleska, T., Aranha, M.M., Grandry, E., & Sellitto, G. P. (2019). Cybersecurity evaluation of
enterprise architectures: The e-sens case. In J. Gordijn, W. Guédria, & H. A. Proper (Eds.), The
Practice of Enterprise Modeling—12th IFIP Working Conference, PoEM 2019, Luxembourg,
Luxembourg, November 27-29, 2019, Proceedings. Vol. 369. Lecture Notes in Business Infor-
mation Processing, (pp. 226–241). Springer.
Personal Connected Health Alliance. (2020). PCHA. https://pchalliance.org.
Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2020). Decen-
tralized identifiers (DIDs) v1.0.
Reference Laboratory. (2020). Eurotransplant. https://www.eurotransplant.org/professionals/etrl/.
Reisman, M. (2017). EHRs: The challenge of making electronic data usable and interoperable, P
& T (42).
Riemann, R., & Olejnik, L. (2020). TechDispatch #1/2020: Contact tracing with mobile applications.
European Data Protection Supervisor: TechDispatch. ISSN: 2599-932X.
Rosental, R., Dainis, B., & Dmitriev, P. (1997). BaltTransplant: A new organization for transplan-
tation in the Baltic States. Transplantation Proceedings, 29(8), 3218–3219. ISSN: 0041-1345.
Royal College of Physicians of Ireland. (2019). Model of care for rare diseases—The national
clinical program for rare diseases.
Saidi, R., & Kenari, S. (2014). Challenges of organ shortage for transplantation: Solutions and
opportunities. International Journal of Organ Transplantation Medicine, 5, 87–96.
Scholl, M. A., Stine, K. M., Hash, J., Bowen, P., Johnson, L. A., Smith, C. D., & Steinberg, D. I.
(2008). SP 800-66 Rev. 1. An introductory resource guide for implementing the health insurance
portability and accountability act (HIPAA) security rule. Technical Report Gaithersburg, MD,
USA: NIST.
1 Healthcare Data Management by Using Blockchain Technology 27
Schulte, K., Borzikowsky, C., Rahmel, A., Felix, K., Polze, N., Fränkel, P., et al. (2018). Decline
in organ donation in Germany: A nationwide secondary analysis of all inpatient cases. Dtsch
Arztebl International, 115, 463–468.
Shoeb, S. (2018). ICOs in Healthcare industry | Detailed Healthcare ICO sector analysis.
https://hackernoon.com/icos-in-healthcare-industry-detailed-healthcare-ico-sector-analysis-
dd73766e809.
SNOMED CT (2020). SNOMED. https://www.snomed.org/.
Staff, C.-A. C. M. (2019). Access controls and healthcare records: who owns the data? Communi-
cations of the ACM, 62(7), 41–46.
The digital imaging and communications in medicine (DICOM) standard (2020). DICOM. https://
www.dicomstandard.org/.
The Sequoia Project. (2019). Sequoia. https://sequoiaproject.org.
Tobin, A., & Reed, D. (2018). The Inevitable Rise of Self-Sovereign Identity. The Sovrin Foundation:
Technical Report.
Trillium Bridge II. (2020). EU Commission. https://cordis.europa.eu/project/id/727745/it.
Wang, X., Zha, X., Ni, W., Liu, R. P., Guo, Y. J., Niu, X., & Zheng, K. (2019). Survey on blockchain
for internet of things. Computer Communications, 136, 10–29. ISSN: 0140-3664.
Weigand, K. (2018). Organspende in deutschland: Wollen wir nicht? Können wir nicht? Oder dürfen
wir nicht? Urologe, 57, 1091–1099.
Windley, P. (2016). How Sovrin works: A technical guide form the sovrin foundation. Sovrin:
Technical Report.
World Health Organisation. (2019). Recommendations on Digital Interventions for Health Sys-
tem Strengthening https://www.who.int/reproductivehealth/publications/digital-interventions-
health-system-strengthening/en/.
Xia, K.-J., Zhong, X., Zhang, L., & Wang, J. (2019). Optimization of diagnosis and treatment
of chronic diseases based on association analysis under the background of regional integration.
Journal of Medical Systems, 43(3), 46:1–46:8.
Chapter 2
Modernizing Healthcare by Using
Blockchain
Mario Ciampi, Angelo Esposito, Fabrizio Marangio, Mario Sicuranza,
and Giovanni Schmid
Abstract Electronic health record (EHR) systems are designed and deployed to
store data accurately and to capture the state of a patient across time, and they have
been one of the major drivers to advance care in the last decade. However, the EHR
is not eligible in supporting a model that is beyond episodic visits, nor the idea of an
integrated care plan that all care team members can view and contribute to. On the
other hand, the concept of a longitudinal record and the idea of a “smart care plan”
are key factors for paving the way toward Predictive, Preventive, Personalized and
Participatory (P4-medicine), which arguably will be in a near future the only effective
and sustainable approach for pandemics and “silent” chronic diseases. At the current
state-of-the-art, the HL7 FHIR standard and distributed ledger technologies (DLTs)
are two very promising areas of research and development in the context of health
information management, and a proper synergy among their approaches, concepts
and tools could overcome the limitations of EHR systems, giving rise to the hub of the
IT infrastructure for P4-medicine. This chapter explores the potential and challenges
of integrating the FHIR standard into DLTs, also through a concrete example of
implementation.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 29
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_2
30 M. Ciampi et al.
2.1 Introduction
Population health information management is a key factor for paving the way toward
Predictive, Preventive, Personalized and Participatory medicine (P4-medicine),
which in turn represents the main answer to the two most challenging threats to
population health: pandemics and “silent” chronic diseases. Arguably, P4-medicine
will be in a near future the only effective approach for containing public spending
and the sustainability of national health systems (Góngora Alonso et al. 2019).
In the last decade, electronic health record (EHR) systems have been designed
and deployed to store data accurately and to capture the state of a patient across
time, and they represent one of the major drivers to advance care in many Countries.
However, the EHR is not eligible in supporting a model that is beyond episodic visits,
nor the idea of an integrated care plan that would draw on all of the relevant data
about an individual at any point in time, and that all care team members can view and
contribute to. These smart care plans could represent the linchpin of P4-medicine
approaches if they were housed on collaborative care platforms that can access to
and perform cognitive computing on the patient data from a variety of sources.
Distributed ledger technologies (DLTs)—and, in particular, blockchain architec-
tures—are widely recognized as having the potential to transform health care, placing
patients at the center of the healthcare ecosystem and increasing the availability, reli-
ability and usefulness of their data (Ciampi et al. 2019). However, an analysis of
the current state-of-the-art of DLTs in healthcare shows that it is very challenging
to design and implement dependable, interoperable and scalable blockchain plat-
forms upon which health information can be connected, searched for and computed
in compliance with privacy and safety regulations (Namasudra et al. 2020). In fact,
data and workflows in healthcare are by far more complex, variegate and interdepen-
dent than in other application domains, and major efforts have to be done in order
to guarantee that the proposed solutions actually permit to store medical data in a
certified manner (Kim and Deka 2019) and adhere to emerging standards.
The HL7 Fast Health Interoperability Resources (FHIR) standard and the use of
open application programming interfaces (APIs) are very promising approaches for
developing IT platforms aiming at managing population health information, now
that new sources, formats and processing tools for health data are emerging, and
that interoperability among health IT systems and with patient’s own data sources
will be required (Kilintzis et al. 2019). The characteristics of this new standard,
which permits to represent health information in simple and formal data structures
(named “resources”) based on XML or JSON formats, facilitate the implementation
of numerous applications for the healthcare sector that need to exchange and memo-
rize data. In particular, it represents an enabling standard to support all the actors
involved in care plans according to a patient-centric approach. These aspects are
dealt with the IHE Dynamic Care Planning (DCP) profile, which specifies the struc-
tures and communication protocols based on FHIR resources for planning, creating,
updating and sharing care plans among many users (like providers, patients and
payers), with particular reference to patients with chronic conditions.
2 Modernizing Healthcare by Using Blockchain 31
The natural recording system for recordkeeping business actions is the ledger, an
append-only register, where asset transfers to or from it. These actions, also known
as transactions, are recorded according to contracts, which set conditions for trans-
actions to occur. Therefore, a ledger is a registry acting as a historical memory, with
the aim of checking, verifying and managing all the transactions made and the assets
involved therein.
In the context of the modern society, an asset is anything, tangible or intangible,
that is capable of being owned or controlled to produce value, and assets are more
and more made available through sets of companies and organizations, each having
a different role, function and geographical location but common strategic and oper-
ational objectives. Such business networks can be quite complex in processing, and
can be deployed on a very large scale, but each participant keeps their own system
of record and runs their own form of the business process to update their ledger.
32 M. Ciampi et al.
This reflects the centralized nature of the data base management systems (DBMSs)
realizing these recording systems. Although a DBMS, through its deployment, could
implement a traditional ledger with various degrees of replication and/or distribution
among multiple network nodes (in order to avoid a single point of failure), data in
these systems are stored and managed under the control and responsibility of a single
authority. This lack of decentralization may lead to substantial costs and risks in
business networks, where multiple ledgers have to be kept synchronized between all
the interacting parties. Establishing data provenance can be very laborious, tracking
back a chain of transactions can take days, contracts must be signed and executed
manually, and every database in the network can represent a single point of failure
since it contains unique information.
A distributed ledger is a ledger replicated among multiple parties. All the replicas
are kept synchronized without a central authority, through to a consensus protocol
(that is, a protocol among a set of peers designed to ensure that all participants
agree on a common value or status). In addition to data being shared, the software
protocols (well known as smart contracts) that implement the logic related to assets
and transactions can also be shared through the ledger. Specifically, a smart contract is
a piece of code defining the transaction logic that controls the lifecycle of a business
object (asset) contained in the world state. One or more smart contracts can be
packaged into a chaincode, which is then deployed to a communication subnet,
where a consensus protocol allows a set of peers to determine which transactions
can be written to, and their total ordering in the shared ledger. This way, a unique
copy of the ledger is shared among participants (consistency), and they will have a
common view of the business processes flowing throughout the network. Moreover, a
consensus protocol for a distributed ledger system is usually designed to be resilient to
a certain percentage of peers that can arbitrarily diverge from following the protocol,
thus assuring both the liveness and integrity of the network below a threshold of
such faults. With the ability to coordinate their business data and processes through a
shared ledger also in untrusted environments, business networks can overcome many
of the drawbacks and limitations of current systems.
in the last two decades, has widely spread and evolved beyond the scope and context
of financial industry.
In a blockchain network, any transaction task concerns endpoints that are authen-
ticated through public keys of a given digital signature scheme, and the blockchain
ledger composes of a continuously growing list of transaction records that are grouped
in blocks, where each block contains a cryptographic hash of the previous block.
Assuming that a given block cannot be altered, all the previous blocks in the chain—
with high probability—cannot be altered, too, because of the properties of the hash
function. In particular, if the last block in the chain is supposed to be uniquely gener-
ated and unforgeable, then these properties are inherited with high probability by
all the other blocks, and the overall blockchain satisfies both the consistency and
integrity properties.
Blockchain technology is quickly evolving and consolidating around two basic
models of decentralized network, realizing two different types of blockchain: permis-
sionless and permissioned. Bitcoin and Ethereum are examples of permissionless
blockchain: anyone can participate to the management of the ledger through the
consensus protocol without a specific identity. Permissionless blockchains typi-
cally involve a native cryptocurrency and often use consensus based on a “proof
of X” block proposal scheme, unfinished block finalization (as explained below)
and economic incentives. In permissioned blockchains, on the other hand, the ledger
is managed by a restricted set of known, identified participants in the system, and
consensus can be realized through more efficient approaches achieving determin-
istic finality like byzantine fault tolerant (BFT ) protocols. BFT and “proof of X”
based protocols are both designed to tolerate byzantine faults, in which one or more
peers involved in consensus behave arbitrarily against the goal of reaching agree-
ment (liveness) or that of adding to the blockchain the true block intended by the
protocol (integrity). BFT protocols have been studied since the early 80 s (Pease
et al. 1980; Lamport et al. 1982; Dwork et al. 1988), and modern instantiations can be
deployed on asynchronous networks (e.g.; Miller et al. 2016) and also be optimized
for different objectives like BEAT (Duan et al. 2018). These protocols have a marginal
computing cost and result in a definite agreement, but can manage consensus only
on small scale (up to few dozens of nodes), since they require explicit communi-
cation rounds among participants in order to select the peer in charge of uploading
the new block to the blockchain. On the contrary, “proof of X” based protocols
select the uploader through a sort of cryptographic puzzle, which does not require
explicit communication, so they scale well and can be used to manage consensus
among a large and open set of participants. In the face of such advantages, however,
these protocols: (i) are quite expensive in terms of specific resources of participants
(e.g.; computational power, owned coins, network bandwidth), and (ii) suffer from
unfinished consensus, that is they select the uploader just with high probability so
that temporary forks in the blockchain could occur before reconciliation. The first
unfinished consensus protocol was the Nakamoto protocol introduced with Bitcoin
(Nakamoto 2008), which is based on the proof of work (PoW ) block proposal scheme
and uses the longest chain rule for block finalization. In this last decade, many alter-
natives to the PoW have been introduced, primarily in order to avoid its energetic
34 M. Ciampi et al.
high inefficiency, such as the proof of stake (PoS) (King and Nadal 2012), the proof
of activity (PoA) (Bentov 2014; Bentov et al. 2016) and the proof of elapsed time
(PoET ) (Chen et al. 2017). Other recent proposals (e.g.; Kogias et al. 2016; Micali &
Vaikuntanathan 2017; Daian et al. 2019) try to overcome the limitations of the two
above approaches by combining them in hybrid protocols that first randomly select
a small subgroup of participants and then reach consensus through explicit voting
ballots in this subset.
Overall, there are currently substantial efforts and investments for not only devel-
oping and deploying mature DLT-based systems in many industry sectors like finance,
manufacturing, banking, insurance, retail, healthcare and telcos, but also to improve
public administration and e-governance.
The next Subsection illustrates the Hyperledger project, one of the major consor-
tium established so far as a result of the great interest of industry toward DLTs; it
is of particular interest in the context of business networks, since its main goal is to
promote a modular approach that provides a wide range of open-source blockchain
solutions across many industries.
The Hyperledger project was started in 2015 by the Linux Foundation to advance
cross-industry collaboration by developing blockchains and distributed ledgers,
with a particular focus on improving the performance and reliability of these
systems, so that they are capable of supporting global business transactions by major
technological, financial and supply chain companies.
The philosophy underlying this project is that DLT is not one-size-fits-all tech-
nology: since different organizations have different needs, there will never be one
single, standard blockchain; instead, many blockchains with different features will
provide a wide range of solutions across many industries.
Hyperledger provides a “greenhouse” structure that can incubate new ideas,
support each one with essential resources, and distribute the results widely. Modular
programming allows this structure to support many different solutions while
consuming far fewer resources.
So far, the available Hyperledger projects enabling the implementation of DLTs
are: Besu, Burrow, Fabric, Indy, Iroha, Sawtooth.
All the Hyperledger projects are designed so to be composed of software modules
that can be reused and replaced. This way, developers can experiment and build
blockchain suitable for different requirements. Through this feature, for instance,
different consensus protocols can be tried in order to find the one that best suits
a given application scenario. The Hyperledger Architecture Work Group (AWG)
is a technical workgroup focused on identifying common and critical components,
providing a functional decomposition of a blockchain stack into component layers
and modules, regularizing interfaces between the components, and interoperability
between ledgers. Another important aspect of the blockchain solutions hosted by the
2 Modernizing Healthcare by Using Blockchain 35
Hyperledger projects is that they do not require any cryptocurrency or token in order
to work; however, some of these projects allow implementing a cryptocurrency, or
giving developers the possibility to create tokens so to manage assets and currencies
through them. A cryptocurrency is a digital medium of exchange designed so that
individual coin ownership records are stored in a database using strong cryptography,
so to control the creation of additional digital coin records and to guarantee the correct
flow of coin transactions avoiding double spending. Instead, a token represents an
asset or utility tied to, and evaluated in term of, a given blockchain cryptocurrency.
Tokens are tradable and transferable among the various participants of the blockchain,
and they are often used to fundraise for crowd sales.
At the time of writing this chapter, the Hyperledger project hosts the frameworks,
libraries and tools illustrated in Fig. 2.1. Six different frameworks for implementing
complete DLT-based systems are currently provided, all based on the blockchain
technology but with major differences in the consensus protocols supported, the
membership service, the smart contract programming models, and the APIs for the
interactions of the application layer with the blockchain network. Some frameworks,
like Burrow and Indy, are focused on specific tasks, whilst others (e.g.; Fabric)
are general frameworks that aim at providing solutions for different application
scenarios.
The main characteristics of the Hyperledger projects designed to realize DLTs are
provided below.
Besu is a client designed to create public or private permissioned networks on top
of Ethereum, but that can also be ran on test networks such as Rinkeby (Rinkeby 2020)
or Ropsten (Ropsten 2020). It supports different consensus algorithms including
IBFT2.0 (Saltini and Hyland-Wood 2019), Ethash (Zamanov et al. 2018), and RCPA
(Schwartz et al. 2014).
Burrow provides a modular blockchain client with a permissioned smart contract
interpreter built in part to the specification of the Ethereum Virtual Machine (EVM).
It was designed to be a general-purpose smart contract machine. It supports both
EVM and WASM based smart contracts and uses BFT consensus via the Tender-
mint algorithm (Kwon 2014). Governance and permissioning is built in and can be
amended by on-chain proposal transactions. It is optimized for public permissioned
proof of stake use cases, but can also be used for private/consortium networks.
Fabric is a platform for building distributed ledger solutions, with a modular
architecture that delivers high degrees of confidentiality, flexibility, resiliency, and
scalability. Fabric allows main components, such as consensus and membership
services, to be plug-and-play. This way, solutions developed with Fabric can be
adapted for any industry. It leverages container technology to host and orchestrate the
various components of a blockchain network, and offers the possibility to write smart
contracts in different general-purpose programming languages like Go, Javascript,
and Java.
Indy is a special-purpose distributed ledger for the deployment and manage-
ment of digital identities. Indy provides tools, libraries, and reusable components
for creating and using independent digital identities rooted on blockchains or other
distributed ledgers. These identities are interoperable across administrative domains,
applications, and any other organizational silos.
Iroha is an easy to use, modular distributed blockchain platform with its own
unique crash fault tolerant consensus and ordering service algorithms, rich role-based
permission model and multi-signature support. Iroha was designed to be simple and
easy to incorporate into infrastructural or IoT projects that require distributed ledger
technology.
Sawtooth offers a flexible and modular architecture that separates the core system
from the application domain, so smart contracts can specify the business rules for
applications without needing to know the underlying design of the core system.
Hyperledger Sawtooth supports a variety of consensus algorithms, including Prac-
tical Byzantine Fault Tolerance (PBFT) (Castro and Liskov 1999) and PoET (Chen
et al. 2017).
The four libraries currently provided by the Hyperledger project aim to reduce the
development effort in writing distributed ledger software from scratch, but can also
be used to enrich the above frameworks with new functionalities or for implementing
interoperability among different blockchains. Aries is a shared, reusable, interoper-
able tool kit designed for creating, transmitting and storing verifiable digital creden-
tials, with the cryptographic support provided by Ursa. Quilt provides all core Java
primitives required for sending and receiving payments in a ledger-agnostic manner,
enabling payments across any payment network. Transact is a library used to imple-
ment virtual machines or interpreters, called smart contract engines, for processing
smart contracts. Ursa is a shared cryptographic library designed to avoid duplicating
cryptographic work for Hyperledger and non-Hyperledger projects, so to increase
security in the process.
Hyperledger provides also a set of tools to facilitate the interaction with blockchain
platforms. Avalus aims to enable the secure movement of blockchain processing off
the main chain to dedicated computing resources. Cactus is a blockchain integration
tool designed to allow users to securely integrate different blockchains. Cello is a
blockchain provision and operation system, which helps people use and manage
2 Modernizing Healthcare by Using Blockchain 37
blockchains in a more efficient way. Last but not least, Explorer is a user-friendly
web application used to query and view any relevant information stored into a ledger.
The most important Hyperledger project is Fabric (HLF 2020), a highly modular
and configurable open source permissioned DLT platform, designed for use in enter-
prise contexts: its modularity is the strength of the platform, since companies can
develop architectures that meet specific requirements. At a high level, Fabric is
comprised of the following modular components:
• An ordering service establishes consensus on the order of transactions and then
broadcasts blocks to peers. The ordering service is logically decoupled from the
peers that execute and endorse transactions, thus separating agreement on execu-
tion order (i.e.; ledger status) from agreement on the execution of applications.
This approach is much more suitable for commercial networks than the consensus
implemented for cryptocurrencies, as it allows to tailor agreement among parties
in function of the specifics of business. Moreover, since the ordering service is
implemented as a pluggable module, it can be chosen on the basis of the trust
assumption of a particular deployment or solution. Well-established protocols for
crash fault-tolerant or byzantine fault-tolerant consensus are being provided for
the latest Fabric release.
• A pluggable membership services provider (MSP) is responsible for associating
entities in the network with cryptographic identities. The MSP defines the rules
in which identities are validated, authenticated, and allowed access to a Fabric
network. Each MSP makes use of a Certificate Authority (CA) and X.509 public
key certificates, and there is a default CA that can be implemented through the
Fabric-CA API. Organizations can however implement external CAs of their
choice; as a result, a single Hyperledger Fabric network can be controlled by
multiple MSPs, where each organization brings its own favorite.
• A gossip protocol performs three primary functions: (i) peer discovery and channel
membership management, (ii) ledger data dissemination across all peers on a
channel and, (iii) peer-to-peer state transfer update of ledger data. A channel is
a private “subnet” of communication among several members, with the aim of
exchanging confidential transactions. Each channel has its own members, anchor
peers per member, shared ledger, chaincode and ordering service. Each trans-
action on the Fabric network is executed on a channel, where each party must
be authenticated and authorized to transact on that channel through a MSP. Each
gossiped message is signed, thereby allowing participants sending faked messages
to be easily identified and the distribution of messages to unwanted targets to be
prevented. Peers resulting in missed blocks will eventually be synced up to the
current ledger state by contacting peers in possession of these missing blocks.
• Smart contracts are implemented and deployed as chaincode, which runs within
a container environment (e.g. Docker) for isolation rather than on the ledger. A
smart contract can be written in standard programming languages and defines the
different states of a business object or asset through transactions.
• The ledger subsystem can be configured to support a variety of DBMSs and
comprises two components: the world state and the transaction log. The world
38 M. Ciampi et al.
state is the database of the ledger and describes the state of the ledger at a given
point in time, whilst the transaction log has a blockchain structure and records
all transactions, which have resulted in the current value of the world state.
• A pluggable endorsement and validation policy enforcement that can be indepen-
dently configured per application.
A Hyperledger Fabric network can be used by different organizations forming
a so-called consortium. Since not all the organizations within a consortium can be
interested or permitted to share the same assets with all the others, Fabric provides the
notion of channel, and allows the use of multiple channels in the same network. Each
channel has its own ledger, chaincode and ordering service: only the nodes registered
to a given channel can interact with the underlying blockchain, as specified by the
access control, endorsement and validation policies enforced on that channel. A node
can be connected to multiple channels, so it can interact with multiple blockchains
maintaining a separation between them.
In a Fabric network, there are two basic types of nodes: orderers and peers.
Orderers are the nodes composing the ordering service, which is responsible for
ordering transactions in a consistent manner so to ensure that the updates of the
world state are valid after being committed to the network. Peers are the nodes that
commit transactions and maintain the state and a copy of the ledger; moreover, some
peers can enforce specific functions. Endorsing peers must have chaincode installed,
since they simulate transactions and prepare transaction responses. Anchor peers act
as gateways for the communication between different organizations connected to the
ledger. Finally, leading peers use the gossip protocol to disseminate messages from
the ordering service to the other peers of the same organization.
As shown in Fig. 2.2, clients are applications interacting with the network through
the Fabric SDK, which provides a simple API to submit transaction proposals to a
ledger or query its content with minimal code.
In case of a transaction proposal, the Fabric SDK sends the proposal to the
endorsing peers, which verify and execute the transaction, generating an output
(transaction response) which is sent back to the client. If the transaction response
certifies that the endorsement policy provided for the transaction was satisfied, then
the client can send the response to the ordering service. The orderers then assemble
the above transaction alongside with other received transactions in a block, and send
this block to the committers. All and only the peers that register to a Fabric channel
play the role of committers for the blocks proposed on that channel. They check all
the transactions encoded in a block against their world state database, reporting each
as valid or invalid and updating the database only in the first case; lastly, they add
the new block in their copy of the blockchain.
The change in the needs and expectations of the patient-citizen, mostly caused by the
aging process of the population, along with the spread of the technological innovation
and the development of science in the medical field, is pushing towards the definition
of new models of health care and delivery of services, according to a “patient-
centric” vision. In the recent years, the health domain has shown an adequate attention
towards the introduction in a systematic way of communication and information
technologies in the entire social and health processes (eHealth). In this context,
eHealth becomes a strategic and enabling instrument for the management of the socio-
health systems. It allows not only the systematic collection and retrieval of health
information, but also its correct interpretation, according to models able to support the
decentralization of the care, the optimization of clinical and organizational resources
and the improvement of the quality of health processes.
The technological and methodological solutions currently available have several
limitations, as they are not able to manage the dynamism of health processes in a
synergic and intelligent way, due to the interaction between organizational flows and
care protocols. These limitations are reflected in the efficiency in the use of resources
and in the adequacy of the care processes, causing inhomogeneity of the care levels
on the territory. The main innovations that must be provided to the health system
mainly have to be able to provide:
• a universal model for health focused on the person (every time, and not only for
a specific clinical event);
• a proactive approach to the health domain, by means of novel tools aiming at
involving the patient-citizen in the care processes;
• an integrated process management, by creating cooperative care models through
the digital connection among all the actors involved in the prevention, treatment
and follow-up processes;
• a certification of the health protocols adopted and of the clinical data produced, in
order to encourage a native use of knowledge technologies, which allow to offer
intelligent services capable of integrating and configuring themselves dynami-
cally with respect to the operational context with a view to socio-health care
comprehension as a complex adaptive system.
In light of these reasons, the health domain needs innovative IT platforms and
services that comply with the most consolidate health informatics standards, able to
support stakeholders in the development of innovative and natively secure, certified,
40 M. Ciampi et al.
and interoperable eHealth applications. With reference to the problems and limita-
tions previously exposed, such IT platforms and services will have to provide new
solutions concerning a set of specific issues, as shown in Table 2.1.
Blockchain technology permits to implement innovative platforms in the health
domain, facilitating the management of the different phases of the health processes,
identifying and certifying activities and procedures to be followed. This will facil-
itate above all the scheduling of the resources to be used, in order to monitor and
optimize overall efficiency and effectiveness with a reduction of the major process
inefficiencies in terms of time, duplication or uselessness of some phases/activities
making up each process. Moreover, they will simplify the activities of medical and
health personnel, also offering patients a better and faster treatment service. The
certification of clinical data produced and health processes performed will permit to
provide “controlled” intelligent services to doctors both in: (i) the management of
decision-making processes carried out in diagnostic, therapeutic and rehabilitation
practice, and (ii) the assessment of the appropriateness of the interventions to be
carried out to provide patient health care. Indeed, this would allow training artificial
intelligence based systems on correct, verified and shared information rather than on
fake ones. This would also permit to improve the overall quality of services and to
reduce health risk, ensuring alignment with reference clinical guidelines.
This Section firstly provides an overview on the most important European
initiatives undertaken to implement homogeneous and interoperable electronic and
2 Modernizing Healthcare by Using Blockchain 41
personal health records. Then, it illustrates the main aspects regarding clinical work-
flows and the importance to respect the health paths formalized, in order to follow
best practices and provide a homogeneous care service.
EHRs offer the great advantage to make it possible for healthcare professionals
to easily consult the patient’s clinical history, if they have the access right to such
information. Many efforts have been performing worldwide to realize exhaustive and
distributed EHR systems, even if with several critical issues. Indeed, the implementa-
tion of such systems can be really completed only with the development of numerous
subsystems by many different actors (hospitals, clinical laboratories, general prac-
titioner ambulatories, institutional authorities, etc.) and by paying much attention
to user privacy. Despite this, the importance of having a great amount of clinical
information available pushes the authorities to finance this kind of projects.
Differently, a Personal Health Record (PHR) is devised to collect personal health
information maintained by the patient, like clinical reports, annotations or data
produced by biomedical sensors. They represent an important tool complementary
to EHRs, considering their ability to classify and memorize all the data provided by a
patient, thus offering to him/her an individual’s medical history. The main difference
between EHR and PHR lies on the nature of the health information collected. EHRs
gather certified clinical information produced by healthcare facilities, whereas PHRs
collect information held by the patients and, for this reason, these data are not certi-
fied. So far, several PHR systems have been implemented from private enterprises or
public organizations, also in order to take advantage of the widespread of biomedical
sensors and wearable devices, which are able to produce great amount of physiolog-
ical data. However, even if many Countries have issued norms for establishing their
realization, a comprehensive technical framework for assuring the implementation
of homogeneous and interoperable systems is still in progress (NCHIT 2018).
Instead, many efforts have been performed in the last two decades to develop
IT systems able to gather the great amount of clinical documents (like clinical
reports, prescriptions, discharge letters and so on) produced by the healthcare facil-
ities. The great part of these systems are based on the registry/repository paradigm:
the digital healthcare documents are stored in repositories, which are information
systems managed directly by the healthcare facilities or by more high-level organi-
zations; a set of metadata related to such documents (including the reference to the
repositories where they are stored) is memorized in a registry.
These systems are typically distributed and managed by the organizations deputed
at different levels to their implementation: healthcare enterprises, regional admin-
istrations, Countries. Considering that many EHR systems are implemented by
different organizations, much attention has been paid in the last years by the Euro-
pean Commission to promote initiatives aimed at making such systems interoperable
42 M. Ciampi et al.
each other at a European level. The most important European projects focused on
such a theme are described in Table 2.2.
conditions. They are tools that allow to outline, with regards to one or more patholo-
gies or clinical problems, the best possible path within an organization and among
organizations for taking care of the patient and his/her family. CPs lie on the concept
of putting a patient in a therapeutic diagnostic path where, according to the needs
and phases of the disease, the medical team defines the most appropriate therapy in
agreement with the interested parties. CPs thus have the aim of representing the best
temporal and spatial sequence for the patient care. CPs, according to the European
Pathway Association, have to:
2 Modernizing Healthcare by Using Blockchain 45
the improvement of the decision making process of physicians, helping to adapt the
medical treatment for the patient’s needs. Studies show the reasonableness of inter-
department pathways in terms of decreasing lengths of hospital stays or a better
coordination of the whole care procedure (Rotter et al. 2010; Rotter 2013).
The use of care plans among different departments and systems has allowed
improving the quality of patient care. Once the most suitable treatment path for the
specific problem (such as pathology, disease, state of health, etc.) is identified, it
is essential that all health professionals who are part of the process and the patient
follow the whole workflow. In the same manner, logging all the actions undertaken
for patient care is necessary for research purposes and the improvement of the process
itself, as well as for identifying responsibilities in a care plan. The ability to update
the treatment plan is also essential to follow the specific needs of a patient during
the start of the treatment path or during the therapy, in order to set the treatment plan
with respect to any patient’s needs, thus obtaining a personalized dynamic pathway.
These ones are flexible tools that go beyond the traditional installation of clinical
pathways. The management of care plans through a health service architecture has
to support the personalization of care for specific patient requirements, as well as the
addition of patient interactions with the care process, in order to achieve objectives
that bring healthcare to improve the quality of care.
An integrated environment in which the healthcare treatment can represent the
link among different departments in the process of a specific patient treatment, as
well as the possibility of making the patient fully experience for her/his path, allows
realizing the so-called patient empowerment. It is a key element allowing patient to
acquire trust towards the therapy to be followed and towards the IC technologies
to be used in order to improve the quality of care. Moreover, it is the core element
to decrease the risk of the escalation of the pathologies, especially of comorbidities
(Chaudhry et al. 2006).
Figure 2.3 shows an example of care plan modeled according to the OMG BPMN
2.0 standard, which may be represented in a CP document. It is possible to note that
the all the care journeys carried out from the patient follow strictly the planned path:
from a general visit by the General Practitioner (GP) to a diagnostic exam performed
by a specialist center or to a medication dispensed by a pharmacy.
The definition of the IT services architecture based on informatics health standards
(such as HL7, FHIR, IHE, etc.) and on the use of blockchain technologies will
allow in a simple way to make the care plans: (i) interdisciplinary (among different
departments and systems); (ii) connected to each other, and consequently allowing
interaction among different actors (such as doctors with diverse specializations) with
different roles, in order to favor the second opinion, use different medical skills and
permit the communication in an easy manner. In addition, an enabling platform able
to track all the phases of a clinical workflow would allow incentivizing and enticing
the patient to take part in the treatment process: in this way, it would be possible to
obtain the trust from the patient and therefore increase the probability that he/she
correctly follows the therapy. Then, it would increase the degree of personalization
of the clinical pathway in a secure way. The use of blockchain technology in the
architecture of such a platform would offer the following important benefits:
• Identification of an integrated and verified treatment plan;
• Management of care paths in a secure way, by satisfying confidentiality and
integrity;
• Log all the operations carried out on the clinical pathways for subsequent analysis
phases, useful to certify the actions taken in the care process and possibly identify
responsibilities in the process;
• Guide physicians and patients to comply with the specific treatment plan
identified;
• Verification of the correct application of the CP specific to the situation: the system
made up of blockchain technology is in fact able to identify a deviation from the
modeled CP and thus notify the observed deviation.
2.4 Standards
Many health informatics standards have been produced by the Standard Developing
Organizations (SDOs) to assure homogeneous implementation and interoperability
of health IT systems. These standards provide important benefits in the development
of homogeneous, interoperable, reusable IT systems for healthcare. For this reason,
they are used to implement health record and workflow systems. These standards have
to be used and integrated with all the new technologies (like blockchain) introduced
in a health domain to implement additional IT applications.
This Section illustrates the most recent health informatics standards and technical
specifications, which refer to clinical data representation and care planning: HL7
FHIR and IHE PCC DCP.
48 M. Ciampi et al.
Resources
Resources are the smallest discrete concepts that can be maintained independently.
They are collected in the following classes:
• Administration: covers basic data that can be represented in FHIR, such as Patient,
Practitioner, CareTeam, Device, Organization, Location, Healthcare Service;
• Clinical: contains clinical records (e.g. Allergy, Procedure, CarePlan/Goal,
ServiceRequest);
• Diagnostics: holds clinical diagnostics, including laboratory tests, imaging, and
genomics;
• Medication: contains the ordering, dispensing, administration of medications;
• Workflow: includes the resources for managing assistance processes (e.g. appoint-
ment, order, encounter, etc.);
• Financial: supports billings and payments (e.g. coverage, claim, etc.);
• Clinical Reasoning: permits to provide the ability to reason, such as artifacts of
clinical knowledge, clinical decision support rules, quality measures, etc.
Data Types
The data types are used for categorizing the resource elements. They are organized
into the following four categories:
• Simple/primitive types, which are single elements with a primitive value;
• General-purpose complex types, which are re-usable clusters of elements;
• Metadata types, which are a set of types used with metadata resources;
• Special purpose data types, which are defined elsewhere in the specification for
specific usages.
Bundling
A common operation performed with resources is to collect them into a single
instance, containing correlated data with respect to a specific context. In FHIR,
this is called “bundling”, i.e. a group of resources. The “Bundle Resource” includes
the whole content of all resources, not only their metadata and references.
Profile
Another important aspect of the FHIR specifications concerns the concept of Profile.
Profiles are part of the standard that describe the adoption of FHIR in particular use
cases. Some specific use cases are common or important enough to be described as a
part of the specification itself. A FHIR profile is thus a set of rules that allow a FHIR
resource to include specific constraints or extensions, so that additional attributes
can be added.
50 M. Ciampi et al.
General clinical care aspects such as document exchange, order processing, work-
flows and coordination with other specialty domains are dealt within the IHE PCC
domain, sponsored by HIMSS (Health Information Management Systems Society)
and ACP (American College of Physicians). Some solutions to these issues have
been described in numerous Integration Profiles (IHE PCC 2020).
Specifically, the structures and transactions for care planning, creating, updating
and sharing Care Plans that meet the needs of interested users are provided in
the Dynamic Care Planning (DCP) Integration Profile, whose Revision 3.1 was
published in September 2019 as Trial Implementation (IHE PCC DCP 2019).
The DCP profile permits to dynamically update Care Plans by the different actors
involved in the care processes each time a patient interacts with the healthcare system.
The profile takes advantage of these standards:
• From a functional point of view, it is based on HL7 Service Functional Model:
Coordination of Care Service (CCS) (HL7 CSS 2018);
• With regards to the data model, it derives its concepts from the HL7 Care Plan
Domain Analysis Model (DAM) (HL7 DAM 2016);
• With concerns to technical aspects, the profile is based on HL7 FHIR Resources
and transactions.
The data that a system compliant to IHE PCC DCP has to be able to process have
to be represented in the following HL7 FHIR resources:
• CarePlan: tool used by clinicians to plan and coordinate care for an individual
patient;
• PlanDefinition: contains an action definition that describes an activity to be
performed;
• ActivityDefinition: specific actions to be performed as part of care planning.
The actors formalized in this profile are described below:
• Care Plan Contributor: reads, creates and updates Care Plans and Plan Definitions,
generates Care Plans and requests resources based on a selected activity definition;
• Care Plan Service: manages Care Plans received from Care Plan Contributors and
provides updated Care Plans to subscribed Care Plan Contributors;
• Care Plan Definition Service: manages Plan Definitions received from Care Plan
Contributors and provides updated Plan Definitions to subscribed Care Plan
Contributors;
• Care Team Contributor: reads, creates and updates Care Teams;
• Care Team Service: manages Care Teams received from Care Team Contribu-
tors and provides notification of updates and access to updated Care Teams to
subscribers.
52 M. Ciampi et al.
The management and monitoring of health processed information are complex activ-
ities because they provide for the adoption of specific mechanisms to guarantee the
security and control of the actions about health data. In the healthcare context, it is
essential to adequately manage data qualitatively as well as quantitatively. For this
reason, it is necessary to assure the integrity and availability of health data, as well
as confidentiality, being the health data contain sensitive information. The manage-
ment of health information must be monitored so as to allow the identification of the
users and the operations on health data done (creation/update/cancellation), in this
way performing the so-called integrity monitoring. At the same time, the operations
carried out by the user who reads the data must also be monitored and controlled, in
order to provide data confidentiality.
This Section provides information related to the way health records should be
securely managed and monitored in a standard way. Thus, the concept of security
(in particular, integrity and confidentiality) will be explored by adopting the FHIR
standard. The next Section illustrates how these issues can be satisfied by using
blockchain technology.
FHIR takes in due account security issues. Specifically, authentication and authoriza-
tion of the actors on the system are a necessary requirement. FHIR defines exchange
protocols and content models to be used with the well-known IT security protocols.
Among these, there are:
• Time Keeping, using NTP/SNTP;
• Communications Security: all data exchanges must be protected via TLS (e.g.
HTTPS);
• Authentication: the use of OAUTH is recommended;
• Access Control: defines a Security Label infrastructure to support access control
management, in addition to the extended CRUD (Create, Read, Update, Delete)
scheme;
• Audit: defines useful resources for auditing (audit event and provenance).
The mechanisms to guarantee privacy and security directly depend on the analysis
of the requirements of the specific system to implement and must protect against the
security risks of the data to protect. FHIR is based on a RESTful protocol: each
of the wide set of clinical, administrative, financial, and infrastructure resources
formally defined has a different protection requirement. It supports basic operations
on resources, so assuming that adequate protocols like OAuth and TLS are in place to
authenticate parties and protect their communications. Thus, it is sufficient to define
2 Modernizing Healthcare by Using Blockchain 53
FHIR servers should authenticate clients: to this aim, they can either (i) authenticate
and trust the client system or (ii) authenticate the individual user with a variety of
techniques. For web environments, the standard recommends using OpenID Connect.
It also recommends using OAuth to authenticate and/or authorize the client and user.
The Smart-On-FHIR profile on OAuth is a recommended method for using OAuth.
The OAuth 2.0 protocol framework defines a mechanism to allow a resource
owner to delegate access to a protected resource for a client application, optionally
54 M. Ciampi et al.
limited by a set of scopes. This specification profiles the OAuth 2.0 protocol scopes
to be used with the FHIR protocol to increase baseline security, provide greater
interoperability, and structure deployments in a manner specifically applicable to (but
not limited to) the healthcare domain (Richer and Mandel 2018). A set of privacy and
security specifications are developed: they allow authorization to access the health
data sharing features made available through the RESTful API (https://openid.net/
wg/heart/). The correct identification of an actor on a system is one of the bases on
which the security system is based. In fact, most security applications (authentication,
access control, digital signatures, etc.) are based on the correct mapping between the
relevant resources and the underlying systems. The data owner should not allow
the disclosure of data unless there are sufficient guarantees that the other party is
authorized to receive it. This applies to a client that creates/updates a resource via
PUT/POST, as much as it is managed by a server that returns resources required via
GET.
Two of the classic Access Control models are Role-Based Access Control
(RBAC), where the access policies are based on the role assumed by a user, and
Attribute-Based Access Control (ABAC) (Esposito et al. 2013; Shen & Hong 2006),
where the access policies are evaluated by analyzing several attributes of the user
(and not only on the role). Some other access control models have successfully been
proposed (Namasudra 2019).
A possible approach to create a specific access control model, accompanied by
appropriate security policies, is through the use of the FHIR API. In particular,
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare
interoperability in Java. HAPI FHIR 3.8.0 introduces a new interceptor framework
that is used across the entire library. Interceptor classes may “hook into” various
points in the processing chain in both the client and the server. The interceptor called
Authorization Interceptor permits to determine preliminarily whether a user has the
appropriate permission to perform a given task on a FHIR server. This is done by
declaring a set of rules that can selectively allow (whitelist) and/or selectively block
(blacklist) the access to a resource.
The Authorization Interceptor, opportunely used, is an important mechanism that
can be used to intercept a client request sent to a server in order to: (i) apply the access
control policies in order to grant or deny the access to a health service/resource
requested by a user (for example, a service able to return a clinical report or a
set of metadata related to a patient); (ii) send the same request to the blockchain
network, with the aim of recording the operation, as shown in Fig. 2.4. This way, the
authorization protocol can be performed in two phases: (i) one at application level
(that is, health business level); (ii) one at network level (that is, blockchain level).
FHIR provides an AuditEvent resource used for event logging. This audit logging
action records specific details when the event occurs to ensure security and privacy.
2 Modernizing Healthcare by Using Blockchain 55
This form of audit logging records details about the security event that happened.
The AuditEvent can then be used by authorized applications in order to support audit
reporting, alerting, filtering, and forwarding. This model is developed and used by the
widespread IHE ATNA profile. The events of the ATNA logs can be automatically
converted into FHIR resources and therefore the applications are able to search for
audit events or to register for notifications. As regards HTTP logs, developers need
to consider the implications of distributing access to the logs, in fact, HTTP logs
should be regarded as being as sensitive as the resources themselves. Therefore,
FHIR allows, through the appropriate use of the AuditEvent resource, to guarantee
the data integrity on the system, by using the hash attribute of the resource. It is hard
to guarantee integrity at the health process level, because there are different resources
and actors that take part in the process.
A platform based on the FHIR framework and blockchain technology would
permit to assure integrity at a process level, satisfying the key needs of the
health domain, such as interoperability of data and applications, structured data,
unambiguous representation of information.
As illustrated in the previous Section, the integrity protection of healthcare data and
processes is a key factor for the success of digitized medicine and medical research.
Diagnostic processes and care plans can be more easily implemented, controlled
and updated by assuring that medical records and the actors, actions, devices and
circumstances producing and/or consuming them are reliably tracked through a kind
of tamper-proof ledger. Effective and efficient tools rooted in blockchain concepts
can be designed to promote research integrity values in medical sciences; indeed, the
concept of transaction can be used to encode a potential cause-effect relation that can
56 M. Ciampi et al.
later be analyzed with backward reasoning. By one side, the recording of data and
procedures should mitigate the physician’s or scientist’s bias on the outcome, or the
tendency to rule out data which do not support the hypothesis, or even the failure to
estimate quantitatively systematic errors. On the other hand, feedbacks from patients
and records of their significant health parameters can be comprehensively collected,
analyzed and correlated to care processes.
FHIR resource management can greatly benefit from the adoption of blockchain
networks, since these can be used to enforce resource authentication and the integrity
of their related workflows, which are two aspects not covered by the standard. FHIR
is devoted to interoperability for the exchange of electronic healthcare informa-
tion, and this goes well with the decentralized nature of a permissioned blockchain
network, where code and data are replicated among a set of authorized parties and
kept synchronized without a central authority by means of a consensus protocol. The
model of trust better fitting with modern healthcare ecosystems is indeed that real-
ized through open consortia, where well-recognized healthcare providers (hospitals,
nursing homes, diagnostic centers and medical associations) cooperate in order to
offer a multidisciplinary, flexible and complete care support.
As detailed in Subsect. 2.2.2, Hyperledger Fabric was designed so that a network
can be worked under a governance model based on the trust among the partici-
pants, such as a legal agreement or framework for handling disagreements, although
the participants may not fully trust one another. This is precisely the trust model
of open consortia. The multi-channel architecture of Hyperledger Fabric allows
the various kinds of FHIR resources to be managed independently, sharing them
among different participants and according to specific access control policies. This
way, interoperability can be achieved without sacrificing privacy, and the backbone
network supporting FHIR services can be built incrementally over time in a modular
fashion with respect to managed resources (i.e.; number of services) and the set of
participants and their roles.
FHIR specifications are based on the REST architectural style (RESTful): for this
reason, the kind of possible operations that can be performed on a resource are
the same for each resource type. This aspect permits to manage the resources in a
highly granular fashion. Such operations are carried out by means of client/server
interactions based on the HTTP primitives (like GET, PUT, POST, DELETE): they
can be relative to interaction types, interaction instances or the whole system (as
shown in Table 2.3), and collectively constitute the Resource-Oriented Architecture
based on the FHIR API. Coherently with context and scope of the standard, this
API does not directly address authentication, authorization, and audit collection; nor
it provides methods for assuring the integrity of information supplied by servers:
implementers can choose which of the interactions are made available, and which
resource types are supported by servers.
2 Modernizing Healthcare by Using Blockchain 57
Delete a
delete
resource
Retrieve the
change history
history
for a specific
resource
a diverse chaincode, whilst each channel can have its own set of participants and
access control policy. The integrated architecture is shown in Fig. 2.5.
One main point in this design is the choice of the FHIR resources, or part of them,
that must be coded as Fabric assets. For the purpose of data and process integrity, it
is not efficient to store on the ledger the full specification of a resource, since it can
consist of many elements, and some of them are quite narrative and not important
to be recorded as such. Blockchain ledgers are not usually designed to store large
assets, since they are intended to log transactions (i.e.; state changes in assets) for
large amount of time and in a replicated way, and this can easily result in large
amounts of data and scalability issues. Resources are already stored and managed
by the FHIR server, thus replicating them on the Fabric ledger would only result in a
harmful computational and storage overhead. Moreover, FHIR resources are closely
related to each other: it is often the case that a FHIR resource contains references to
other FHIR resources, which can be managed by the same server or even by a remote
server. Fully reproducing these interdependencies at the blockchain layer would be
too complex and useless, since this is managed by the application layer. Thus, it
is mandatory in this proposed approach to select a few primary FHIR resources on
which the others depend and keeping explicitly track on the ledger only of the first
ones.
Another main point in the proposed design concerns how resource instances are
named and addressed in the context of a single server and the overall network. The
name space has to be defined not only to avoid name collisions under the assump-
tion that FHIR servers give names independently from each other to newly created
instances, so to get globally unique assigned names. A more stringent requirement is
that the naming convention must not disclose sensitive information (e.g.; patient iden-
tifiers) and must be immune to enumeration attacks. The proposed approach involves
2 Modernizing Healthcare by Using Blockchain 59
resource names consisting of three parts: a prefix that uniquely identifies the FHIR
server in the network and its service,1 a unique pseudo-random string (nonce) in the
namespace of the server to univocally identify each resource managed by the server,
and a sequential integer that identifies the version of the given resource. This naming
schema is compatible with the FHIR standard and major naming conventions for
computer networks (e.g.; DNS).
A final relevant point of the design concerns participants in the Fabric network. Being
a permissioned blockchain, Fabric relies on Member Service Providers to manage the
identities of participants, which in turn are constructed from public-key certificates
and a X.509 public key infrastructure. Managing the identities at the application
layer through Fabric would result in a large-scale, time-varying process which is
quite cumbersome to administer via the MSPs, and that it would also significantly
deviate from current standards. As detailed in Subsect. 2.5.2, FHIR applications
have their own authentication and authorization requirements that are very different
from those concerning a permissioned blockchain network. FHIR recommends to
use OAuth 2.0 (Hardt 2012) to authenticate and/or authorize the client and user.
Moreover, for the purpose of data and process integrity, handling user authentication
and authorization at the Fabric layer is completely useless, whereas it is instead
important to keep track of “who does what” in the ledger, where “who” and “what”
are defined at the application layer.
The identities managed at the Fabric level will be therefore those concerning
the FHIR servers operating at the application layer, which will be casted as Fabric
clients, plus those related to the peers and orderers composing the Fabric network, as
provided by the organizations belonging to the consortium defined at the application
layer and enforced at the blockchain layer. This way, the FHIR layer has the aim of
managing participants at business level, whereas the Fabric layer at network level.
1 It may be the case that a single server offers multiple services (i.e.; resources): thus it is important
to distinguish among different services deployed by the same server, for example through FHIR
resource acronyms.
60 M. Ciampi et al.
The IHE Dynamic Care Planning (DCP) Profile provides the structures and trans-
actions for managing and sharing care plans that meet the needs of providers, patients
and payers. As illustrated in Subsect. 2.4.2 and fully detailed in (IHE PCC DCP
2019), this profile is built around the HL7 FHIR Care Plan resource and is made up
by the Care Plan, Care Team and Care Plan Definition services. Care Plan captures
basic details about who is involved and what actions are intended in a care plan-
ning, without dealing in discrete data about dependencies and timing relationships.
A Care Plan can be dynamically created from tools used to support evidence-based
practice, allows the inline definition of activities using the activity.detail element,
and is updated by the Care Plan contributors. The Care Plan contributors constitute a
Care Team, which can be made up of a single individual (e.g.; a self-caring patient),
a single group of individuals or multiple groups of individuals providing various
types of services. In the context of DCP Profile use cases, it is therefore natural to
consider Care Plan as the primary resource that needs an explicitly track on the ledger
through a dedicated Fabric channel. On this basis, the other external FHIR resources
characterizing it are managed by means of a suitable cryptographic hash values, so
to get the overall integrity of the plan. It is worthwhile to note in this respect that
retrieving an external resource and computing its hash value is only required if such
a resource is not managed with integrity protection by its related server. Otherwise,
it will suffice to guarantee the integrity of the reference to the resource by explicitly
tracking it into the ledger, without communication and computing overhead.
The architecture of the proposed platform is shown in Fig. 2.6. It is composed of
the following components:
Fig. 2.6 The proposed two-tier architecture for care plan management
2 Modernizing Healthcare by Using Blockchain 61
• REST Interface: represents a REST server able to receive requests and send
responses according to the FHIR protocol;
• Authorization Manager: is deputed to verify the access rights to the resources;
• Storage Manager: interacts with the FHIR DB for storing/retrieving FHIR
resources;
• Asset Composer: has the aim of coupling a service managing a primary FHIR
resource to a Fabric channel of the same name;
• FHIR DB: is a database where FHIR resources are stored;
• Digest Analyzer: computes and verifies the digests of the FHIR resources;
• Transaction Management: identifies the Fabric transactions to be performed
according to the user request;
• Fabric Ledger: is a distributed and shared registry where transactions are
immutably stored.
A high level sketch of the interactions among the components is illustrated for the
Care Plan create/upload workflow in Fig. 2.7. However, it should be noted that the
architecture depicted in Fig. 2.6 is valid for any FHIR resource or service, although
its implementation can vary and, at the time of writing, it was developed only for the
Care Plan resource in the context of the IHE DCP Profile.
A request containing a FHIR Care Plan resource, sent through the REST Interface,
is intercepted by the Authorization Manager, in order to verify if the user has the
rights to access the service. In this case, the request is sent to the Storage Manager,
which parses the incoming FHIR transaction and, depending on the request type, it
creates or updates the FHIR DB resource database. Then, using a resource specific
configuration file, the Digest Analyzer interface selects the elements of the resource
that have to be explicitly tracked in Fabric and computes some digest values through
the use of an hash function, thus obtaining a memory buffer that encodes the Fabric
asset (named Resource Digest), which corresponds to the resource targeted in the
FHIR transaction (Care Plan Digest in Fig. 2.7). The FHIR interface is also in
charge of assigning names (Resource ID) to newly created resources and their related
Resource Digests, according to the naming schema described in Subsect. 2.6.1.
The Fabric interface of the Asset Composer represents the client of the Fabric
channel implementing the tamper-proof logging for a given FHIR resource or service.
It is called by the FHIR interface with the Resource ID and the string encoding the
Resource Digest as parameters, and it returns to the caller a status condition. This
interface makes use of the Fabric SDK to connect to the Fabric network, access
to the channel provided for the given resource, and submit transactions, trough the
Transaction Manager, to the ledger according to the application transactions inter-
cepted by the FHIR interface. Figure 2.7 shows two types of transactions: create and
update. Fabric transactions are then managed by the peers and endorsers composing
the network, with chaincode installed and instantiated on the endorsing peers which
is appropriate for the processing of the given resource.
2.8 Conclusions
A crucial aspect for the improvement of the health domain is to make medicine
predictive, preventive, personalized and participatory (P4-medicine). An enabling
factor to reach such an objective is represented by the availability of operating plat-
forms connecting the various actors, actions, devices and circumstances producing
and/or consuming health records, while guaranteeing the authenticity of the infor-
mation acquired and its correct processing in compliance with current regulations
and health informatics standards. Distributed ledger technologies, and in particular
permissioned blockchain platforms, have the right requirements but must be correctly
deployed and implemented in order to solve some technological and research prob-
lems that stand in the way of their effective use. Most important, these technologies
can be used only for the network layer, and they have to be appropriately integrated
with the application layer to get the required platforms. In this chapter, potentialities
and challenges of integrating the emerging health informatics HL7 FHIR standard in
distributed ledger technologies are explored. The great advantage of such an integra-
tion is to satisfy an important necessity for the health domain: certify and verify the
clinical events occurred for development of the health processes. After introducing
concepts, frameworks and current challenges for distributed ledgers and the health
domain, the adoption of FHIR for the particular use case of dynamic care planning, as
defined in the IHE DCP profile, is illustrated. Then, in order to show how blockchain
technologies can be used to enforce the authentication of FHIR resources and the
integrity of their related workflows, a concrete example of integration of the permis-
sioned blockchain platform Hyperledger Fabric with some of the services considered
by the IHE DCP profile is provided.
2 Modernizing Healthcare by Using Blockchain 63
References
Ainsworth, J., & Buchan, I. (2012). COCPIT: A tool for integrated care pathway variance analysis.
Study Health Technology Information, 180, 995–999.
Antilope. (2015). Advancing eHealth Interoperability Available at: https://www.antilope-project.
eu/front/index.html.
Bentov, I., et al. (2014). Proof of activity: Extending bitcoin’s proof of work via proof of stake
[extended abstract]. ACM SIGMETRICS Performance Evaluation Review, 42(3), 34–37.
Bentov, I., Gabizon, A., & Mizrahi, A. (2016). Cryptocurrencies without proof of work. In Interna-
tional Conference on Financial Cryptography and Data Security (pp. 142–157). Springer, Berlin,
Heidelberg.
Billings, J. (2005). What do we mean by integrated care? A European interpretation. Journal of
Integrated Care, 13(5), 13–20.
CALLIOPE Network. (2010). CALL for InterOPErability. Available at: https://www.eu-patient.eu/
whatwedo/Projects/completed-projects/CALLIOPE-Network/.
Castro, M. & Liskov, B. (1999). Practical Byzantine fault tolerance. In OSDI (Vol. 99, No. 1999,
pp. 173–186).
Chaudhry, B., et al. (2006). Systematic review: Impact of health information technology on quality,
efficiency, and costs of medical care. Annals of Internal Medicine, 144(10), 742–752.
Chen, L. et al. (2017). On security analysis of proof of elapsed-time (PoET). In International
Symposium on Stabilization, Safety, and Security of Distributed Systems (pp. 282–297). Springer,
Cham.
Ciampi, M. et al. (2019). A blockchain architecture for the Italian EHR system. In Proceedings of
the Fourth International Conference on Informatics and Assistive Technologies for Health-Care,
Medical Support and Wellbeing—HEALTHINFO (pp. 11–17).
Daian, P., Pass, R., & Shi, E. (2019). Snow white: Robustly reconfigurable consensus and applica-
tions to provably secure proof of stake. In International Conference on Financial Cryptography
and Data Security (pp. 23–41). Springer, Cham.
Duan, S., Reiter, M. K., & Zhang, H. (2018). Beat: Asynchronous bft made practical. In Proceedings
of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2028–
2041).
Dwork, C., Lynch, N., & Stockmeyer, L. (1988). Consensus in the presence of partial synchrony.
Journal of the ACM (JACM), 35(2), 288–323.
E-SENS. (2016). Electronic simple European networked services. Available at: https://www.ese
ns.eu/.
eHGI. (2014). The European eHealth Governance Initiative. Available at: https://www.ehgi.eu/def
ault.aspx.
epSOS. (2014). Smart Open Services for European Patients. Available at: https://www.epsos.org/.
Esposito, A., Sicuranza, M., & Ciampi, M. (2013). A patient centric approach for modeling access
control in EHR systems. Algorithms and Architectures for Parallel Processing. ICA3PP 2013.
Lecture Notes in Computer Science, (vol. 8286, pp. 225–232) Springer.
EXPAND. (2015). Deploying sustainable cross-border eHealth services in the EU. Available at:
https://www.expandproject.eu/.
Fico, G., et al. (2016). Integration of personalized healthcare pathways in an ICT platform
for diabetes managements: A small-scale exploratory study. IEEE Journal Biomed Health
Information, 20(1), 29–38.
Góngora Alonso, S., de la Torre Díez, I., & García Zapiraín, B. (2019). Predictive, personalized,
preventive and participatory (4P) medicine applied to telemedicine and eHealth in the literature.
Journal of Medical Systems, 43, 140.
Hardt, D. (2012). The OAuth 2.0 authorization framework. Request For Comment 6749.
HL7 CSS. (2018). HL7 Service functional model: Coordination of care service, STU, Release 1.
Available at: https://www.hl7.org/implement/standards/product_brief.cfm?product_id=452.
2 Modernizing Healthcare by Using Blockchain 65
HL7 DAM. (2016). HL7 Version 3 Domain Analysis Model: Care Plan Release 1. Available at:
https://www.hl7.org/implement/standards/product_brief.cfm?product_id=435.
HL7 FHIR. (2020). HL7 Fast Healthcare Interoperability Resources. Available at: https://www.hl7.
org/fhir/ (Accessed on 30th June 2020).
HLF. (2020). Hyperledger Fabric Documentation. https://hyperledger-fabric.readthedocs.io/
(Accessed on 30th June 2020).
IHE. (2020). Integrating the Healthcare Enterprise. Available at: https://www.ihe.net/ (Accessed on
30th June 2020).
IHE PCC. (2020). IHE Patient Care Coordination domain. Available at: https://www.ihe.net/ihe_
domains/patient_care_coordination/ (Accessed on 30th June 2020).
IHE PCC DCP. (2020). IHE PCC Dynamic Care Planning Integration Profile, Release 3.1, Trial
Implementation. Available at: https://www.ihe.net/uploadedFiles/Documents/PCC/IHE_PCC_
Suppl_DCP.pdf (Accessed on 30th June 2020).
IHE Wiki. (2020). Available at: https://wiki.ihe.net/index.php/Main_Page (Accessed on 30th June
2020).
Kilintzis, V. et al. (2019). Supporting integrated care with a flexible data management framework
built upon Linked Data, HL7 FHIR and ontologies. Journal of Biomedical Informatics, 94.
Kim, S., & Deka, G. C. (2019). Advanced Applications of Blockchain Technology. Studies in Big
Data 60, Springer.
King, S., & Nadal, S. (2012). Ppcoin: Peer-to-peer crypto-currency with proof of stake, self-
published paper.
Kinsman, L., et al. (2010). What is a clinical pathway? Development of a definition to inform the
debate. BMC Med, 8, 31–33.
Kodner, D., & Spreeuwenberg, C. (2002). Integrated care: meaning, logic, applications, and
implications—a discussion paper. International Journal of Integrated Care, 2.
Kogias, E. et al. (2016). Enhancing bitcoin security and performance with strong consistency via
collective signing. In 25th Usenix security symposium (Usenix security 16) (pp. 279–296).
Kwon, J. (2014). Tendermint: Consensus without mining. Draft v. 0.6, fall, 1 (11).
Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions
on Programming Languages and Systems, 4(3), 382–401.
Micali, S., & Vaikuntanathan, V. (2017). Optimal and player-replaceable consensus with an honest
majority. MIT-CSAIL-TR-2017–004.
Miller, A. et al. (2016). The honey badger of BFT protocols. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security (pp. 31–42).
Nakamoto, S. (2008). Bitcoin: A Peer to Peer Electronic Cash System, self-published paper.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. Concurrency and Computation: Practice and Exercise, 31(3).
Namasudra, S. et al. (2020). The revolution of blockchain: State-of-the-art and research challenges.
Archives of Computational Methods in Engineering.
NCHIT. (2018). National Alliance for Health Information Technology, Defining Key Health
Information Technology Terms.
Panella, M., & Vanhaecht, K. (2010). Is there still need for confusion about pathways? International
Journal Care of Pathw, 14(1), 1–3.
Pease, M., Shostak, R., & Lamport, L. (1980). Reaching agreement in the presence of faults. Journal
of the ACM (JACM), 27(2), 228–234.
Richer, J., & Mandel, J. (2018). Harvard Medical School Department of Biomedical Informatics,
Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) OAuth
2.0 Scopes—openid-heart-fhir-oauth2.
Rinkeby. (2020). Rinkeby TestNet Explorer. Available at https://rinkeby.etherscan.io/ (Accessed on
30th June 2020).
66 M. Ciampi et al.
Mario Ciampi is technologist at CNR-ICAR. He received his M.Sc. degree in Computer Engi-
neering from the University of Naples “Federico II”, and a Master’s degree in European Master
on Critical Networked Systems and a Ph.D. degree in Information Engineering from the University
of Naples “Parthenope”. His topics of interests include e-health interoperability, software archi-
tectures and standards. He has held numerous leadership roles within international and national
research projects. He is member of the Technical-Strategic Committee of HL7 Italy and the
UNINFO Commission of Medical Informatics. He is Adjunct Professor of Computer Science at
the University of Naples “Federico II”.
Fabrizio Marangio is a research fellow at CNR-ICAR and a Ph.D. student at the University of
Naples “Parthenope”. He received his (MS) degree (cum laude) in 2018 in Telecommunications
Engineering from the University of Naples “Parthenope”. His research interests include e-Health
and Information security.
Mario Sicuranza received his BEng in Computer Engineering in 2006, MEng in 2011 from the
University of Naples ‘Federico II’, and a Ph.D. degree in Information Engineering on Cyber-
security for Health Information System in 2016. Currently, he is a technologist at CNR-ICAR.
His research interests include e-health, web services, and security architectures. Since 2017, he is
Adjunct Professor of Elements of Computer Science at the University of Naples “Federico II”.
2 Modernizing Healthcare by Using Blockchain 67
Giovanni Schmid received his MS degree (cum laude) in Mathematics and his Ph.D. in Applied
Mathematics and Computer Science from the University of Naples “Federico II”. Since 2012 he is
a Certified Information System Security Professional (CISSP), and currently he works as research
scientist at CNR-ICAR. His main research interests are Computer and Network Security, Cryp-
tography, Secure Programming, Distributed and Cloud Computing. Since 2012 he is member of
the technical-scientific board of CLUSIT (www.clusit.it), and member of the International Infor-
mation Systems Security Certification Consortium (www.isc2.org). He carries out teaching and
consulting activities both at universities and companies, in the fields of Secure Programming,
Information Security and Cryptography.
Chapter 3
Security, Privacy, Trust Management and
Performance Optimization of Blockchain
Technology
M. Swarnkar (B)
Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India
e-mail: [email protected]
R. S. Bhadoria
Computer Science and Engineering, Birla Institute of Applied Science, Bhimtal, India
e-mail: [email protected]
N. Sharma
Computer Science and Engineering, IPS College of Technology & Management, Gwalior, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 69
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_3
70 M. Swarnkar et al.
3.1 Introduction
In the past few years, internet has grown a lot leading to changes in various tech-
nologies worldwide. One such growing technology is Blockchain. As per the reports
of Statista (Statista, n.d.), worldwide market of Blockchain is 3.9 billion USD in
2020 and expecting to grow to 23.3 billion USD by 2023 A block chain is a temporal
series of unchangeable records of data stored in the computers belong to distributed
systems. The copy of data is stored in more than one computers and these comput-
ers communicate with each other securely using data encryption. Blockchain has
many applications but cryptocurrency Bitcoin is its most widely used application
(Yuan and Wang 2018). Bitcoin was invented in 2008 by Satoshi Nakamoto. He
made the source code open in 2009 for public use. Bitcoin is a digital and crypto-
graphic secured currency designed for secure online transaction. This technology
become popular among product based websites, investment startups etc from 2013.
Moreover, Blockchain gave a proper platform to Bitcoin for secure and trustable
transactions. However, Blockchain is also gaining popularity among applications
like Insurance, Healthcare, Smart Appliances, Passports, Online ID verification etc.
This growing popularity of Blockchain is luring hackers towards it for data stealing,
data corruption, Denial of Service attacks on Blockchain network, network breaches
etc. (Li et al. 2017). A vulnerable Blockchain system if applied to the sectors such
as Healthcare, document storage etc. which contains sensitive and confidential data,
it can be attacked by hackers for data stealing and selling it (Namasudra et al. 2020).
Moreover, integrity of data or transaction is still a problem in Blockchain system
(Otte et al. 2017; Anjum et al. 2017).
Therefore, it is important to design a secure Blockchain system to prevent it
from such attacks and vulnerabilities (Namasudra and Deka 2018). However, it is
known that increasing security in any interconnected system decreases its working
efficiency (Wu 1988; Acharya et al. 2006). The same also implements in Blockchain.
For example, if high number of security policies are implemented on Blockchain
system then each packet of inbound and outbound network traffic needs to be checked
with those implemented policies. This will increase the load of the interconnected
Blockchain system and sometimes become a performance bottleneck. Therefore, it
is also important to consider the performance optimization of secure Blockchain
system. This book chapter discuss the following points in detail:
1. Blockchain design from security perspective using hash pointers and Merkel tree.
2. Digital signature in Blockchain using Elliptical Curve Digital Signature Algo-
rithms.
3. Blockchain transaction models for privacy like UTXO model and Account based
model.
4. Cyber-attacks in Blockchain and its defense mechanisms
5. Privacy and trust management in Blockchain by mix-coin, signature anonymity
and privacy decentralization
6. Performance optimization of Blockchain by using methods like sharding, chain
optimization and system optimization.
3 Security, Privacy, Trust Management and Performance … 71
The rest of this book chapter is divided into following sections: Sect. 3.2 as
Literature Survey, Sect. 3.3 as Security in Blockchain, Sect. 3.4 as Privacy and Trust
Management in Blockchain, Sect. 3.5 as Performance optimization in Blockchain,
Sect. 3.6 as Case Study of Smart Home and conclude with Sect. 3.7 as Conclusion
and Future Research Directions.
In this section, we discuss the work done in Security, Privacy, Trust Management and
Performance Optimization of Blockchain Technology. Following are the subsections,
each describing the previous work done briefly.
Zyskind et al. (2015) implemented a protocol to automate the access control manager
of Blockchain system to avoid the trusted third party to increase the data and account
privacy. However in this method, a malicious user can do much more harm to the
Blockchain system as third party cannot verify the actions of users. Hawk which
is a method for privacy preservation of smart contracts was designed by Kosba
et al. (2016) which encrypts and store the financial transactions in intuitive manner.
72 M. Swarnkar et al.
This method also adds processing complexity in the Blockchain system because
of the implementation of additional cryptographic algorithm. Provchain by Liang
et al. (2017) which collect, store and verify the origin of the data for cloud based
data with very low overhead to cloud storage applications. However, the method
is limited to cloud computing only. Li et al. (2018) proposed CreditCoin which is
a Blockchain based vehicular announcement system for authentic announcements
in Vehicular Adhoc Network which also preserves the privacy of the announcer.
CreditCoin is temper resistant and traces malicious users identities in the Blockchain
system. However, the proposed method is tested in simulated environment only.
decentralized security model for electric vehicle and charging piles using lightning
network and smart contract in the Blockchain ecosystem. Li et al. (2018) devel-
oped a queuing theory of Blockchain systems using the matrix-geometric solution
and then evaluated the Blockchain system performance. Authors reported improved
performance of the system under few assumptions. Liu et al. (2019) proposed deep
reinforcement learning based performance optimization framework for Blockchain-
enabled Industrial IoT systems for improving scalability maintaining security and
latency of the system.
A secure Blockchain system is far away from simplicity in terms of real implemen-
tation. There are many features associated with Blockchain system which provide
security. However, two of the most important security features are consensus and
immutability. Consensus is the ability of the nodes or end devices within a dis-
tributed Blockchain system to agree on the true state of the Blockchain network and
on the transaction validity. Efficiency of Consensus depends on the implementation
of Consensus algorithms. Anomaly can introduce fake nodes or bots in the system
for data theft but strong consensus algorithm protects the Blockchain system from
such attacks. In other words, Consensus prevents any unwanted state the distributed
Blockchain. On the other hand, Immutability refers to the ability of the Blockchain
system to prevent any modification in the confirmed transactions. Immutability pre-
vents anomaliness such as fake transactions, genuine transaction alterations etc.
Blockchain system implements hash chain storage to maintain security features like
consensus, immutability etc. In the following subsections, we study the secure way
of storing and validating transactions in the distributed Blockchain system.
Hash chain means successive hashing of any message to improve authenticity of that
message. However in Blockchain, Hash chained storage consist of two elementary
building blocks which are Hash pointer and Merkle tree. Figure 3.1 shows Hash
chained storage in Blockchain.
It can be observed from Fig. 3.1 that both Hash pointer and Merkel tree is imple-
mented simultaneously for Hash chained storage in Blockchain. Hash pointer and
Merkel tree are explained in the following consecutive subsections.
Hash Pointer: It is basically a pointer that contains the address of a previous block
and the cryptographic hash of the information inside the previous block. The pointer
can be used to access the information stored in the predecessor block. Moreover, the
74 M. Swarnkar et al.
hash can be used to verify that information has not been tampered. A Blockchain
can be referred as a linked list that uses hash pointer to link data blocks together. A
simple implementation of Hash pointer is shown in Figure.
From Fig. 3.2, we can observe that Blockchain is a distributed ledger that can
record data between two parties in an efficient way. Each block contains data, hash,
and hash of previous block. Data stored inside the block depends on the type of
Blockchain. For example, Bitcoin Blockchain stores data as sender-id, receiver-id
and number of coins transferred in the transaction process. Second element is the
hash of the previous block which is always unique and can be called as fingerprint.
It identifies the block and all of its contents. Once the block is created, its hash is
being calculated. Any changes made inside the block will cause the hash to change.
Thus, it is useful to detect any change inside the block and thus used for validation.
Third element is the hash of the previous block. The hash of the first block is not
stored in any other block therefore called genesis block. When the data is changed in
any block the hash of the block is changed which will cause all the following blocks
invalid because it will no longer store the valid hash of the previous block. Thus, a
chain of blocks is created which keeps this technique secure.
Merkle Tree: It is named after Ralph Merkle, who patented the concept in 1979.
Merkle tree is a binary search tree where each non-leaf node is a hash of its respective
child nodes. A merkle tree is also shown in Fig. 3.3.
3 Security, Privacy, Trust Management and Performance … 75
Top Hash
(Hash-1 + Hash-2)
Hash-0 Hash-1
(Hash-00 + Hash-01) (Hash-10 + Hash-11)
L1 L2 Data Blocks L3 L4
We can see in Fig. 3.3 that the leaf nodes are present at the lowest level in the
tree which are data blocks in Blockchain. Merkle tree is a significant data structure
for building a Blockchain where nodes are connected to each other by using hash
pointers. In this tree disjoint groups are formed by grouping two nodes present at
the lower lever into one at the parent level and for each pair of lower level nodes,
hash value is calculated and stored in a new data node created at an upper level. This
process is repeated until reaching the root node of the tree. Merkle tree has three
salient features which are as follows:
• Tamper evident: In a Merkle tree, only hash pointer of the root node is memorized
which makes it temper evident as one change disturbs whole Merkel tree.
• Traversal efficiency: In a Merkel tree, one data block can be verified by only
traversing the path to that node because of unique hash values of child nodes.
The complexity of traversal in the Merkle tree is O(log(n)) which is much more
efficient compared with O(n) of a linked list like Blockchain.
• Non-Membership proof : This property means that there is no space left between
the nodes if they are present in the sorted order in the tree.
A digital signature is a technique that can verify that the data is received from
the authentic source and is remained unaltered in the transmission channel. There
are two important properties of a digital signature: Verifiability and Unforgeability.
Verifiability means the data obtained at receiver end can be verified using digital
signature and Unforgeability means digital signature cannot be forged as per forged
data by an anomaly. Digital signature has three core components: key generation
algorithm, signing algorithm, verification algorithm. The key generation algorithm
creates a public key and a private key. A key that is made available to the public
76 M. Swarnkar et al.
is known as the public key and the key that is used to sign the messages is known
as the private key. The signing algorithm is used to produce a signature on the
input message by using the private key. The verification algorithm takes signature,
message, and a public key as inputs and returns a Boolean value by validating the
message’s signature with a public key. The digital signature can close deals between
the two parties within a few minutes by right-clicking the document, sign digitally
using their secure pin code, and then send it off by email. This process is completely
paperless and in the European Union, a digital signature is just as valid as one made
with ink. Digital signature benefits everyone from common citizens and enterprises
to the governments. It raises productivity, efficiency, and reduces our impact on the
environment.
Blockchain uses Elliptic Curve Digital Signature Algorithm (ECDSA) for for
storing, processing, and securing encrypted data and digital transactions. EC DS A
is a modified elliptical curve cryptography algorithm proposed in 2001 (Johnson et al.
2001). ECDSA is a digital signature algorithm which also works in three steps: Key
Generation Algorithm, Signing Algorithm and Signature Verification Algorithm. All
three algorithms are shown in Algorithm 1, Algorithm 2 and Algorithm 3 respectively.
The parameters used in all the algorithms are abbreviated in Table 3.1.
3.3.3 Consensus
• Proof of Stake: In this system, the creator of a new block also known as the validator
is randomly chosen based on the number of stakes they commit to the network. The
78 M. Swarnkar et al.
A good consensus mechanism has two important properties: persistent and liveli-
ness. Persistence ensures the consistent response from the system about the state of
a transaction. Liveliness states that all nodes agree on a decision or a value.
3.3.4 Consistency
Consistency refers to the property that says all nodes have the same ledger at the
same time. Some people argue that eventual consistency is provided by the bitcoins
(Wattenhofer 2016) while other argue that bitcoins guarantee strong consistency
(Sirer 2016). Comparison between eventual consistency and strong consistency is
shown in Table 3.2.
It refers to the resistance to an entity by the users or the adversaries. Entity can
be a system, product or physical/logical object. In context of Blockchain, tamper-
resistance means that any transaction cannot be harmed or tampered during and after
the generation of a block. In bitcoin system, new blocks are generated by mining
nodes. Information can be tampered in following two ways:
Blockchain is also known as distributed ledger that is created and maintained for
online transactions. However, maintaining privacy of end users, stored data and
transaction is a challenging task in distributed environment. To handle privacy in
distributed Blockchain systems, there are two transaction models for privacy: The
Unspent Transaction Outputs (UTXO) model and the Account Based Online Transac-
tion (ABOT) Model. Both models are explained in the following subsections respec-
tively.
UTXO model was initially introduced by Bitcoin (Bitcoin). This model resembles
the bank’s account record-keeping system, owner of accounts, and account balances.
UTXOs are processed continuously and are responsible for beginning and ending of
each transaction. Unspent transaction output is a result of a transaction that the user
receives and spends in the future. Every UTXO can only be spent once; meaning it
cannot be used again in the future. Working of UTXO model is shown in Fig. 3.4.
Validation of each transaction is important in terms of privacy and Security. In
UTXO, each transaction can be validated if it meets following three constraints:
Unconfirmed Broadcast
Ti
User A Transaction Pool Blockchain
Confirmed Network
(T1, T2, T3 ... Tn) Block
Yes No
Block Validation Remove the Block
Block Block Block Block (Consensus) and Report
Add Block
to Blockchain
• Every referenced input in the transaction must be signed by its owner and not yet
spent.
• If the transaction has multiple inputs, then each input must have a signature match-
ing the owner of the input.
• A transaction is legal if the total value of its inputs equals or exceeds the total value
of its outputs.
The benefits of implementing UTXO model in Blockchain system are:
T1
T2 Reciever-1
Sender-1 T3 Reciever-2
Tn
Transaction Chain
After the validation of a transaction, token value is debited from the sending
account and the value is credited to the receiving account. Thus, in Ethereum system,
user’s account balance refers to the sum of the ETH coins for which the user has
a private key for producing a valid signature. The benefits of Account based online
Transaction model are:
• Simplicity: Account/Balance model does not force transactions to include states
thus making the design of the model simple.
• Efficiency: Account/Balance model is efficient because each transaction only needs
to validate that the sending account has enough balance for the payment in a
transaction.
Blockchain system means Blocks in Chains attached to each other. Its design only
make it very secure as compared to other data storage systems. If an anomaly wants to
make a change in one node or try to compromise one block, it has to make changes to
its consecutive nodes. However this requires a lot of computational power to break
such encryption is small amount of time. Even if the anomaly makes successful
change in the Block, the Block synchronization of Blockchain reveals the compro-
mised blocks. Nevertheless their are many motivated hackers in the world who can
damage the distributed Blockchain system in various other ways. In the following
subsections, few attacks are discussed which are effecting the security of Blockchain.
Denial of service attack is performed on the host. In DOS attack, host machine and
its network resources are made unavailable to the intended recipients by disrupt-
ing the hosted Internet services. DDoS attack refers to “distributed” DOS attack.
DDoS attack uses multiple end machines as bots to disrupt the service or empty the
resources of the targeted server. Bitcoin exchange servers in the BitCoin Blockchain
system are the main targets of the attackers for DDoS attacks. As per the report of
cloudflare, one popular coin exchange service has been flagged for 76 application
layer DDoS attacks over about a year. However, there are various defense mechanism
available to detect DDoS attacks in applied distributed Blockchain system (Mirkin
et al. 2019).The fully decentralized mechanism of the Blockchain system and the
consensus protocol mechanism effectively ensure the working of Blockchain would
prevent the Blockchain system from DDoS attacks. Moreover, exchange servers are
installed with powerful Intrusion Detection Systems.
82 M. Swarnkar et al.
Double-spending attack refers to the spending of a coin more than once. In other
words, it is an ability to use same Bitcoin for multiple transactions by an attacker.
However, this attack is not possible if the attacker has massive computing power. To
overcome such issues, attackers used to combine double spending with other attack
like Sybil attack to make significant harm to the Bitcoin system (Zhang and Lee
2019). Such type of attacks poses major challenge in trading digital currency in a
decentralized network. However. there are few solutions provided by the researched
community to prevent double spending in distributed Blockchain systems. Double-
spending attack can be prevented by evaluating and verifying the authenticity of each
transaction using transaction logs in a Blockchain with a consensus protocol. Each
transaction is publicly verified with a consensus protocol before adding the block
into the global Blockchain. Additionally, each transaction is signed by its sender
using a secure digital signature algorithm.
Majority Consensus attack is also known as 51% attack. Presence of cheating risks
in the majority consensus protocol gives rise to the 51% attack. This attack is caused
by the group of miners controlling more than 50% of the Blockchain network’s
computing power. If attackers control the majority of the computing power on the
Blockchain network, an attacker or group of attackers can interfere with the process
of recording new blocks. Thus, attackers can prevent other genuine miners from
completing blocks and allowing attackers to monopolize the mining of new blocks
and earn all of the rewards every-time. There were multiple instances of 51% attack in
the world. Krypton and Shift which are two Blockchain based on Ethereum, suffered
51% attacks in August 2016. Similarly in May 2018, Bitcoin Gold which was the
26th-largest cryptocurrency at that time, suffered a 51% attack. These attacks can be
prevented by strong end user monitoring and surveillance systems.
3.5.4 Pseudonymity
Secure sharing and storage of trust information are important for maintaining con-
fidentiality and integrity in the Blockchain systems. Privacy leakage leads to trust
issues in Blockchain system. Identity integrity makes applied Blockchain system
trustworthy for its users. There are few techniques discussed in this chapter to main-
tain privacy and build trust in Blockchain systems. These techniques are discussed
in the following subsections.
3.6.1 Mixing
Mixing is the process of hiding the linkages between the input and output of individual
transactions by combining (mixing) with inputs and outputs of other transactions.
There are two popular methods for Mixing which are as follows:
• MixCoin: It is a bitcoin mixing protocol that was proposed for providing transaction
accountability. It allows users to send their transactions to trusted third party who
act as mixing peers and then receive back the same amount of the transactions
submitted by other users. This is done to provide anonymity to bitcoin transactions.
Trusted third party uses mixing server simply called as mix. Later, the mix decrypts
the new addresses, randomly shuffles them, and sends the funds back to each
participant. MixCoin also provides signed warranties to participants as a recovery
in case of error by the Third party. MixCoin can also provide anonymity to external
participants. The major disadvantage of this approach is that the participants deal
with a third party and have to trust the mix.
• CoinJoin: It solves the drawback of MixCoin by involving the combination of
inputs by multiple users into a single transaction for protecting the privacy of bit-
coin users when they conduct transactions with each other. It provides anonymity
by using multi-signature transactions. Multi-signature requires the involvement of
more than one party in the transaction. In CoinJoin, the participants mix their joins
by generating one single mixed transaction. The transaction with multiple inputs
is considered valid only if has been signed with all the keys related to the input
addresses. Hence, the generated mix is verified by each user and refuses to sign
the transaction to stop the exchange. CoinJoin provides external unlinkability. It
is a process in which no external party can determine which input corresponds to
which user. In this way, ownership of Bitcoins is hidden from external parties by
84 M. Swarnkar et al.
joining them with others in a single mixed transaction. The disadvantage of Coin-
Join is that one of the involved parties can learn the process of linking transactions
between inputs and outputs.
Anonymous digital signatures are required because basic digital signature does not
provide signer anonymity or unlinkability. Anonymous digital signature retains the
public verifiability. Two of the popular method for anonymous digital signature are
Group signature and Ring signature which are discussed below:
• Group Signature: It was introduced by Chaum and van Heyst in 1991. In this
signature, there exists a group manager who is responsible for handling registration
of group members and providing each group member with a group certificate (or
a group signing key). Each member of the group can sign anonymously on behalf
of the whole group. Meanwhile, the group manager can identify the real signer of
a valid group signature.
• Ring Signature: It was introduced by by Rivest, Shamir and Tauman in 2001. In
this signature, there is no involvement of a ring manager and thus, each user has a
complete freedom in selecting other ring members. Similar to group signature, a
ring signature allows a ring member to sign anonymously on behalf of other ring
users. Moreover, no one is able to revoke the anonymity of a ring signature.
Encryption that allows one to perform calculations on the encrypted data without
decrypting it first is called Homomorphic encryption. Applications of Homomorphic
encryption are healthcare, smart grids, education, and machine learning as a service
(MLASS). Figure 3.6 shows MLaaS Application of Homomorphic Encryption.
Encrypted
Public Key
Result
• Inference is performed on the encrypted data thus; model can never see the private
data of the client. Therefore, data is not misused or leaked.
• There is no requirement of any interaction between the client and the model owner
for performing any computation.
However thee are two disadvantages also of Homomorphic encryption which are
as follows:
There is a rapid increase in reported incidents of security breaches that have compro-
mised the user’s privacy. The decentralization mechanism of Blockchain eliminates
the need for a central authority, thus increasing the user’s privacy. Data privacy can
be reshaped by the following measures:
Blockchain has refueled a growing generation of ideas that has allowed individ-
uals to take their privacy back with the help of decentralization. The decentralized
mechanism of Blockchain addresses several challenges that are faced by centralized
models. Three major challenges are as follows:
• Prevents replicated identities through data verification by all the network users and
through time stamping of transaction records
• Prevents data tampering through hashing algorithms
• Prevents data processing manipulation with a majority consensus achieved through
several mechanisms (proof of work, proof of stake, etc.)
86 M. Swarnkar et al.
3.7.1 Sharding
Sharding is a database architecture pattern that divides a large piece of data into
smaller data pieces that are faster and easier to manage. These broken pieces are
later placed on different servers for improving performance and availability. In the
Blockchain, block is fragmented and each node only needs to verify the transaction
in its own shard. There is no need of verifying the transaction outside the shard.
Thus, the transactions can be performed in a parallel fashion with the other nodes
on the network. Parallel mechanism completes the verification task in a faster way,
reduces redundancy calculation performed by the nodes, improves the transaction
speed of the public chain, and minimizes the transaction cost. There are three main-
stream sharding strategies: network sharding, transaction sharding, and state shard-
ing. Creating shards and preventing them from the attackers are crucial tasks for the
developers. Embedment of randomness in the Blockchain structure can prevent the
overfilling of individual fragments by attackers. The key feature of sharding is the
separation of entire storage for accommodating different parts on different shards.
Thus, each node is only responsible to maintain its own fragmented data rather
than storing entire Blockchain structure. In the case of account handing between
two different shards, frequent cross-fragmentation and state change phenomena are
required. Cross-fragmentation does not allow performance gains for state sharding.
This problem requires further studies. Another problem faced in state sharding is
data availability. The solution to this problem is the maintenance of backup by the
node which can help to system to repair and recover data that are not available.
There are various challenges that are faced by sharding such as creation of shards,
assigning shards to the nodes, determining the size of each shard, implementation
of cross-shard trading, high costs, affect on the throughputs and profits of the entire
network, etc. The first project that implemented fragmentation technology using net-
work sharding and consensus mechanism is Zilliqa (Zilliqa, n.d.). It has used 1400
nodes and 6 shards in the test and got a throughput of 2800 TPS.
3 Security, Privacy, Trust Management and Performance … 87
Directed Acyclic Graph is the second method to design Blockchain systems. DAG
was proposed by Nxt community to store blocks and solving the problem of
Blockchain efficiency. In DAG, performance can be greatly improved by doing the
transaction packaging on different branch chains in a parallel fashion. The concept
of DAG-chain was first proposed in the year 2005 and in the same year DAG network
was upgraded from the block packaging dimension to the transaction-based level.
DAG-chain skips the stage of packing the block and directly broadcasts the trans-
action to the whole network. Thus, efficiency is theoretically improved. Table 3.3
shows the comparison between DAG-based Blockchain and traditional Blockchain.
In DAG, verification of the previous transactions is done by the latter transaction.
This verification method allows the DAG to write transactions asynchronously and
concurrently. This finally forms a topology tree structure and thereby improving
scalability.
New consensus protocols can be adopted to improve efficiency and scalability. The
mining process used in the Proof-of-Work (POW) wastes a large number of resources
and consumes time to reach consensus. These delays are not suitable for commercial
applications. Proof-of-Stake (POS) consensus is an upgrade to POW. The difficulty
of the mining process is reduced in POS consensus by managing the proportion and
time of each node. This shortens the time required to reach the consensus but the
involvement of the mining process still creates problems for commercial applications.
Delegated Proof-of-Stake is another improved version of POS that works on the
concept of voting elections. In DPOS several nodes are selected as representatives to
operate the network and professional network servers are used to ensure security and
performance of the Blockchain network. PBFT Byzantine fault-tolerant algorithm
claims for high performance and good security but the degree of decentralization is
88 M. Swarnkar et al.
weak, fault-tolerance is low, and the node system is closed. Another protocol known
as Ripple consensus protocol that improves speed and scalability works in two stages:
• The first stage involves the scenario of reaching the consensus in the transaction
set.
• The second stage involves the proposal of newly generated blocks and finally
forming the consensual block.
Ripple results in weak security and a centralized structure. Ripple itself controls
a large part of accounting nodes. From all the above consensus protocols, it can be
concluded that extending the protocols might cause some improvements in the perfor-
mance of the network but weakens the degree of network decentralization. Therefore,
the best consensus mechanism can be designed by considering local conditions for
fostering the best results in the future.
Plasma Contract
(Decentralized Exchange)
Plasma Contract
(Micropayments)
3.7.5 On Chain
There are some significant ways that are introduced to improve the scalability of
Blockchain networks through on-chain which are as follows:
• Multiple Blocks per Leader: In this approach, multiple blocks are appended to the
Blockchain until another leader is elected. Bitcoin-NG is based on the same trust
model, but breaks bitcoin’s Blockchain operation into leader and transaction seri-
alization for performance improvement. Leader election is performed randomly
and infrequently via proof-of-work. In bitcoin, leader can propose to append only
one block to the Blockchain whereas in Bitcoin-NG time is divided into multiple
epochs and a leader can unilaterally append multiple transactions to the Blockchain
for the duration of its epoch which ends when a new leader is elected.
• Collective Leaders: Many systems employ multiple leaders to collectively and
quickly decide whether the block should be added to the Blockchain or not. This
unanimous decision gives a strong reason to a client about the placement of a
block on the chain. Byzcoin replaces the probabilistic transaction consistency of
a bitcoin with strong consistency thus, improving transaction latency of bitcoin.
90 M. Swarnkar et al.
• Parallel Blockchain Extension: Here, different parts of the Blockchain are grown in
a parallel fashion. This work is accomplished by multiple leaders. Bitcoin performs
a linear process for growing blockchains. A problem is given to the miners, one
who finds the solution adds the bloc to the chain. Boyen et al. (2016) introduced a
framework that parallelizes this process by abandoning the concepts of “blocks”
and “chains” and introduced the concept of cross-validation of transaction. Each
transaction confirms two transactions (its parents) and contains some payload (for
example, cryptocurrency) and proof of work.
3.8 Conclusion
In this chapter, an overview about various security, privacy, trust and optimization
issues on distributed Blockchain system is described. Moreover, this chapter also
described few of the effective solutions given by researchers to resolve each kind of
problem. Blockchain is an interesting modern technology which will grow further in
the near future. Because of its growing popularity and adaptability, applications of
Blockchain will increase and so the issues which are discussed in this chapter. This
will surely give real challenges to Security and Blockchain related researchers in the
coming future.
3 Security, Privacy, Trust Management and Performance … 91
References
Acharya, S., Wang, J., Ge, Z., Znati, T. F., & Greenberg, A. (2006). Traffic aware firewall optimiza-
tion strategies. In Proceedings of the 12th IEEE International Conference on Communications
(ICC’06) (pp. 2225–2230).
Anjum, A., Sporny, M., & Sill, A. (2017). Blockchain standards for compliance and trust. Cloud
Computing, 4, 84–90.
Boyen, X., Carr, C., & Haines, T. (2016). Blockchain-free cryptocurrencies: A framework for truly
decentralised fast transactions. Cryptology, 1, 1–13.
Fischer, M. J., Lynch, N. A., & Paterson, M. S. (1985). Impossibility of distributed consensus with
one faulty process. Journal of the ACM, 32, 374–382.
Fournaris, A. P., Dimopoulos, C., Moschos, A., & Koufopavlou, O. (2019). Design and leakage
assessment of side channel attack resistant binary edwards elliptic curve digital signature algo-
rithm Architectures. Microprocessors and Microsystems, 64, 73–87.
García-Bañuelos, L., Ponomarev, A., Dumas, M., & Weber, I. (2017). Optimized execution of
business processes on blockchain. In Proceedings to the 1st International Conference on Business
Process Management (BPM’17) (pp. 130–146).
Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer
network. In Proceedings to the 24th USENIX Security Symposium (USENIX’15) (pp. 129–144).
Huang, X., Xu, C., Wang, P., & Liu, H. (2018). LNSC: A security model for electric vehicle and
charging pile management based on blockchain ecosystem. IEEE Access, 6, 13565–13574.
Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm
(ECDSA). International Journal of Information Security, 1, 36–63.
Kochovski, P., Gec, S., Stankovski, V., Bajec, M., & Drobintsev, P. D. (2019). Trust management
in a blockchain based fog computing platform with trustless smart oracles. Future Generation
Computer Systems, 101, 747–759.
Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of
cryptography and privacy-preserving smart contracts. In Proceedings of the 37th IEEE Security
and Privacy Workshops (S&P’16) (pp. 839–858).
Li, Q.-L., Ma, J.-Y., & Chang, Y.-X. (2018). Blockchain queue theory. In Proceedings of the 7th
International Conference on Computational Social Networks (pp. 25–40).
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., & Njilla, L. (2017). Provchain: A
blockchain-based data provenance architecture in cloud environment with enhanced privacy and
availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud
and Grid Computing (CCGRID’17) (pp. 468–477).
Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain
systems. Future Generation Computer Systems, 107, 841–853.
Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., et al. (2018). Creditcoin: A privacy preserving
blockchain-based incentive announcement network for communications of smart vehicles. IEEE
Transactions on Intelligent Transportation Systems, 19, 2204–2220.
Liu, M., Yu, F. R., Teng, Y., Leung, V. C., & Song, M. (2019). Performance optimization for
blockchain-enabled industrial internet of things (IIoT) systems: A deep reinforcement learning
approach. IEEE Transactions on Industrial Informatics, 15, 3559–3570.
Luu, L., Chu, D.-H., Olickel, H., Saxena, P., & Hobor, A. (2016). Making smart contracts smarter.
In Proceedings of the 21st ACM International Conference on Special Interest Group on Security,
Audit and Control (SIGSAC’16) (pp. 254–269).
Malik, S., Dedeoglu, V., Kanhere, S. S., & Jurdak, R. (2019). TrustChain: Trust management in
blockchain and IoT supported supply chains. In Proceedings of the 2nd IEEE International
Conference on Blockchain (ICBC’19) (pp. 184–193).
Mehibel, N., & Hamadouche, M. (2020). A new enhancement of elliptic curve digital signature
algorithm. Journal of Discrete Mathematical Sciences and Cryptography, 23, 743–757.
Mirkin, M., Ji, Y., Pang, J., Klages-Mundt, A., Eyal, I., & Jules, A. (2019). BDoS: Blockchain
denial of service. arXiv:1912.07497 .
92 M. Swarnkar et al.
Moubarak, J., Chamoun, M., & Filiol, E. (2018). Developing a K-Ary malware using blockchain.
In Proceedings of the 13th IEEE/IFIP Network Operations and Management Symposium
(NOMS’18) (pp. 1–4).
Namasudra, S., & Deka, G. (2018). Taxonomy of DNA-based security models. In Advances of dna
computing in cryptography (pp. 37–52).
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020). The revolution
of blockchain: State of the art and research challenges. Archives of Computational Methods in
Engineering.
Otte, P., de Vos, M., & Pouwelse, J. (2017). TrustChain: A sybil-resistant scalable blockchain.
Future Generation Computer Systems, 107, 770–780.
Pinzón, C., & Rocha, C. (2016). Double-spend attack models with time advantange for bitcoin.
Electronic Notes in Theoretical Computer Science, 329, 79–103.
Pletinckx, S., Trap, C., & Doerr, C. (2018). Malware coordination using the blockchain: An anal-
ysis of the cerber ransomware. In Proceedings of the 6th IEEE International Conference on
Communications and Network Security (CNS’18) (pp. 1–9).
Sirer, E. (2016). Bitcoin guarantees strong, not eventual consistency. Distributed: Hacking.
Statista. (n.d.). (https://www.statista.com/statistics/647231/worldwideblockchain-technology-
market-size)
Thakkar, P., Nathan, S., & Viswanathan, B. (2018). Performance benchmarking and optimizing
hyperledger fabric blockchain platform. In Proceedings of the 26th IEEE International Sym-
posium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
(Mascots) (pp. 264–276).
Wattenhofer, R. (2016). The cience of the blockchain. CreateSpace Independent Publishing Platform.
Wu, F. (1988). Real-time network security monitoring, assessment and optimization. International
Journal of Electrical Power & Energy Systems, 10, 83–100.
Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. (2018). Blockchain-based decentralized trust
management in vehicular networks. IEEE Internet of Things Journal, 6, 1495–1505.
Yuan, Y., & Wang, F.-Y. (2018). Blockchain and cryptocurrencies: Model, techniques, and applica-
tions. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48, 1421–1428.
Zhang, S., & Lee, J.-H. (2019). Double-spending with a sybil attack in the bitcoin decentralized
network. IEEE Transactions on Industrial Informatics, 15, 5715–5722.
Zilliqa. (n.d.). (https://www.zilliqa.com/)
Zyskind, G., Nathan, O., et al. (2015). Decentralizing privacy: Using blockchain to protect personal
data. In Proceedings of the 36th IEEE Security and Privacy Workshops (S&P’15) (pp. 180–184).
Chapter 4
Securing Healthcare Data by Using
Blockchain
M. Gupta (B)
Department of CSE, Chandigarh University, Punjab, India
e-mail: [email protected]
R. Jain · G. Narula
Department of CSE, Bharati Vidyapeeth’s College of Engineering, Delhi, India
e-mail: [email protected]
G. Narula
e-mail: [email protected]
M. Kumari
Department of ECE, Chandigarh University, Punjab, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 93
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_4
94 M. Gupta et al.
4.1 Introduction
provides complete confidentiality as the records are not stored on the blockchain,
instead of pointing only in this blockchain to the data storage locations, logs, and
permissions. Gem has introduced Gem Health Network using Ethereum blockchain,
in collaboration with Philips Blockchain Lab. This structure is developed to address
operating costs (Shen et al. 2019).
This shared infrastructure offers interoperability between various organizations
that access the same information to improve patient care better. Healthcare platform
Guardtime provides an intermediate partnership between patients and providers in
Estonia. Guardtime blockchain allowed open patient, provider, and payer information
sharing promising secure, accurate, and auditable records. Research organizations
demand the health data of patients. In this sense, the Healthbank has provided patients
with a forum for preserving and exchanging their health data with research organi-
zations that can be used for clinical research and pharmaceuticals. The platform also
supports patients with financial incentives for their blockchain-based data sharing
(BBDS) access control program optimized for their contributions using authoriza-
tion blockchain. Data owners can use a shared data pool to access their EMRs
(Khatoon 2020). This safe and scalable framework recognizes, authenticates, and
authorizes users to use cryptographic keys and digital signatures that gain an advan-
tage over Healthcare Data Gateways (HDG), a mobile application developed over
the blockchain cloud. Quick Healthcare Interoperability Resources: FHIR chain was
developed by the clinical data exchange organization Health Level Seven Interna-
tional (HL7). FHIR is improving performance and interoperability (Khatoon et al.
2019).
The existing systems have certain flaws in its management and security making
it prone to security attacks and making confidential patient data at a very high risk.
Keeping this in mind, authors try to resolve this issue by introducing the concept
of blockchain and smart contract system which uses encryption and decentralized
nodes in its process to provide security. Authors try to develop a system which is
user friendly but also provides high security with public-key encryption to overcome
the existing security flows in the existing systems.
This book chapter focuses on the concepts of decentralization that can be applied
to large-scale data processing using blockchain technology. It can be applied to
large-scale data processing in the medical sector and to streamline tough medical
procedures. The authors demonstrate an innovative approach to the handling of
medical records, giving auditability, interoperability, and accessibility through smart
contracts. In this chapter, a smart contract healthcare system for managing health-
care data and complex streamlining medical procedures has been presented. In the
field of healthcare, authors addressed the state-of-the-art blockchain work and intro-
duced an ethereum cantered solution for healthcare management. The older health-
care system pooled money collectively in the area of medicine and rehabilitation,
which was not consistent with the external network. One of the most important
problems is the exchange of data between different entities requesting data from
healthcare providers such as physicians. This new healthcare system model uses
smart blockchain contracts (Schöner et al. 2017).
96 M. Gupta et al.
The chapter includes every aspect of healthcare facilities. Firstly, smart contracts
are discussed and how they can be used in healthcare management, its benefits over
existing systems. Then, authors proposed a system using Ethereum’s smart contracts
and included medical prescriptions, laboratory data and results, reimbursement,
clinical trials, and various other necessary facilities in the healthcare chain.
4.2 Background
Legacy programs usually only exchange healthcare and medical services internally,
and they are not completely compliant with systems externally. Nonetheless, evidence
shows various benefits from hybridizing these networks for connected internally and
improved medical, calling for interconnections for health informatics researchers
between different organizations (Dennis and Owen 2015). One of the most important
problems is the multi-organizational data sharing that allows other organizations,
like a research or physician center, to have ready access to medical data collected
by a healthcare provider (Mougayar 2020). Blockchain technology redefines data
processing and governance in many healthcare implementations. This is due to its
unparalleled and adaptability segmentation, safe storage, and exchange of healthcare
data. Blockchain technology is at the forefront of dozens of other emerging trends
in the healthcare industry, as shown in Fig. 4.1.
With advances in health-related electronic technology, patient data, cloud data
storage data and security laws, new chances for medical data management and conve-
nience for patients to access and exchange their medical data are opening up (Siyal
et al. 2019). Ensuring data privacy, storing, managing and transactions for their
walk into any hospital in the world for treatment, and if they produce their private
key, the hospital would have access to their information in a heartbeat.
3. Telemedicine
Telemedicine is a medical field that is growing by the day. It allows physicians
and doctors to reach their patients through the use of electronic devices, such
as mobile phones and other IoT devices. It is primarily used for providing care
for the terminally ill. Telemedicine allows doctors to take care of prescription
compliance and collate real-time data measurements of their patients’ conditions.
These modern advancements are helping to increase interoperability and reduce
admin inefficiency while enhancing patient outcomes. However, telemedicine
has downsides as the mechanisms involved are a large target for hackers. If smart
contracts are used, the safety and privacy of a patient’s information and other
important clinical data can be ensured. Smart contracts can be implemented on
a large scale and stored on the blockchain to share and protect the data. They
can also help to maintain data and ensure patients’ private information is stored
securely and in a transparent manner.
Smart contracts combined with blockchain technology represent the future of
healthcare and medicine. They embrace high-level encryption and security that allows
users, patients, and doctors to have trust that their information is safe and attack-proof.
Byzantine fault-tolerant algorithms allowed smart contracts to shape digital
protection through decentralization. Additionally, the programming languages with
varying degrees of Turing-completeness as an integrated function of some blockchain
make it possible to construct custom sophisticated logic (Khezr et al. 2019). Figure 4.3
shows the workflow with smart controlled access in a system.
The Hyperledger Global Forum is the most important annual platform for businesses
implementing blockchain technology in the consortium. At the annual Hyperledger
Forum, hundreds of blockchain enthusiasts come together to share their use cases and
the latest advances in enterprise blockchain technologies (Bell et al. 2017). During
the conference, a paper was presented on the ten critical issues and requirements to be
considered using the Hyperledger Fabric-based Oracle Blockchain Platform (OBP)
based on numerous business blockchain implementation projects. These ventures
span the spectrum of sectors, including financial services, supply chain, healthcare,
and government, and spectrum from custom innovations funded by the Oracle tech-
nology team to ISV technology and SI-led ventures. Those critical issues are as
follows (Kenry and Lim 2016):
• Using SQL for rich smart contract queries
• Save/recover data
• Checkpoint database and pruning/archiving
• Byzantine consensus tolerant of fault
• Governing
• Achievement
• Privacy & privacy protection
• Supporting the internetwork
• Crypto implementations pluggable
• Capacity audit.
Although the original public blockchain relies on a self-sovereign style of
management with complete decentralization and rules governed by consensus algo-
rithms, permitted blockchain is structured differently (Xu et al. 2020). Throughout
the enterprise-permitted blockchain used in private or consortium implementa-
tions, participating companies are mostly concerned with effectively and resiliently
managing their nodes and, at the same time, operating as part of a cross-company
blockchain network (Saberi et al. 2019).
This requires a secure and flexible model of governance and on-chain collab-
orative mechanisms to address the many operational issues at different layers of
the blockchain network—from interoperable connections to storage management,
membership management, chain code distribution, etc. When organizations set up
their blockchain networks, they need to pay special attention to and develop their
networks with a view on many issues (Nir Kshetri 2019). Figure 4.4 shows the
healthcare system using blockchain.
4 Securing Healthcare Data by Using Blockchain 101
been used to disclose smart Blockchain contracts. Figure 4.4 shows the function of
Ethereum with smart contracts, where for simplification, the mining process is ruled
out. This smart contract is compiled into machine-level bytecode, where each byte
represents an operation and then added as an EVM-1 transaction to the blockchain.
A miner picks it up and confirms Block-1. When a user passes the request through
the Web interface, the EVM-2 queries embeds the Web-based data into Transaction
tx and deploys it to the blockchain. In Block-2, the transaction tx status is changed.
If node 3 decides to test the states stored in the contract, it will need to synchronize
up to at least Block-2 later to observe the changes that tx makes (Crosby et al. 2020).
Authors propose a model that uses Ethereum’s smart contracts to construct smart
representations of existing medical records that are stored within individual nodes
on the network. Main focus is building contracts to include metadata, permissions,
and data validity of record ownership. Blockchain transactions of our network hold
cryptographically signed instructions to handle certain properties. State-transition
contract functions execute laws, only through legal transactions that implement data
alteration (Pournader et al. 2019). Such regulations can be designed to implement
any set of rules that govern a specific medical record as long as it can be expressed in
computational form. Such as, a policy can involve the sending of different consent
transactions from both healthcare and patients providers before granting permission
to a third party to access. So, a framework is developed for complex healthcare
workflows that are based on blockchain smart contracts. In the healthcare envi-
ronment, smart contracts were built for specific medical workflows, and then, data
access permission was handled between various entities. A smart stored contract
on blockchain technology could be built, where all the necessary conditions from
handling various permissions to accessing data, as shown in Fig. 4.5. It can be
seen that a variety of stakeholders are interested in this scheme performing distinct
activities. It would help to create stronger physician-patient experiences. The rules
regulating data authorization are integrated into smart contracts (Saberi et al. 2018).
This can also help monitor all actions from their origin to their surrender, with
unique Id. Distinct scenarios have been explained and designed alongside all the
processes embedded, and functions in the smart contracts are well described. There
will be no need for a centralized body to oversee and authorize the project because
it can be handled directly through the smart contract that will greatly reduce the
management process administration costs. To ensure consistency and economic
viability, all healthcare record data is stored in local database storage, and the hash of
data is the data part of the blockchain block joined to the chain (Chang et al. 2019).
The proposed model uses Aadhar card verification combined with smart contracts
in Ethereum blockchain for verification of one’s identity. This identity verification
helps doctors to access the medical history of patients along with any current medi-
cations or treatments ongoing. The Aadhar data transactions are private keys (patient
4 Securing Healthcare Data by Using Blockchain 103
Fig. 4.5 Integrated framework of healthcare system with the existing system
104 M. Gupta et al.
or physician) signed by the owner. The network’s block content reflects data owner-
ship and viewing authorization exchanged by various members of a private peer-to-
peer network. Thus, blockchain technology helps the utilization of smart contracts
that allow automating and monitoring particular state transitions. On an Ethereum
blockchain, one logs patient–provider relationships through smart contracts using
Aadhar card that joins a healthcare record with viewing data retrieval. Permissions
instructions (essentially information pointers) for external server execution to ensure
against manipulation provide a cryptographic hash of the medical record on the
blockchain to ensure data integrity (Pandey and Litoriya 2020). Figure 4.5 shows an
integrated framework for the healthcare system with the existing system.
Providers may attach a new record associated with a specific patient, and patients
can require the sharing of records between providers. In both cases, the party receiving
new information receives an automatic notification and may check the proposed
record before approving or rejecting the data. That keeps the participants updated
and involved in the evolution of their data and helps them decide and give control of
data. This system prioritizes usability by also offering a designated contract based
on Aadhar verification that aggregates references to all a user’s patient–provider
relationships, thus providing a single reference point for checking for any updates
in healthcare history. Also, it uses a public-key cryptography to handle identity
verification and our utilization of a DNS-like implementation that maps the user’s
Ethereum address to an already defined and commonly accepted type of ids such
as name or social security number. A syncing algorithm handles “off-chain” data
exchange between a patient database and a provider database. After referring the
blockchain to validate permissions through our database authentication service, the
data will exchange.
Different medical workflows were planned and implemented through blockchain
smart contract systems, involving unique medical procedures. Those involve
providing simple medical prescriptions for the treatment of chronic diseases and
their protocol for surgical patients as a recovery technique. The aim of developing
these smart medical contracts is to promote the overcoming of administrative inef-
ficiencies for the patients, doctors, and healthcare organizations. This program will
assist in the recovery, review, and management of complex data and procedures in the
healthcare sector (Kleinaki et al. 2018; Namasudra et al. 2017, Namasudra and Roy
2017, 2020a, b, c; Namasudra 2019). Table 4.1 shows the proposed model workflow
for securing healthcare data by using blockchain.
These workflows have been explained as separate entities with data flow in each
of them.
• Issuing and Filling of Medical Prescriptions Process
The key objective is to smooth the process of healthcare prescription handling by
deleting the long waiting period cycle, removing the fraud factor from the network,
and the error rate caused by misinterpretations by the doctor. A doctor prescribes for
the patient and sends it into a smart contract into the patient’s healthcare records.
The pharmacy then accesses this prescription through the Ethereum blockchain smart
contract through the primary doctor and a patient’s permission to do so. After the
4 Securing Healthcare Data by Using Blockchain 105
prescription has been obtained, the pharmacy then issues the drug via smart contracts
along with its expiry date and dosage usage listed on the patient medical records.
Then, the medication is ready for patient selection. Smart contract apps generally
coordinate medicine satisfaction among doctors and drug stores. Doctors spend less
time discussing demands for medication, or simply talking to drug stores during a
patient’s visit (Namasudra 2018).
As shown in Fig. 4.6, data flow for the issuance of a medical prescription involves
patient, primary doctor (PD), and pharmacy. It also contains prescription information,
which includes drug ID, date of expiry, a patient ID, etc.
• Sharing Results Data/Laboratory Test
Here, the primary objective is to exchange information through smart blockchain
contracts by enabling hospitals, physicians, emergency clinics, and various partners
to successfully access and share the therapeutic information of a patient among
various stakeholders, as shown in Fig. 4.7.
Find a case of use in which a patient visits a blood test laboratory. After processing,
the laboratory must insert the causes into the patient records, the patient receives
these updates via Ethereum blockchain, a note that the tests processed provides are
accessible and can choose whether to allow the laboratory to encrypt the information
and position it on Ethereum blockchain. The patient grants permission to post the
details on the blockchain. The emergency room will be able to access patient details
instantly through Ethereum blockchain whenever he and will have personalized care,
and there is an emergency with the patient (Namasudra et al. 2017).
By allowing medical records to be posted on healthcare blockchain, a medical
prevents having to either bear the test reports on their own or arrange for records
to be faxed to different care providers. He also makes sure all of his healthcare
professionals know available to deliver the best quality treatment.
Laboratories provide each printing and mail/fax regulatory expense for every
test result to singular suppliers. Also, laboratories and patients have access to the
healthcare blockchain, where they can receive installments from protective firms
recommending the transferred information to process claims or from pharmaceu-
tical companies choosing the information to be used in contemplates. Specialists
and emergency departments have access to pool restorative knowledge about their
patients at no expense, reducing authoritative research and expense.
• Enabling Patients and Service Providers Effective Communication
The patient applies to a healthcare condition in this case, as shown in Figs. 4.7
and 4.8. It immediately sends the question through the smart contract network to
the primary doctor. For quality assurance, patient information related to disease is
taken and respond with observations where it is possible. After analyzing the patient
information they refer to the specialist for further treatment. Patient information
about treatment history should be reported on the EHR.
4 Securing Healthcare Data by Using Blockchain 107
Please notice that a local database holds patient records, and there are unique
rules that can have access to the record to what degree and to what degree the smart
contracts on Ethereum blockchain control those rules, another case in which the
patient applies a particular medical procedure. Accordingly, the strict structure of the
agreement sends this submission to the correct professional. A doctor understands
the demand and response with suggestions, but patients can exchange their thoughts
with the specialist for further treatment. Any patient information regarding treatment
history must be effectively reported on the EHR. Here, a nearby database provides
patient records where there are principles that can approach the record to what extent
the knowledgeable contracts on Ethereum blockchain administer these guidelines
(Namasudra and Deka 2018).
Patients looking for health information on a particular subject receive suggestions
that are far more comprehensive than those given by a Web search. Senior doctors
are finding a new way to monetize without having to overbook their expertise. In
contrast, junior doctors can enter a novel potential customer audience and develop
their brand within their nobility. Payments allow patients to seek Junior Doctors’
recommendations.
• Healthcare Reimbursement Data Flow
The key goal is to speed up the payment process for the healthcare system. In this,
doctors will be able to proceed with care quickly, instead of having to put their
patient’s treatment on hold while waiting for the payer to respond. Automated smart
contract execution will supervise the entire operation. This process is reducing and
removing-human effort to manually review the payment where patients needs to
requests for prior authorization. It also reducing appeals caused by misinterpretation
of manually written prior authorization for medical treatment (Sarkar et al. 2015).
Medical Insurance Company posts its policies via smart blockchain contracts,
which contain the policies used to decide authorization. A manufacturer then lodges a
submission for prior authorization for a specialist consultation, diagnosis, or prescrip-
tion using the blockchain. The payer’s smart contract for a medical policy automat-
ically decides authorization using the patient’s medical details stored by Ethereum
108 M. Gupta et al.
blockchain and the details in the request. Authorization data is then immediately
returned to the supplier. Also, the patient, as well as any laboratories, hospitals,
specialists, and other stakeholders to whom the patient has delegated access, could
check the authorization for insurance in real time. The entire cycle is shown in
Fig. 4.8. The automated prior authorization process will result in considerable cost
savings for payers, which currently spends significant sums on manual analysis and
response to requests.
Doctors will continue with treatment immediately, rather than having to pause
their patient’s care while waiting for the payer’s response. Patients will be spared
concerned about how their insurance will cover the medication their doctor recom-
mends. With details on prior authorization readily accessible, physicians and patients
can work together comfortably with a treatment plan tailored specifically to the
patient’s needs and the correct insurance coverage.
• Smart Contracts for Clinical Trials Based on Ethereum
Allowing medical device and drug manufacturers with a quicker and more cost-
effective alternative to the existing recruitment in clinical trials also entails substan-
tial expenditures in purchasing patient contact information from independent data
suppliers and carrying out extensive pull-marketing campaigns. The primary goal is
to allow users to run clinical trial-related smart contracts on an Ethereum network
leading to secure medicines and improved public interest in medical research. Thus,
in this phase, authors manage metadata via smart contracts, considering protocol
registration, preset study information, screening, and enrollment logs.
A pharmaceutical company is looking for metadata stored on the Ethereum
blockchain to classify possible patients for clinical trial inclusion, as seen in Fig. 4.9.
The organization then sends a letter to read access to their medical records for selected
patients, including any related laboratory test results. The patient permits access, a
pharmaceutical company bill will be processed via smart contracts, awarding the
patient part of the fee paid, and another portion to the laboratories, which recorded
the patient’s correct test results.
Medical devices and drugs and manufacturers can dramatically reduce spending
on data purchases and marketing campaigns by targeted targeting of eligible
consumers, as shown in Fig. 4.10. Patients, meanwhile, will gain access to alter-
native care options, in addition to obtaining compensation for participating in trials.
Laboratories engaged in posting results would have a new way to monetize their
data.
• Cost Estimation Method
In terms of deploying medical blockchain, an assessment of the costs associated with
implementing smart contracts for healthcare needs to be made. The ultimate aim is
to develop a program with all the advantages of blockchain that can offer a feasible
electronic health system. In Ethereum blockchain, all programmable calculations
cost some fees to prevent network misuse and to solve other computer-related issues.
The fee for running all kinds of transactions in the Ethereum blockchain is listed as
gas. Gas refers to the payment or price value provided by the Ethereum blockchain
4 Securing Healthcare Data by Using Blockchain 109
platform for a successful transaction or execution of a contract. The exact gas price is
calculated by the miners of the network, who will refuse to process a transaction if the
gas price does not reach their cap. All operations, computations, message calls, smart
contract creation/deployment, and storage on Ethereum virtual machines (EVM),
therefore, require gas to perform all of these tasks. Figure 4.11 presents the smart
contract Metamask extension cost calculation.
To perform transactions on Ethereum virtual machines, if anyone wants to do some
kind of activity on EVM, they need to have a certain amount of gas in their account.
110 M. Gupta et al.
Contract Deployment
$0.00
0
DETAILS DATA
GAS FEE $0.18
Amount-GAS FEE
TOTAL $0.18
Reject Confirm
Each transaction has a gas limit, so if there is any unused gas, it will return to the user
account after the transaction has been executed. If a user does not have a valid balance
account, he is unable to perform any sort of operation and is therefore deemed to be
invalid. In EVM Ethers, gas is purchased, and users running the transactions can set
their account gas limit for the particular transaction. But again, whether they want
to authorize the transaction or not, it is on the miner. If a sender opts for a higher
gas price, paying for the gas will cost them a high price, and miners will get great
value for the transactions. A miner then performs the computation to connect the
transaction to a stack. A miner could then broadcast the new block into the network
after the successful execution of transactions.
This section discusses the way of securing healthcare data using blockchain are
discussed as follows.
The proposed system has many advantages over the existing models that have not
implemented blockchain technology.
4 Securing Healthcare Data by Using Blockchain 111
1. The model is much secure as it uses smart contracts and various encryption
algorithms to achieve that
2. There is no central dependency ensuring that each node participates in data flow,
and the flow path cannot be predicted.
3. Timings of each and every task are reduced by much which will help to provide
the best possible care to a patient.
4. Laboratory data can be directly shared with doctors thus eliminating the paper
trail thus reducing errors.
5. Prescriptions are digitized making admittance of patients easier and simpler.
The system thus explained will help in each and every sector of healthcare. The system
proposed by the authors uses smart contracts to provide the security to data over
transfer. The traditional system is much more prone to attacks as the blockchain and
smart contracts are not implemented in it. Thus, in each and every sector from filling
the forms to clinical trials, smart contracts are introduced. These provide encrypted
data thus preventing data loss and making the transfer much more secure. The system
proposed is not centrally dependent, instead uses several nodes of blockchain and
uses smart contract encryption, thus making the data transfer much easier and secure
and much more difficult to attack. This system can be used to replace the traditional
system due to its security and various other benefits.
112 M. Gupta et al.
References
Abou Jaoude, J., & George Saade, R. (2019). Blockchain applications—Usage in different domains.
IEEE Access, 7, 45360–45381.
Agbo, C. C., & Mahmoud, Q. H. (2020). Blockchain in healthcare.
Ahram, T., Sargolzaei, A., Sargolzaei, S., & Daniels, J. (2017). B. Amaba Blockchain tech-
nology innovations. In 2017 IEEE technology and engineering management society conference
TEMSCON (pp. 137–141).
Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500–
36515.
Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. R. (2020). Blockchain applications for Industry
4.0 and Industrial IoT: A review. IEEE Access, 1.
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2017). Applications of blockchain within
healthcare. Blockchain in Healthcare Today, 1–7.
Biswas, K., & Muthukkumarasamy, V. (2017). Securing smart cities using blockchain technology. In
Proceedings of 18th IEEE international conference on high performance computer and commu-
nication. 14th IEEE International Conference Smart City 2nd IEEE International Conference
Data Science System. HPCC/SmartCity/DSS (pp. 1392–1393) (2016).
Chang, Y., Iakovou, E., & Shi, W. (2019). Blockchain in global supply chains and cross border trade:
A critical synthesis of the state-of-the-art, challenges and opportunities. International Journal of
Production Research, 1–18.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2020). BlockChain technology: Beyond
bitcoin. Applied Innovation Review, 5–20.
Dennis, R., & Owen, G. (2015). Rep on the block: A next generation reputation system based
on the blockchain. In 2015 10th international conference for internet technology and secured
transactions ICITST 2015 (pp. 131–138).
Deshpande, A., Stewart, K., Lepetit, L., & Gunashekar, S. (2017). Overview report distributed
ledger technologies/blockchain: Challenges, opportunities and the prospects for standards.
Genestier, Jp., Zouarhi, S., Limeux, P., Excoffier, D., Prola, A., Sandon, S., et al. (2017). Blockchain
for consent management in the eHealth environment: A nugget for privacy and security challenges.
Journal of the International Society for Telemedicine eHealth, 5, 24–25.
Gordon, W. J., & Catalini, C. (2018). Blockchain technology for healthcare: Facilitating the transi-
tion to patient-driven interoperability. Computational and Structural Biotechnology Journal, 16,
224–230.
Hölbl, M., Kompara, M., Kamišalić, A., & Zlatolas, L. N. (2018). A systematic review of the use
of blockchain in healthcare. Symmetry (Basel), 10.
Horst Treiblmaier, T. C. (2020). Blockchain and distributed ledger technology use cases.
Kenry, J. C. Y., & Lim, C. T. (2016). Emerging flexible and wearable physical sensing platforms
for healthcare and biomedical applications. Microsystems Nanoengineering, 2.
Khatoon, A. (2020). A blockchain-based smart contract system for healthcare management.
Electronics, 9.
Khatoon, A., Verma, P., Southernwood, J., Massey, B., & Corcoran, P. (2019). Blockchain in energy
efficiency: Potential applications and benefits. Energies, 12, 1–14.
Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019). Blockchain technology in
healthcare: A comprehensive review and directions for future research. Applied Science, 9, 1–28.
Kleinaki, A. S., Mytis-Gkometh, P., Drosatos, G., Efraimidis, P. S., & Kaldoudi, E. (2018). A
blockchain-based notarization service for biomedical knowledge retrieval. Computational and
Structural Biotechnology Journal, 16, 288–297.
Kshetri, N. (2018). Blockchain’s roles in meeting key supply chain management objectives.
International Journal of Information Management, 39, 80–89.
Kuo, T-T, & Ohno-Machado, L. (2004) Education ModelChain: Decentralized privacy-preserving
healthcare predictive modeling framework on private blockchain networks (pp. 1–15).
4 Securing Healthcare Data by Using Blockchain 113
Makhdoom, I., Abolhasan, M., Abbas, H., & Ni, W. (2019). Blockchain’s adoption in IoT: The
challenges, and a way forward. Journal of Network and Computation Applications, 125, 251–279.
Mougayar, W. (2020). The business blockchain: Promise, practice, and application of the next
internet technology.
Namasudra, S. (2018). Cloud computing: A new era. Journal of Fundamental and Applied Sciences,
10(2), 113–135.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. Concurrency and Computation: Practice and Exercise,, 31(3). https://doi.
org/10.1002/cpe.4364.
Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2020a). Securing multimedia
by using DNA based encryption in the cloud computing environment. ACM Transactions on
Multimedia Computing, Communications, and Applications (in Press).
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020b). The revolution
of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in
Engineering. https://doi.org/10.1007/s11831-020-09426-0.
Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020c). Towards DNA based
data security in the cloud computing environment. Computer Communications, 151, 539–547.
Namasudra, S., & Deka, G. C. (2018). Advances of DNA computing in cryptography. Taylor &
Francis. ISBN: 9780815385325.
Namasudra, S., & Roy, P. (2017). Time saving protocol for data accessing in cloud computing. IET
Communications, 11(10), 1558–1565.
Namasudra, S., Roy, P., Balamurugan, B., & Vijayakumar, P. (2017a). Data accessing based on the
popularity value for cloud computing. In Proceedings of the international conference on inno-
vations in information, embedded and communications systems (ICIIECS). Coimbatore, India:
IEEE.
Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balamurugan, B. (2017b). Time efficient
secure DNA based access control model for cloud computing environment. Future Generation
Computer Systems, 73, 90–105.
Nir Kshetri, E. L. (2019). Blockchain adoption in supply chain networks in Asia. IT Professionals,
21, 11–15.
Pandey, P., & Litoriya, R. (2020). Securing and authenticating healthcare records through blockchain
technology. Cryptologia, 1–16.
Pournader, M., Shi, Y., Seuring, S., & Koh, S. C. L. (2019). Blockchain applications in supply
chains, transport and logistics: A systematic review of the literature. International Journal of
Production Research, 1–19.
Ratta, P., Kaur, A., & Sharma, S. (2020). Blockchain—Secure decentralized technology blockchain-
Secure decentralized technology.
Rejeb, A. (2018). Blockchain potential in Tilapia supply chain in Ghana. Acta Technica Jaurinensis,
11, 104–118.
Rodrigo da Rosa Righi, M. S. (2020). Antonio Marcos Alberti blockchain technology for Industry
4.0.
Saberi, S., Kouhizadeh, M., Sarkis, J., Shen, L. (2018). Blockchain technology and its relationships
to sustainable supply chain management. International Journal Production Research, 1–19.
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relation-
ships to sustainable supply chain management. International Journal of Production Research,
57, 2117–2135.
Sarkar, S., Saha, K., Namasudra, S., & Roy, P. (2015). An efficient and time saving web service
based android application. SSRG International Journal of Computer Science and Engineering
(SSRG-IJCSE), 2(8), 18–21.
Schöner, M., Kourouklis, D., Sandner, P., Gonzalez, E., & Förster, J. (2017). Blockchain technology
in the pharmaceutical industry. FSBC Working Paper (pp. 1–9).
Shen, B., Guo, J., & Yang, Y. (2019). MedChain: Efficient healthcare data sharing via blockchain.
Applied Sciences, 9.
114 M. Gupta et al.
Siyal, A. A., Junejo, A. Z., Zawish, M., Ahmed, K., Khalil, A., & Soursou, G. (2019). Applica-
tions of blockchain technology in medicine and healthcare: Challenges and future perspective.
Cryptography, 3.
Tamazirt, L., Alilat, F., & Agoulmine, N. (2018). Agoulmine blockchain technology: A new secured
electronic health record system. In 2018 International Workshop on Advances ICT Infrastructures
and Services (Vol. 134).
Warkentin, M., & Orgeron, C. (2020). Using the security triad to assess blockchain technology in
public sector applications. International Journal of Information Management, 52, 102090.
Wu, X., & Lin, Y. (2019a). Blockchain recall management in pharmaceutical industry Blockchain
management in pharmaceutical 28th recall A new methodology to physical architecture of existing
products for an assembly oriented product family identification functional and recall. Procedia
CIRP, 83, 590–595.
Wu, X., & Lin, Y. (2019b). Blockchain recall management in pharmaceutical industry. Procedia
CIRP, 83, 590–595.
Xu, X., Pautasso, C., Gramoli, V., Ponomarev, A., & Chen, S. (2020). The blockchain as a software
connector.
Chapter 5
Secure and Decentralized Management
of Health Records
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 115
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_5
116 S. Venkatesan et al.
5.1 Introduction
The eHealth record management systems have several benefits over the traditional
systems, such as: facilitating fast diagnosis, avoiding repetition of pathological tests,
promoting advanced treatments, and ensuring the availability of the data whenever
required. Overall 84 percent of US hospitals have adopted the electronic health record
system (Henry et al. 2016). However, there are countries with less than 50 percent
adoption of electronic health record systems although percentage will increase in near
future because of broader requirements. In general, eHealth records of the patients are
stored in a centralized storage server and either maintained by the hospital adminis-
tration or outsourced to a trusted third party. The health records stored in a centralized
server could be accessed by various agencies according to their authorization. The
key question to ponder over is how to share these records among various stake-
holders by ensuring integrity and privacy. The drawbacks with traditional electronic
health/medical record management systems are that there is no guarantee for the
integrity, privacy, and availability of the record, and need to trust a third party for
managing the database. It is also not straightforward to connect various hospitals to
share these records each other and connect them seamlessly for the greater good.
The eHealth record management system provides several benefits when compared
to the traditional paper-based record management system; however, security require-
ments such as patient’s record privacy, integrity, and availability minimize the large
utilization. Even though there are models and systems that exist to provide the secu-
rity requirements, unauthorized administrator access, redundant patient’s account,
access of record during patient’s unresponsive state, etc., are not addressed. The
present need of eHealth record management system and unsolved security issues
triggered to develop a secure and decentralized eHealth record management system
using blockchain technology thus enables larger utilization.
In the past decade, it has been seen a range of applications of the blockchain tech-
nology in e-governance and other kinds of data sharing and transaction applications.
It is believed that blockchain solves the problem of data sharing among the right
stakeholders without compromising the privacy of data, maintaining the integrity
of data throughout its life cycle, and availability through redundancy. Therefore,
blockchain-based solution to health record management has a lot of potentials.
In the proposed system, the immutability of blockchain and IPFS/multi-cloud
is utilized to ensure integrity, confidentiality, and availability of the health record.
The proposed system keeps meta-data of the health records that are the message
(record) digest, hospital original or pseudo-identity, and access permissions in the
blockchain and encrypted health record in the cloud/IPFS to ensure the availability.
A user wishes to access the patient record need to get the access permission from the
patient subsequently the proxy re-encrypted record will be provided.
The remaining section of this chapter is organized as follows: Sect. 5.2 discusses
the existing techniques, Sect. 5.3 presents the problem statement, Sect. 5.4 discusses
the background studies, Sect. 5.5 presents the proposed system, Sect. 5.6 analyzes the
5 Secure and Decentralized Management of Health Records 117
security of the proposed system, and Sect. 5.7 discusses the implementation, experi-
mental results, and overhead of the proposed system when compared to existing non-
blockchain-based eHealth record management system. Finally, Sect. 5.8 concludes
the chapter with the directions of future work.
The Health Insurance Portability and Accountability Act of 1996, known as HIPAA
(HIPPA 1996), and National eHealth Authority known as NeHA (NeHA 2018)
emphasize on the confidentiality and integrity of health information. Conceicao et al.
(2018) indicated the cost issue in the electronic health record management system
that even records are maintained by nonprofit organizations, the maintenance of reli-
able infrastructure in a large scale and control access to them demands significant
resources. Even though there are various existing works present in the literature for
the eHealth record management system, blockchain-based solution is preferred since
it ensures the decentralization, immutability, etc.
In the past decade, several applications of blockchain have been witnessed; it
is also believed that blockchain is one of the best solutions for securing healthcare
data (Namasudra et al. 2020), and researchers implemented in different perspectives.
The promising uses of the blockchain in eHealth record management system include
improving the security and management of patient data, reducing the regulatory
and compliance cost, optimizing the interactions between the hospital and insurance
providers, etc. (Tierion, 2016). Vazirani et al. (2020) analyzed and recommended
blockchain since it supports efficient management of medical records and ensures
interoperability but without compromising security. Azaria et al. (2016) developed a
prototype MedRec, which is a decentralized and modular health record management
system that takes advantage of the Ethereum blockchain for accountability, authen-
tication of stored information, and access. In the prototype, data is stored at a trusted
third party and its meta-information in the blockchain. Even though MedRec uses
blockchain technology, its security depends on the trusted third party.
Yip (2016) discussed the use of blockchain in processing insurance claims in
a positive way. The author suggested to keep insurance claim record on a private
blockchain and provide access only to the organization that exchanges data, and has
it with real-time updated. Therefore, the claims can be processed more quickly and
could mitigate false claims and make sure that the final bill is correct. Shrier et al.
(2016) state that the existing centralized IT systems are vulnerable to hacking and
proposed a solution using blockchain. Kuo et al. (2017) discussed the advantage
of using blockchain for biomedical and healthcare applications. Vian et al. (2016)
discussed the issues in the Medicaid healthcare programs and the use of blockchain
to solve it. Goldwater (2016) addresses the problem of storing the personal health
data gathered from all kinds of new devices and software such as wearables and
mobile on the cloud and proposed a solution that uses blockchain technology as a
base, for bringing greater security to protect the data.
118 S. Venkatesan et al.
The important security requirements that eHealth record management systems need
to ensure are confidentiality, integrity, and availability (Hasan et al. 2007). The data
modification and unauthorized disclosure are always the issues in the eHealth record
management system since in most cases data is maintained by the third party. The
eHealth records should not be modified by unauthorized users; otherwise, treatment
and analysis may kill the patient and the patient’s record privacy is an important
requirement to avoid the consequent issues, such as neighbor’s activity, knowledge
of regular medication, and misuse.
5 Secure and Decentralized Management of Health Records 119
This section discusses the key concepts used in the proposed eHealth record
management system.
The blockchain introduced in the Bitcoin is public, which allows any user or organi-
zation to join and contribute. Later, the effectiveness of blockchain and lightweight
applications motivated the researchers to develop different types. The types of
blockchain are as follows.
120 S. Venkatesan et al.
5.4.2 Ethereum
It is used when a party would like to share the received content, which is encrypted
using its public key by another party without disclosing the private key. For example,
Alice received a content encrypted using her public key from Bob. Now, Alice would
like to share the content with Charlie without disclosing her private key as well as
without performing decryption and re-encryption with Charlie’s public key. In this
case, Alice uses the proxy re-encryption to do it. Now, Alice can generate a proxy
re-encryption key using her private key and Charlie’s public key and designate a
proxy to re-encrypt the encrypted content using it. The proxy re-encrypted content
can be shared with Charlie. Charlie can decrypt the proxy re-encrypted content using
his private key. The requirement is achieved without disclosing the content to proxy
and decryption at Alice end (Qin et al. 2016).
5 Secure and Decentralized Management of Health Records 121
In cryptography, a Merkle tree or hash tree is a tree, where leaf nodes are a hash of
the data block and non-leaf nodes are a hash of its child nodes. The concept of a hash
tree is named after Ralph Merkle who patented it in 1979 (Merkle Tree 2019). The
sample Merkle tree is shown in Fig. 5.1. The leaf nodes (L 1 and R1 ) of Merkle tree
are hash (h) value of the data blocks (MB1 , MB2 , MB3 …), and non-leaf nodes (L 2
and R2 , L 3 and R3 and Root) are the hash values of its child nodes. The root hash
of the tree will be shared to manage the integrity of the data without keeping the
complete tree.
The hash function used in the Merkle tree is a cryptographic hash function. The
Merkle tree can be used to verify the integrity of the data that is data stored, handled,
and transferred in and between peer network nodes are undamaged and unaltered.
Merkle tree is used in blockchain to store transactions, account balances, etc. The
Practical Algorithm To Retrieve Information Coded In Alphanumeric (PATRICIA)
is also a type of trie, and it was first described in 1968 by Donald R. Morrison (1968).
This is similar to radix tree with radix equal to 2 and has an innovative concept to
store n items in the n nodes. It is very compact that if a node is only one child for
a parent then it gets merged with the parent. The way it is used in cryptocurrency
especially in Ethereum [17] is with the Merkle tree known as Merkle Patricia Trie
(MPT) to ensure the integrity of the data that is transactions, world state, etc.
the encrypted data and access on-demand. Along with hospitals, government orga-
nizations and insurance agencies can also take part in the blockchain activities and
use the services of the blockchain by accessing the statistics and necessary authentic
data in an authorized way. The system includes the following entities to maintain the
record securely and make it available at all times. All entities except the cloud and
IPFS are part of the blockchain and integrate the blockchain with the cloud/IPFS.
• Patient: A user possessing the unique address, public and private key pair, and
more importantly owner of the record.
• Doctor: A user possessing the unique address, public and private key pair, and
creator of the patient’s record.
• Hospital: A user (or organization) having facility for medical treatment including
doctors, diagnose kits, prepare eHealth records, encrypt, and store it on the third-
party storage. Also, able to access patient records with the consent of the patient
and refer for further treatment.
• Agencies: A user or organization, which uses the eHealth records for statistical
analysis, insurance claim, research, etc.
• Cloud/IPFS: A third-party storage to keep the encrypted record.
5 Secure and Decentralized Management of Health Records 123
(F id ) will be replaced with the new on the patient’s MPT node if the node exists;
otherwise, a new node will be created and stored.
• GrantRevoke (ty, Pid , H id , F id , sig, t): This transaction will be created and posted
by the patient to grant or revoke permission to hospitals/agencies to access the
records. The transaction includes the type (ty): 1 for grant and 0 for revoke, the data
request hospital’s identity (H id ), patient identity (Pid ), and file (record) identity
(F id ). At first, the transaction signature, identity, and timestamp will be validated
and then committed to the block, if it is valid. The commit is adding the transaction
in the block and updates the access structure (A) of the patient.
• Key (pa |ha , H pub or Ppub , sig, t): This transaction is to update the public key (H pub
or Ppub ) of the transaction owner. If the transaction is valid, then the key will be
updated. The reason for keeping the public key of the hospital and patient in the
blockchain is to reduce the delay in sharing the key. The public key stored in
blockchain for data encryption and proxy re-encryption is different from the key
pair that is used for blockchain account creation since it is advised not to use the
same key for different purposes because in one attack all protection walls will be
compromised.
The record management includes indexing, storing, accessing, and sharing of the
patient’s encrypted eHealth record and equivalent meta-data. The hospital has to
prepare the eHealth record of a patient and securely store it in the cloud/IPFS. Since
the patient public key (Ppub ) is available in the blockchain, the hospital can encrypt
the record using the Ppub , obtain C, and store it in the cloud/IPFS. The process of
indexing, storing, and accessing varies for the cloud and IPFS; however, both have
a similar method of sharing.
Cloud: The process flow of indexing and hosting is shown in Fig. 5.3. The
encrypted record (C) along with the previous/preceding record hash (H p ) is stored
in the cloud with index as the patient’s identity (Pid ) and file identity (F id ). The new
file identity is the increment of the previous file identity. The hash of the concate-
nated plain record and previous record hash sent through Record transaction will
be committed in the patient’s MPT node’s record hash attribute. The record can be
accessed by providing the patient and file identity to the cloud. The reason for storing
the preceding record hash along with the succeeding record is to validate the integrity
of preceding records since the meta-data of the records other than the latest record
is not part of the latest block.
IPFS: The index of a record is the hash value of it. The process flow of indexing and
hosting data is shown in Fig. 5.4. The encrypted new record and the previous record
index (H pi ) are hashed to create the IPFS index accordingly encrypted new record
and previous record index are stored. The same index will be placed in the patient’s
MPT node’s optional (O) attribute. Also, the plain record hash will be stored in the
MPT’s hash attribute to validate the integrity of the record. The optional (O) attribute
5 Secure and Decentralized Management of Health Records 125
index will be used to locate and access the encrypted health records from the IPFS.
The function h() is the cryptography hash function like SHA 256.
The latest block contains only the latest record index and thus allows accessing
the latest record. A user can fetch preceding records using the index value available
in the accessed records. Similarly, the record’s integrity will be verified using the
meta-data present in the blockchain.
Patient
1: Fetch the H id ’s public key (H pub ) from the blockchain
2: Compute Rk = rekey(H pub , Ppri )
3: Share Rk with proxy/third party
Third party/Patient
4: Fetch C from the IPFS/cloud by providing the patient identity or index
5: Re-encrypt C’ = reenc(C, Rk )
6: Share C’ with Hospital/Agency
Hospital/Agency
7: Decrypt HR = Dec(C’, H pri )
8: Fetch the Pid ’s meta-data (H HR ) from the blockchain
9: if (h(HR)== H HR )
10: return HR
11: else
12: return Invalid
Secure Sharing: The process of a patient sharing the health record with a hospital
or agency is given in algorithm 1. The patient wishes to share the record with any
hospital that has to fetch the respective hospital public key H pub from the blockchain
and generate the proxy re-encryption key RK = rekey(PPri , H Pub ) using his/her private
key Ppri . The proxy (third party) re-encrypts (reenc) the encrypted record C using
re-encryption key Rk and provides C’ to the hospital. The hospital uses its private key
H pri and decrypts the re-encrypted version of the record C’ to get the plain record
HR. Later, the integrity of the record will be verified using the meta-data available
in the blockchain. If it is valid, then hospital uses the record; otherwise reject and
report. Patient can do the re-encryption if the required infrastructure is available.
Fig. 5.5 Process flow of the proposed eHealth record management system
(Bpub ,Bpri ) and user account address computed using the public key. The
account address that called as the doctor/hospital/patient’s pseudo-identity
is the last 20 characters of the SHA hash function output (h(Bpub )) similar to
Ethereum. The key pairs are derived using the elliptic curve cryptography,
and it is used for the transaction and record consent signature. To ensure that
each patient creates only one account on the blockchain, the blockchain key
pair can be derived from the biometric of the user that is the scalar private
key from the biometric fingerprint. The biometric devices at the hospitals
could also be attacked by parties and would need a high level of protection.
Later, the user-generated record encryption public key (Ppub ) is stored in
the blockchain through Key transaction.
Step 2: On the visit of a patient, a hospital/doctor has to access the patient public
key and previous record file identity from the blockchain and encrypt the
prepared health record. In addition, the meta-data (hash) of the plain record
should be computed and the patient’s consent for the meta-data needs to be
128 S. Venkatesan et al.
taken. Then, the encrypted record has to be hosted on the cloud or IPFS, and
meta-data along with other parameters will be broadcasted to the blockchain
network through a Record transaction. The miners validate and commit to
the block if the transaction is valid.
Step 3: Patients who wish to share the record with the hospital/agency have to
access their public key from the blockchain and generate the re-encryption
key (Rk ) through a rekey function, which takes the private key of the patient
and the public key of the hospital/agency as input.
Step 4: The patient will share the Rk with a third party (proxy) for re-encryption
of the encrypted record. The patient himself/herself can do the proxy re-
encryption provided enough resources. Also, update the access permis-
sion in the blockchain through the GrantRevoke transaction. The grant and
revoke permission can effectively be used for future auditing.
Step 5: Using the respective re-encryption key, proxy, or patient can re-encrypt the
permitted encrypted record and send it to the respective hospital/agency.
Step 6: Hospital decrypts, verifies the integrity of record by accessing the meta-data
from the blockchain, and uses it for further analysis.
The proposed system addresses all security issues discussed in the problem statement,
ensure the security and privacy of the patient’s eHealth record, and overcome the
meta-data and record conflict.
Confidentiality: The eHealth records are encrypted using the respective patient’s
public key (Ppub ) and hosted at the cloud or IPFS. Since the private key (Ppri ) is
known only to the patient that is the owner of the record, only authorized users can
access the readable record. The user authorized by a respective patient through a
re-encryption key/grant transaction can access the readable record.
Availability: The eHealth records are encrypted and stored in IPFS or multi-cloud
storage. In the case of one site failure, other sites can provide the data. Hence, the
failure of one node cannot make the record unavailable.
Integrity: Whenever doctors/patients/other agencies request a record from the
cloud or IPFS, they will be provided along with previous record meta-data. For
example, let us assume the records HR1 , HR2 ,…HRn are available for a patient.
Along with records, meta-data H HR:1 , H HR:2 , H HR:3 , … H HR:n are also available.
The meta-data H HR:2 of the second record is computed as h(H HR:1 ||h(HR2 )) using the
SHA hash function. Similarly, the next hashes H HR:3 , H HR:4 , and so on are computed.
While accessing the record, for example, HR10 , the health record HR10 and H HR:9
will be provided to the user. The user will fetch H HR:10 from the public blockchain
and verify the integrity of the record by mapping the H HR:10 and h(H HR:9 ||h(R10 )). If
mapping is successful, then data is not modified and accepted; otherwise reject and
report to the patient. Hence, integrity of the record is achieved.
5 Secure and Decentralized Management of Health Records 129
Logging and Auditing: Since the records are encrypted and stored, without patient
consent and proxy re-encryption, records cannot be accessed and used by any of the
subscribers. Patient grant access to the health record for any of the hospital is stored in
the immutable blockchain. The auditing can be done using the information available
in the blockchain. However, patient grant permission to agencies without posting on
the blockchain cannot be identified and controlled.
There are insider attacks possible since the data and meta-data are in different
networks or environments. The possible attack and the solution by the proposed
system are as follows.
(a) Unauthorized creation and posting of eHealth record: There is a possibility that
malicious intended hospital or agency knowing the patient identity and public
key can host the poison data on the cloud or IPFS and link the hash in blockchain.
This creates uncertainty on the patient’s health record. To overcome this attack,
the proposed system mandates hospital to create blockchain Record transaction
with patient signature (consent of the patient) on the health record hash using
Bpri . The Record transaction validation includes the patient consent validation.
While accessing and using the record, in addition to record integrity verification,
the client signature also verified to confirm the patient consent on the record.
(b) Unauthorized modification of the encrypted record stored at cloud/IPFS by
faulty nodes: The malicious intent user or compromised third party may modify
the encrypted records or meta-data. This will lead to hash conflict, poisoned
records, etc. Since the proposed system uses cloud/IPFS which has distributed
storage, modification of record will not harm because other non-faulty nodes
will provide the true copy of records. It is hard for the attacker to compromise
all storage nodes to achieve the desired attack. However, it is not suggestive to
store the health record in all IPFS nodes since the eHealth records are too big
in size.
(c) The malicious intended hospital may host the meta-data in blockchain but not
in IPFS/cloud and vice versa: The solution to tolerate this fault is MPT node’s
additional attribute HU.
Problem I Malicious intended hospital hosts a record on IPFS/cloud but not the
meta-data on blockchain.
Solution In this case, the problematic record is not part of the patient’s record set.
IPFS: To access the record of a patient, the hash available in the block MPT’s optional
attribute (O) will be used as an index. Thus, record can be accessed; however, the
problematic record will not be usable. Cloud: The patient’s Pid is used to access
the latest record and the record hash is mapped with the meta-data (hash) available
in blockchain. The hash conflict will occur because of a mismatch between data in
storage and meta-data; thus, records cannot be used. However, it is possible to access
the preceding record from the cloud using the same identity and can be verified with
blockchain meta-data (hash). If again conflict occurs, then next preceding record and
so on. At one stage, hashes (record hash and blockchain hash) will be matching and
130 S. Venkatesan et al.
the respective record and preceding records can be used. Hence, the malicious node
behavior will not affect the complete record access and use.
Problem II Malicious intended hospital hosts meta-data into blockchain but not the
record on IPFS or cloud.
Solution In this case, the hash available at the latest block and hash of the latest
record in the cloud will not match. To tolerate the problem, fetch the preceding hash
by directly accessing the block, which has the previous hash update using the HU
attribute, and validate the records. If not matches, continue till it matches. Similarly
for the IPFS, if the record not found for the respective hash index then try with the
preceding hash index.
The above solutions consume more time for record access if malicious behavior
occurs. In case blockchain and IPFS validating nodes verify each other about the
new update, an attack will be identified immediately and prevented. However, this
is computationally heavy and infeasible because miner as well as non-miner has to
verify with IPFS and validate the transaction. Similarly, IPFS nodes have to perform
the task. Hence, in the proposed system only the above two solutions are considered.
(d) Hospital posts incorrect record or not posts the record: Patient can verify the data
availability through blockchain and IPFS/cloud. However, incorrect data cannot
be identified until the patient has medical knowledge or it is cross-verified by
multiple hospitals.
Single account and access of record in an unresponsive state: Ensuring a single
identity for a patient is a complex problem in health care, since a patient may register
multiple times within the same or different hospitals under different accounts. This
causes fragmentation of patient data and affects data sharing and effective use. To
bring a single account, the account address or identity of the patient can be derived
from his/her biometric fingerprint. Even though the patient knowingly or unknow-
ingly tries to create multiple accounts, in blockchain, it will be stored under a single
account. In the proposed system, the key pair is derived using the elliptic curve cryp-
tosystem, where the private key (Bpri ) is a random scalar value and the public key
(Bpub ) is the point multiplication of the private key and elliptic curve base point. The
random scalar value can be derived using the patient’s biometric; thus getting a single
account address or identity for the patient. The key escrow technique will be used
to solve the problem of accessing the record when the patient is in an unresponsive
state.
Statistical Data Privacy: It is very important to maintain the disease/patients statis-
tics and making the information available to the public or governing bodies without
violating the privacy of the patients. The proposed system never discloses the actual
identity of the patient similar to Reen et al. model (2019); however, the malicious
can map the statistics information in the hospital’s Record transaction and the visit
of the known patient to conclude or predict the health report. Also, specialized hospi-
tals increase the chance of prediction. This can be mitigated by posting transactions
continuously and in random order. In case, the hospital broadcasts multiple Record
5 Secure and Decentralized Management of Health Records 131
The implementation scenario is the hospital gives the hash of the health record to
the patient, and then the patient creates a transaction by including from and to as
his/her address (from: eth.accounts[0] & to: eth.accounts[0]) and health record hash
concatenated with the previous record hash (H p ). Then broadcast it to the network for
inclusion in the block. The successfully validated transaction will be given transaction
confirmation as shown in Fig. 5.6 and then committed into the block during mining.
In the implementation, the transaction is prepared and submitted by the patient; thus
Fig. 5.7 Retrieval of health record hash and public key of a patient
by default, the hash of the record along with other parameters in the transaction is
signed by the patient using his/her Bpri .
Figure 5.7 shows the retrieval of latest health record hash (meta-data) and the
public key of a user from the blockchain by providing the patient’s Ethereum address.
These data can be accessed by any of the nodes in the network.
Figure 5.8 shows the computational time (latency) consumption of goethereum
node for modified sendTransaction validation and data access on the presence of a
different number of participating nodes. The computational time plot HRhAc is for
accessing the health record hash (meta-data) of a patient, and RTr is for the validation
of modified sendTransaction. The experimental result shows that the transaction
validation time is greater than the data access time. This is because of multiple
validations such as signature and account existence. Also, the result in Fig. 5.8
shows that the access to meta-data and validation of the transaction are not heavy
and time-consuming.
Figure 5.9 shows the latency difference of smart contract (SCAcc) and core world
state MPT storage (MPTAcc)-based data access. The data access includes two steps in
the case of core world state MPT storage and three steps in the case of smart contract
storage. In the world state MPT storage-based data access, as the first step, the trie is
traversed and the patient node is located using the patient pseudo-identity/Ethereum
address and as the second step data is accessed. In smart contract storage-based data
18
16
Latency (in milliseconds)
14
12
10
8 RTr
6
Hrhacc
4
2
0
40 80 100 200 500
No. of Nodes
Fig. 5.8 Computational latency for the transaction validation and data access
5 Secure and Decentralized Management of Health Records 133
12
6
SCAcc
4
MPTAcc
2
0
20 40 80 100
No. of Nodes
Fig. 5.9 Computational latency for the world state MPT and smart contract storage data access
access, the first step is to traverse the trie and locate the application administrator
node, the second step is to traverse and locate the application user (patient) node in
the smart contract storage, and the third step is accessing the data. Hence, the smart
contract storage-based data access latency is more when compared to the world state
MPT storage-based data access. The existing systems use the smart contract-based
storage, and that needs more latency for data access as shown in Fig. 5.9. Hence, the
proposed eHealth record management system uses the core world state MPT storage
instead of smart contract-based storage.
Table 5.1 shows the parameters and values considered for the overhead evaluation of
the proposed eHealth record management system, which uses the blockchain tech-
nology. The blockchain considered for the analysis is the Ethereum public cryptocur-
rency blockchain since the proposed system uses the Proof of Authority (PoA)-based
Ethereum implementation.
There are four different eHealth record management systems considered for
comparison: A: the eHealth record is kept at the hospital in plain format, B: the
eHealth records are encrypted and kept in the hospital, C: the eHealth records are
encrypted and placed in the hospital as well as in cloud, and D: the eHealth records
encrypted and placed in the hospital, cloud or IPFS and meta-data on the blockchain.
Table 5.2 shows the space, access time, and computational time requirement of all
systems. The given computational time for eHealth record encryption, and hashing
is computed through the OpenSSL since these are not part of the blockchain activ-
ities. Table 5.2 shows that the systems C and D are computationally heavy when
134 S. Venkatesan et al.
compared with the systems A and B; however, the systems A and B are not consid-
ered for overhead analysis since it lags in confidentiality and integrity while sharing
the records.
Table 5.3 shows the overhead of the proposed system D over system C for storage
space, access time, and record, and block sharing cost. The proposed blockchain-
based system (D) needs more overhead with respect to space, data sharing, and IPFS
data access.
(i) Storage space: It has storage space overhead of approximately 7 TB; however,
it is not from the beginning of the blockchain application. It increased gradually
from 33 KB to 7 TB in ~ 10 years, and it will further go high. In connection with
Moore’s law [Moore 1965], the year it goes, the cost of memory may reduce.
Hence, it will not affect the cost at a high level. Also, the proposed system
provides faster access to meta-data since the copy of the blockchain is stored
locally in full nodes.
(ii) Access time: It has additional overhead only in IPFS access; however, if the
records are accessed by different nodes then records will be in nearby storage
and will achieve the quick access of record. Also, the efficient cloud data access
techniques (Namasudra et al. 2020a; Namasudra et al. 2020b; Namasudra et al.
2017a; b) will further reduce the access time.
(iii) Sharing cost: The overhead is only ~ 3mbps considering each block size is
33 KB and 10 nodes in the network sharing it. This overhead will not reduce the
functional capability of the system. Also in today’s network, 3mbps bandwidth
is not an overhead.
The Proof of Authority-based block mining and validation is also the additional
overhead. However, this will not delay the record and meta-data access. Even though
proposed system has significant overhead with respect to storage, it achieves reliable
health record sharing, public verifiability, record integrity, and fault tolerance. Also,
Table 5.2 Storage and computational analysis
Model HT ET Blockchain data Blockchain Blockchain Time for Record Time for Record Time for Record
access time transaction validation Size (Storage cost) access from the local access from the IPFS access from the cloud
time database
A NA NA NA NA NA 46.5 NA NA
B 6.0 11.0 NA NA NA 46.5 NA NA
C 6.0 11.0 NA NA NA 46.5 NA 226.7
D 6.0 11.0 2.2 16.5 667.10 GB * 10 nodes 46.5 431.4 226.7
5 Secure and Decentralized Management of Health Records
= 6670.10 GB ~ 7 TB
135
136 S. Venkatesan et al.
blockchain of the proposed system maintains the disease statistics without violating
the privacy of any patient.
5.7.4 Limitations
The proposed model has the following limitations with respect to rural patient
technical knowledge and insider (hospital administrator) malicious behavior.
(i) Patient ignorance and pressure may be used to access the record in an
unauthorized manner.
(ii) The patient may not have enough resources or technical knowledge to do re-
encryption or create transactions even though the interface will be provided.
(iii) Hospital administration may keep the copy of the plain eHealth record without
the knowledge of the patient and access it whenever required without patient
consent.
(iv) Hospital administrators may inject incorrect data.
The limitations (i) and (ii) can be mitigated through awareness. The limitation
(iii) is not going to harm the patient because the respective hospital already knows
the patient details. However, if the respective storage server is compromised or the
hospital shares the data with others then patient privacy is in question. Limitation
(iv) is not possible to mitigate without multiple verifications.
This chapter proposed the eHealth record management system using blockchain to
secure and efficiently share the healthcare data. The health records are encrypted and
stored in the cloud/IPFS to ensure availability and confidentiality. The meta-data of
the health record is stored on the blockchain to ensure the integrity and public verifi-
ability. The proposed system achieves confidentiality, privacy, availability, and fault
tolerance in the presence of inside and outside attackers. Also, it provides services like
5 Secure and Decentralized Management of Health Records 137
statistics generation, and single account for patients. The experimental results, secu-
rity, and overheads analysis prove the applicability of the proposed eHealth record
management system in eHealth care. The future work of this paper is to achieve the
granular access control of the patient’s record.
Key Terms and Definitions
Blockchain: It is a distributed ledger consisting of blocks, which keeps on growing
and cryptographically linked to mitigating the malicious alterations. Also, it spreads
over many users of the network to ensure decentralization and availability.
Cloud: It is an on-demand facility provided by third parties especially for data storage
and computation without direct active management by the client. The encrypted
eHealth records of the proposed record management system are stored in the cloud.
Inter Planetary File System (IPFS): It is a peer-to-peer network for storing and
sharing data in a distributed file system using the Distributed Hash Table (DHT). The
content can be hosted on the IPFS by users using the index (hash of the data); also,
it can be stored in multiple nodes. Any user in the network can access a file using
its content address by approaching any peer in the network that can find and request
the content from a peer that has it.
Cryptographic Hash: It is a function that takes arbitrary size input and produces
a fixed-size output. A small change in a message will change the hash output so
extensively that the new hash value appears uncorrelated with the old hash value.
The properties of the hash function are Pre-Image Resistance, Second Pre-Image
Resistance, and Collision Resistance. This is used for ensuring the eHealth record
integrity.
References
Azaria, A., Ekblaw, A., Vieira, T., & Lippman, A. (2016). Medrec: Using blockchain for medical
data access and permission management. 2nd International Conference on Open and Big Data
(OBD), pp. 25–30.
Conceicao, F.A., Correa da Silva, F.S., Ocha, V., Locoro, L., & Bargui, J.M.M. (2018). Eletronic
health records using blockchain technology. http://www.sbrc2018.ufscar.br/wp-content/uploads/
2018/04/07-181717-1.pdf. Last accessed on 16 June 2020.
Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., & Wang, F. (2017). Secure and trustable
electronic medical records sharing using blockchain. https://arxiv.org/pdf/1709.06528.pdf.
Goldwater, J.C. (2016). The use of a blockchain to foster the development of patient—reported
outcome measures. White paper, https://www.healthit.gov/sites/default/files/6-42-use_of_blockc
hain_to_develop_proms.pdf. Last accessed 14 February 2018.
Hasan, R., Winslett, M., & Sion, R. (2007). Requirements of secure storage systems for healthcare
records. Workshop on Secure Data Management. pp. 174–180.
Henry, J.W., Pylypchuk, Y., Searcy, T., & Patel, V. (2016). Adoption of electronic health
record systems among U.S. non-federal acute care hospitals: 2008–2015.ONC Data
Brief 35 https://dashboard.healthit.gov/evaluations/data-briefs/non-federal-acute-care-hospital-
ehr-adoption-2008–2015.php. Last accessed 17 February 2018.
138 S. Venkatesan et al.
HIPAA, The Health Insurance Portability and Accountability Act of 1996 (HIPAA),
Online at https://aspe.hhs.gov/report/health-insurance-portability-and-accountability-act-1996.
Last accessed 14 February 2018.
HL7. (2018). HL7 Fast Healthcare Interoperability Resources (FHIR). https://www.hl7.org/fhir/.
Khatoo, A. (2020), A Blockchain-Based Smart Contract System for Healthcare Management,
Electronics, MDPI, 9(1).
Kuo, T., Kim, H., & Ohno-Machado, L. (2017). Blockchain distributed ledger technologies
for biomedical and health care applications. Journal of the American Medical Informatics
Association, 24(6), 1211–1220.
Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions
on Programming Languages and Systems, 4(3), 382–401.
Merkle tree. https://en.wikipedia.org/wiki/Merkle_tree; accessed 10-March-2019.
Moore, G.E. (1965). Cramming more components onto integrated circuits. Electronics, 38(8).
Morrison, D. R. (1968). PATRICIA—Practical algorithm to retrieve information coded in
alphanumeric. Journal of the ACM, 15(4), 514–534.
Namasudra, S., & Roy, P. (2017). Time saving protocol for data accessing in cloud computing. IET
Communications, 11(10), 1558–1565.
Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balamurugan, B. (2017). Time efficient
secure DNA based access control model for cloud computing environment, Future Generation
Computer Systems, 73, pp. 90–105.
Namasudra, S., Deka, G.C., Johri, P., Hosseinpour, M., & Gandomi, A.H. (2020). The revolution
of blockchain: State-of-the-art and research challenges, Archives of Computational Methods in
Engineering.
Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N.R. (2020a). Securing multimedia
by using DNA based encryption in the cloud computing environment, ACM Transactions on
Multimedia Computing, Communications, and Applications, (in press).
Namasudra, S., Chakraborty, R., Kadry, S., Manogaran, G., & Rawal, B.S. (2020b). FAST: Fast
accessing scheme for data transmission in cloud computing, Peer-to-Peer Networking and
Applications, (in press).
NeHA, National eHealth Authority (NeHA), https://www.mygov.in/sites/default/files/master_
image/NeHA Concept Note Eng.pdf . Last accessed 14 February 2018.
Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A blockchain-based approach
to health information exchange networks, ONC/NIST Use of Blockchain for Healthcare and
Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST.
Qin, Z., Xiong, H., Wu, S., & Batamuliza, J. (2016). A survey of proxy re-encryption for secure data
sharing in cloud computing. IEEE Transactions on Services Computing. Go-Ethereum, https://
github.com/ethereum/go-ethereum.
Reen, G.S., Mohandas, M. & Venkatesan,S. (2019). Decentralized patient centric e-health record
management systemusing blockchain and IPFS, In Proceedings of International Conference on
Information and Communication Technology (CICT), IEEE, Prayagraj, India, pp. 1–7.
Shrier, A.A., Chang, A., Diakun-thibault, N., Forni, L., Landa, F., Mayo, J., & Riezen, R. (2016).
BlockChain and health IT: Algorithms, privacy, and data, White paper.https://www.healthit.
gov/sites/default/files/1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper.pdf. Last
accessed 14 February 2018.
Stat, Cryptocurrency statistics. https://bitinfocharts.com/. Last accessed on 18 October 2018.
Theodouli, A., Arakliotis, S., Moschou, K., Votis, K., & Tzovaras, D. (2018). On the design of a
Blockchain-based system to facilitate healthcare data sharing, 17th IEEE International Confer-
ence on Trust, Security and Privacy in Computing and Communications/12th IEEE International
Conference on Big Data Science and Engineering (TrustCom/BigDataSE).
Tierion. (2016). Blockchain healthcare 2016 report—promise & pitfalls. [online] https://tierion.
com/blog/blockchain-healthcare-2016-report. Last accessed 14 February 2018.
Vazirani, A.A., O’Donoghue, O., Brindley, D., & Meinert, E. (2020). Blockchain vehicles for
efficient Medical Record management, Digital Medicine, Nature partner journals, Article No. 1.
5 Secure and Decentralized Management of Health Records 139
Vian, K., Voto, A., & Haynes- Sanstead, K. (2016). A BlockChain profile for medi-
caid applicants and recipient. Whitepaper, https://www.healthit.gov/sites/default/files/14-38
blockchain_medicaid_solution.8.8.15.pdf . Last accessed 14 February 2018.
Wood, G. (2014). ETHEREUM: A secure decentralized transaction ledger. Yellow paper. Golang -
The Go Programming Language. https://golang.org/.
Xia, Q., Sifah, E.B., Smahi, A., Amofa, S., & Zhang, X. (2017a). BBDS: Blockchain-based data
sharing for electronic medical records in cloud environments. Information, 8(2), p. 44.
Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., Du, X., & Guizani, M. (2017b). MeDShare: Trust-
less medical data sharing among cloud service providers via blockchain. IEEE Access, 5, 14757–
14767.
Yip, K. (2016). BlockChain and alternative payment models. White paper, https://www.healthit.gov/
sites/default/files/15-54-kyip_blockchainapms_080816.pdf. Last accessed 14 February 2018.
Shubham Sahai is a Ph.D. scholar in Cyber Security Center, Indian Institute of Technology,
Kanpur, and currently working with Prof. Sandeep K. Shukla and Prof. Pramod Subramanyan. His
research interest lies around blockchain, formal methods, and applied cryptography. He has a keen
interest in designing systems that guarantee trust and privacy among users. His peripheral interest
in cryptography revolves around zero-knowledge proofs, oblivious RAMs, and homomorphic
encryption, and he believes that these constructions will play a pivotal role in the development
of a secure, trustworthy, and privacy-preserving digital world.
Sandeep Kumar Shukla is Professor in the Department of Computer Science and Engineering,
Indian Institute of Technology, Kanpur, India. He is an Associate Editor of ACM Transactions
on Cyber-Physical Systems. He is an IEEE fellow and an ACM Distinguished Scientist, and
served as an IEEE Computer Society Distinguished Visitor from 2008 to 2012 and as an ACM
Distinguished Speaker from 2007 to 2014. He was previously the Poonam and Prabhu Goel
Chair Professor in the Deparment of Computer Science and Engineering, Indian Institute of Tech-
nology, Kanpur, India, Editor in Chief of ACM Transactions on Embedded Systems from 2013
to 2020, Associate Editor of IEEE Transactions on Computers, IEEE Transactions on Industrial
Informatics, IEEE Design & Test, IEEE Embedded Systems Letters, and various other journals.
He was Member of the faculty at the Virginia Polytechnic Institute, Arlington, Virginia, between
2002 and 2015, and has also been a visiting scholar at INRIA, France, and the University of
Kaiserslautern, Germany. In 2014, he was named a fellow of the Institute of Electrical and Elec-
tronics Engineers (IEEE) for his contributions to applied probabilistic model checking for system
design. He has authored several books on systems and has edited and co-authored numerous books
with Springer.
Jaya Singh is a Ph.D. student in Network Security and Cryptography Laboratory, Department of
Information Technology, Indian Institute of Information Technology, Allahabad, Prayagraj, India.
Her research interest includes blockchain applications and lightweight authentication techniques.
Chapter 6
IoT-Based Healthcare Monitoring Using
Blockchain
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 141
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_6
142 M. Vahdati et al.
6.1 Introduction
In this chapter, an architecture based on Saghiri et al. (2018) for healthcare moni-
toring is proposed. In addition, some solutions given in ( Abujamra and Randall, 2019;
Jamil et al. 2020; Bublitz et al. 2019; HamlAbadi et al. 2017; Vahdati et al. 2018;
Saghiri et al. 2020) are deployed in this architecture. This architecture solves some
problems associated with security and privacy in IoT, using Blockchain technology.
Because of the distributed and dynamic nature of IoT systems based on Blockchain,
a wide range of management problems should be solved using smart algorithms.
Therefore, the cognitive systems framework has been embedded in the proposed
architecture to better organize the management processes in order to solve problems
in a self-organized manner. Note that all existing algorithms suffer from complex
organization of management algorithms. In other words, the proposed architecture
solves the challenges of complexity in designing management algorithms using a
cognitive systems approach. According to Saghiri (2020b) and Wang et al. (2020),
cognitive systems are used to decrease the complexity of management algorithms in
a wide range of applications. In order to study potential applications of the proposed
architecture, some case studies involving the fight against COVID-19 are studied in
this chapter. The structure of this chapter is as follows: Sect. 6.2 is dedicated to the
literature review. Section 6.3 focuses on background studies. In Sect. 6.4, an archi-
tecture is proposed for healthcare monitoring. In Sect. 6.5, three case studies are
suggested. Discussions and potential applications are given in Sect. 6.6. Section 6.7
is dedicated to performance analysis. Conclusions and future work are given in
Sect. 6.8.
The idea of connecting everything, anywhere, at any time, loosely describes the
concept of IoT. The notion of the IoT is that it not only provides connectivity but
also assists interaction between the devices to be connected. The speed with which
new devices can be connected to an integrated system is very important, but it also
has several serious dangers in terms of security and privacy (Gupta et al. 2020).
In IoT, cloud computing leads to important features such as efficiency, time saving,
cost effectiveness, pay-per-use, flexibility and scalability (Hassanalieragh et al. 2015;
Namasudra and Roy 2017). Blockchain has an important role in the next generation
of IoT-based applications (Dorri et al. 2017). In addition, in order to improve the
security of data in IoT-based devices, some solutions are given in (Namasudra et al.
2020a, c; Namasudra 2018, 2019; Devi et al. 2020; Namasudra et al. 2017, 2018;
Namasudra and Deka 2018).
Wearable devices in healthcare systems are a kind of smart electronic devices,
which can be worn as an accessory or even embedded in clothes. These kinds
of devices are very simple, user friendly, and connection to them can be done
through wireless communication. Important information which can be provided by
these devices includes blood pressure, blood glucose levels and breathing patterns
(Dwivedi et al. 2019b).
Wearable accessories worn by patients can transmit a myriad of data to a smart-
phone. These data play a crucial role in preventive care and critical care, as reported in
Hang et al. (2019). This technology also permits doctors to treat more patients. RPM
facilitates observation and care of patients beyond the contractual clinical setting .
A key advantage is that IoT promotes patient comfort. Patients can keep in touch
with healthcare practitioners as required. It likewise decreases clinical expenses and
improves the quality of care. Medical services suppliers are now investigating ways
of extending the scope of RPM so that it can serve the majority of patients. The
primary segment of RPM framework could be a uniquely planned checking device
to monitor and transmit key data. Wearable devices and the IoT play a significant
role in RPM and are currently being promoted as part of the creation of smart cities.
Wearable devices continuously gather health information and can send it to emer-
gency clinics or clinical organizations as part of their health interventions, enabling
them to monitor disease results and the progress of treatment (Dwivedi et al. 2019b).
Recently, another related concept called the “cognitive IoT” (Foteinos et al.
2013; Saghiri et al. 2018) has been described. This targets coordination of subjec-
tive advances into IoT-based frameworks in order to guarantee smart administration
Table 6.1 Comparison of existing approaches for health care using Blockchains
References Contribution Advantages Disadvantages
(Dwivedi et al. 2019b) Represents use of a Blockchain to Makes IoT application data and No implementation exists
provide secure management and transactions more secure
analysis of healthcare big data
(Dwivedi et al. 2019a) Represents the Blockchain model for Identifies the key points where the IoT No implementation exists
IoT-based healthcare applications and Blockchains can work well together
Bublitz et al. (2019) A framework based on AI, the IoT and The IoT, Blockchains and AI have great No implementation exists
Blockchains is used to support potential in terms of supporting initiatives
investigation and improvement of integrating health and environmental
pan-Canadian monitoring and data, including the potential to be part of
observation activities that have an a pan-Canadian surveillance system
environmental impact on health
Hang et al. (2019) Represents a Blockchain-based medical Support patients with a comprehensive, Does not evaluate the suggested platform
platform to secure electronic medical unchanging log and simple access to their across a large-scale network
record management medical data over diverse departments
within the clinic
6 IoT-Based Healthcare Monitoring Using Blockchain
Fernández-Caramés and Design of fog computing, Blockchains Helps with the control of diseases; Does not evaluate the suggested platform
Fraga-Lamas (2018) and an IoT-based continuous provides a transparent and trustworthy across a large-scale network
glucose-monitoring system for blood-sugar data source
crowdsourcing mHealth
Attia et al. (2019) Represents a secure Blockchain Provides a secure remote-monitoring IoT Needs to implement more functionality
architecture for healthcare monitoring system; secured IoT architecture can be to get a complete
applications implemented in the healthcare IoT–Blockchain framework dedicated to
application domain health monitoring
(continued)
145
Table 6.1 (continued)
146
through empowering collaboration and communication between the IoT and humans
(Mezghani et al. 2017).
The term “smart contract” was first coined by Szabo (1996) as “a set of promises, spec-
ified in digital form, including protocols within which the parties perform on these
promises” (Szabo 1996). Smart contracts could be defined as the computer protocols
that digitally facilitate, verify and exert the contracts created among parties on a
Blockchain. Smart contracts are ordinarily deployed and secured by a Blockchain.
Firstly, the program code of a smart contract is recorded and confirmed on the
Blockchain. Secondly, the execution of a smart contract is implemented among
anonymous, trustless nodes without centralized control or coordination of third-party
specialists. Thirdly, a smart contract, like an intelligent agent, might have its own
cryptocurrencies or other digital assets, and it can transfer them when predefined
conditions are triggered (Stark 2016; Wang et al. 2019a). Recently, smart contracts
have been developed to deploy multiple interactions for Ethereum using “Solidity”
programing language (Nelaturu et al. 2020).
Smart contract technology can solve substantial challenges associated with the
healthcare domain in terms of managing and enforcing contracts without the inter-
ference of a third party in order to improve interoperability and privacy in healthcare
processes. A smart contract in a Blockchain can provide a safe way to create a signif-
icant connection between a patient’s medical data and useful medical guidelines.
This system reduces the costs of healthcare services and increases their accessibility
(Kormiltsyn et al. 2019). In Fig. 6.1, the main objective, i.e., to share patient infor-
mation through Blockchain smart contracts among hospitals, laboratories, doctors,
patients, insurance companies, pharmacies and consultants is presented.
problems may help define better treatment plans using gamification techniques as a
means of incentivizing those people who follow the guidelines defined by doctors.
Technical: From a technical perspective, many tools and algorithms are reported
in the literature to solve different types of problems. Blockchain technology facilitates
three activities, as described below:
• Patients’ medical records can be transferred with a high degree of security and
privacy.
• Management of the medicine supply chain can be done with a high level of
accuracy.
• Healthcare researchers can study patient records, and genetic codes can be
analyzed in accordance with legal routines.
From a technical point of view, some challenges can be solved by a Blockchain-
based algorithm very efficiently. Moreover, such an algorithm could be integrated
with other solutions. For example, in Azaria et al. (2016), secure access controls in
healthcare systems are designated. Blockchain can also be used to secure data sharing,
as reported in Xia et al. (2017). Medical records can be stored in Blockchain with a
6 IoT-Based Healthcare Monitoring Using Blockchain 151
high degree of security, such as one algorithm reported in Dubovitskaya et al. (2018).
Recently reported studies focusing on the abovementioned activities are discussed
below:
• In BurstIQ 2020, a platform is reported that manages patient data considering
safety and security issues handled by Blockchain technology. This platform
includes information about patients’ health and healthcare activities.
• In SimplyVital Health 2020, a system is reported to establish decentralized tech-
nologies for healthcare industries. It helps healthcare experts to access patient
information quickly. This company recently cooperated with genomics and
precision medicine company Shivom in order to organize a global healthcare
Blockchain alliance to protect DNA sequencing data.
• In Coral Health 2020, the author presents a Blockchain-based system to accel-
erate the care control process in relation to administrative processes and health
outcomes. Many actors, such as doctors, scientists, laboratory technicians and
public health authorities, can be connected to each other using a Blockchain
based network very quickly. To ensure accuracy of the data and treatment process,
this company implements smart contracts between patients and healthcare
professionals.
• In Medicalchain 2018, the system utilizes a Blockchain to store health records,
addressing integrity and truth issues. This company also supports patient
consultations with doctors using “MedTokens”.
• In chronicled 2020, the author proposes a Blockchain in order to demonstrate a
solution to help pharma companies track medicine deliveries and also provide a
detailed review of drug shipments.
• The Center for Disease Control and Prevention (CDC) works on diseases in
a supply-chain-based manner utilizing Blockchain technology (CDC 2020).
Blockchain technology can consider timestamps, peer-to-peer health reporting
and data processing in a real-time fashion. These capabilities can be used in
pandemic situations.
• The EncrypGen (GENE-CHAIN 2020) is a Blockchain-based platform that
focuses on the security and privacy of genetic information. This platform facili-
tates activities such as searching, sharing, saving, buying, and selling of genetic
information.
• In XMED Chain 2018, XMED Chain (XMC) is reported. This platform focuses
on artificial intelligence and big data technologies. This platform can provide
a sustainable, patient-oriented and intelligent ecosystem solution, which can be
organized to build a more efficient global healthcare system.
In this part, firstly two aspects of algorithms and tools in medical Blockchain
are considered. The position of Blockchain-based algorithms in healthcare systems
is then analyzed. Finally, the solutions presented by various companies in different
domains are summarized.
152 M. Vahdati et al.
IoT sensors play an important role in healthcare systems. The IoT supports a wide
range of body sensors, including pulse rate, blood oxygen level, distance traveled,
maximal oxygen consumption, body temperature, blood pressure, blood glucose
level, EEG, ECG and calories burned. These sensors can be used either in wearable
devices or body implants. Information gathered by these sensors may be used to
different purposes such as fall detection, diabetes control, sleep monitoring and hearth
attack detection. In contracts to traditional sensing elements, the IoT sensors are cheap
and also small enough to be used in a wide range of devices. A type of IoT sensors that
enables online drug monitoring has revolutionized healthcare monitoring systems.
In healthcare systems, drug monitoring plays an important role in different fields
for different actors in healthcare systems. Drug monitoring activity refers to measure-
ment of medication levels in the blood, and this can be done using IoT sensors in an
online fashion. In the literature, many algorithms based on drug monitoring using IoT
sensors are given to design modern IoT-based treatments. The overdose and under-
dose of a drug may lead to hurtful situation for patents. A small change in insulin
and glucose in the blood of patient leads to many problems. In Al-Odat et al. (2018)
and Gia et al. (2017), some solutions based on IoT-based blood monitoring systems
such as insulin and glucose are given for diabetic patients. In Othman (2019), an
IoT-based system for medication dose calculator for children is presented.
This layer provides the interconnection backbone for transferring data among many
entities, such as doctors, patients, laboratories, ambulances, hospitals, and smart
6 IoT-Based Healthcare Monitoring Using Blockchain 153
Fig. 6.2 Proposed architecture for IoT-based healthcare monitoring using Blockchain
homes. Some scenarios demonstrating the functionalities of this layer are given as
follows. IoT sensors enable online health monitoring, and the network layer directly
transmits data to IoT/Blockchain/AI services layer. A connected home can monitor
the daily activities of individuals which has the capability of monitoring human health
through simple wireless measuring scales. Health centers in particular hospitals and
clinics have benefited from new technologies integrating the IoT into health care,
which play a vital part in improving the quality of medical care, bringing comfort
154 M. Vahdati et al.
for patients and improving the management level of healing centers. In medical
emergencies, smart ambulance sensors such as heart rate sensors, blood pressure
and ECGs will determine the status of crucial parameters, and the status of these
parameters can be sent to the hospital’s database at the same time as activity signals.
Upon receiving data on the state of critical parameters, hospital specialists can then
act accordingly. The network layer components are as follows:
A primary challenge arising during the design of this layer is the complexity of the
management processes, involving three elements: IoT, Blockchain and AI. In order to
resolve this challenge, a framework for the Cognitive Internet of Things (CIoT) based
on a Blockchain is utilized. This framework was proposed in Saghiri et al. (2018),
HamlAbadi et al. (2017), and Vahdati et al. (2018). This framework suggests three
layers, with the following descriptions, to organize management processes (Fig. 6.2):
1. Requirement layer: In this layer, the goals and behaviors of the system are
determined using a language called Cognitive Specification Language (CSL).
In Saghiri et al. 2018; HamlAbadi et al. 2017; Vahdati et al. 2018, the authors
suggest use CSL, but it seems that any formal language (HTML) and informal
language (English) can be used to determine the goals and behaviors of the system
because cognitive engines can be used to extract goals and behaviors based on
machine learning and natural language-processing (NLP) engines.
2. Cognitive process layer: In this layer, cognitive processes are organized. Each
cognitive process may be designated to manage several tasks. In this layer, the
designer develops one or more cognitive engines, and each cognitive engine has
responsibility for managing certain cognitive processes. The cognitive process
layer takes goals from the requirement layer and executes appropriate algorithms
using sensors and actuators provided by the things’ management layer. Some
essential cognitive processes are given below:
6 IoT-Based Healthcare Monitoring Using Blockchain 155
In this layer, DAO can be implemented based on distributed application logics. This
layer also provides RESTful APIs to cooperate with other systems. The APIs can be
used in internal parts of this architecture.
In this section, to apply the proposed architecture in different case studies, three
algorithms, namely path recommendation for pandemic situations, health insurance
recommendation, and fighting COVID-19 pandemic have been suggested. It should
be noted that a wide range of AI and Blockchain-based solutions are given in the
(Ebadi et al. 2020; Hussain et al. 2020, p. 19; Kassani et al. 2020) to combat COVID-
19. To implement these algorithms, different smart contracts in the cognitive engine
must be provided. Table 6.2 presents descriptions of the smart contracts used for the
proposed algorithms. Five Blockchains are included in the cognitive engines (see
Table 6.3), and different microservices are used for the proposed algorithms. These
services are available on a Blockchain platform. Table 6.4 presents a description of
seven services. Three services viz path services, health insurance services and drug
services are provided in this section.
path information. The user can finally take the safest route to his destination, i.e., in
the case of the COVID-19 pandemic, a low-risk route.
160 M. Vahdati et al.
In health insurance recommendations, each user has an identifier, and his/her infor-
mation is saved in the Blockchain. The system goals are determined based on the
user’s commands with considering user’s environmental information collected by
IoT sensors. The goals of the systems can be set automatically by the system or
manually by the user and is obtained by the cognitive engine. The system’s output
can recommend an appropriate insurance package to the user.
6 IoT-Based Healthcare Monitoring Using Blockchain 161
In the cognitive engine, the corresponding microservices are called to interpret the
commands in order to draw out the goal of recommending an appropriate insurance
package for the customer. In accordance with this goal, an algorithm including three
phases is executed. These phases are explained as follows. In the first phase, different
smart contracts can be fetched. These smart contracts include the following:
• A smart contract for users’ medical records: This smart contract can be used to
produce a suitable insurance package for users, as described in Table 6.2.
• A smart contract for a doctor’s prescription: This smart contract can be used to
produce an insurance package according to an individual’s medical prescription,
as described in Table 6.2.
• A smart contract for user’s DNA information: This smart contract can be used to
produce an insurance package according to an individual’s DNA information, as
described in Table 6.2.
• A smart contract for user allergy information: This smart contract can be used to
produce an insurance package according to an individual’s allergy information,
e.g., an allergy to drugs, a seasonal allergy or other allergies, as described in
Table 6.2.
• A smart contract for clinical test needs: This smart contract can be used to produce
an insurance package according to an individual’s clinical test results, as described
in Table 6.2.
• A smart contract for clinical/hospital/pharmacy information: This smart
contract can be used to produce an insurance package according to clin-
ical/hospital/pharmacy information, locations, and services, as described in
Table 6.2.
• A smart contract for drug information: This smart contract can be used to produce
an insurance package according to an individual’s medication details, as described
in Table 6.2.
• A smart contract for medical diagnosis and screening: This smart contract can
be used to produce an insurance package according to an individual’s medical
diagnosis and screening, as described in Table 6.2.
In the second phase, the corresponding microservices can be called. These smart
contracts include the following:
• RS-Service: This service provides users with a list of insurance recommendations
from the cognitive engines, as described in Table 6.4.
• Infection-Info-Service: This service provides information for cognitive engines
as described in Table 6.4. This service may take into consideration the COVID-19
pandemic in order to create an appropriate package.
• Medical-Supply-Chain-Service: This service provides information for cognitive
engines as described in Table 6.4. Calling this service is used to track medication
information to create an appropriate package with high accuracy.
162 M. Vahdati et al.
In the third phase, the best insurance package can be provided using smart
contracts. During this phase, information can be provided from the Blockchains, and
relevant discounts can be calculated for insurance packages. Finally, the requisite
payment is processed, and the user’s account is updated to reflect the transaction.
In Algorithm 2, the system goals are determined by the user’s commands with partic-
ular attention to user’s environmental information collected by IoT sensors. The goals
of the system can be set automatically by the system or manually by the user and is
obtained by the cognitive engine. System output can be represented on a dashboard.
This dashboard utilizes data that can be used to mitigate the impact of the COVID-19
outbreak through predicting, tracking, detecting and managing the pandemic.
In the cognitive engine, user commands can be organized into a system for
managing COVID-19. According to the system’s goals, all smart contracts (as
described in Table 6.2) can be fetched. In addition, all corresponding services (as
described in Table 6.4) can be called to interpret the commands in order to draw out
the goals. Then, suitable dashboards will be handled by the system for managing
COVID-19 outbreak. Based on the cognitive engine, six dashboards will be repre-
sented to the user as described follows; 1) virus modeling and analysis, 2) predic-
tion of future outbreaks, 3) virus outbreak estimation, 4) risk prediction, 5) medical
development, and 6) COVID-19 test certificate. Furthermore, based on appropriate
information like user’s DNA and information relating to pharmaceutical services,
different treatments can be developed (e.g., drugs and vaccines). This information
can be used to organize an appropriate panel. Eventually, the proposed algorithms will
facilitate verification of COVID-19 antibody testing, vaccines, and then will issue a
valid certificate for them. These certificates will be registered in the Blockchain in
a transparent and immutable manner (Eisenstadt et al. 2020). A panel on the dash-
board is dedicated to show the certificates. The Blockchain-based functionalities of
the proposed architecture will be useful for equitable COVID-19 vaccine distribution.
6 IoT-Based Healthcare Monitoring Using Blockchain 163
In this subsection, potentials of the proposed architecture to solve many of the prob-
lems caused by COVID-19 are studied. To start with, a short description of this disease
is given, and potential applications for the proposed architecture are presented.
COVID-19 is an infectious disease caused by the coronavirus. In this disease,
common symptoms include fever, coughing, shortness of breath, muscle pain, sputum
production, a sore throat, indigestion, and redness of the eyes. The time between
exposure to the disease and the onset of symptoms is 2–14 days. Humans may prevent
this disease by keeping a certain amount of distance among themselves (Mehta et al.
2020; Schwartz et al. 2020).The proposed architecture will handle the following
potential applications:
1. Smart social distance determination: The proposed architecture can determine
social distances, taking into consideration high-risk humans. It seems that deter-
mining a fixed distance for all humans may not be rational because of variations
in medical status from person to person. This application can be implemented
using proposed architecture. Because of access to users’ medical records, IoT
sensors can gather information about the environment in an selective fashion. For
example, for a person with high allergy, sensors focus on allergen entities. The
solution given in Devi et al. (2020) may be used to design an adaptive distance
determination.
164 M. Vahdati et al.
• Portability: Some parts of the system such as the database and back-end are
based on Blockchains, and designers may organize a portable application such as
DAOs using the proposed architecture, considering this feature.
In this chapter, a novel architecture for modern healthcare systems has been proposed.
This architecture is an extension to a recently reported framework for cognitive
IoT based on Blockchain considering healthcare monitoring issues. In comparison
with existing solutions for healthcare monitoring systems, a main advantage of the
proposed architecture is to utilize cognitive computing to organize management
processes in IoT-based Blockchain systems. To show the potential of the proposed
architecture, some case studies aimed at combating COVID-19 have been presented.
In presented case studies, the suggested solutions are able to manage impact of
COVID-19 outbreak. In future work, designing gamification algorithms to change
human behaviors in relation to infection rates may be considered. As another direction
in the future work, digital twin technology may be deployed by the cognitive engines
of the proposed architecture. Digital twin technology may also be used to design
personalized medicine in healthcare systems.
Acknowledgements Last but not least, I am dedicating this chapter to my late father Mohammad
Vahdati gone forever away from our loving eyes and who left a void never to be filled ever. Though
your life was short, I will make sure your memory lives on as long as I shall live. I love you all and
miss you all beyond words.
References
Abujamra, R., & Randall, D. (2019). Chapter Five—Blockchain applications in healthcare and the
opportunities and the advancements due to the new information technology framework. In S.
Kim, G. C. Deka, & P. Zhang (Eds.), Advances in Computers (Vol. 115, pp. 141–154). Elsevier.
https://doi.org/10.1016/bs.adcom.2018.12.002.
Adler, J., Berryhill, R., Veneris, A., Poulos, Z., Veira, N., & Kastania, A. (2018). Astraea: A
decentralized blockchain oracle. In 2018 IEEE international conference on internet of things
(IThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical
and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 1145–1152). https://
doi.org/10.1109/Cybermatics_2018.2018.00207.
Ahmadi, V., Benjelloun, S., El Kik, M., Sharma, T., Chi, H., & Zhou, W. (2020). Drug Governance:
IoT-based blockchain implementation in the pharmaceutical supply chain. Sixth International
Conference on Mobile and Secure Services (MobiSecServ), 2020, 1–8. https://doi.org/10.1109/
MobiSecServ48690.2020.9042950.
Ajerla, D., Mahfuz S., Zulkernine F. (2019). A real-time patient monitoring framework for fall
detection Hindawi. https://doi.org/10.1155/2019/9507938.
166 M. Vahdati et al.
Al-Odat, Z. A., Srinivasan, S. K., Al-qtiemat, E., Dubasi, M. A. L., & Shuja, S. (2018). IoT-based
secure embedded scheme for insulin pump data acquisition and monitoring. ArXiv:1812.02357
[Cs]. https://arxiv.org/abs/1812.02357.
Attia, O., Khoufi, I., Laouiti, A., & Adjih, C. (2019). An IoT-blockchain architecture based on
hyperledger framework for healthcare monitoring application. In 2019 10th IFIP international
conference on new technologies, mobility and security (NTMS) (pp. 1–5). https://doi.org/10.1109/
NTMS.2019.8763849.
Azaria, A., Ekblaw, A., Vieira, T., & Lippman, A. (2016). MedRec: Using blockchain for medical
data access and permission management. In 2016 2nd International Conference on Open and Big
Data(OBD) (pp. 25–30). https://doi.org/10.1109/OBD.2016.11.
Baliga, A. (2017). Understanding blockchain consensus models. https://www.persistent.com/wp-
content/uploads/2018/02/wp-understanding-blockchain-consensus-models.pdf.
Bublitz, M., & F., Oetomo, A., S. Sahu, K., Kuang, A., X. Fadrique, L., E. Velmovitsky, P., M.
Nobrega, R., & P. Morita, P. . (2019). Disruptive technologies for environment and health research:
An overview of artificial intelligence, blockchain, and internet of things. International Journal
of Environmental Research and Public Health, 16(20), 3847. https://doi.org/10.3390/ijerph162
03847.
BurstIQ. (2020). BurstIQ|research foundry|blockchain based healthcare data solutions. https://
www.burstiq.com/.
Cai, W., Wang, Z., Ernst, J. B., Hong, Z., Feng, C., & Leung, V. C. M. (2018). Decentralized
applications: The blockchain-empowered software system. IEEE Access, 6, 53019–53033. https://
doi.org/10.1109/ACCESS.2018.2870644.
CDC. (2020). CDC Works 24/7. Centers for Disease Control and Prevention. https://www.cdc.gov/
index.htm.
Chamola, V., Hassija V., Gupta V., Guizani M. (2020). A comprehensive review of the COVID-19
pandemic and the role of IoT, drones, AI, blockchain, and 5G in managing its impact. IEEE
Access, 8, 90225–90265. https://doi.org/10.1109/ACCESS.2020.2992341.
Chronicled. (2020). Chronicled. https://www.chronicled.com/.
Conoscenti, M., Vetrò, A., & De Martin, J. C. (2016). Blockchain for the internet of things: A
systematic literature review. In 2016 IEEE/ACS 13th international conference of computer systems
and applications (AICCSA) (pp. 1–6). https://doi.org/10.1109/AICCSA.2016.7945805.
Coral Health. (2020). Coral health—building a more connected future in healthcare. https://myc
oralhealth.com/product/.
Dentcoin. (2020). Dentacoin: The blockchain solution for the global dental industry. https://dentac
oin.com/.
Devi, D., Namasudra, S., & Kadry, S. (2020, July 1). A boosting-aided adaptive cluster-based
undersampling approach for treatment of class imbalance problem (Article). International
Journal of Data Warehousing and Mining (IJDWM). www.igi-global.com/article/a-boosting-
aided-adaptive-cluster-based-undersampling-approach-for-treatment-of-class-imbalance-pro
blem/256163.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and
privacy: The case study of a smart home. IEEE International Conference on Pervasive Computing
and Communications Workshops (PerCom Workshops), 2017, 618–623. https://doi.org/10.1109/
PERCOMW.2017.7917634.
Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., & Wang, F. (2018). Secure and trustable
electronic medical records sharing using blockchain. AMIA Annual Symposium Proceedings,
2017, 650–659. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5977675/.
Dwivedi, A. D., Malina, L., Dzurenda, P., & Srivastava, G. (2019a). Optimized blockchain model
for internet of things based healthcare applications. In 2019 42nd international conference on
telecommunications and signal processing (TSP) (pp. 135–139). https://doi.org/10.1109/TSP.
2019.8769060.
6 IoT-Based Healthcare Monitoring Using Blockchain 167
Dwivedi, A. D., Srivastava, G., Dhar, S., & Singh, R. (2019b). A decentralized privacy-preserving
healthcare blockchain for IoT. Sensors (Basel, Switzerland), 19(2). https://doi.org/10.3390/s19
020326.
Ebadi, A., Xi, P., Tremblay, S., Spencer, B., Pall, R., & Wong, A. (2020). Understanding the temporal
evolution of COVID-19 research through machine learning and natural language processing.
ArXiv:2007.11604 [Cs]. https://arxiv.org/abs/2007.11604.
Eisenstadt, M., Ramachandran, M., Chowdhury, N., Third, A., & Domingue, J. (2020). COVID-19
Antibody test/vaccination certification: There’s an app for that. IEEE Open Journal of Engineering
in Medicine and Biology, 1, 148–155. https://doi.org/10.1109/OJEMB.2020.2999214.
Fernández-Caramés, T. M., & Fraga-Lamas, P. (2018). Design of a fog computing, blockchain and
iot-based continuous glucose monitoring system for crowdsourcing mHealth. Proceedings, 4(1),
37. https://doi.org/10.3390/ecsa-5-05757.
Foteinos, V., Kelaidonis, D., Poulios, G., Vlacheas, P., Stavroulaki, V., & Demestichas, P. (2013).
Cognitive management for the internet of things: A framework for enabling autonomous appli-
cations. IEEE Vehicular Technology Magazine, 8(4), 90–99. https://doi.org/10.1109/MVT.2013.
2281657.
GENE-CHAIN. (2020). DNA data marketplace. EncrypGen. https://encrypgen.com/.
Gia, T. N., Ali, M., Dhaou, I. B., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H.
(2017). IoT-based continuous glucose monitoring system: A feasibility study. Procedia Computer
Science, 109, 327–334. https://doi.org/10.1016/j.procs.2017.05.359.
Gordon, W. J., & Catalini, C. (2018). Blockchain technology for healthcare: Facilitating the transi-
tion to patient-driven interoperability. Computational and Structural Biotechnology Journal, 16,
224–230. https://doi.org/10.1016/j.csbj.2018.06.003.
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T.
(2018). Healthcare blockchain system using smart contracts for secure automated remote patient
monitoring. Journal of Medical Systems, 42(7), 130. https://doi.org/10.1007/s10916-018-0982-x.
Gupta, S., Malhotra, V., & Singh, S. N. (2020). Securing IoT-driven remote healthcare data through
blockchain. In M. L. Kolhe, S. Tiwari, M. C. Trivedi, & K. K. Mishra (Eds.), Advances in data
and information sciences (pp. 47–56). Springer. https://doi.org/10.1007/978-981-15-0694-9_6.
HamlAbadi, K. G., Saghiri, A. M., Vahdati, M., Dehghan TakhtFooladi, M., & Meybodi, M. R.
(2017). A framework for cognitive recommender systems in the internet of things (IoT). In
2017 IEEE 4th international conference on knowledge-based engineering and innovation (KBEI)
(pp. 0971–0976). https://doi.org/10.1109/KBEI.2017.8324939.
Hang, L., Choi, E., & Kim, D.-H. (2019). A novel EMR integrity management based on a
medical blockchain platform in hospital. Electronics, 8(4), 467. https://doi.org/10.3390/electr
onics8040467.
Hassanalieragh, M., Page, A., Soyata, T., Sharma, G., Aktas, M., Mateos, G., et al. (2015). Health
monitoring and management using internet-of-things (IoT) sensing with cloud-based processing:
Opportunities and challenges. IEEE International Conference on Services Computing, 2015,
285–292. https://doi.org/10.1109/SCC.2015.47.
Huh, S., Cho, S., & Kim, S. (2017). Managing IoT devices using blockchain platform. In 2017
19th International Conference on Advanced Communication Technology (ICACT) (pp. 464–467).
https://doi.org/10.23919/ICACT.2017.7890132.
Hussain, A. A., Bouachir, O., Al-Turjman, F., & Aloqaily, M. (2020). AI techniques for COVID-19.
IEEE Access, 8, 128776–128795. https://doi.org/10.1109/ACCESS.2020.3007939.
Islam, A., & Shin, S. Y. (2019). BHMUS: blockchain based secure outdoor health monitoring scheme
using UAV in smart city. In 2019 7th international conference on information and communication
technology (ICoICT) (pp. 1–6). https://doi.org/10.1109/ICoICT.2019.8835373.
Jacobsen, H.-A., Sadoghi, M., Tabatabaei, M. H., Vitenberg, R., & Zhang, K. (2018). Blockchain
landscape and AI renaissance: The bright path forward. In Proceedings of the 19th international
middleware conference tutorials, Vol. 1. https://doi.org/10.1145/3279945.3279947.
Jaiswal, K., Sobhanayak, S., Turuk, A. K., Bibhudatta, S. L., Mohanta, B. K., & Jena, D. (2018). An
IoT-cloud based smart healthcare monitoring system using container based virtual environment
168 M. Vahdati et al.
Mišić, V. B., Mišić, J., & Chang, X. (2019). Towards a blockchain-based healthcare information
system: Invited paper. IEEE/CIC international conference on communications in China (ICCC),
2019, 13–18. https://doi.org/10.1109/ICCChina.2019.8855911.
Mohammed, J., Lung, C.-H., Ocneanu, A., Thakral, A., Jones, C., & Adler, A. (2014). Internet
of things: Remote patient monitoring using web services and cloud computing. In 2014 IEEE
international conference on internet of things (IThings), and IEEE green computing and commu-
nications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) (pp. 256–263).
https://doi.org/10.1109/iThings.2014.45.
Namasudra, S., & Roy, P. (2017). Time saving protocol for data accessing in cloud computing. IET
Communications, 11(10), 1558–1565. https://doi.org/10.1049/iet-com.2016.0777.
Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balusamy, B. (2017). Time efficient secure
DNA based access control model for cloud computing environment. Future Generation Computer
Systems, 73, 90–105. https://doi.org/10.1016/j.future.2017.01.017.
Namasudra, S. (Ed.). (2018). Taxonomy of DNA-based security models. In Advances of DNA
computing in cryptography (pp. 53–68). Taylor & Francis. https://doi.org/10.1201/978135101
1419-3.
Namasudra, S., & Deka, G. C. (2018). Advances of DNA computing in cryptography. Taylor &
Francis. https://doi.org/10.1201/9781351011419.
Namasudra, S., Deka, G. C., & Deka, G. C. (2018). Introduction of DNA computing in cryptography.
In Advances of DNA computing in cryptography (pp. 17–34). Taylor & Francis. https://doi.org/
10.1201/9781351011419-1.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4364.
Namasudra, S, Chakraborty, R., Majumder, A., & Moparthi, N. R. (2020a). Securing multimedia
by using DNA based encryption in the cloud computing environment. ACM Transactions on
Multimedia Computing, Communications, and Applications.
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020b). The revolution
of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in
Engineering. https://doi.org/10.1007/s11831-020-09426-0.
Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020c). Towards DNA based
data security in the cloud computing environment. Computer Communications, 151, 539–547.
https://doi.org/10.1016/j.comcom.2019.12.041.
Nelaturu, K., Mavridou, A., Veneris, A., & Laszka, A. (2020). Verified development and deployment
of multiple interacting smart contracts with VeriSolid, Vol. 9.
Othman, W. A. F. W. (2019). IoT-based intelligent medication dose calculator for kids
in Drugstore. International Journal of Engineering Creativity & Innovation, 1(2),
15–29. https://www.academia.edu/40791933/IoT-Based_Intelligent_Medication_Dose_Calcul
ator_for_Kids_in_Drugstore.
Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafito, A. (2018). Blockchain and IoT
integration: A systematic survey. Sensors, 18(8), 2575. https://doi.org/10.3390/s18082575.
Ramezan, G., & Leung, C. (2018). A Blockchain-based contractual routing protocol for the internet
of things using smart contracts (Research Article). Hindawi: Wireless Communications and
Mobile Computing. https://doi.org/10.1155/2018/4029591.
Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with
IoT. Challenges and opportunities. Future Generation Computer Systems, 88, 173–190. https://
doi.org/10.1016/j.future.2018.05.046.
Saddik, A. E., Hossain, M. S., & Kantarci, B. (Eds.). (2020). Connected health in smart cities.
Springer International Publishing. https://doi.org/10.1007/978-3-030-27844-1.
Saghiri, A. M. (2020a). Blockchain Architecture. In S. Kim & G. C. Deka (Eds.), Advanced appli-
cations of blockchain technology (pp. 161–176). Springer. https://doi.org/10.1007/978-981-13-
8775-3_8.
170 M. Vahdati et al.
Saghiri, A. M. (2020b). A Survey on challenges in designing cognitive engines. In 2020 6th inter-
national conference on web research (ICWR) (pp. 165–171). https://doi.org/10.1109/ICWR49
608.2020.9122273.
Saghiri, A. M., HamlAbadi, K. G., & Vahdati, M. (2020). The internet of things, artificial intelli-
gence, and blockchain: implementation perspectives. In S. Kim & G. C. Deka (Eds.), Advanced
applications of blockchain technology (pp. 15–54). Springer. https://doi.org/10.1007/978-981-
13-8775-3_2.
Saghiri, A. M., Vahdati, M., Gholizadeh, K., Meybodi, M. R., Dehghan, M., & Rashidi, H. (2018).
A framework for cognitive Internet of Things based on blockchain. In 2018 4th International
Conference on Web Research (ICWR) (pp. 138–143). https://doi.org/10.1109/ICWR.2018.838
7250.
Schwartz, J., King, C.-C., & Yen, M.-Y. (2020). Protecting healthcare workers during the coronavirus
disease 2019 (COVID-19) outbreak: Lessons From Taiwan’s severe acute respiratory syndrome
response. Clinical Infectious Diseases. https://doi.org/10.1093/cid/ciaa255.
SimplyVital Health. (2020). SimplyVital health|F6S. https://www.f6s.com/simplyvitalhealth.
Srivastava, G., Crichigno, J., & Dhar, S. (2019). A light and secure healthcare blockchain for IoT
medical devices. IEEE Canadian Conference of Electrical and Computer Engineering (CCECE),
2019, 1–5. https://doi.org/10.1109/CCECE.2019.8861593.
Stark, J. (2016, June 4). Making sense of blockchain smart contracts. CoinDesk. https://www.coi
ndesk.com/making-sense-smart-contracts.
Szabo, N. (1996). Smart contracts: Building blocks for digital markets. Extropy, 16(18), 2.
Torky, M., & Hassanien, A. E. (2020). COVID-19 blockchain framework: Innovative approach.
ArXiv:2004.06081 [Cs]. https://arxiv.org/abs/2004.06081.
Vahdati, M., Gholizadeh HamlAbadi, K., Saghiri, A. M., & Rashidi, H. (2018). A self-organized
framework for insurance based on internet of things and blockchain. In 2018 IEEE 6th interna-
tional conference on future internet of things and cloud (FiCloud) (pp. 169–175). https://doi.org/
10.1109/FiCloud.2018.00032.
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., & Wang, F.-Y. (2019a). Blockchain-enabled smart
contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and
Cybernetics: Systems, 49(11), 2266–2277. https://doi.org/10.1109/TSMC.2019.2895123.
Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., et al. (2019b). A survey on
consensus mechanisms and mining strategy management in blockchain networks. IEEE Access,
7, 22328–22370. https://doi.org/10.1109/ACCESS.2019.2896108.
Wang, Y., Samavi, R., & Sood, N. (2019c). Blockchain-based marketplace for software testing. In
2019 17th international conference on privacy, security and trust (PST) (pp. 1–3). https://doi.
org/10.1109/PST47121.2019.8949025.
Wang, Y., Kwong, S., Leung, H., Lu, J., Smith, M. H., Trajkovic, L., et al. (2020). Brain-inspired
systems: A transdisciplinary exploration on cognitive cybernetics, humanity, and systems science
toward autonomous artificial intelligence. IEEE Systems, Man, and Cybernetics Magazine, 6(1),
6–13. https://doi.org/10.1109/MSMC.2018.2889502.
Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., Du, X., & Guizani, M. (2017). MeDShare: Trust-less
medical data sharing among cloud service providers via blockchain. IEEE Access, 5, 14757–
14767. https://doi.org/10.1109/ACCESS.2017.2730843.
XMED Chain. (2018). MED chain (XMC) is the world 1st global medical blockchain and AI big
data platform, specializing in cross-border medical solutions. https://www.accesswire.com/491
915/XMED-Chain-XMC-is-the-World-1st-Global-Medical-Blockchain-and-AI-Big-Data-Pla
tform-Specializing-in-Cross-border-Medical-Solutions.
Zhang, K., Vitenberg, R., & Jacobsen, H.-A. (2018). Deconstructing blockchains: Concepts,
systems, and insights. In Proceedings of the 12th ACM international conference on distributed
and event-based systems (pp. 187–190). https://doi.org/10.1145/3210284.3219502.
Chapter 7
Healthify: A Blockchain-Based
Distributed Application for Health care
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 171
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_7
172 P. Sharma et al.
7.1 Introduction
cloud environment (Namasudra 2018). However, cloud environment also faces data
security issues (Namasudra 2019).
This chapter designs an application that focused on blockchain and protects health
data. In this architecture, users can upload and publish health data periodically.
Doctors, patients, or health analyzers can access the data at anytime and anywhere.
There is a large amount of medical information with the exponential growth of
the hospital’s report. It is not sufficient to document full user information in the
blockchain, as the resource requirements are extremely high for each node on the
blockchain. Considering each blockchain node’s limited storage capacity, an Inter-
Planetary File System (IPFS) supports to share document for high integrity and
durability data storage. There is no single repository in IPFS, and the information is
circulated and collected in various IPFS nodes throughout the Internet. Hence, IPFS
has no single failure point. Without replication, a large volume of data can effectively
spread in IPFS (Nizamuddin et al. 2018). The document stored on the IPFS frame-
work has one distinct hash sequence. In the proposed architecture, complete user
health information is uploaded on the IPFS file framework. Within IPFS, the only
hash sequence of medical information is saved in blockchain to check the validity
of the data and to map the entire data. Healthcare architecture thus promotes the
collection of large-scale health data and has excellent usability. The contributions of
the chapter are given below:
1. This chapter proposes a blockchain-based distributed application for the protec-
tion of large-scale healthcare data, called Healthify. In Healthify application,
clients are allowed to publish healthcare information and access treatments from
doctors. In the meantime, doctors are capable of reading information from users
and upload diagnosis.
2. Healthify distinguishes data publishing transactions from access control transac-
tions. The healthcare information is encoded and processed in IPFS, which may
effectively decrease the overhead of processing while maintaining the protection
of healthcare data.
3. Healthify supports integrity checking and enhances security of the healthcare
data.
and an appropriate prevention strategy. Today, hospitals and healthcare providers are
commonly using EHRs to monitor the medical data of patients using a client–server
architecture (Rind et al. 1997; Schoenberg and Safran 2000; Uckert et al. 2002;
Grant et al. 2006; Gritzalis and Lambrinoudakis 2004; Bonacina et al. 2007; Ibraimi
et al. 2009). But the hospitals are the primary data guardians in this form of data
management system for health care. This thing makes it hard for medical practi-
tioners to give a specific diagnosis or treatment of illness whenever necessary. It is
also tough for sick persons to have a clear understanding of the health records, as their
prescription data mostly found in multiple health centers. Over the past few years,
researchers and organizations have created several cloud-based medical information
management methods (Fernández-Cardeñosa et al. 2012; Bahga and Madisetti 2013;
Zangara et al. 2014) to enable a patient to monitor their medical data from different
organizations. In these schemes, however, a patient maintains essential health infor-
mation in a concentrated cloud-based repository that struggles from a single failure
point and makes the plan vulnerable to mistakes, cyberthreats, and leakage of data.
As a consequence, the present cloud-based and client server-based health informa-
tion monitoring methods are suffering from device vulnerability problems, lack of
transparency, protection, and security, as noted above.
with the existing physician data storage solutions and allows for scalability. The appli-
cation enables the physicians to share on the blockchain medical records of patients.
The authors use patient information as a reward for miners, keeping the security of
patient information at greater liability. The authors of Dagher et al. (2018) and Li
et al. (2018) proposed a smart contract-based system for accessing health information
using Ethereum.
The authors of Fan et al. (2018) recommend MedBlock, a blockchain-based health
information delivery scheme that provides efficient accessibility and extraction of
EHRs for an authenticated network. These work (Azaria et al. 2016; Dagher et al.
2018; Li et al. 2018; Fan et al. 2018) do not permit a sick person to transfer data
on their health problems and activities to the blockchain network that would help
healthcare professionals strengthen their treatment and follow-up. On the other hand,
the writers of Dey et al. (2017), Yue et al. (2016) suggest the need for blockchain
for sharing patient information. However, it only allows medical practitioners to
access the health records of patients and does not allow the professionals to dissem-
inate the medical data of patients to the network (treatments, outcomes of labs, and
medication). The authors (Uddin et al. 2018) suggest a medical data network to
exchange health information between different health centers and patients through
blockchain. This study permits both hospitals and physicians to upload patient health
records on the blockchain network, giving a full overview of a patient’s records.
Shen et al. (2019) introduce a system to use blockchain and peer-to-peer networks
such as MedChain to exchange medical data. This system was designed to produce
healthcare data via medical inspection and collect patient data from IoT sensors and
other mobile applications. Zhang et al. (2017) addressed how blockchain-based smart
contracts can resolve various healthcare concerns. They introduced some initial steps
to incorporate blockchain technology for specific healthcare use cases and pointed
to numerous obstacles in adopting blockchain technology. They also elaborated that
creating blockchain-based applications will more effectively tackle healthcare issues.
many other advantages like medical data security, patient identity safety, and care
management. The critical healthcare problems that blockchain technology can tackle
are described below.
• Ensuring security: Ensuring data protection in health care is one of the crit-
ical issues when sharing information among different stakeholders, such as
doctors, research and development units, health agencies, government sectors,
and information given to their caregivers.
• Ensuring the integrity of health records: Improving or preserving the high
degree of data integrity is essential in health care, as these documents indicate
medication, laboratory check, and significant procedure. Record errors may lead
to misdiagnosis and insufficient treatment. These errors can be generated during
record exchange, sharing, and storage in electronic systems.
• Centralized health records: Health information is exceptionally susceptible and
must be protected appropriately. A centralized cloud-based healthcare solution
reveals customer privacy to commercial benefit. For example, consumers only
enable authorized healthcare professionals to access their health data. Still, cloud
providers may release customized EHRs from users for scientific research, medi-
cation advertising, and so on, without the customer’s consent. Where there is a
diagnostic conflict, the patient can assume that the main EHRs saved in the cloud
altered as third-party mistrust.
• Limited access to health records: In terms of the sharing of information on health
care, there is restricted access to health records to ensure security; however, this
often creates obstacles in investigating the study of different conditions and the
results of such medications.
• Interoperability of healthcare information and requests: Interoperability prob-
lems occur when it comes to accessing, sharing, and storing healthcare applica-
tions and data. It first involves confidence building between various stakeholders
and maintaining safe access and transactions. It is assumed that the blockchain is
capable of overcoming these challenges. This chapter also analyzes and explains
how the proposed architecture handles and provides a solution for each identified
problem in the analysis section.
This section provides an outline of blockchain technology and explains basic terms
and related technologies.
7 Healthify: A Blockchain-Based Distributed Application … 177
Smart contracts are coding functions stored on a ledger. Users can specifically call or
establish smart contracts to activate any action (e.g., modifying a smart contract vari-
able through a transaction that could trigger a confirmation response to the contract).
When smart contract methods are called, each entity in the network runs the code,
verifying the output against other nodes through the consensus algorithm. Subse-
quently, the smart function call (arguments) may be added to the blockchain as a
178 P. Sharma et al.
This section presents the architecture of the proposed application for secure health-
care data management. The architecture contains the main components, such as a
smart contract, IPFS storage, and distributed application, as shown in Fig. 7.1. A
blockchain-based smart contract is designed to check the authenticity of the users
and maintain the integrity of the healthcare data. The smart contract consists of
various functions that are deployed on the blockchain network. Smart contract execu-
tion triggers automatically whenever the user initiates a request to upload/access the
healthcare data to check the user’s authenticity. The healthcare data is stored in the
form of blocks in the peer-to-peer IPFS storage network. The application is imple-
mented to guarantee that anybody, including the users themselves, cannot manipulate
the transactions of users. The application has three types of user transactions: data
transactions, data access transactions, and validation transactions. Data transactions
are used to upload healthcare data, data access transactions are used for accessing
data, and validation transactions are handled to safeguard data integrity.
Figure 7.1 presents a layered architecture of the application. It describes all the
entities of the application in different layers showing how the data flows through
them and the functionalities of each layer.
Data Collection Layer The first layer, data collection layer, consisted of different
users, and the user interface of the Healthify using which the users interact with
the application. Firstly, users register on the platform using a distributed application
(Dapp), and his/her details are stored on the Ethereum network using the smart
contract. The user receives a unique address using which the user interacts on the
Dapp. Through the application portal, users may collect their health data. The users
may upload the data manually or can set a time after which the data will upload. The
user sends data on the Dapp, where it accumulates the healthcare data in the form of
files, and the user can also visualize the data and registered doctors list.
Data Processing Layer The second layer is the data processing layer. The Healthify
will utilize the Ethereum platform for implementation, and the blockchain user
utilizes the platform’s functionalities. The users authorize by their public addresses
and digital signatures, and they are generated using their private keys, which ensure
the authority. User access manages using the public–private keys of each user, and
the users can access the data only according to their provided access and authority.
Storage Layer The last layer is the storage layer, which consists of smart contract
and IPFS storage. The smart contract provides a primary application backend that
governs all tasks and authorities of the user. The smart contract is responsible for
creating a record, checking integrity, transferring data, and funds between users. The
smart contract uses an authentication process to ensure the accessibility of security
service. It can check to see if users’ transactions are valid and legitimate. A smart
contract manages the authenticity of the users by checking if the legit user is using the
application. The IPFS storage layer is the layer where the individual healthcare data
are stored, and the user has received a unique hash of the file. The data is encrypted
using the Advanced Encryption Standard (AES) algorithm before uploading it to
the IPFS storage node. The IPFS is a peer-to-peer network and security procedures
to store and share information in a decentralized manner. IPFS utilizes information
addressing to locate each document in a global namespace that uniquely connects
all computing devices. In contrast to a central server, IPFS is developed through
a distributed client–operator scheme, which holds a percentage of the aggregate
information, generating a robust document processing and exchanging system. The
unique file hash is stored on the Ethereum network (smart contract) to maintain the
user’s record.
This work assumes that a protected connection exists between the system and the
user node. Doctor nodes follow the criteria strictly and honestly give the diagnoses.
180 P. Sharma et al.
User and medical professional private keys are protected in storage. The shared IPFS
servers used for saving data use encryption to collect data from users and doctors
safely and stably. It is believed that hospitals or a person who is not part of the
network could be a malicious attacker. Intruders may imitate a customer identifi-
cation, generate malicious blocks or transactions, interfere with interaction, reject
operations, remove or alter transaction information. The network’s critical threat
groups may be divided into four categories: threats to availability, threats to confi-
dentiality, threats to authentication, access control, and threats to integrity. Threats to
availability create problems for a ledger user to view their data, while confidentiality
threats create security-related issues for a user’s healthcare data. Threats to authen-
tication involve the imitation of a client to obtain entry to his records. Threats to
integrity create problems for application users to access correct healthcare data. The
discussion and explanation describe how the proposed architecture handles them in
the analysis section.
currently registered user. Similarly, the same function is designed for other users of
the application.
Algorithm 2 represents the file uploading function. This function is called when
the user is uploading the health data on the blockchain. This function stores the IPFS
hash of the encrypted file on the smart contract. The conditional statements check if
the function is called by a valid user only.
(continued)
2. Algorithm to Upload File (addFile (_fileHash))
1. if (isPatient[msg.sender] == true)
2. Print “Address is not Patient”;
3. end
4. PatientData[msg.sender].push(_fileHash);
Algorithm 3 function is called when the user wants to share (or send) the data to any
authorized user. It shows the sample function for registered patients. This function
also deducts the doctor’s fee from the patient account and reverts if the user has
insufficient token balance. Similarly, the function is called by the doctor/diagnostic
center to send a prescription/report to the patient. Once the prescription/report is
sent, the user receives the fee which is stored in the contract.
This section presents a model that shows how the user interacts with the Healthify
application and all processes functionalities. Firstly, users register on the platform
using a Dapp, and his/her details are stored on the Ethereum network using a smart
contract. The user receives a unique address using which the user interacts on the
Dapp. Whenever a user wants, the user can send the data to the IPFS file storage, and
in return, the user receives a unique hash corresponding to the stored file. This unique
file hash is stored on the Ethereum network as well (smart contract) to maintain a
record of the user. If a user wants to send his data to another user, the user can transfer
the file (not actual file but only the file hash) along with the fee in the form of tokens.
Once the user receives the hash of the file, she/he views the file content and can send
the response to the user accordingly.
The application basically would consist of four separate users. They will engage
in delivering improved healthcare services through the joint use of self-monitoring
and specialist consultation. The shared relationship occurs as the patient will be given
the option to send the data to the doctor for review, provide feedback, and then act
on his advice. The model of interaction for each user is described below.
Patient Patient satisfaction is an important aspect of the medical sector and the
lifeline for any health-related enterprise or initiative. Personal well-being is a concern
for most of us, and that is why the need for the hour is to find the most effective ways
184 P. Sharma et al.
Step 1: Initially, the patient must register with the application by providing various
personal information, including his name, age, sex, etc., and data is stored on a
Fig. 7.3 a Flow diagram of patient. b The flow diagram of doctor. c The flow diagram of diagnostic
center. d The flow diagram of healthcare analyzer
7 Healthify: A Blockchain-Based Distributed Application … 185
smart contract. The registration phase is compulsory until the user can use the
functionalities of the software. The user then logs on using his/her specific address.
Step 2: Upon logging into the application, the user has a few choices on the
portal. The user can upload the health data using the portal options. Before the data
uploading process, data is encrypted using the AES algorithm to provide a more
secure environment. After encryption, information is divided into multiple shards
and stored in the distributed platform supplied by the IPFS. In response, the user
receives a unique hash corresponding to the uploaded file, which is further utilized
by the user for sharing the file to the doctors or for accessing the file. The data file
186 P. Sharma et al.
for healthcare is created from the consumer’s data over a given period. After this file
is submitted to the application, it will allow the applicant to continue obtaining the
diagnosis/prescription from the application’s registered doctors.
Step 3: The user selects the doctor from the registered doctor list and sends the
individual stored health data unique hash to the doctor. When sending the request,
the selected doctor’s fees deducted from the patient account and save on a smart
contract. The smart contract automatically transfers the stored tokens in the doctor’s
account once the patient receives the prescription.
Doctor The work of a doctor is essential to every medical care process, and we
include the provision in our proposal to obtain input from doctors. The patient should
be able to report to the selected doctor. But this feature must depend entirely on
the customer’s decision whether she/he follows the doctor’s feedback. Interaction
between the patients and the doctors was a significant obstacle due to the hectic
schedules and availability of physicians. It is a little inconvenient for patients to call
the doctors anytime of the day, given the fact that real-time contact is highly needed
for treatments and cures. The medical apps, fortunately, provide instant solutions
to this issue. Medical applications are provided between healthcare providers and
patients to address this challenge in the industry. Doctors are actively using digital
technologies to ease their day-to-day processes and provide their patients with effec-
tive, enhanced, and improved care solutions. Therefore, the proposed application
provides the interaction between the patients and the doctors to combat the issues
mentioned above. Figure 7.3b represents the stepwise overall flow of the registered
doctor.
Step 1: The doctor registers on the application using the same procedure and then
uses his unique credentials to sign in to the application.
Step 2: When the doctor is logged in, she/he should be able to view a patient’s data
via a user interface, which allows him/her to pick the patients. After the patient’s
selection, the data should be available for the review by the doctors, except that
after reviewing the patient’s information, the doctor should be able to add his/her
suggestions or input. Remember that the data used for monitoring will not be editable
by either the patient or the physician. Doctors are allowed to view the files using the
file hash shared by the patients.
Step 3: Once the doctor uploads the prescriptions, the prescription sends to the
patients in the same manner, and the doctor receives his fee in the form of tokens,
especially design for the proposed application. After posting the doctor’s comments,
the user/patient will be able to see that once after signing in to their account.
Diagnostic Center One of the most tedious tasks for everyone is receiving medical
records from test centers. Adding to that was the pain of taking these reports to doctors
or having immediate consultation about the same. Mobile apps make electronic
monitoring of their health records simple for patients. Patients may check the reports
directly from the centers, and the same can be exchanged immediately with the
doctors. Therefore, no more trouble picking up files from centers or carrying them to
hospitals. Thus, the proposed application allows diagnostic centers to register at the
7 Healthify: A Blockchain-Based Distributed Application … 187
portal and provide quick services to the users in a more secure manner. Figure 7.3c
represents the overall flow of the registered diagnostic center.
Step 1: The diagnostic center starts with the registration process and obtains
unique credentials.
Step 2: After logging into the system, the diagnostic may store the generated
reports to the IPFS storage and obtained the unique hash of the file.
Step 3: The diagnostic shares the stored report hash to the registered patients by
checking the details stored on the smart contract. The diagnostic center also allows
to check the integrity of the shared document and ensures security.
Healthcare Analyzer Healthcare experts include a wide range of specialists and
practitioners who provide some form of healthcare service, including primary care
practitioners such as nurses, doctors, surgeons, physical therapists, medical labora-
tories, healthcare researchers, scientists, and social workers. They mostly work in
hospitals, healthcare centers, and other service delivery points, but often in academic
training, science, and management. Health analysts play a key and essential role in
enhancing the quality of health care. Based on the primary healthcare model, they
provide critical services that promote wellness, prevent diseases, and provide health-
care services to patients, families, and communities. Thus, the proposed application
included the interface for healthcare analyzers to provide a medium for improving
the quality of health care. Figure 7.3d shows the stepwise overall flow of healthcare
analyzers.
Step 1: The healthcare analyzer starts with the registration process and obtains
unique credentials.
Step 2: After the registration process, healthcare analyzer may utilize healthcare
data to improve the quality of healthcare services, tools, medications, and diagnostic
methods.
In this section, we are dealing with validating Healthify efficiency and viability. The
section is further split into two subparts. The first subsection presented the imple-
mentation and deployment setting of the application. In the second part, we analyze
the application’s performance by using the processing time required for uploading
different sized files on IPFS, the computation time needed for the completion of the
transactions, and the cost incurred for the deployment of the smart contract.
has been used to develop smart contracts for healthcare blockchain. This is an open-
source platform and presently one of the largest public blockchain networks with
an active community and a large collection of public Dapp. The Dapp can detect
discrepancies, unauthorized access to the data, and missing objects. Ganache tool
is used to setting up Healthify blockchain network to deploy contracts, develop
Dapp, and run tests. It provides the environment to perform all the actions on the
main chain. Ganache also provides ten default user accounts, each with a hundred
Ether. The proposed application experimental setup consists of two parts, distributed
application setup and a smart contract deployment. Thus, the implementation settings
are described in two tables, respectively, to explain each part. Table 7.1 describes the
development environment of a distributed application. The user interface is designed
using React Native as it has excellent compatibility with the Ethereum client. Node
JS is used to connect with the backend, i.e., connection with Ethereum and IPFS.
The deployment settings of smart contracts are described in Table 7.2. Smart
contracts are developed in Solidity language, which is the primary smart contract
language for Ethereum. These are designed by using online compiler remix.ethereum.
The key elements of the smart contracts are functions, events, state variables, and
modifiers and are written in the Solidity programming language. The remix test
network is used to deploy smart contracts on the testnet, and Ethers are utilized to
pay the transaction fee. Three stages are involved in the creation of smart contracts,
which use Solidity programming to write, compile, and announce. The real-time
compiler Solidity creates the bytecode. Ethereum wallet is used to announce smart
contracts to the blockchain.
This section presents the actual results of the work to assess the output of the proposed
application. Several experimental tests were performed using various parameters.
The processing time would include the time to send a transaction query to access
the health document and the amount of time it takes for the upload process until the
user receives an acknowledgment. For this test, we used different sized health files
and noted the time for each file uploading process, as shown in Table 7.3. These are
approximate times, and these solely depend on the number of peers and the Internet
connection speed at the moment.
The proposed architecture is also evaluated for computation time required for
data storage, data access, and validation transactions. The computation time is the
average time taken by the proposed application to execute the series of transactions
requested by the users. As shown in Fig. 7.4, the Healthify application calculated
the computation time for a series of hundred transactions. A total of five hundred
transactions are initiated by different users to analyze the computation time of the
proposed application for different types of transactions.
Computation Time
400-500
No. of Transactions
300-400
200-300
100-200
0-100
system. Users are allowed to access the stored files by using unique hash obtained
at the time of the uploading process. The unique sequence of hash mapping with
document provides a secure and efficient environment. Users can securely access
the data anytime, anywhere, by using the gadgets.
2. Threats to confidentiality: Healthify used the AES algorithm to encrypt the health
data, thus preventing secrecy. It utilizes the IPFS for storing health data. There-
fore, due to the immutability feature of decentralized storage and mapping of
data to the hash, the attackers cannot access data and prevent confidentiality.
3. Threats to authentication and access control: In essence, the proposed application
provides the registration portal through which users may obtain the credentials
and access the application portal services according to the role assigned.
4. Threat to integrity: In the attack on data manipulation, an intruder attempts to
change or erase a specific user’s information. The application’s data cannot be
changed because of the blockchain’s immutability feature. If the intruder attempts
to alter or remove any information, the network may detect the violation using
the application’s integrity check function and notifies the users.
7.8 Discussion
This section discussed the potential solutions provided by the distributed applica-
tion for the secure management of broad-scale health data. It also presents a useful
comparison between the existing approaches and proposed application and highlights
the assessment findings.
This section presents the analysis of identified problem statements in Sect. 7.3. All
the defined problem statements are analyzed along with the potential solutions deliv-
ered by the proposed application. Table 7.6 represents the solutions provided by the
proposed application.
7.8.2 Comparison
This section performs the proposed platform’s comparative analysis with some of
the latest platforms examined in the related work. A comparison survey is conducted
to illustrate the built platform’s performance and flexibility, and the findings of the
assessment are summarized in Table 7.7.
192 P. Sharma et al.
Table 7.7 Comparative analysis of the proposed application with the existing studies
Author Cryptocurrency Mining Smart Blockchain Integrity File Access
used required contract platform checking storage policy
Azaria No Yes No Permissioned Yes Database Yes
et al. gatekeeper
(2016)
Dagher No Yes Yes Permissioned Yes EHR DB Yes
et al.
(2018)
Li et al. No Yes Yes Consortium Yes Cloud Yes
(2018) storage
Fan et al. No No No Permissioned Yes Blockchain Yes
(2018) as storage
Dey et al. No Yes Yes Permissioned No IPFS Yes
(2017)
Yue et al. No No No Permissionless Yes Blockchain Yes
(2016) cloud
Uddin Yes Yes Yes Customized Yes Blockchain Yes
et al. blockchain cloud
(2018)
Shen et al. No No No Permissioned Yes Healthcare Yes
(2019) database
Proposed Yes (tokens) Yes Yes Permissioned Yes IPFS Yes
application
7 Healthify: A Blockchain-Based Distributed Application … 193
For this analysis, the characteristics mentioned above play a crucial role in
comparing the existing frameworks. It also represents the overall blockchain plat-
form’s success and shows the importance of our proposed approach. As shown in
Table 7.7, the proposed system offers a more appropriate environment for storing
healthcare data as compared with the existing works for the following reasons:
(1) Users may use the distributed application anywhere anytime by using smart-
phones, (2) utilized the decentralized storage (IPFS) for securely saving users files
instead of static databases, (3) designed tokens for providing services to the users.
It also prevents the malicious activities, (4) designed smart contract to store user-
related/token-related information during the communication between the users, (5)
the health data of each individual can only be accessed by him/herself.
This chapter introduced a distributed application for secure authentication and access
control of broad-scale health data. We have implemented the application to guar-
antee that the medical data of patients is secured to prevent diagnostic conflicts.
We designed a smart contract for authentication, access control, file sharing, and
token management process to obtain secure and flexible healthcare data manage-
ment. Furthermore, users can validate the integrity of documents to ensure security
and privacy at anytime. The results, performance evaluation, security analysis, and
comparison study show that our plan fulfilled the safety and storage requirements.
The proposed application could easily be extended by providing more services to
users in the healthcare domain.
Key Terms and Definitions
Healthcare Data Healthcare data is a digital version of a patient’s paper medical
history that provides information to approved healthcare practitioners instantly and
securely. They include patient medical and may store information outside traditional
clinical data obtained at a provider’s office, such as diagnoses, medicines, treatment
options, reactions, and test results.
Distributed Application (Dapp) A Dapp is an independently managed open-source
application that operates its data and stores records cryptographically in a distributed
blockchain (e.g., via a smart contract) to avoid single points of failure. To monetize
the Dapp, it uses a new or cryptographic token. The tokens are required to use the
services provided by the application.
InterPlanetary File System (IPFS) The IPFS is a decentralized, peer-to-peer file
network designed to link all computer nodes to the same file system. There is no
single repository in IPFS, and the information is circulated and collected in various
IPFS nodes throughout the Internet. Hence, IPFS has no single failure point. Without
replication, vast volumes of data can effectively spread in IPFS. The document stored
on the IPFS framework has one distinct hash sequence.
194 P. Sharma et al.
Advanced Encryption Standard (AES) The more popular and widely adopted
symmetric encryption algorithm. AES is a cryptographic cipher that uses a block
length of 128 bits and key lengths of 128, 192, or 256 bits. AES is based on a
design principle known as a substitution–permutation network and is efficient in
both software and hardware. It is essential for computer security, cybersecurity, and
electronic data protection.
References
Fan, K., Wang, S., Ren, Y., Li, H., & Yang, Y. (2018). MedBlock: Efficient and secure medical data
sharing via blockchain. Journal of Medical System, 42(8).
Fernández-Cardeñosa, G., de la Torre-Díez, I., López-Coronado, M., & Rodrigues, J. J. P. C. (2012).
Analysis of cloud-based solutions on EHRs systems in different scenarios. Journal of Medical
Systems, 36(6), 3777–3782.
Florian, G. (2017). Pervasive decentralisation of digital infrastructures: A framework for blockchain
enabled system and use case analysis. In Proceedings of the Hawaii International Conference on
System Sciences, Puako, HI, USA.
Gipp, B., Kosti, J., & Breitinger, C. (2016). Securing video integrity using decentralized trusted
timestamping on the bitcoin blockchain. In Proceedings of the Mediterranean Conference on
Information Systems (MCIS) (p. 51), Paphos, Cyprus.
Grant, R. W., Wald, J. S., Poon, E. G., Schnipper, J. L., Gandhi, T. K., Volk, L. A., & Middleton, B.
(2006). Design and implementation of a web-based patient portal linked to an ambulatory care
electronic health record: Patient gateway for diabetes collaborative care. Diabetes Technology
and Therapeutics, 8(5), 576–586.
Griebel, L., Prokosch, H. U., Köpcke, F., Toddenroth, D., Christoph, J., Leb, I., Engel, I., & Sedlmayr,
M. (2015). A scoping review of cloud computing in healthcare. BMC Medical Informatics and
Decision Making, 15(1).
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T.
(2018). Healthcare blockchain system using smart contracts for secure automated remote patient
monitoring. Journal of Medical Systems, 42(7).
Gritzalis, D., & Lambrinoudakis, C. (2004). A security architecture for interconnecting health
information systems. International Journal of Medical Informatics, 73(3), 305–309.
Guo, R., Shi, H., Zhao, Q., & Zheng, D. (2018). Secure attribute-based signature scheme with
multiple authorities for blockchain in electronic health records systems. IEEE Access, 6, 11676–
11686.
Hölbl, M., Kompara, M., Kamisalic, A., & Zlatolas, L. N. (2018). A systematic review of the use
of blockchain in healthcare. Symmetry, 10, 470.
Hussein, F., Arunkumar, N., Ramírez-González, G., Abdulhay, E., Tavares, J. M. R., & de Albu-
querque, V. H. C. (2018). A medical records managing and securing blockchain based system
supported by a genetic algorithm and discrete wavelet transform. Cognitive Systems Research
Journal, 52, 1–11.
Ibraimi, L., Asim, M., & Petković, M. (2009). Secure management of personal health records
by applying attribute-based encryption. In Proceedings of the 6th International Workshop on
Wearable Micro and Nano Technologies for Personalized Health (pp. 71–74).
James, F. P. (2018). Blockchain technology simplified: The complete guide to blockchain manage-
ment, mining, trading and investing cryptocurrency. CreateSpace Independent Publishing
Platform. Available online: https://dl.acm.org/doi/book/10.5555/3208750
Jamoom, E., Yang, N., & Hing, E. (2016). Adoption of certified electronic health record systems
and electronic information sharing in physician offices: United States, 2013 and 2014. NCHS
Data Brief, 1–8. US Department of Health and Human Services, Centers for Disease Control and
Prevention, National Center for Health Statistics.
Juneja, A., & Marefat, M. (2018). Leveraging blockchain for retraining deep learning architecture
in patient-specific arrhythmia classification. In Proceedings of the IEEE EMBS International
Conference on Biomedical and Health Informatics (BHI), Las Vegas, Nevada, USA (pp. 393–397).
Khatoon, A., Verma, P., Southernwood, J., Massey, B., & Corcoran, P. (2019). Blockchain in energy
efficiency: Potential applications and benefits. Energies, 12, 3317.
Li, H., Zhu, L., Shen, M., Gao, F., Tao, X., & Liu, S. (2018). Blockchain-based data preservation
system for medical data. Journal of Medical System, 42(8).
Liang, X., Zhao, J., Shetty, S., Liu, J., & Li, D. (2017). Integrating blockchain for data sharing
and collaboration in mobile healthcare applications. In Proceedings of the IEEE 28th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
(pp. 1–5).
196 P. Sharma et al.
McGhin, T., Choo, K.-K.R., Liu, C. Z., & He, D. (2019). Blockchain in healthcare applications:
Research challenges and opportunities. Journal of Network and Computer Applications, 135,
62–75.
Mehdi, B., & Ravaud, P. (2017). Blockchain technology for improving clinical research quality.
Trials, 18, 335.
Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection
meets blockchain technology: A review. IEEE Access, 6, 10179–10188.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. [Online]. Available: https://
www.bitcoin.org/bitcoin.pdf
Namasudra, S. (2018). Cloud computing: A new era. Journal of Fundamental and Applied Sciences,
10(2), 113–135.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. Concurrency and Computation: Practice and Exercise, 31, 3. https://doi.
org/10.1002/cpe.4364
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020). The revolution
of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in
Engineering. https://doi.org/10.1007/s11831-020-09426-0
Nizamuddin, N., Hasan, H. R., & Salah, K. (2018). IPFS-blockchain-based authenticity of online
publications. In Proceeding of the International Conference on Blockchain (pp. 199–212).
Ovais, A. (2017). Block chain technology: Concept of digital economics. Munich, Germany:
University Library of Munich, Germany.
Patel, V. (2018). A framework for secure and decentralized sharing of medical imaging data via
blockchain consensus. Health Informatics Journal, 25(4), 1398–1411.
Rabah, K. V. O. (2017). Challenges & opportunities for blockchain powered healthcare systems: A
review. Mara Research Journal of Medical and Health Sciences, 1, 45–52.
Rind, D. M., Kohane, I. S., Szolovits, P., Safran, C., Chueh, H. C., & Barnett, G. O. (1997).
Maintaining the confidentiality of medical records shared over the internet and the world wide
web. Annals of Internal Medicine, 127(2), 138–141.
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relation-
ships to sustainable supply chain management. International Journal of Production Research,
57, 2117–2135.
Saravanan, M., Shubha, R., Marks, A. M., & Iyer, V. (2017). SMEAD: A secured mobile enabled
assisting device for diabetics monitoring. In Proceedings of the IEEE International Conference
on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1–6).
Schoenberg, R., & Safran, C. (2000). Internet based repository of medical records that retains patient
confidentiality. British Medical Journal, 321(7270), 1199–1203.
Sharma, P., Jindal, R., & Borah, M. D. (2019). Blockchain-based integrity protection system for
cloud storage. In Proceedings of the 4th Technology Innovation Management and Engineering
Science International Conference (TIMES-iCON) (pp. 1–5), Bangkok, Thailand.
Shen, B., Guo, J., & Yang, Y. (2019). MedChain: Efficient healthcare data sharing via blockchain.
Applied Sciences, 9, 1207.
Suveen, A., Krumholz, H. M., & Schulz, W. L. (2017). Blockchain technology: Applications in
health care. Circulation: Cardiovascular Quality and Outcomes, 10, e003800.
Uckert, F., Görz, M., Ataian, M., & Prokosch, H. U. (2002). Akteonline—An electronic healthcare
record as a medium for information and communication. Studies in Health Technology and
Informatics, 90, 293–297.
Uddin, M. A., Stranieri, A., Gondal, I., & Balasubramanian, V. (2018). Continuous patient
monitoring with a patient centric agent: A block architecture. IEEE Access, 6, 32700–32726.
Wang, H., & Song, Y. (2018). Secure cloud-based EHR system using attribute based cryptosystem
and blockchain. Journal of Medical Systems, 42(8).
Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum
Project, Yellow Paper, 151, 1–32. Zug, Switzerland.
7 Healthify: A Blockchain-Based Distributed Application … 197
Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on
blockchain technology?—A systematic review. PLoS ONE, 11, e0163477.
Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: Found healthcare
intelligence on blockchain with novel privacy risk control. Journal of Medical System, 40(10).
Zangara, G., Corso, P. P., Cangemi, F., Millonzi, F., Collova, F., & Scarlatella, A. (2014). A
cloud-based architecture to support electronic health record. Studies in Health Technology and
Informatics, 207, 380–389.
Zhang, X., & Poslad, S. (2018). Blockchain support for flexible queries with granular access control
to electronic medical records (EMR). In Proceedings of the IEEE International Conference on
Communications (ICC) (pp. 1–6).
Zhang, J., Xue, N., & Huang, X. (2016). A secure system for pervasive social network-based
healthcare. IEEE Access, 4, 9239–9250.
Zhang, P., White, J., Schmidt, D. C., & Lenz, G. (2017). Design of blockchain-based apps using
familiar software patterns to address interoperability challenges in healthcare. In Proceedings of
the PLoP-24th Conference on Pattern Languages of Programs, Vancouver, BC, Canada
Zyskind, G., & Nathan, O. (2015). Decentralizing privacy: Using blockchain to protect personal
data. In Proceedings of the IEEE Security and Privacy Workshops, San Jose, CA, USA, May
21–22, 2015.
Rajni Jindal is working as Professor and Head at the Computer Engineering Department, Delhi
Technological University, Delhi. She received her M.E. from Delhi College of Engineering. She
completed her Ph.D. (Computer Engineering) from Faculty of Technology, Delhi University,
Delhi. She also worked as Professor (IT), Dean (Research and Collaboration) at Indira Gandhi
Delhi Technical University for women, Delhi, for 3 years. She possesses a work experience of
around 29 years in research and academics.
Her research interests include database systems, data mining, operating systems, and compiler
design. She has authored around 100 research papers and articles for various national and inter-
national journals/conferences and five books. She is a senior member of IEEE and a life member
of CSI.
Malaya Dutta Borah is an Assistant Professor in the Department of Computer Science and Engi-
neering at the National Institute of Technology (NIT) Silchar, Assam, India. Before joining NIT
Silchar, she worked at Assam Engineering College, Delhi Technological University, Inderprastha
Engineering College.
She has received her Engineering Degree (B.Tech.) in Computer Science and Engineering,
Master of Engineering (with distinction) in Computer Technology and Applications, and Ph.D. in
Computer Science and Engineering. She has authored/co-authored around 30 research papers in
national/international journals/conferences. She is actively involved in research works in the field
of data mining, blockchain technology, cloud computing, ICT, and e-governance. As of now, she
has organized three international conferences (Springer and IEEE) in India as Organizing Chair,
198 P. Sharma et al.
Finance Chair, and member. She is an editorial board member of the International Journal of Infor-
mation Systems and Social Change, IGI-Global, and reviewer for various journals and interna-
tional conferences. She is the associate member of CSI (India) and IEEE. Online Profile: https://
cs.nits.ac.in/malaya/.
Chapter 8
Blockchain in Pharmaceutical Sector
M. Kumari (B)
Department of ECE, Chandigarh University, Punjab, India
e-mail: [email protected]
M. Gupta
Department of CSE, Chandigarh University, Punjab, India
e-mail: [email protected]
C. Ved
Department of Information Technology, Bharati Vidyapeeth’s College of Engineering, Delhi, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 199
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_8
200 M. Kumari et al.
8.1 Introduction
Blockchain Block
Node 1
Blockchain Blockchain
Node 2 Node 3
Block Block
Fig. 8.1 Architecture of blockchain (Nofer et al. 2017; Mohanta et al. 2019)
et al. 2019). Inefficient transactions, poorly performing supply chains, pilferage and
fraud supply chains lead to trust shortage thus the need for good information sharing,
traceability and verifiability (Saberi et al. 2019; Xu et al. 2016).
paper provides the concept of the electronic payment system based on cryptography,
and it also provides the solution to the two times money spending where no one
can spend money more than one. After an open-source bitcoin implemented, the
system was released within a few months. The first bitcoin network was begun in
2009 (Sarmah 2018; Albanese et al. 2020). Bitcoin holds the lion share, the most
famous market cryptocurrency among the others such as Dogecoin, Litecoin, etc.
(Sarmah 2018; Alladi et al. 2019a). Schöner, Manuela M, et al. presented a blockchain
technology-based solution for enhancing the supply chain privacy and security for
the pharmaceutical industry means supply chain security (Schöner et al. 2017).
Kshetri, Nir reported the effect of blockchain is examined on supply chain manage-
ment by considering the concept of speed, risk reduction, cost, quality and flexibility.
The case studies in this paper show transparency and accountability of supply chain
management and various ways to achieve the above supply chain goals (Kshetri 2018;
Abou Jaoude and George Saade 2019). Clauson, Kevin A et al. presented the various
challenges, issues and opportunities associated with using blockchain technology
in health care for the deployment of health supply chain in pharmaceutical supply,
Internet of healthy things (IoHT), public health sectors and medical devices has been
discussed. The results show that critical challenges in the health supply chain can be
omitted by the development of blockchain technology in health care (Clauson et al.
2018; Tamazirt et al. 2018).
Again, in (Jain and Mishra 2018), the introduction of blockchain technology,
uses in different applications and future scope in supply chain in the next gener-
ations has been presented. Further, the authors discussed the security and trust of
blockchain with its challenges and solutions against counterfeit malpractices for
supply chain. Also, the role of blockchain in improving business relationships to
know the truth about this technology has been discussed. Chang, Yanling et al.
discussed the blockchain technology is introduced in supply chain management for
sustainability and its applications. Then, its major advantages are described to main-
tain sustainability dimensions along with various challenges while implementation
of blockchain technology in a sustainable supply chain (Chang et al. 2019). Also, in
(Wu and Lin 2019), the decision-making process, corrective and preventative action
(CAPA), out of specification (OOS), out of trend (OOT) and the action of the working
group have been recalled in blockchain technology in the pharmaceutical field. This
helps in shortening time, protecting and transparency.
Chang, Yanling et al. provided the use of blockchain technology to provide critical
synthesis has been presented. Again, the taxonomy of pilot initiatives in the pharma-
ceutical industry for the wide applications of blockchain technology in the private
field has been provided. The efforts, implications and open challenge of blockchain
technology for governmental agencies and the existing gaps among governmental
agencies, the private sector and the public sector are also identified (Chang et al.
2019). Also, Jameela and Nader proposed and reviewed various industrial applica-
tion fields for using blockchain technologies. It also explores the benefits, opportu-
nities and open challenges of blockchain technology in different industrial applica-
tions has been presented. It also identifies the basic requirements that support the
applications of blockchain for various industrial applications that has been revised
8 Blockchain in Pharmaceutical Sector 203
latest academic and industrial frontiers in blockchain technology in the supply chain
transport management and logistics system. The systematic review and co-citation
analysis contain four main clusters, namely traceability/transparency, trust, trade
and technology, which have been presented (Rejeb 2018). The applied inductive
method in reasoning and the emerging themes along with various applications of
blockchain technology for supply chains, transport and logistics have been applied.
It is concluded that future-based blockchain technology’s main themes and its appli-
cations (Pournader et al. 2019). It is observed that there are very few existing reviews
that focus on the role of blockchain in pharmaceutical industries and its applications.
Specifically, in this chapter, the detailed review of the role of blockchain in pharma-
ceutical industries to create visibility, traceability and privacy to the medicines and
drugs system among people has been presented (Si et al. 2019; Mistry et al. 2020).
Thus, in this chapter, blockchain technology in the pharmaceutical sector has been
explained in detail. Here, it has been discussed that how the blockchain technology
in the supply chain for the pharmaceutical sector helps to add visibility, traceability
and privacy to the medicines and drugs system (Mougayar 2020; Horst Treiblmaier
2020). Firstly, it has been explained how the drug usability, its impact on patients’
health and data recorded to the blockchain database for the future purpose. Secondary,
the authorized blockchain used for these statistics to store the transactions has been
discussed. Also, its future applications, challenges and solutions to guard people’s
life are discussed (Khezr et al. 2019; Rejeb 2018; Sengupta et al. 2020). Here, the
introduction about blockchain technology, its background and its role in pharma-
ceutical industries have been introduced in Sect. 8.1. In Sect. 8.2, telemedicine in
blockchain for pharmaceutical sectors and its advantages as well as disadvantages
has been described. Section 8.3 describes the pharmaceutical drug discovery process.
Section 8.4 presents the blockchain-based supply chain in pharmaceutical industries
that incorporating the supply chain process to manage and detect fake drug using
blockchain technology. Sections 8.5 and 8.6 present the applications, challenges
and future research opportunities, respectively. Finally, the conclusion is drawn in
Sect. 8.7.
8.2 Telemedicine
(Norris 2001). Also, some of the examples are given as follows which are significant
to tackle technology (Hjelm 2005).
1. Access extension: The enlarging healthcare access to communities as well as
individuals who have restricted, erratic or no access to medical services has
encouraged telemedicine developers from recent times. Beneficiaries consist of
patients who reside in rural areas with limited healthcare professionals for care
and residents who live in periodically cut-off areas form general transport by
worst weather (Tachakraet al. 2003).
2. Traveler’s health care: Public members who live within fixed access to medical
services at first level may see themselves contradict their travels (Dhillon and
Forducey 2006).
3. Military applications: These applications in perception are comparable
providing health care for patients and travelers from general access to first-level
medical facilities. Since the circumstances are different, and the conventional
disease incidence to emergency conditions is normally opposite civilian life
(Dhillon and Forducey 2006). Major advantages of telemedicine are as follows:
• It has enhanced information access.
• Enhanced services access and improving care delivery.
• Enhanced professional education.
• Screening programmers quality control.
• Minimize healthcare costs.
Table 8.1 Current open issues within the modern pharmaceutical industries (Bell et al. 2017)
S. No Issues Working in pharmaceutical industries
1 Data exchange The healthcare data must be passed between medical providers and
necessary third patients insure and parties with high protection
2 Interoperability These should be a single standard for medical data exchange
3 Device tracking The medical tracking device allows for the swift curing of devices,
protection of fraud analysis and repurchasing
4 Drug tracking Drug tracking from the supply chain for patients allows for the
protection of counterfeit drugs
drugs are the world problem with general consumers and public risks. Thus, many
researchers are working on pharmacy surveillance blockchain system which will
improve the transparency, traceability and integrity of counterfeit drugs (Chang et al.
2019; Khezr et al. 2019).
The supply chain and smart contract with distributed ledgers motive for providing
interoperability and developing a traceable and transparent system in the pharma-
ceutical sector. To increase the tracing and tracking ability in the pharmaceutical
supply chain, there is a requirement of integrating the smart contract-based system
with the distributed ledgers (Khezr et al. 2019). The smart contract will play the role
of getting digital signatures recorded in digital signature-based distributed ledger
with an increment of each phase in the supply chain, which is incorporated with a
transaction-based distributed ledger (Valentina et al. 2020; Rosa Righi and Alberti
2020). At each incremental phase in the supply chain, the smart contract also gets
updated with the next phase. To maintain transparency and security of supplies, this
system will provide this capability to every node to cross-verify its previous digital
signatures and transactions at any point. It will be going to maintain trustability
between the trustable organization and non-trustable organizations will improve the
transparency, traceability and integrity of counterfeit drugs (Chang et al. 2019; Khezr
et al. 2019) (Table 8.1).
All the above challenges in pharmaceutical industries can be overcome by
blockchain technology as follows (Bell et al. 2017; Kosba et al. 2016).
1. Blockchain can help to reduce the increasing risk of unapproved and counter-
feit drugs. With the help of blockchain technology, the healthcare device can
track drugs and identify pills with integrated smart GPS and chain of custody
mechanism (Agbo and Mahmoud 2020).
2. In healthcare clinical trials, blockchain can minimize fraudulent results and data
removal, which is not significant for the researcher’s bias.
3. It allows for an immutable log to be kept the trail subject consent.
8 Blockchain in Pharmaceutical Sector 207
The pharmaceutical drug chain starts with the development process of a drug as the
pharmaceutical drug development process is a complex process that takes an average
of fifteen years, starting from the discovery of drugs to regulatory approval. For this,
the pharmaceutical industrial process is structured into three phases, wherein the first
phase lots of test phases proceeded by industries to the various test phases and at
last market access is granted. It starts with discovery followed by pre-clinical testing
and finally filed for patent protection. As shown in Fig. 8.2, firstly, the clinical test
starts with primary healthy human testing, followed by testing in a larger community
of patients for safety and efficacy. These trails are done in three phases, such as
phase 1, phase 2 and phase 3. In these phases, the efficacy, effeteness and safety are
tested. Moreover, each phase is ended up with a proceeded decision, termination or
suspended testing. After clinical trial completion, the firms may file for marketing
approval. Here, the critical decision goes to the market to control the pharmaceutical
organizations (We et al. 2017) (Fig. 8.3).
For this, the new drug is regulated by a government agency to control the phar-
maceutical industry by exercised trusted regulatory control. Then, pharmaceutical
industrial negotiate pricing after successful authorization of markets with other stake-
holders, e.g., payers. The added value is processed by the pharmaceutical innovator
and reviewed by the efficient and quality institute (Tamazirt et al. 2018). When
the drug is up-scaled for distribution and manufacturing, the consumers’ safety and
quality are the main issue (Di Francesco Maesa and Mori 2020). Supply chain privacy
is one of the main aspects that won attention to the drug supply chain security imple-
mented. Then, after successful implementation of act verification of the drug, legit-
imacy is done to enhance the detection of illegal medicines. At last, by packing and
selling the drugs in a country with minimum price, the various opportunities occur in
pharmaceutical companies (Deshpande et al. 2017; Radanović and Likić 2018). The
blockchain technology can have an opportunity to increase security, trust and trans-
parency with users being able to track drugs in pharmaceutical industries through
supply chain management. With the help of blockchain, only trusted patties can be
delivered by scanned code bar to see the product history for ensuring verification,
tracking, notification and identification in case of the illegitimate drug found (Bell
et al. 2017; Radanović and Likić 2018) (Fig. 8.4).
208 M. Kumari et al.
Phase 3
Volunteer
paƟent, validity,
Approval 3.5 years
Drug
Development
Process
Pre-clinical Phase 2
Research and Volunteer
animal test, paƟent, safety,
paƟent 2 years
protecƟon, 6
years
Phase 1
Healthy, safety,
1.5 years
transparency from brands, producers and manufacturers throughout the whole supply
chain (Hussein et al. 2019). For this, blockchain technology tracking capabilities will
provide a full audit trail for every touchpoint of transaction data in the supply chain.
This will help in improving the traceability of the supply chain among government,
customers and businesses with the authenticity of products for sustainable supply
chain (Chang et al. 2019; Dorri and Dorri 2017).
Patients
7
Healthcare
providers/
Retailers
Warehouse
6
Out
Transpiration 5
Warehouse In 4
Manufacturing 3
Plant
Pharmaceutical 2
Clinical Research
Fig. 8.5 Steps of working blockchain technology in pharmaceutical industries (Khezr et al. 2019)
the movement of pharmaceuticals and for their authentication throughout the supply
chain. Every manufactured item could be marked by a unique code, and blockchain
could be used to check the authenticity of the code and the product (Schöner et al.
2017).
Further, the supply chain consists of distinct partners: carriers, forwarders, pre-
wholesale providers, wholesalers, etc. The quality management is significant to the
pharmaceutical sector. Here, each supply chain participant has an important role
in providing quality, efficient and safe medicine in public and provides a result of
therapy responsibility. Securing and protecting the pharmaceutical supply channel
need constant vigilance in collection with channel partners such as distributor, manu-
facturer and pharmacy with state and regulatory agencies. But the medicinal product
quality affected by adequate control lack over various activities that happen during
the process of distribution. Thus, to maintain the real medicinal product quality, each
activity consisted of their distribution should be bearded as per the good manufac-
turing practice (GMP), good distribution practice (GDP) and good storage practice
(GSP) principles (Stoimenova et al. 2013; Di Francesco Maesa and Mori 2020;
Biswas and Muthukkumarasamy 2016).
• The blockchain technology can secure the private data move fast and timely
(Radanović and Likić 2018; Eklund 2019).
• The education of medical is an important field for showing the benefit of
blockchain technology in the pharmaceutical field. This technology can be used
to track and store the medical education data among students in the form of
records on the digital ledger for continue growing, achieving, an article written,
rate and share the performance of every procedure performed (Clauson et al. 2018;
Radanović and Likić 2018).
coins to spend many times, which is also known as double spend. This attack
is more resistant to bitcoin having more cryptocurrencies with communities of
miners. Thus, security plays an important part in protecting from such attacks.
Unfortunately, the blockchain technology and its models increase the vulner-
ability while operating on multiple platforms (Radanović and Likić 2018; Nir
Kshetri 2019).
2. Integration: As the blockchain solutions are integrated with multiple distributed
applications to enable the addition of new applications used within the pharma-
ceutical industries. This leads to challenges due to security and interoperability
issues. The example of this challenge are smooth and secure integrated legacy
applications, different operating environment and platforms need incorporation to
operate blockchain-based solutions in pharmaceutical industries (Kleinaki et al.
2018). Moreover, the integration process becomes more complex due to the pres-
ence of different environments, methodologies and programming languages in
integrated pharmaceutical organizations. Further, the integration must be secure,
consistent, reliable and available for opening new doors for tomorrow phar-
maceutical industrial sectors (Jain and Mishra 2018; Al-Jaroodi and Mohamed
2019).
3. Scalability: As the current pharmaceutical industries require blockchain tech-
nology to generate a large number of transactions to link and process, which may
easily reduce the performance of the healthcare system (Hussein et al. 2019).
Moreover, the bigger the blockchain size in pharmaceutical industries slower will
be the process. Scaling becomes a major issue when the no. of entries involved
increases in transitions performed. These issues create the operational and busi-
ness issues to pharmaceutical industries applications (Al-Jaroodi and Mohamed
2019; Saberi et al. 2018).
4. Privacy: In a public blockchain, some pharmaceutical industries participants can
verify and view the transitions, contribution, etc., in the blockchain process while
others cannot. However, all participants are restricted to the strict agreement on
authorization policies. Also, in the private blockchain transition process, the oper-
ation and control are done by a single entry with its own rule and regulation (Siyal
et al. 2019) as the different blockchain types are used in variable applications.
In a public blockchain, all pharmaceutical industry participants are difficult to
maintain who can see all the transition process. While in private pharmaceutical
industries, participants have high degree of security and privacy needed, which
is generally considered as insecure (Al-Jaroodi and Mohamed 2019; Moin et al.
2019).
5. Technological challenges: The lack of technical and technological knowledge
of blockchain technology is a serious challenge for the adoption of blockchain
technology in pharmaceutical industries (Saberi et al. 2019). It requires a certain
degree of literacy of complex and simple blockchain. Thus, efforts are neces-
sary for improving user experience and developing blockchain protocols (Chang
et al. 2019; Moin et al. 2019; Namasudra et al. 2017b, 2020b; Namasudra 2018;
Namasudra and Deka 2018; Sarkar et al. 2015) (Fig. 8.6).
8 Blockchain in Pharmaceutical Sector 215
Technolo
gical
Privacy
challenges
Further, blockchain technology can solve the various problems presents in phar-
maceutical industries. A trusted owner can enable novel healthcare solutions, and the
right machine can enable the novel business model to lead new dynamic healthcare
stakeholders like providers and patients (Mohanta 2019; Schöner et al. 2017).
8.7 Conclusion
blockchain would restrict medical data from being stolen or changed. Consequently,
the blockchain-based biomedical domain system will grab patients more in their
excellent health care to ultimately enhance the quality of human life.
References
Abou Jaoude, J., & George Saade, R. (2019). Blockchain applications—usage in different domains.
IEEE Access, 7, 45360–45381.
Agbo, C. C., & Mahmoud, Q. H. (2020). Blockchain in healthcare.
Albanese, G., Calbimonte, J. P., Schumacher, M., & Calvaresi, D. (2020). Dynamic consent manage-
ment for clinical trials via private blockchain technology. Journal of Ambient Intelligence and
Humanized Computing.
Aleksic, S. (2019). A survey on optical technologies for IoT, smart industry, and smart infrastruc-
tures. Journal of Sensor and Actuator Networks, 8(3).
Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500–
36515.
Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. M. (2019a). Blockchain applications for industry
4.0 and industrial IoT : A review. IEEE Access, 1.
Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. K. R. (2019b). Blockchain applications for
Industry 4.0 and Industrial IoT: A review. IEEE Access, 7, 176935–176951.
Ameri, F., Stecke, K. E., & Gregor von Cieminski, G. (2020). Advances in production management
systems. Production management for the factory of the future.
Andanda, P. (2013). Managing intellectual property rights over clinical trial data to promote access
and benefit sharing in public health. ICT-International Review of Intellectual Property and
Competition Law, 44(2), 140–177.
Awan, M. U., Raouf, A., Ahmad, N., & Sparks, L. (2009). Total quality management in developing
countries: A case of pharmaceutical wholesale distribution in Pakistan. International Journal of
Pharmaceutical and Healthcare Mark, 3(4), 363–380.
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2017). Applications of blockchain within
healthcare. Blockchain Healthcare Today, 1–7.
Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology
securing smart cities using blockchain technology (pp. 5–7).
Chang, Y., Iakovou, E., & Shi, W. (2019). Blockchain in global supply chains and cross border trade:
a critical synthesis of the state-of-the-art, challenges and opportunities. International Journal of
Production Research, 1–18.
Chen, H., & Huang, X. (2018). Will blockchain technology transform healthcare and biomedical
sciences? EC Pharmacology and Toxicology, 6(11), 910–911.
Clauson, K. A., Breeden, E. A., Davidson, C., & Timothy, K. (2018). Leveraging blockchain tech-
nology to enhance supply chain management in healthcare: An exploration of challenges and
opportunities in the health supply chain. Blockchain in Healthcare Today, 1–12.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). BlockChain technology: Beyond
bitcoin. Applied Innovation Review, 2, 5–20.
da Rosa Righi, R., & Alberti, A. M., (2020). Blockchain technology for industry 4.0.
Deshpande, A., Stewart, K., Lepetit, L., & Gunashekar, S. (2017a). Distributed ledger technolo-
gies/blockchain: Challenges, opportunities and the prospects for standards. The British Standards
Institution, 82.
Deshpande, A., Stewart, K., Lepetit, L., & Gunashekar, S. (2017b). Overview report distributed
ledger technologies/blockchain : Challenges, opportunities and the prospects for standards.
8 Blockchain in Pharmaceutical Sector 217
Dhillon, H., & Forducey, P. G. (2006). Implementation and evaluation of information technology
in telemedicine. In Proceedings of Annual Hawaii International Conference of System Sciences
(Vol. 5, no. C, pp. 1–10).
Di Francesco Maesa D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel
and Distributed Computing, 138, 99–114.
Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2018). Untangling blockchain:
A data processing view of blockchain systems. IEEE Transactions on Knowledge and Data
Engineering, 30(7), 1366–1385.
Dorri, A., & Dorri, A. (2017). Towards an optimized blockchain for IoT towards an optimized
blockchain for IoT.
Eklund, J. M. (2019). Blockchain technology in healthcare : A systematic review.
Hasselgren, A., Kralevska, K., Gligoroski, D., Pedersen, S. A., Faxvaag, A. (2020). Blockchain in
healthcare and health sciences—A scoping review. International Journal of Medical Informatics,
134, 104040.
Hjelm, N. M. (2005). Benefits and drawbacks of telemedicine. Journal of Telemedicine and
Telecare., 11(2), 60–70.
Horst Treiblmaier, T. C. (2020). Blockchain and distributed ledger technology use cases.
Hussein, A. F., ALZubaidi, A. K., Habash, Q. A., & Jaber, M. M. (2019). An adaptive biomedical
data managing scheme based on the blockchain technique. Applied Science, 9(12).
Jain, V. N., & Mishra, D. (2018). Blockchain for supply chain and manufacturing industries and
future it holds! International Journal of Engineering Research, V7(09).
Jain, R., Gupta, M., Nayyar, A., & Sharma, N. (2020). Adoption of fog computing in healthcare 4.0.
In Tanwar, S. (Eds.),Fog computing for healthcare 4.0 environments. Signals and communication
technology. Springer, Cham. https://doi.org/10.1007/978-3-030-46197-3_1.
Jovic, A., Jozic, K., Kukolja, D., Friganovic, K., & Cifrek, M. (2018). Challenges in designing
software architectures for web-based biomedical signal analysis. In Medical big data internet of
medical things (pp. 81–111).
Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019). Blockchain technology in
healthcare: A comprehensive review and directions for future research. Applied Sciences, 9(9),
1–28.
Kleinaki, A. S., Mytis-Gkometh, P., Drosatos, G., Efraimidis, P. S., & Kaldoudi, E. (2018). A
blockchain-based notarization service for biomedical knowledge retrieval. Computational and
Structural Biotechnology Journal, 16, 288–297.
Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of
cryptography and privacy-preserving smart contracts. In Proceedings—2016 IEEE Symposium
on Security Privacy, SP (pp. 839–858).
Kshetri, N. (2018). 1 Blockchain’s roles in meeting key supply chain management objectives.
International Journal of Information Management, 39, 80–89.
Lamb, J. A., & Curtin, J. A. (2019). Translational medicine: Insights from interdisciplinary graduate
research training. Trends in Biotechnology, 37(3), 227–230.
MacDonald, L. (2017). Trading globally in Austrian history: Vereinigte bühnen wien. In The
Palgrave handbook of musical theatre producers (pp. 343–349).
Makhdoom, I., Abolhasan, M., Abbas, H., & Ni, W. (2019). Blockchain’s adoption in IoT: The
challenges, and a way forward. Journal of Network and Computer Applications, 125, 251–279.
Mamoshina, P., Ojomoko, L., Yanovich, Y., Ostrovski, A., Botezatu, A., Prikhodko, P., et al. (2018).
Converging blockchain and next-generation artificial intelligence technologies to decentralize and
accelerate biomedical research and healthcare. Oncotarget, 9(5), 5665–5690.
Mistry, I., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Blockchain for 5G-enabled IoT for industrial
automation : A systematic review, solutions, and challenges. Mechanical Systems and Signal
Processing, 135, 106382.
Mohanta, B. K., Jena, D., & Panda, S. S. (2019). Internet of Things blockchain technology : A
survey on applications and security privacy challenges. Internet of Things, 8, 100107.
218 M. Kumari et al.
Moin, S., Karim, A., Safdar, Z., Safdar, K., Ahmed, E., & Imran, M. (2019). Securing IoTs in
distributed blockchain: Analysis, requirements and open issues. Future Generation Computer
Systems, 100, 325–343.
Mougayar, W. (2020). The business blockchain: Promise, practice, and application of the next
internet technology.
Namasudra, S. (2018). Cloud computing: A new era. Journal of Fundamental and Applied Sciences,
10(2), 113–135.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. Concurrency and Computation: Practice and Exercise, 31(3). https://doi.
org/10.1002/cpe.4364.
Namasudra, S., & Deka, G. C. (2018). Advances of DNA computing in cryptography. Taylor &
Francis. ISBN: 9780815385325.
Namasudra, S., & Roy, P. (2017). Time saving protocol for data accessing in cloud computing. IET
Communications, 11(10), 1558–1565.
Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balamurugan, B. (2017a) Time efficient
secure DNA based access control model for cloud computing environment. Future Generation
Computer Systems, 73, 90–105.
Namasudra, S., Roy, P., Balamurugan, B., Vijayakumar, P. (2017b). Data accessing based on the
popularity value for cloud computing. In Proceedings of the International Conference on Innova-
tions in Information, Embedded and Communications Systems (ICIIECS) (pp. 109–113). IEEE,
Coimbatore, India.
Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2020a). Securing multimedia
by using DNA based encryption in the cloud computing environment. ACM Transactions on
Multimedia Computing, Communications, and Applications (in press).
Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020b). Towards DNA based
data security in the cloud computing environment. Computer Communications, 151, 539–547.
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020c) The revolution
of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in
Engineering. https://doi.org/10.1007/s11831-020-09426-0.
Nir Kshetri, E. L. (2019). Blockchain adoption in supply chain networks in Asia. IT Professional,
21(1), 11–15.
Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business and Information
Systems Engineering, 59(3), 183–187.
Norris, A. C. (2001). The strategic support of telemedicine and telecare. Health Informatics Journal,
7(2), 81–89.
Nozari, H., & Szmelter, A. (2020). Global supply chains in the pharmaceutical industry.
Pournader, M., Shi, Y., Seuring, S., & Koh, S. C. L. (2019). Blockchain applications in supply
chains, transport and logistics: A systematic review of the literature. International Journal of
Production Research, 1–19.
Qian, F., Guo, J., Jiang, Z., & Shen, B. (2018). Translational bioinformatics for cholangiocarcinoma:
Opportunities and challenges. International Journal of Biological Sciences, 14(8), 920–929.
Qin, Z. S. (2017). Special collection of bioinformatics in the era of precision medicine. Quantitative
Biology, 5(4), 277–279.
Radanović, I., & Likić, R. (2018). Opportunities for use of blockchain technology in medicine.
Applied Health Economics and Health Policy, 16(5), 583–590.
Ratta, P., Kaur, A., & Sharma, S. (2020). Blockchain—Secure decentralized technology blockchain-
secure decentralized technology.
Rejeb, A. (2018a). Blockchain potential in tilapia supply chain in Ghana. Acta Technica Jaurinensis,
11(2), 104–118.
Rejeb, A. (2018b). Blockchain potential in Tilapia supply chain in Ghana. Acta Technica Jaurinensis,
11(2), 104–118.
8 Blockchain in Pharmaceutical Sector 219
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2018). Blockchain technology and its relation-
ships to sustainable supply chain management. International Journal of Production Research,
1–19.
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relation-
ships to sustainable supply chain management. International Journal of Production Research,
57(7), 2117–2135.
Sarkar, S., Saha, K., Namasudra, S., & Roy, P. (2015). An efficient and time saving web service
based android application. SSRG International Journal of Computer Science and Engineering
(SSRG-IJCSE), 2(8), 18–21.
Sarmah, S. S. (2018). Understanding Blockchain Technology. Computer Science and Engineering,
8(2), 23–29.
Schöner, M., Kourouklis, D., Sandner, P., Gonzalez, E., Förster, J. (2017). Blockchain technology
in the pharmaceutical industry. FSBC Working Paper, pp. 1–9.
Segarra, J., Sales, V., & Prat, J. (2019). Versatile metro-access network integrating FTTH, enter-
prises, IoT and 5G services. In International Conference on Transparent Optical Networks (Vol.
2019, pp. 1–6).
Seliem, M., & Elgazzar, K. (2019). BIoMT: Blockchain for the internet of medical things. In 2019
IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom
2019.
Sengupta, J., Ruj, S., & Das, S. (2020). A comprehensive survey on attacks, security issues and
blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149,
102481.
Service, C., & Via, P. (2017). MeDShare : Trust-less medical data sharing among. IEEE Access, 5,
1–10.
Si, H., Sun, C., Li, Y., Qiao, H., & Shi, L. (2019). IoT information sharing security mechanism
based on blockchain technology. Future Generation Computer Systems, 101, 1028–1040.
Siyal, A. A., Junejo, A. Z., Zawish, M., Ahmed, K., Khalil, A., & Soursou, G. (2019). Applica-
tions of blockchain technology in medicine and healthcare: Challenges and future perspectives.
Cryptography, 3(1), 3.
Stoimenova, A., Savova, A., Manova, M., & Petrova, G. (2013). Quality management in pharmaceu-
tical procurement: Most frequent non-conformities in pharmaceutical wholesalers in Bulgaria.
Biotechnology and Biotechnological Equipment, 27(5), 4193–4196.
Tachakra, S., Wang, X. H., Istepanian, R. S. H., & Song, Y. H. (2003). Mobile e-Health: The unwired
evolution of telemedicine. Telemedicine Journal and E-Health, 9(3), 247–257.
Tamazirt, L., Alilat, F., & Agoulmine, N. (2018). Blockchain technology: A new secured electronic
health record system. In 2018 International Workshop on Advances in ICT Infrastructures and
Services (p. 134).
Valentina, R. K., Balas, E., & Solanki, V. K. (2020). An industrial IoT approach for pharmaceutical
industry growth (Vol. 2).
Wajsman, N., Arias Burgos, C., & Davies, C. (2016). The economic cost of IPR infringement in
the recorded music industry the recorded music industry (p. 41).
We, W., We, W., We, H., Get, W., Risius, M., & Spohrer, K. (2017). State of the art. Business and
Information Systems Engineering (pp. 1–6).
Wipo. (1957). MOD. 1—The economics of intellectual property. Intellectual Property, 87(3), 1–16.
Workman, J. P. (2008). A marketplace for health: opportunities and challenges for biomedical
blockchains. J. Bus. pp. 363–369, 2008.
Wu, X., & Lin, Y. (2019). Blockchain recall management in pharmaceutical industry blockchain
management in pharmaceutical 28th recall a new methodology to physical architecture of existing
products for an assembly oriented product family identification functional and recall and. Procedia
CIRP, 83, 590–595.
Xu, X., Pautasso, C., Gramoli, V., Ponomarev, A., & Chen, S. (2016). The blockchain as a software
connector. In 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
Zheng, Z., Xie, S., & Dai, H. (2018). Blockchain challenges and opportunities : A survey.
220 M. Kumari et al.
Meet Kumari is an Assistant Professor (ECE-UIE) at the Department of Electronics and Commu-
nication Engineering at Chandigarh University, Punjab, India. She has done her graduation and
postgraduation from Guru Nanak Dev University, Regional Campus (GNDU RC) Gurdaspur and
GNDU RC Jalandhar, respectively, Punjab, India. Currently, she is pursuing a Ph.D. from Punjabi
University Patiala, Punjab, India. She has published around 10 research papers in different journals
(SCOPUS) and conferences. Her areas of interest are the next generation of wireless communica-
tion networks. Her areas of interest are wireless communication, optical communication and deep
learning.
Meenu Gupta is an Assistant Professor (CSE-UIE) at the Department of Computer Science Engi-
neering at Chandigarh University, Punjab, India. She has done her Ph.D. from Ansal University,
Gurugram, in Computer Science in the year 2020. She received an M.Tech degree in the year 2010
from MDU University, Rohtak, with a specialization in Computer Science and Engineering. She
was awarded an honors degree in B.Tech (Information Technology) in 2006 from NC College
of Engineering, Kurukshetra University. She also received an award of Best Project Display in
2006. She completed many certifications like a rational seed, Vb.Net, DBMS by oracle, DBA
from Microsoft and CDC from Govt. consultancy. She also certified faculty of MTA and MOS.
Her research interests are cloud computing, blockchain, big data, IoT, deep learning and machine
learning. A total of 12+ years of academic/research experience with more than 30+ publications
in various national, international conferences cum international journals (Scopus/ESCI/SCI) of
high repute. She is a lifetime member of educational society like ISTE and IAENG. She hosted a
session chair at the IEEE conference, the year 2017. She guided the thesis of M.Tech students and
handled the project of B.Tech (CSE). She published four subject books named, Web Development
Using core Java, Theory of Automata & Computation, Analysis & Design Algorithm and Visual
Basic C++. She also contributes to writing book chapters of reputed book calls (i.e., Springer-
Scopus, Elsevier, Taylor & Francis, DeGruter, Apple Academia, etc.). She also worked on patent
filing and submitted two patents for further recommendation. She attended many workshops
and seminars along with she did a research fellowship program from IITD. She also attended
FDP programs of reputed College/University/Organizations such as Infosys, C-DAC, IIITD, ISTE
sponsored, CSI sponsored and UGC sponsored. In her teaching scenario, she worked as an event
coordinator, workshop/seminar/conference coordinator, exam evaluation coordinator, training and
placement coordinator, etc. She also organized a five-day FDP and worked as a co-convener. She
organized industrial visits in Infosys (Chandigarh), Network Bulls, Wipro, TCS, IAON, etc. She
received many appreciation letters for conducting events.
Chetanya Ved is a student currently pursuing B.Tech in Information Technology from Bharati
Vidyapeeth’s College of Engineering, New Delhi, India. He has been part of various conferences
and events related to Information Technology. Organized and founded various events in college
society which is associated with IEEE. Attended Delhi Section Congress in IIITD which is orga-
nized by IEEE of Delhi Section in October 2019. He has been a student member of IEEE for
1 year. He has been instructor and mentor of several workshops of society which is associated
with IEEE. He has completed his higher secondary education from N.C Jindal Public School, New
Delhi, India, in 2016.
Chapter 9
Accelerating Life Sciences Research
with Blockchain
9.1 Introduction
While life sciences research involves increasing volumes of data and a greater need
for real-world evidence (U.S. Food and Drug Administration 2019c), current research
data collection and storage systems face limited capabilities to meet emerging tech-
nological needs (Efanov and Roschin 2018). As examples, there are few cost-
effective methods to integrate data silos or easily aggregate data from multiple
sources (Angeletti et al. 2017a). Further, most electronic data capture systems for life
sciences research are not designed to give research participants access to their data
or honor specific terms of their preferences for future uses of their data (Benchoufi
W. M. Charles (B)
Life Sciences Division, BurstIQ, Denver, CO, USA
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 221
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_9
222 W. M. Charles
et al. 2018). Blockchain and other distributed ledger technologies (referred to collec-
tively as “blockchain”) offer capabilities that could solve many obstacles of life
sciences research in a secure and systematic manner (Hughes et al. 2019). Most
notably, blockchain offers opportunities to accelerate research innovation in ways
not possible with current data technologies.
At this early stage of blockchain development for life sciences research,
blockchain developers and operators often express lack of familiarity with research
infrastructure and related data and technology standards (Kakavand et al. 2017).
Similarly, research organizations may be cautious to implement new technologies
due to uncertainties about best practices and an unpredictable regulatory climate
(De Filippi and Hassan 2016). This chapter explains blockchain uses and considera-
tions to developers and life sciences research stakeholders to help them understand
blockchain features that advance research capabilities.
A clinical trial is “a prospective study comparing the effects and value of interven-
tion(s) in human beings” while conducted in a clinical or medical setting (Friedman
et al. 2015, p. 2). While there are many clinical trial designs, these types of trials
study a person’s health by applying an intervention with varying combinations of
procedures, diagnostic methods, prevention strategies, therapeutic drugs, devices,
biologics, or treatment regimens (Friedman et al. 2015). The outcome of an inter-
vention is referred to as “efficacy” to recognize that the outcome was studied under
tightly controlled circumstances—the ideal setting (Angeletti et al. 2018; Friedman
et al. 2015).
When conducting studies with the intention of developing new drugs or devices,
pharmaceutical, and device trials involve highly controlled study designs and rigid
protocols. All stakeholders must follow the rules of the applicable regulatory agency
9 Accelerating Life Sciences Research with Blockchain 223
Table 9.1 A comparison of basic research trial types and their primary characteristics
Clinical trial Pragmatic trial Participatory trial
Expertise needed for Expert Expert Public
trial design
Objective Clinical assessment Decision-making, policy Information delivery,
development study planning
Outcome Efficacy Effectiveness Effectiveness
Protocol type Structured and rigid Structured and Structured to fluid
explanatory and interpretable
Enrollment target Selective within Representative of Representative of
patient population patient population patients, caregivers,
and providers
Data collection Very controlled Moderately controlled Loosely controlled
prospective prospective or prospective
retrospective
Research environment Clinical Community Community
Electronic assessment Medical grade Medical grade to Consumer grade
tools consumer grade
to ensure solid scientific outcomes and ethical protections of the human participants
(Charles et al. 2019; Turner 2010).
For both safety and data integrity, study participants typically visit a clinical or
medical facility for testing and checkups. The frequency and distance of these study
visits become burdensome for research participants (Angeletti et al. 2017b) as well
as logistically challenging and expensive to conduct (Steinhubl et al. 2019). There is
increasing interest in alternative study designs to facilitate more practical methods
of data collection.
Within the past several years, there has been greater emphasis on studies that reflect
“real-world” healthcare and management. These studies are referred to as “pragmatic
trials” or “real-world evidence trials” because they are designed to evaluate interven-
tions in settings that more closely represent patients’ or communities’ typical health
experiences (Thorpe et al. 2009). For example, this type of research may assess the
outcomes of patients who have received the standard of care by collecting information
from their medical records. Other methods of data collection may involve patient-
completed surveys, questionnaires, or healthcare applications designed to collect
patient-reported outcomes (Park et al. 2020). Any patient/participant involvement
in data collection is designed to minimize the burdens and maintain engagement
(Schultz et al. 2019). The interventions’ outcomes are referred to as “effectiveness”
because it is believed that the outcome reflects real-world behavior and typical clinical
practice (Ethier et al. 2017).
224 W. M. Charles
Scientists in many research fields are also exploring the creative and innovative oppor-
tunities afforded by participatory trials. A participatory trial, sometimes referred to
as a “crowdsourcing trial,” reaches out to large group of volunteers in the public
or patient communities to help answer research questions in a real-world setting.
In many circumstances, researchers post-enrollment information via social media
or reach out to participatory sites, such as Amazon Turks (Park et al. 2020). The
looser eligibility criteria and enrollment processes allow researchers to collect a
large volume of data quickly and inexpensively. Further, “citizen science” members
of the public may also be asked to provide feedback about data collection methods
or to suggest endpoints that may be more meaningful to the patient group being
studied (Park et al. 2020). The primary drawback of studies that lack close oversight,
however, is that data tend to be less reliable and may unintentionally collect complex
unstructured information (Park et al. 2020).
As a current participatory trial, the Eunice Kennedy Shriver National Institute
of Child Health and Human Development is currently sponsoring a crowdsourced
application-based data collection method to obtain current real-world information
about pregnancy management and complications (PregSource: Crowdsourcing to
understand pregnancy 2020). All adult pregnant women are eligible to participate.
There is a click-through informed consent process that collects minimal personal
information. Using an application, participants are asked to answer questions about
9 Accelerating Life Sciences Research with Blockchain 225
weight, health conditions and treatments, and emotions throughout their pregnancies.
Up to 100,000 pregnant women are invited to participate.
The most common type of consensus mechanism for public blockchains involves
proof of work. This mechanism relies on “mining,” where all nodes compete to find
a “nonce,” a random number that requires intensive computing capability to find in
order to create a block (Calvaresi et al. 2019).
For life sciences research, the transparent nature of public chains is not suitable for
the proprietary or private information processed and stored. Further, data processing
could be slow and computationally intensive, creating performance limitations for
the volume, and speed required. The need for financial incentives to create blocks or
the cost of data mining may also be cost-prohibitive (Lopez et al. 2019). Last, due to
the need to have some centralized governance of data and decision-making for life
sciences research, a public infrastructure is generally not appropriate (Wong et al.
2019).
In contrast to public blockchains, platforms with a governance structure requiring
permission to join, post, or view information are referred to as “private” blockchains
[Note that there is some controversy as to whether the network and governance
features of permissioned platforms meet the definition of “blockchains” (Lopez et al.
2019)]. These private networks are synchronized and distributed, but their networks
are usually restricted to nodes that are known and invested in the network, such as life
sciences research sponsors, healthcare organizations, or academic institutions who
are willing to make an investment in the governance and privacy (Essén and Ekholm
2020). The governance structure allows for planning and decision-making about
preventing or managing nodes’ collusion, malicious actions, or failures (Calvaresi
et al. 2019). As a final consideration, these private networks are supported by the
organizations within the governance structure and therefore do not require mining
or incentives for block storage and maintenance (Choudhury et al. 2019).
Common private blockchain platform structures include Hyperledger Fabric,
Ethereum Private, R3 Corda, and MultiChain (Calvaresi et al. 2019). In addition,
private blockchain companies dedicated to healthcare or life sciences research include
BurstIQ, Carechain, ConsenSys Health, Hashed Health, and Patientory, among others
(Essén and Ekholm 2020). Due to the investment and control required for blockchain
governance, private blockchains often utilize “proof of stake” or modifications of this
consensus structure to validate and store transactions in a manner that does not require
intensive computing (Zhuang et al. 2018).
A “consortium” blockchain model is thought of as a semi-decentralized network
where multiple organizations provide support and decision-making for blockchain
operations. Because of the need for permissioning across separate legal entities, a
consortium model may include infrastructure from private blockchain models and/or
hybrid models (Ray et al. 2020).
A “hybrid” model combines the best features from public and private platforms or
may offer a private network that connects to a public blockchain. The public platform
could store metadata and proof of transactions for data integrity and immutability,
while the private platform could store confidential information (Benchoufi et al. 2019;
Sato and Himura 2018). As an example, ConsenSys adds a private network module,
Hyperledger Besu, to the public Ethereum platform for private enterprise blockchain
solutions (Enterprise Ethereum: 5 reasons why Enterprise Ethereum is so much more
9 Accelerating Life Sciences Research with Blockchain 227
than a distributed ledger technology 2020). For life sciences research, TrialChain is
a private ledger that synchronizes hashes with the public Ethereum blockchain (Dai
et al. 2018; Wong et al. 2019). These companies seem to have created a successful
balance of public/private capabilities with the added benefit that the public platform
allows anyone to verify hash integrity (Calvaresi et al. 2019).
Because life sciences research may require data processing for millions of data points
across an extensive network of users, it is also necessary to determine the most
scalable mechanisms for storage. Life sciences research information, for example,
may contain radiological images, scans of documents, and genomic data that may
exceed the size capabilities of a traditional blockchain ledger (Zhang et al. 2018).
Not only does volume and size of data create possible reductions in performance but
can potentially increase storage costs. Therefore, the blockchain storage structure
merits careful consideration and planning.
When storing data on-chain, data points and their metadata are stored in program-
ming code on the ledger in a manner reminiscent of eXtensible Markup Language
(XML code). In some cases, data files, such as an Excel spreadsheet, can also be
stored on the blockchain for security if they do not exceed the ledger’s capabili-
ties. As an example, BurstIQ is a proprietary platform that stores data—including
protected health information (PHI) and personally identifiable information (PII)—
on-chain to enable very flexible data representations and access permissions (Pennec
2018; Srivastava et al. 2019). Because the platform stores data subject to privacy
regulations and research regulations, BurstIQ sought and obtained SOC 2 Type II
certification to demonstrate compliance with the Health Insurance Portability and
Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR)
(Build your impossible: the most advanced blockchain platform on the market, period
2020).
As drawbacks of on-chain storage, there are some files that may be too large
to store on-chain. Further, some organizations find the security programming to
be complicated and cumbersome (Lin et al. 2020). Also, with recognition that a
blockchain ledger is continually growing, the process of chain management requires
forethought and planning otherwise performance may degrade (Zhang et al. 2018).
When designing on-chain storage, scalability and speed can be maintained by creating
a network of separate chains and forks. Additionally, a hybrid approach could be
designed where most data are stored on-chain, but data larger than a certain size
could be stored off-chain in a database or data lake while only hashes of those large
transactions are maintained on-chain (Jung and Pfister 2020).
In contract, some platforms store all private data off-chain where only a represen-
tative hash and metadata are stored on-chain. In this manner, the platform does not
store PHI or PII and so privacy regulations may not apply to the blockchain itself.
The length of the ledger may also remain more manageable, preserving desired
228 W. M. Charles
performance. However, Košťál et al. (2019) recommend against storing data off-
chain because data then lose the security of the blockchain and distributed networks.
The authors point out that data or files stored in an off-chain database or data lake
are not protected, and anyone with access to that storage can modify or delete the
files. There may be a hash on the blockchain that reflects that a file was modified or
deleted, but the hash cannot restore the data.
There are certain challenges inherent in all types of research, such as the risks of data
fabrication/manipulation and misconduct (Thornton 2017), interoperability chal-
lenges between data systems and silos (Kendzierskyj and Jahankhani 2019), and
lack of flexibility with patient and researcher access controls (Sukhija et al. 2019).
These issues can be addressed, in part, by blockchain, but blockchain can also unlock
the potential capabilities in data to accelerate the future of life sciences research.
Rather than conducting lengthy and costly clinical trials, pharmaceutical compa-
nies are increasingly employing blockchain technologies to perform data mining of
enormous data sets of electronic records, conduct meta-analyses, longitudinal data
analyses, and subgroup analyses to identify new trends that signal new drug develop-
ment or marketing opportunities (Choudhury et al. 2019). As a Federal example, the
US Department of Health and Human Services Innovation, Design, Entrepreneurship
and Action Laboratory, together with the FDA Office of Hematology and Oncology
Products (Khozin et al. 2017) initiated the Information Exchange and Data Trans-
formation (INFORMED) project to provide infrastructure for big data analyses. A
blockchain, powered by IBM Watson Health, provides a decentralized mechanism
for stakeholders within the pharmaceutical industry to share data (Khozin et al. 2018).
This project also serves as a sandbox for sharing resources across companies and
generating new ideas (Khozin et al. 2018).
The FDA is also using the blockchain capabilities within INFORMED to aggre-
gate data that had been submitted from new drug applications or biologic licensing
applications (Dorsey 2017). The FDA has been aggregating these data for predic-
tive analytics used to inform internal decisions and create processes to streamline
data curation and standardization. Findings believed to influence public health deci-
sions or drug development strategies are shared through publications and workshops
(Dorsey 2017).
The INFORMED project has also partnered with the FDA’s Office of Surveillance
and Epidemiology to create a blockchain framework for secure transmission of safety
information to the FDA (Dorsey 2017). After transitioning from a PDF-based system
to a secure digital submission system, the FDA has realized significant efficiencies
and streamlined the ability to detect and validate drug safety signals (Khozin et al.
2018).
Consistent with the FDA’s data aggregation efforts, pharmaceutical companies are
using blockchain to aggregate and parse enormous data sets. This enables companies
to learn about real-world uses of their drugs in clinical practice to request regulatory
approval for new indications instead of conducting additional costly and lengthy
clinical trials (Loftus 2019). Data may come from electronic health records or other
research studies with strict confidentiality protections (Leon-Sanz 2019). For new
studies where randomization may not be feasible or ethical, existing real-world
health data can serve as a control group. As a result from aggregating and real-
world data about drugs, the FDA has already approved new drug labeling indications
for leukemia, breast cancer, and bladder cancer (Loftus 2019).
Federated Learning
Because a research protocol directs methods for ethical and objective data collection,
it is typically written by teams of experts and maintained under strict confidentiality
(Benchoufi et al. 2018). However, patient involvement in the research design could
improve the research participants’ experience, add financial value (up to fivefold
return on investment), and reduce the time necessary to conduct trials (Levitan et al.
2018). Blockchain is currently enabling patient participation in protocol design while
maintaining confidentiality of proprietary information. As examples, Transparency
Life Sciences (Vuturo 2020) uses a blockchain-based crowdsourcing application to
design protocols. After a team of scientists designs, a project with specific aims
(without revealing proprietary information), patients, advocacy groups, caregivers,
and healthcare providers then provide direct input about methodology to improve
patient-centric approaches. The scientists review the feedback and include sugges-
tions that would benefit the target patient population (Park et al. 2020). Similarly,
CORUS (Park et al. 2020) is a crowdsourcing blockchain platform that allows for
protocol development collaboration between scientists and the general public, but
9 Accelerating Life Sciences Research with Blockchain 231
could even be used without the help of experts. Members of the community can
design research, offer feedback about an expert-designed study, or even join a study.
After a protocol is designed, there is great risk of protocol manipulation, such
as modifying the hypotheses to fit the collected data (Park et al. 2020). However,
blockchain can maintain protocol versioning and traceability to ensure scientific
integrity (Benchoufi et al. 2019; Benchoufi and Ravaud 2017). Before a study
begins, the critical study documents, such as the protocol, consent form(s), case
report form(s), data-sharing plan, and analytic code could be time-stamped by the
blockchain, reducing the risk of unauthorized revisions (Benchoufi and Ravaud 2017;
Porsdam Mann et al. 2020).
Blockchain-based processes can facilitate data collection with security and integrity.
In this section, we will review the emerging roles of blockchain to enhance and
facilitate study recruitment, crowdsourcing, consent management, and electronic
data capture.
To conduct a study with sufficient strategic endpoints and statistical power, there is
need for a well-structured enrollment and recruitment plan. According to the 2019
survey conducted by the Center for Information and Study on Clinical Research
Participation (2020), 85% of participants stated they would be willing to partici-
pate in a research, but recruiting and selecting participants is a complex process.
Enrollment criteria typically include age, gender, diagnosis, stage of disease, current
medications, or other medical conditions (Weng et al. 2010). Unfortunately, failure
to enroll enough participants in a timely manner is the primary cause for delays in
trials (U.S. Government Accountability Office 2019), and the majority of clinical
trials do not meet their recruitment goals on time (Vining et al. 2014; Zhuang et al.
2019). Further, inconsistent recruitment may result in an unrepresentative sample,
which compromises the generalizability and interpretability of the studies’ results
(Vining et al. 2014).
Blockchain is currently being used to bring together researchers and prospective
participants in new and unique ways. Using a private Ethereum blockchain, Zhuang
et al. (2019) created a system by which research participants can provide details
about their health and study interests on the blockchain. When new eligibility criteria
are entered by researchers into smart contracts, prospective participants can see the
study opportunities in a guided interface or receive automated alerts. Only when a
prospective participant agrees to learn more about a study, a smart contract is triggered
to share that person’s information with the sponsor or investigators recruiting for
the study. Machine learning can be applied to recruitment information to optimize
232 W. M. Charles
9.2.2.2 Crowdsourcing
As noted with the descriptions of pragmatic and participatory trials, data can be
collected quickly and in large volumes using crowdsourcing strategies. This approach
is increasingly popular within disease communities and improves participant engage-
ment in their health (Avdoshin and Pesotskaya 2019). To conduct crowdsourcing
research in an ethical manner, it is important to carefully control access privi-
leges, ensure data provenance, and manage participants’ privacy and confidentiality
(Sukhija et al. 2019).
Blockchain is introduced for crowdsourcing studies—not only for offering faster
enrollment, as noted above—but for enhancing privacy and confidentiality on a
public-access study platform. In some trials, the platform provides tamper-resistant
secure zones for protecting private information contributed by individual partici-
pants (Sukhija et al. 2019) or transparency for public review and accountability when
not private (Fernández-Caramés et al. 2019). Further, smart contracts can automate
payments to participants for engagement (Curbera et al. 2019).
Blockchain-based crowdsourcing platforms include TrialChain, where project
creators post-study opportunities and instructions and users can select and immedi-
ately participate in a trial (Wong et al. 2019). The platform TraneAi uses blockchain
for crowdsourcing to complete trial data tasks, such as tagging training data for
9 Accelerating Life Sciences Research with Blockchain 233
Consent Integrity
Because uses of paper or electronic consent forms are the primary methods of docu-
menting a person’s agreement to participate in research, this documentation must be
carefully protected to ensure the integrity of the process. Unfortunately, a review of
FDA records found failures of consent process in 53% of the cases studied (Porsdam
Mann et al. 2020). Falsified consent forms are listed among the most common types
of research misconduct (Bell et al. 2018). Therefore, the tamper-resistant nature of
a blockchain promotes greater trust and integrity of the consent documentation.
Some blockchain platforms have emerged to organize and secure these legal docu-
ments digitally (Benchoufi et al. 2018; Jung and Pfister 2020). A blockchain platform
prototype designed by Angeletti et al. (2017a) allows a research organization to store
consent forms off-chain in a private space and create a hash on the blockchain to
verify the integrity and authenticity of the form. A time-stamped consent form could
234 W. M. Charles
much-needed trust among marginalized groups that have historically been cautious
about participating in research.
While blockchain may offer many positive advances to ensure integrity and flexibility
of informed consent, there are certain obstacles that blockchain cannot overcome.
For example, after a researcher receives data based on a participant’s consent for a
particular type of research, there is no way to control how the researcher actually
uses the information. Taylor and Whitton (2020) note that research plans may drift
or researchers may share data with collaborators for research not consistent with
the participant’s original preferences. Further, there are not currently mechanisms—
short of an organizational audit—to monitor or enforce a researchers’ adherence to
the participant’s wishes, and such violations are unlikely to be detected (Shabani
2019).
As an additional limitation, when participants are given access to a web-based
consent platform, it is difficult, if not impossible, to verify the identity of the user
logging into the web-based system. Usernames and passwords can be easily shared
and sometimes compromised. Therefore, Chen et al. (2020) recommend adding
biometric identification, such as finger-drawn signatures, that adds an authentication
token to the blockchain. This token could be stored with the electronically signed
document. Even if the correct participant accesses the system, it is difficult to verify
that the participant has the competence or capacity to understand the ramifications
of their choices (Leon-Sanz 2019). It is also necessary to consider how legal consent
authority transfers from parents to their children when the children reach the age of
majority and parental permission is no longer valid (Rahimzadeh 2020). To address
the expiration of parental permission, smart contracts can be designed to provide
alerts to the researchers to contact the child-turned-adult for informed consent, to
request a waiver of informed consent from the IRB, or to discontinue future uses of
the child-turned-adult’s data and/or specimens.
Life sciences research organizations use several different electronic systems to plan,
manage, execute, and report research activities (Albanese et al. 2020). These systems
are critical for maintaining timelines and budgets. However, there are still many
obstacles for disparate systems to readily exchange information—especially across
different companies, such as vendors (Zhang et al. 2018). Life sciences organizations
have been exploring blockchain to enable secure interoperability between electronic
data capture systems and electronic health record systems (Paramesh and Shabna
2020).
Remote electronic data capture systems are increasingly used in life sciences
research to allow for remote participation or collect real-time information. Remote
236 W. M. Charles
After data are collected for a research study, they must be stored in a secure envi-
ronment to protect the confidentiality of participants’ information. With life sciences
research trials, there is need for researcher access, monitoring, and validating data
after collection (Albanese et al. 2020). Because so many research stakeholders may
need data access, it is necessary to ensure the right balance of confidentiality and
access to ensure appropriate study oversight.
9 Accelerating Life Sciences Research with Blockchain 237
With increased importance for patients to have access to their own health informa-
tion, blockchain can be used as a tool to give patients and research participants the
opportunity to access and share their own health data (Ballantyne 2020). Dr. Sean
Khozin, recent Director of US FDA’s Oncology Center of Excellence, commented
that the FDA would also like to empower patients to access and exchange their health
information (Dorsey 2017).
While there are many blockchain technology capabilities that enable
patients/research participants to access and share their own healthcare information,
the circumstances are different for the life sciences research industry due to company
ownership of data collected during a sponsored research study. Unlike healthcare
238 W. M. Charles
not only verifies whether access is appropriate, but also releases de-identified data
in Statistical Analysis Software (SAS) format.
During and after a research study, data are continuously reviewed for adverse events,
deaths, and circumstances surrounding participant withdrawal from a study (Williams
2006). The study sponsor or the investigator is also expected to monitor data for
quality and ensure that the investigator and study team are closely adhering to study
requirements and local instructions (Williams 2006). Most sponsors design a moni-
toring plan based on perceived risk in the study and conduct a combination of on-site
and remote monitoring visits.
Because study monitoring and auditing are expensive and time-consuming, orga-
nizations are evaluating blockchain to address common problems in life sciences
research (Beckstrom 2019). Instead of providing monitoring in a centralized manner
where few individuals have access to data corrections or monitoring reports, a
blockchain-based system could ensure that monitoring information is available in
real time to study stakeholders, as appropriate, to allow for risk assessments and
corrective actions in a timely manner (Shabani 2019). In a similar manner, informa-
tion about adverse events is normally processed and distributed in a manual manner,
resulting in human errors. Wong et al. (2019) proposed a blockchain-based safety
system where smart contracts execute to alert the study’s medical monitor and can
aggregate data for the data safety monitoring board. The authors note that automation
of adverse event processing and alerts could improve study safety.
When organizations use blockchain for collecting or processing data for life sciences
research studies, the sponsors must determine which semantic (variable/data naming)
standards would best to allow for robust data exchange or would be required for
submission to a regulatory agency (Ethier et al. 2017; U.S. Food and Drug Adminis-
tration 2014). Semantic data standards should be built into the data dictionary early
240 W. M. Charles
in the design process for electronic case report forms, data management systems,
and statistical analyses plans (U.S. Food and Drug Administration 2014).
As the most common example, the Clinical Data Interchange Standards Consor-
tium (CDISC) together with the National Cancer Institute has developed structured
data terminology, referred to as Common Data Elements for clinical research (U.S.
Food and Drug Administration 2020a). This type of terminology also called a “vocab-
ulary” is necessary to standardize study data to allow for semantic interoperability
with electronic health records or clinical research data (U.S. Food and Drug Admin-
istration 2014). Table 9.2 displays data standards associated with different types of
clinical data. While this nomenclature is required for data submission to the US
FDA, Japanese Pharmaceuticals and Medical Devices Agency, and other interna-
tional regulatory agencies, use of data standards is considered a best practice for
other types of research to enable meaningful data exchange.
Standard data structures are also necessary to support data normalization (data
derivations, transformation, and extraction of original data) and statistical anal-
yses (Ethier et al. 2017). As examples, the CDISC Analysis Data Model (ADaM
Table 9.2 Data standards associated with different types of clinical data
Nature of data Data standard
General clinical data Clinical Data Interchange Standards
Consortium (CDISC) Terminology
Adverse events Medical Dictionary for Regulatory Activities
(MedDRA)
Medications WHO Drug Dictionary or WHO Drug Global
Laboratory test name Logical Observation Identifiers Names and
Codes (LOINC)
Substances, including active ingredients, Unique Ingredient Identifiers (UNII)
active moieties, inactive ingredients
Pharmacological class Medication Reference Terminology (MED-RT)
Indication and usage Systematized Nomenclature of
Medicine—Clinical Terms (SNOMED CT)
Product labeling submissions Structured Product Labeling (SPL)
Postmarketing safety reporting—Adverse Individual Case Safety Report (ICSR)
events for medical devices
Countries (e.g., USA) and their Principal Geopolitical Entities, Names, and Codes
subdivisions (e.g., Maryland) (GENC)
Drug establishment registration and drug Unified Codes for Unit of Measures (UCUM)
listing, structured product labeling, content of
labeling
Tabulations data CDISC Study Data Tabulation Model (SDTM)
or Standard Exchange for Nonclinical Data
(SEND)
U.S. Food and Drug Administration (2020b)
9 Accelerating Life Sciences Research with Blockchain 241
2020) provides standards for subject-level analyses data set structures and anal-
yses methods, and the CDISC Operational Data Model (ODM) is a platform-neutral
XML format that facilitates metadata for contextualizing, exchanging, and archiving
clinical research data (Ethier et al. 2017).
To provide clearer standards for implementation and use of blockchain uses in
life sciences, IEEE created a new working group and subgroups among a wide
range of industry experts (IEEE Standards Association 2020). The Life Sciences
Research subgroup is designing standards for appropriate life sciences data sharing
and oversight. We expect that standards will continue to develop and become more
nuanced as blockchain becomes a more pervasive presence in life sciences research.
When blockchain technologies are used for clinical research, the technologies must
meet the requirements of research laws, statutes, and regulations. The nature of
research requirements depends on whether the research involves human partici-
pants, PHI or PII, and whether the research involves support by, or submission to, a
regulatory agency (Charles et al. 2019).
In particular, when a blockchain platform manages electronic records that are
“created, modified, maintained, archived, retrieved, or transmitted, under any records
requirements set forth in agency regulations” (21 CFR § 11.1(b), 2018), there are
many requirements that must be met by the blockchain developer, sponsors, and/or
research sites to ensure data integrity and confidentiality (U.S. Food and Drug Admin-
istration 2007, 2019b). Further, each sponsor and research site should ensure that
their standard operating procedures (SOPs) reflect their data integrity requirements,
as appropriate. A listing of these requirements is outside the scope of this article but
a detailed regulatory assessment for blockchain uses in research is available in my
earlier work (Charles et al. 2019).
When a blockchain—or more likely, the smart contracts—are “intended to be used
for one or more medical purposes that perform these purposes without being part of
a hardware medical device,” the software may be regulated as Software as a Medical
Device (SaMD) (Software as a Medical Device Working Group 2017, p. 11). Whether
SaMD is regulated by the FDA Center for Devices and Radiological Health depends
on the software’s intended functions and the risks posed by the software if there are
errors or system failures (U.S. Food and Drug Administration 2017). In most cases,
the blockchain will not be considered SaMD under the exception, “software functions
that are solely intended to transfer, store, convert formats, and display medical device
data or medical imaging data, unless the software function is intended to interpret
or analyze clinical laboratory test or other device data, results, and findings, are
not devices and are not subject to FDA laws and regulations applicable to devices”
(“21st Century Cures Act” 2016, Sec. 3060). Software and blockchain developers
should not immediately assume that their products are not regulated. In 2019, the
FDA reviewed and cleared several standalone AI algorithms as SaMD (Wu 2020).
242 W. M. Charles
Writing complex smart contracts that are accurate and reliable without error is
unlikely (Abdullah and Jones 2019). Smart contract code is vulnerable to mistakes;
therefore, code should be transparent and explainable. When using smart contracts
with regulated life sciences data, the code must be validated “to ensure accuracy, reli-
ability, consistent intended performance, and the ability to discern invalid or altered
records” (21 CFR § 11.10(a), 2018). Both the regulatory authorities in the USA and
European Commission have created guidance documents about validation processes
(EudraLex: The rules governing medicinal products in the European Union, Volume
4: Good manufacturing practice: medicinal products for human and veterinary use;
Annex 11: computerized systems 2011; U.S. Food and Drug Administration 2002).
The privacy regulations are likely to have the largest impact on blockchain strate-
gies used for life sciences data because research typically requires the collection
of PHI involving a covered entity (defined as a healthcare provider, health plan,
or clearinghouse; 45 CFR § 160.103, 2013). When an individual or organization
receives, generates, maintains, processes, or transmits PHI for a covered entity, that
individual or organization is considered a business associate (45 CFR § 160.103,
2013). Business associates must follow all the same HIPAA Privacy and Security
Rule requirements as covered entities (Department of Health and Human Services
2009). Data management companies that store or process PHI for covered entities are
explicitly listed as business associates that must comply with the HIPAA regulations
(Office for Civil Rights 2002). Therefore, blockchain companies should evaluate the
type of data and nature of activities to determine if the HIPAA Privacy and Security
Rules apply to their services.
Similarly, if citizens of the European Union are targeted for enrollment in research
and their PII is managed by a blockchain, GDPR may apply (“General Data Protec-
tion Regulation” 2016). The GDPR grants citizens more protections for the privacy
of their PII, including the right to have their data deleted at their request, also referred
to as the “right to be forgotten.” This right has caused concern about the prospects of
using an “immutable” blockchain to process data in the European Union (Evangelatos
et al. 2020). However, clinical and public health research data are classified in GDPR
in special categories for exemptions (Hasselgren et al. 2020). The European Commis-
sion recognizes that research data cannot be removed from the audit trail without
jeopardizing regulatory requirements for complete records and cannot be removed
from a data set without changing statistical outcomes. Hence, the immutability of a
blockchain’s ledger should involve careful planning and documentation for compli-
ance strategies with the right to be forgotten, but life sciences research is typically
exempt from that provision.
While blockchain has achieved significant progress in life sciences research, there
remain opportunities for improvement.
9 Accelerating Life Sciences Research with Blockchain 243
9.4.2 Security
Electronic health records systems have been increasingly targeted for breaches and
ransomware (Koczkodaj et al. 2019) and research participants are concerned about
unauthorized access to their private information. In a 2019 survey conducted by the
Center for Information and Study on Clinical Research Participation (2020), 65%
of potential research participants stated that confidentiality protections were “very
important” considerations for their participation in research. While blockchain-based
systems are highly tamper-resistant, these systems are not be immune from hacking
efforts. Saad et al. (2019) describe three major areas where blockchains are targeted:
mathematical/cryptographic techniques for creating the ledger, architecture distribu-
tions, and application contexts. Most of the known types of attacks are designed to
attack cryptocurrency, but general risk principles of domain name system attacks,
consensus delays, and distributed denial of service attacks apply to all types of
distributed ledgers (Xu 2016).
If research participants will interact with a blockchain, the primary security
concern involves their sometimes poor discretion when presented with phishing
attacks and key management (Radhakrishnan et al. 2019). Participants may be
unable to recover their public/private key pair due to accidental loss or may not
be able to retrieve it during an emergency or health decline (Verde et al. 2019). If
a blockchain-based user interface allows access to the system using a password,
weak passwords can be easy to guess with a dictionary attack and when passwords
are reused (Takemiya and Vanieiev 2018). Therefore, any approach to blockchain
security should not be focused on the technology but also consider education, data
governance, and risk monitoring (Ballantyne 2020).
244 W. M. Charles
Adding a blockchain solution will require some degree of cultural change within a life
sciences organization (De Filippi and Hassan 2016; Zhang et al. 2018). Hindering this
effort, many proposed blockchain technologies are new and have not achieved suffi-
cient large-scale implementation to demonstrate value (Porsdam Mann et al. 2020).
To educate stakeholders and overcome misperceptions about blockchain, Porsdam
Mann et al. (2020) recommend creation of partnerships among health and technology
divisions. These partnerships should create a dialogue that is open and supportive
with a focus on the central role that blockchain would serve in the life sciences
research. A patient advocate could provide insight about patient-centric features that
could promote patient engagement. This partnership must be ongoing due to the
organization’s need to develop and revise policies, workflows, risk assessments, and
monitoring (Kaye et al. 2015).
9.5 Conclusions
Blockchain is not just a new technology, but a new approach to data collection
and governance in life sciences research. Rather than implement blockchain to
address current operational challenge, life sciences organizations should explore
how blockchain could facilitate advances and breakthroughs in research. Blockchain
will require active collaborations among stakeholders to determine data governance,
new models of data ownership, and a new level of data transparency and control to
research participants. This is a significant undertaking, but I expect that the investment
will be well worth the effort.
Key Terminology and Definitions
Blockchain: A distributed digital ledger of cryptographically signed transactions
that are grouped into blocks. Each block is cryptographically linked to the previous
one (making it tamper evident) after validation and undergoing a consensus decision.
As new blocks are added, older blocks become more difficult to modify (creating
tamper resistance). New blocks are replicated across copies of the ledger within the
network, and any conflicts are resolved automatically using established rules.
Consensus mechanism: A fault-tolerant mechanism used in blockchain systems to
achieve the necessary agreement on a single data value or a single state of the network
among distributed nodes or multi-agent systems.
Hashing: A method of applying a cryptographic hash function to data, which calcu-
lates a relatively unique output (called a message digest, or just digest) for an input
of nearly any size (e.g., a file, text, or image). It allows individuals to independently
take input data, hash that data, and derive the same result—proving that there was
9 Accelerating Life Sciences Research with Blockchain 245
no change in the data. Even the smallest change to the input (e.g., changing a single
bit, such as adding a comma) will result in a completely different output digest.
Homomorphic encryption: A form of encryption allowing one to perform calcula-
tions on encrypted data without decrypting it first. The result of the computation is
on an encrypted form, when decrypted the output is the same as if the operations had
been performed on the unencrypted data.
Institutional Review Board (IRB)/Ethical Review Board (ERB): Any board,
committee, or other group formally designated by an institution to review biomed-
ical research involving humans as subjects, to approve the initiation of, and conduct
periodic review of such research.
Participatory trial: A trial design where a large group of volunteers from the general
public or who individuals who self-identify with a particular health condition can
self-enroll in a less structured study to understand the effectiveness of an approach
in a real-world setting. There is some overlap with a pragmatic trial.
Private identifiable information (PII): Personal data that are related to an identified
or identifiable natural person. In the content of research, PII could allow the identity
of a research participant to be ascertained by the clinical investigator or members of
the research team.
Pragmatic trial (also referred to as “real-world evidence trial”) A structured research
design that collects health information and patient-reported outcomes to establish the
external validity of interventions in settings that more closely represent patients’ or
communities’ typical health experiences and outcomes. There is some overlap with
a participatory trial.
Protected health information (PHI): Individually identifiable health information
transmitted or held by a covered entity or its business associate, in any form or
medium, whether electronic, on paper, or oral.
Secondary research: Research with materials originally obtained for non-research
purposes or for research other than the current research proposal. The exemption
can only be used when there is broad consent from the subjects for the storage,
maintenance, and secondary research use of their identifiable materials.
Smart contract: A collection of code deployed using cryptographically signed trans-
actions on the blockchain network. The smart contract is executed by nodes within
the blockchain network; all nodes must derive the same results for the execution, and
the results of execution are recorded on the blockchain.
246 W. M. Charles
References
21st Century Cures Act. Public Law, 114–225, 130 Stat. 1033 (December 13, 2016). https://www.
congress.gov/114/plaws/publ255/PLAW-114publ255.pdf
Abdullah, T., & Jones, A. (2019). eHealth: Challenges for integrating blockchain within healthcare.
IEEE. https://doi.org/10.1109/ICGS3.2019.8688184.
About Enterprise Ethereum Alliance. (2020). Enterprise ethereum alliance. Retrieved July 31, 2020,
from https://entethalliance.org/about/
ADaM. (2020). Clinical data interchange standards consortium. Retrieved July 25, 2020, from
https://www.cdisc.org/standards/foundational/adam
Albanese, G., Calbimonte, J.-P., Schumacher, M., & Calvaresi, D. (2020). Dynamic consent manage-
ment for clinical trials via private blockchain technology. Journal of Ambient Intelligence and
Humanized Computing. https://doi.org/10.1007/s12652-020-01761-1.
Andrianov, A., & Kaganov, B. (2018, March 13). Blockchain in clinical trials: The ultimate notary.
Applied Clinical Trials. Retrieved April 30, 2018, from http://www.appliedclinicaltrialsonline.
com/print/352251?page=full
Angeletti, F., Chatzigiannakis, I., & Vitaletti, A. (2017a). Privacy preserving data management in
recruiting participants for digital clinical trials. ACM. https://doi.org/10.1145/3144730.3144733
Angeletti, F., Chatzigiannakis, I., & Vitaletti, A. (2017b). The role of blockchain and IoT in recruiting
participants for digital clinical trials. IEEE Communications Society. https://doi.org/10.23919/
SOFTCOM.2017.8115590
Angeletti, F., Chatzigiannakis, I., & Vitaletti, A. (2018). Towards an architecture to guarantee both
data privacy and utility in the first phases of digital clinical trials. Sensors (Basel, Switzerland),
18(12), 4175. https://doi.org/10.3390/s18124175.
Avdoshin, S., & Pesotskaya, E. (2019). Blockchain revolution in the healthcare industry. Springer
Nature Switzerland AG. https://doi.org/10.1007/978-3-030-02686-8_47
Ballantyne, A. (2020). How should we think about clinical data ownership? Journal of Medical
Ethics, 46(5), 289–294. https://doi.org/10.1136/medethics-2018-105340.
Banga, R., & Juneja, M. (2018). Clinical trials on blockchain. PhUSE. https://www.lexjansen.com/
phuse/2018/tt/TT11.pdf
Beckstrom, K. (2019). Utilizing blockchain to improve clinical trials. In D. Metcalf, J. Bass, M.
Hooper, A. Cahana, & V. Dhillon (Eds.), Blockchain in healthcare: Innovations that empower
patients, connect professionals and improve care (pp. 109–121). Merging Traffic. https://www.
crcpress.com/Blockchain-in-Healthcare-Innovations-that-Empower-Patients-Connect-Professio
nals/Dhillon-Bass-Hooper-Metcalf-Cahana/p/book/9780367031084
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of blockchain within
healthcare. Blockchain in Healthcare Today, 1(8). https://doi.org/10.30953/bhty.v1.8
Benchoufi, M., Altman, D. G., & Ravaud, P. (2019). From clinical trials to highly trustable clinical
trials: Blockchain in clinical trials, a game changer for improving transparency? Frontiers in
Blockchain, 2(23). https://doi.org/10.3389/fbloc.2019.00023
Benchoufi, M., Porcher, R., & Ravaud, P. (2018). Blockchain protocols in clinical trials: Trans-
parency and traceability of consent. F1000Research, 6. https://doi.org/10.12688/f1000research.
10531.5
Benchoufi, M., & Ravaud, P. (2017). Blockchain technology for improving clinical research quality.
Trials, 18, 335. https://doi.org/10.1186/s13063-017-2035-z.
Build your impossible: the most advanced blockchain platform on the market, period. (2020).
BurstIQ, LLC. Retrieved July 31, 2020, from https://www.burstiq.com/technology/
Burki, T. K. (2019). Pharma blockchains AI for drug development. Lancet, 393(10189), 2382.
https://doi.org/10.1016/S0140-6736(19)31401-1.
Calvaresi, D., Calbimonte, J.-P., Dubovitskaya, A., Mattioli, V., Piguet, J.-G., & Schumacher, M.
(2019). The good, the bad, and the ethical implications of bridging blockchain and multi-agent
systems. Information, 10(12), 363. https://doi.org/10.3390/info10120363.
9 Accelerating Life Sciences Research with Blockchain 247
Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of blockchain-
based applications: Current status, classification and open issues. Telematics and Informatics, 36,
55–81. https://doi.org/10.1016/j.tele.2018.11.006.
Center for Information and Study on Clinical Research Participation. (2020, January 31). CISCRP
releases 2019 perceptions and insight study. Retrieved July 31, 2020, from https://www.ciscrp.
org/wp-content/uploads/2019/12/Deciding-to-Participate-04DEC-1.pdf
Charles, W. M., Marler, N., Long, L., & Manion, S. T. (2019). Blockchain compliance by design:
Regulatory considerations for blockchain in clinical research. Frontiers in Blockchain, 2(18).
https://doi.org/10.3389/fbloc.2019.00018
Chen, X., Zhu, H., Geng, D., Liu, W., Yang, R., & Li, S. (2020). Merging RFID and blockchain
technologies to accelerate big data medical research based on physiological signals. Journal of
Healthcare Engineering, 2020, 2452683. https://doi.org/10.1155/2020/2452683.
Choudhury, O., Fairoza, N., Sylla, I., & Das, A. K. (2019). A blockchain framework for managing
and monitoring data in multi-site clinical trials (13) [Preprint]. https://arxiv.org/abs/1902.03975
Curbera, F., Dias, D. M., Simonyan, V., Yoon, W. A., & Casella, A. (2019). Blockchain: An enabler
for healthcare and life sciences transformation. IBM Journal of Research and Development.
https://doi.org/10.1147/JRD.2019.2913622.
Custers, B. (2016). Click here to consent forever: Expiry dates for informed consent. Big Data &
Society, 3(1), 2053951715624935. https://doi.org/10.1177/2053951715624935.
Dai, H., Young, H. P., Durant, T. J. S., Gong, G., Kang, M., Krumholz, H. M., Schulz, W. L., & Jiang,
L. (2018). TrialChain: A blockchain-based platform to validate data integrity in large, biomedical
research studies [Preprint]. Cornell University. https://arxiv.org/abs/1807.03662.
Datta, S. (2019, March 16). HEARTLINE: A 180,000 patient-strong, pragmatic, real world
randomized trial assesses the prowess of Apple technology in afib diagnosis and improvement
of hard outcomes. Cardiology Now. Retrieved July 30, 2020, from https://cardiologynownews.
org/heartline-a-180000-patient-strong-pragmatic-real-world-trial-assess-the-prowess-of-apple-
technology-in-afib-diagnosis-and-improvement-of-hard-outcomes/
De Filippi, P., & Hassan, S. (2016). Blockchain technology as a regulatory technology: From code
is law to law is code. First Monday, 21(12). https://doi.org/10.5210/fm.v21i12.7113
Department of Health and Human Services. (2009). HIPAA administrative simplification: Enforce-
ment. Federal Register, 74(209), 56123–56131. https://www.hhs.gov/sites/default/files/ocr/pri
vacy/hipaa/administrative/enforcementrule/enfifr.pdf
Dorsey, E. R. (2017). Digital footprints in drug development: A perspective from within the FDA.
Digital Biomarkers, 1(2), 101–105. https://doi.org/10.1159/000481274.
Efanov, D., & Roschin, P. (2018). The all-pervasiveness of the blockchain technology. Elsevier, Ltd.
https://doi.org/10.1016/j.procs.2018.01.019
Enterprise Ethereum: 5 reasons why Enterprise Ethereum is so much more than a distributed
ledger technology. (2020). ConsenSys. Retrieved July 31, 2020, from https://consensys.net/ent
erprise-ethereum/best-blockchain-for-business/5-reasons-why-enterprise-ethereum-is-so-much-
more-than-a-distributed-ledger-technology/
Essén, A., & Ekholm, A. (2020). Centralization vs. decentralization on the blockchain in a health
information exchange context. In A. Larsson & R. Teigland (Eds.), Digital transformation and
public services: Societal impacts in Sweden and beyond (pp. 58–82). Routledge. https://doi.org/
10.4324/9780429319297
Ethier, J.-F., Curcin, V., McGilchrist, M. M., Choi Keung, S. N. L., Zhao, L., Andreasson, A., et al.
(2017). eSource for clinical trials: Implementation and evaluation of a standards-based approach
in a real world trial. International Journal of Medical Informatics, 106, 17–24. https://doi.org/
10.1016/j.ijmedinf.2017.06.006.
EudraLex: The rules governing medicinal products in the European Union, Volume 4: Good manu-
facturing practice: medicinal products for human and veterinary use; Annex 11: computerized
systems. (2011). European Commission. Retrieved January 18, 2020, from https://ec.europa.eu/
health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf
248 W. M. Charles
Evangelatos, N., Özdemir, V., & Brand, A. (2020). Blockchain for digital health: Prospects and
challenges. OMICS: A Journal of Integrative Biology, 24(5), 237–240. https://doi.org/10.1089/
omi.2020.0045
Fernández-Caramés, T. M., Froiz-Miguez, I., Blanco-Novoa, O., & Fraga-Lamas, P. (2019).
Enabling the internet of mobile crowdsourcing health things: A mobile fog computing, blockchain
and IoT based continuous glucose monitoring system for diabetes mellitus research and care.
Sensors (Basel, Switzerland), 19(15), 3319. https://doi.org/10.3390/s19153319.
Friedman, C. P., Furberg, C. D., DeMets, D. L., Reboussin, D. M., & Granger, C. B. (2015).
Fundamentals of clinical trials (5th ed.). Springer International Publishing AG. https://doi.org/
10.1007/978-3-319-18539-2
General Data Protection Regulation, European Parliament and the Council of the European
Union. (2016). https://gdpr-info.eu/ and https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?
uri=CELEX:32016R0679
Hasselgren, A., Kralevska, K., Gligoroski, D., & Faxvaag, A. (2020). GDPR compliant blockchain
and distributed ledger technologies in the health sector. IOS Press. https://doi.org/10.3233/sht
i200408
Hughes, L., Dwivedi, Y. K., Misra, S. K., Rana, N. P., Raghavan, V., & Akella, V. (2019). Blockchain
research, practice and policy: Applications, benefit4s, limitations, emerging research themes and
research agenda. International Journal of Information Management, 49, 114–129. https://doi.
org/10.1016/j.ijinfomgt.2019.02.005.
IEEE Standards Association. (2020). P2418.6—Standard for the framework of distributed ledger
technology (DLT) use in healthcare and the life and social sciences. IEEE. Retrieved July 25,
2020, from https://sagroups.ieee.org/2418-6/
Inbaraj, X. A., & Chaitanya, T. R. (2020). Need to know about combined technologies of blockchain
and machine learning. In S. Krishnan, V. E. Balas, E. G. Julie, Y. H. Robinson, S. Balaji, & R.
Kumar (Eds.), Handbook of research on blockchain technology (pp. 417–432). Academic Press.
https://doi.org/10.1016/B978-0-12-819816-2.00017-4
Internet/broadband fact sheet. (2019, June 12). Pew research center. Retrieved July 31, 2020, from
https://www.pewresearch.org/internet/fact-sheet/internet-broadband/
Jung, H. H., & Pfister, F. M. J. (2020). Blockchain-enabled clinical study consent management.
Technology Innovation Management Review, 10(2), 14–24. https://doi.org/10.22215/timreview/
1325
Kakavand, H., Kost De Sevres, N., & Chilton, B. (2017). The blockchain revolution: An analysis of
regulation and technology related to distributed ledger technologies. SSRN, 27. https://doi.org/
10.2139/ssrn.2849251
Kaye, J., Whitley, E. A., Lund, D., Morrison, M., Teare, H., & Melham, K. (2015). Dynamic
consent: A patient interface for twenty-first century research networks. European Journal of
Human Genetics, 23(2), 141–146. https://doi.org/10.1038/ejhg.2014.71.
Kendzierskyj, S., & Jahankhani, H. (2019). Blockchain as an efficient and alternative mechanism for
strengthening and securing the privacy of healthcare patient and clinical research data. https://
doi.org/10.1109/ICGS3.2019.8688148
Khozin, S., Kim, G., & Pazdur, R. (2017). From big data to smart data: FDA’s INFORMED initiative.
Nature Reviews Drug Discovery, 16(5), 306. https://doi.org/10.1038/nrd.2017.26.
Khozin, S., Pazdur, R., & Shah, A. (2018). INFORMED: An incubator at the US FDA for driving
innovations in data science and agile technology. Nature Reviews Drug Discovery, 17(8), 529–
530. https://doi.org/10.1038/nrd.2018.34.
Koczkodaj, W. W., Masiak, J., Mazurek, M., Strzałka, D., & Zabrodskii, P. F. (2019). Massive health
record breaches evidenced by the Office for Civil Rights data. Iranian Journal of Public Health,
48(2), 278–288. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6556182/
Košťál, K., Helebrandt, P., Belluš, M., Ries, M., & Kotuliak, I. (2019). Management and monitoring
of IoT devices using blockchain (dagger). Sensors (Basel, Switzerland), 19(4), 856. https://doi.
org/10.3390/s19040856.
9 Accelerating Life Sciences Research with Blockchain 249
Kuo, T.-T., Ohno-Machado, L., & Zavaleta Rojas, H. (2019). Comparison of blockchain platforms:
A systematic review and healthcare examples. Journal of the American Medical Informatics
Association, 26(5), 462–478. https://doi.org/10.1093/jamia/ocy185.
Lane, T. S., Armin, J., & Gordon, J. S. (2015). Online recruitment methods for web-based and
mobile health studies: A review of the literature. Journal of Medical Internet Research, 17(7),
e183. https://doi.org/10.2196/jmir.4359.
Leon-Sanz, P. (2019). Key points for an ethical evaluation of healthcare big data. Processes, 7(8),
493. https://doi.org/10.3390/pr7080493.
Levitan, B., Getz, K., Eisenstein, E. L., Goldberg, M., Harker, M., Hesterlee, S., et al. (2018).
Assessing the financial value of patient engagement: A quantitative approach from CTTI’s patient
groups and clinical trials project. Therapeutic Innovation & Regulatory Science, 52(2), 220–229.
https://doi.org/10.1177/2168479017716715.
Li, G., Yin, C., Zhou, Y., Wang, T., Chen, J., Liu, Y., et al. (2020). Digitalized adaptation of oncology
trials during and after COVID-19. Cancer Cell, S1535–6108(20), 30325–30331. https://doi.org/
10.1016/j.ccell.2020.06.018.
Li, M., Weng, J., Yang, A., Lu, W., Zhang, Y., Hou, L., et al. (2019). CrowdBC: A blockchain-
based decentralized framework for crowdsourcing. IEEE Transactions on Parallel and Distributed
Systems, 30(6), 1251–1266. https://doi.org/10.1109/TPDS.2018.2881735.
Lin, C., He, D., Zeadally, S., Kumar, N., & Choo, K.-K. R. (2020). SecBCS: A secure and privacy-
preserving blockchain-based crowdsourcing system. Science China Information Sciences, 63(3),
130102: 130101–130114. https://doi.org/10.1007/s11432-019-9893-2
Lin, Q., Yan, H., Huang, Z., Chen, W., Shen, J., & Tang, Y. (2018). An ID-based linearly homomor-
phic signature scheme and its application in blockchain. IEEE Access, 6, 20632–20640. https://
doi.org/10.1109/ACCESS.2018.2809426.
Loftus, P. (2019, Decembe 24). Drugmakers turn to data mining to avoid expensive, lengthy drug
trials: Pfizer, Johnson & Johnson and Amgen try to win drug approvals by analyzing vast data
sets of electronic medical records. Wall Street Journal, 1–2. https://www.wsj.com/articles/dru
gmakers-turn-to-data-mining-to-avoid-expensive-lengthy-drug-trials-11577097000
Lopez, P. G., Montresor, A., & Datta, A. (2019). Please, do not decentralize the internet with
(permissionless) blockchains! (11) [Preprint]. https://arxiv.org/abs/1904.13093
Lorell, B. H., Mikita, J. S., Anderson, A., Hallinan, Z. P., & Forrest, A. (2015). Informed consent in
clinical research: Consensus recommendations for reform identified by an expert interview panel.
Clinical Trials (London, England), 12(6), 692–695. https://doi.org/10.1177/1740774515594362.
Mak, K.-K., & Pichika, M. R. (2019). Artificial intelligence in drug development: Present status and
future prospects. Drug Discovery Today, 24(3), 773–780. https://doi.org/10.1016/j.drudis.2018.
11.014.
Maslove, D. M., Klein, J., Brohman, K., & Martin, P. (2018). Using blockchain technology to
manage clinical trials data: A proof-of-concept study. JMIR Medical Informatics, 6(4), e11949.
https://doi.org/10.2196/11949.
National Institutes of Health. (2018, October). National institutes of health grants policy statement.
Bethesda, MD. Retrieved June 26, 2019, from https://grants.nih.gov/grants/policy/nihgps/nihgps.
pdf
Office for Civil Rights. (2002, July 26). Is a software vendor a business associate of a covered
entity? Retrieved June 30, 2019, from https://www.hhs.gov/hipaa/for-professionals/faq/256/is-
software-vendor-business-associate/index.html
Paramesh, B., & Shabna, M. (2020). Blockchain in smart health: Synergy for next generation ehealth
system. International Journal of Engineering Applied Sciences and Technology, 4(10), 381–385.
https://doi.org/10.33564/IJEAST.2020.v04i10.069
Park, J., Park, S., Kim, G., Kim, K., Jung, J., Yoo, S., et al. (2020). Reliable data collection in
participatory trials to assess digital healthcare applications. IEEE Access, 8, 79472–79490. https://
doi.org/10.1109/ACCESS.2020.2985122.
250 W. M. Charles
Pennec, F. (2018, February 23). Healthcare blockchain startup BurstIQ secures $5 M investment.
HIT Consultant. Retrieved July 26, 2020, from https://hitconsultant.net/2018/02/23/healthcare-
blockchain-startup-burstiq-secures-5m/
Porsdam Mann, S., Savulescu, J., Ravaud, P., & Benchoufi, M. (2020). Blockchain, consent and
prosent for medical research. Journal of Medical Ethics, (Forthcoming). https://doi.org/10.1136/
medethics-2019-105963
PregSource: Crowdsourcing to understand pregnancy. (2020, October 30). ClinicalTrials.gov.
Retrieved July 30, 2020, from https://clinicaltrials.gov/ct2/show/NCT02577536
Private Ethereum networks. (2019). Go Ethereum. Retrieved July 31, 2020, from https://geth.eth
ereum.org/docs/interface/private-network
Radhakrishnan, B. L., Joseph, A. S., & Sudhakar, S. (2019). Securing blockchain based electronic
health record using multilevel authentication. IEEE. https://doi.org/10.1109/ICACCS.2019.872
8483.
Rahimzadeh, V. N. (2020). Pros and cons of prosent as an alternative to traditional consent in
medical research. Journal of Medical Ethics, (Forthcoming). https://doi.org/10.1136/medethics-
2020-106443
Ray, P. P., Dash, D., Salah, K., & Kumar, N. (2020). Blockchain for IoT-based healthcare: Back-
ground, consensus, platforms, and use cases. IEEE Systems Journal, (in press). https://doi.org/
10.1109/JSYST.2020.2963840
Saad, M., Spaulding, J., Njilla, L. L., Kamhoua, C. A., Nyang, D., & Mohaisen, A. (2019). Overview
of attack surfaces in blockchain. In S. Shetty, C. A. Kamhoua, & L. L. Njilla (Eds.), Blockchain
for distributed systems security (pp. 51–66). IEEE Computer Society Press. https://doi.org/10.
1002/9781119519621.ch3
Sato, T., & Himura, Y. (2018). Smart-contract based system operations for permissioned blockchain.
Curran Associates, Inc. https://doi.org/10.1109/NTMS.2018.8328745
Schultz, A., Saville, B. R., Marsh, J. A., & Snelling, T. L. (2019). An introduction to clinical trial
design. Paediatric Respiratory Reviews, 32, 30–35. https://doi.org/10.1016/j.prrv.2019.06.002.
Shabani, M. (2019). Blockchain-based platforms for genomic data sharing: A de-centralized
approach in response to the governance problems? Journal of the American Medical Informatics
Association, 26(1), 76–80. https://doi.org/10.1093/jamia/ocy149.
Shahaab, A., Lidgey, B., Hewage, C., & Khan, I. (2019). Applicability and appropriateness of
distributed ledgers consensus protocols in public and private sectors: A systematic review. IEEE
Access, 7, 43622–43636. https://doi.org/10.1109/ACCESS.2019.2904181.
Shetty, S. S., Kamhoua, C. A., & Njilla, L. L. (Eds.). (2019). Blockchain for distributed systems
security. IEEE Computer Society Press. https://ieeexplore.ieee.org/servlet/opac?bknumber=869
3620.
Siyal, A. A., Junejo, A. Z., Zawish, M., Ahmed, K., Khalil, A., & Soursou, G. (2019). Applica-
tions of blockchain technology in medicine and healthcare: Challenges and future perspectives.
Cryptography, 3(1), 3. https://doi.org/10.3390/cryptography3010003.
Smetanin, S., Ometov, A., Komarov, M., Masek, P., & Koucheryavy, Y. (2020). Blockchain eval-
uation approaches: State-of-the-art and future perspective. Sensors (Basel, Switzerland), 20(12),
E3358. https://doi.org/10.3390/s20123358.
Software as a Medical Device Working Group. (2017, September 21). Software as a medical device.
International Medical Device Regulators Forum. Retrieved June 29, 2020, from http://www.imdrf.
org/docs/imdrf/final/technical/imdrf-tech-170921-samd-n41-clinical-evaluation_1.pdf
Srivastava, G., Parizi, R. M., Dehghantanha, A., & Choo, K.-K. R. (2019). Data sharing and
privacy for patient IoT devices using blockchain. Springer. https://doi.org/10.1007/978-981-15-
1301-5_27
Steinhubl, S. R., Wolff-Hughes, D. L., Nilsen, W., Iturriaga, E., & Califf, R. M. (2019). Digital
clinical trials: Creating a vision for the future [Editorial]. NPJ Digital Medicine, 2(1), 126. https://
doi.org/10.1038/s41746-019-0203-0.
9 Accelerating Life Sciences Research with Blockchain 251
Sukhija, N., Bautista, E., Moore, M., & Sample, J.-G. (2019). Employing blockchain technology
for decentralized crowdsourced data access and management. IEEE. https://doi.org/10.1109/Sma
rtWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00089.
Takemiya, M., & Vanieiev, B. (2018). Sora identity: Secure, digital identity on the blockchain. IEEE
Computer Society. https://doi.org/10.1109/COMPSAC.2018.10299.
Taylor, M. J., & Whitton, T. (2020). Public interest, health research and data protection law: Estab-
lishing a legitimate trade-off between individual control and research access to health data. Laws,
9(1), 6. https://doi.org/10.3390/laws9010006.
Thornton, J. P. (2017). Conflict of interest and legal issues for investigators and authors [Editorial].
Journal of the American Medical Association, 317(17), 1761–1762. https://doi.org/10.1001/jama.
2017.4235.
Thorpe, K. E., Zwarenstein, M., Oxman, A. D., Treweek, S., Furberg, C. D., Altman, D. G., et al.
(2009). A pragmatic–explanatory continuum indicator summary (PRECIS): A tool to help trial
designers. Journal of Clinical Epidemiology, 62(5), 464–475. https://doi.org/10.1016/j.jclinepi.
2008.12.011.
Treshock, M., Fraser, H., & Pureswaran, V. (2018). Team medicine: How life sciences can win with
blockchain. https://www.ibm.com/downloads/cas/RYD0QA7G
Turner, J. R. (2010). New drug development: An introduction to clinical trials (2nd ed.). Springer.
https://doi.org/10.1007/978-1-4419-6418-2
U.S. Food and Drug Administration. (2002, January 11). General principles of software validation:
Final guidance for industry and FDA staff . Retrieved January 18, 2020, from https://www.fda.gov/
regulatory-information/search-fda-guidance-documents/general-principles-software-validation
U.S. Food and Drug Administration. (2007, May). Guidance for industry: Computerized systems
used in clinical investigations. Retrieved June 14, 2019, from https://www.fda.gov/media/70970/
download
U.S. Food and Drug Administration. (2014, December). Providing regulatory submissions in elec-
tronic format—Standardized study data: Guidance for industry. Retrieved June 14, 2019, from
https://www.fda.gov/media/82716/download
U.S. Food and Drug Administration. (2017, December 8). Software as a medical device (SaMD):
Clinical evaluation: guidance for industry and Food and Drug Administration staff . Retrieved
June 29, 2020, from https://www.fda.gov/media/100714/download
U.S. Food and Drug Administration. (2018, December). Framework for FDA’s real-world evidence
program. U.S. Food and Drug Administration. Retrieved August 2, 2019, from https://www.fda.
gov/media/120060/download
U.S. Food and Drug Administration. (2019a, September 18). FDA’s Technology Modernization
Action Plan (TMAP). Retrieved January 23, 2020, from https://www.fda.gov/about-fda/reports/
fdas-technology-modernization-action-plan
U.S. Food and Drug Administration. (2019b, September). Guidance for industry and Food and
Drug Administration staff: Policy for device software functions and mobile medical applications.
Retrieved January 18, 2020, from https://www.fda.gov/media/80958/download
U.S. Food and Drug Administration. (2019c). Submitting documents using real-world data and real-
world evidence to FDA for Drugs and Biologics: DRAFT guidance for industry. U.S. Department
of Health and Human Services. Retrieved May 10, 2019, from https://www.fda.gov/media/124
795/download
U.S. Food and Drug Administration. (2020a, March 26). Study data standards resources. Retrieved
July 19, 2019, from https://www.fda.gov/industry/fda-resources-data-standards/study-data-sta
ndards-resources
U.S. Food and Drug Administration. (2020b, March). Study data technical conformance guide:
Technical specifications document. Retrieved July 19, 2019, from https://www.fda.gov/media/
136460/download
U.S. Government Accountability Office. (2018). Urgent actions are needed to address cybersecurity
challenges facing the nation (GAO-18-622). Report to Congressional Committees, Issue. http://
media.proquest.com/media/hms/PFT/1/EHP07?_s=h7D1qexAHJOqnGYfNjXKiA75J8k%3D
252 W. M. Charles
U.S. Government Accountability Office. (2019). Artificial intelligence in health care: Benefits and
challenges of machine learning in drug development (GAO-20-215SP). https://www.gao.gov/ass
ets/710/703558.pdf
Verde, F., Stanzione, A., Romeo, V., Cuocolo, R., Maurea, S., & Brunetti, A. (2019). Could
blockchain technology empower patients, improve education, and boost research in radi-
ology departments? An open question for future applications. Journal of Digital Imaging, 32,
1112–1115. https://doi.org/10.1007/s10278-019-00246-8.
Vining, R. D., Salsbury, S. A., & Pohlman, K. A. (2014). Eligibility determination for clinical trials:
Development of a case review process at a chiropractic research center. Trials, 15(1). https://www.
ncbi.nlm.nih.gov/pmc/articles/PMC4221721/
Vuturo, A. (2020, May 18). Clinical trial protocol design gets patient input boost from Transparency
Life Sciences. Business Wire. Retrieved July 24, 2020, from https://www.businesswire.com/news/
home/20200518005475/en
Walters, S. J., dos Anjos, Bonacho, Henriques-Cadby, I., Bortolami, O., Flight, L., Hind, D., et al.
(2017). Recruitment and retention of participants in randomised controlled trials: A review of
trials funded and published by the United Kingdom Health Technology Assessment Programme.
British Medical Journal Open, 7(3), e015276. https://doi.org/10.1136/bmjopen-2016-015276.
Weng, C., Tu, S. W., Sim, I., & Richesson, R. L. (2010). Formal representations of eligibility criteria:
A literature review. Journal of Biomedical Informatics, 43(3), 451–467. https://doi.org/10.1016/
j.jbi.2009.12.004.
Williams, G. W. (2006). The other side of clinical trial monitoring; assuring data quality and
procedural adherence. Clinical Trials (London, England), 3(6), 530–537. https://doi.org/10.1177/
1740774506073104.
Wong, D. R., Bhattacharya, S., & Butte, A. J. (2019). Prototype of running clinical trials in an
untrustworthy environment using blockchain. Nature Communications, 10(1), 917. https://doi.
org/10.1038/s41467-019-08874-y.
Wu, A. (2020, February 20). Key considerations for SaMD companies developoing and commer-
cializing software as a medical device. Greenlight Guru. Retrieved June 25, 2020, from https://
blog.greenlight.guru/hubfs/RQS_GG%20Webinar_SaMD_022020_final.pdf
Xu, J. J. (2016). Are blockchains immune to all malicious attacks? Financial Innovation, 2(25).
https://doi.org/10.1186/s40854-016-0046-5
Zhang, P., Schmidt, D. C., White, J., & Lenz, G. (2018). Blockchain technology use cases in health-
care. In P. Raj & G. C. Deka (Eds.), Advances in computers. Blockchain technology: Platforms,
tools and use cases (Vol. 111, pp. 1–41). Academic Press. https://doi.org/10.1016/bs.adcom.2018.
03.006
Zhang, R., Xue, R., & Liu, L. (2019). Security and privacy on blockchain. ACM Computing Surveys,
52(3). https://doi.org/10.1145/3316481
Zhuang, Y., Sheets, L. R., Shae, Z., Chen, Y.-W., Tsai, J. J. P., & Shyu, C.-R. (2019).
Applying blockchain technology to enhance clinical trial recruitment. AMIA Annual Symposium
Proceedings, 2019, 1276–1285.
Zhuang, Y., Sheets, L. R., Shae, Z., Tsai, J. J. P., & Shyu, C.-R. (2018). Applying blockchain
technology for health information exchange and persistent monitoring for clinical trials. AMIA
Annual Symposium Proceedings, 1167–1175. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC
6371378/
Chapter 10
Challenges and Future Work Directions
in Healthcare Data Management Using
Blockchain Technology
Abstract In recent times, blockchain becomes a hot research topic and several
research works have been made to investigate the applications of the blockchain to
non-financial use cases. Healthcare is an important industry in which blockchain is
anticipated to have substantial impacts. Exploration of this domain is certainly new
and increasing rapidly in present times. Therefore, healthcare informatics research
communities and physicians are struggling to retain pace with research progress in
this area. This survey offers a detailed review of the ongoing study in the application
of blockchain technologies in the healthcare sector. This survey elaborates on several
research works involving the applicability of blockchain in healthcare, but there is an
absence of enough prototype implementation and studies to describe the efficiency
of these presented use cases. The survey additionally highlights the existing devel-
opments of blockchain applications in the medical domain, benefits, challenges, and
future scope.
D. A. Pustokhin
Department of Logistics, State University of Management, Moscow, Russia
e-mail: [email protected]
I. V. Pustokhina
Department of Entrepreneurship and Logistics, Plekhanov Russian University of Economics,
117997 Moscow, Russia
e-mail: [email protected]
K. Shankar (B)
Department of Computer Applications, Alagappa University, Karaikudi, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 253
S. Namasudra and G. C. Deka (eds.), Applications of Blockchain in Healthcare,
Studies in Big Data 83, https://doi.org/10.1007/978-981-15-9547-9_10
254 D. A. Pustokhin et al.
10.1 Introduction
posts, interviews and so on, and there are unwanted data, rumors and irregularities
regarding the valid component of blockchain in medical application. Developers and
practitioners have tried to learn the particular function or utilize cases of blockchain
in the medical industry; and the recognized utilize cases are what blockchain-based
medical functions were deployed.
256 D. A. Pustokhin et al.
This survey intends to offer a brief survey of existing research works carried out on
the function of blockchain technologies in the healthcare sector. These surveys elab-
orate several research works involving the applicability of blockchain in healthcare,
but it is an absence of enough prototype implementation and learned for describing
the efficiency of this presented employ case. A survey additionally highlights the
existing developments of blockchain applications in the medical domain, benefits,
challenges, and future scope.
The remaining section of the chapter are organized as follows. Section 10.2
explains the different application areas of blockchain in healthcare. Section 10.3
discusses the healthcare data management in blockchain. Then, Sect. 10.4 listed out
the significant merits of blockchain in healthcare industry. Next, the challenges exist
in the blockchain in healthcare is provided in Sect. 10.5 and the future works is listed
out in Sect. 10.6. Finally, the chapter is concluded in Sect. 10.7.
The lifecycle of electronic health records (EHRs) is depicted in Fig. 10.3. Blockchain
method is mainly to approve the traceability and immutability of the patient’s clin-
ical data without placing the medicinal details on the blockchain; however, it is
recorded as metadata and patient’s consent. The maximum and sensitive medical
data have been saved in single nodes of the network, whereas the smart implications
are recorded on-chain. The latter method is applied in cloud-based service for tempo-
rary storage as well as data exchange (Namasudra and Roy 2017). FHIR chain is a
blockchain-dependent method used for data interchange which encapsulates HL7
Fast Healthcare Interoperability Resources (FHIR) for healthcare data. Effective on-
chain consent supervision as well as enforcement of management policy represented
by consent would enhance and serve data exchange for secured data transmission.
Optimal treatment management could be accomplished by linking patients, several
medical providers, health insurances, and pharmacies provide a specific kind of
data (Mohanty et al. 2020). The major limitation involved in developing connected
health is the absence of interoperability. A module which depends upon the permis-
sion blockchain platform, and defined the FHIR combination with a system can
report the interoperability problem. The evidence of interoperability is based on the
assurance of FHIR protocol that needs validation for the messages forwarded to
the blockchain which is finally transformed into the required format. Then, visible
implementation of modern contracts would activate rapid, independent, standard,
and bias-free computations reimbursements and claims. Furthermore, it is essential
to assure the problems involved in healthcare data management. Magyar in (Magyar
et al. 2017) developed few strategies of HIPAA regulation, which recommends a list
of cryptographic devices that are highly used to assure data privacy and security.
Traceability, data authenticity, and interoperability among the data sources would
activate a probability of developing and supervising the whole medical data.
Blockchain-relied use cases in supply-chain are developing, with the help of trace-
ability and immutability features of blockchain to overcome limitations involved
in healthcare, protecting clinical devices, optimizing the performance of medical
IoT tools, and maximizing the common health supply chain, assuring control over
returned drugs to pharmacies. Recently, the capability of a blockchain to offer the
advantages of SCM and traceability of pharmaceuticals is shown. Issues of phar-
maceutical supply-chain, validation of transportation, and memory conditions have
maximum significance where medications have minimum efficiency. To apply smart
contracts developed on Ethereum blockchain for compliance validation depends upon
the sensor details (Sivaram et al. 2020).
Medical trials are carried out to determine newly presented models and medicines.
Organization among various centers activates the aggregation of maximum hetero-
geneous data within a limited period and compared the medical trials processed in
a medical institution (Namasudra and Deka 2018a). Furthermore, the contribution
of various centers makes autonomous estimation. Therefore, these trials are highly
difficult with respect to coordination. Under the application of blockchain model
facilitates control over multicenter medical trials, enhances transparency, traceability
of the consents in clinical trials, supremacy, and scalability of medical trials’ data, and
improvises patient contribution and refers to the proper treatment. Under the obser-
vation of data exchange, the threats involved can be predicted to gain maximum
knowledge regarding a patient, by integrating anonymized datasets with the same
258 D. A. Pustokhin et al.
patient data and evaluate the threats that reduce the patient’s security (Pustokhina
et al. 2020).
The legacy method exclusively distributes healthcare resources within the medicinal
field and is completely incompatible with the exterior system (Kathiresan et al.
2020). However, facts show various advantages with these integrated networks for
interrelated and betterment in medicinal sectors, intercom calls involving several
firms for healthcare information studies. Multi-organizational data exchange is the
most crucial problem that requests the medicinal data received by a health care
contributor could openly accessible to other firms like doctors or laboratory (Elhoseny
et al. 2019). Blockchain technique specifies process and control over the data to make
it flexible, secure, forms new segmentation as well as share the data with services in
various healthcare management, as shown in Fig. 10.4. This technique is prominence
for various recent developing process (Raj et al. 2020).
With progress in digital data allied to healthcare, cloud storage and patient infor-
mation safety policies (Namasudra et al. 2020a), innovative chances are available
for healthcare organization and easily accessible to patient data and use its data.
Assuring transactions, storing, data security (Devi et al. 2020) and controlling its
smooth integration is highly important to every data-driven firm, mainly in health-
care where blockchain technique has the possible to determine such crucial prob-
lems in a vigorous and effectual method. In this segment, blockchain-based appli-
cation comprises EHR, data storage, data management and data sharing, explained
elaborately. Developing blockchain technology in healthcare innovations, consists
of stakeholders, blockchain technology, healthcare applications, and data sources,
which are theoretically separated into numerous levels.
(Gordon and Catalini 2018) posted an analysis on medicinal blockchain. In
their research, they evaluate the working of blockchain transformation technique
in the healthcare area by permitting data immutability, handling a large volume of
healthcare data, patient identification across the network and digital access rights. It
employed on medicinal record utilizing the Hyperledger fabric blockchain sector to
send medicinal information to the hyper ledger blockchain network. They gathered
these medicinal records with the help of smart phones and other IoT gadgets and
aims to assure the healthcare data are recorded to the Blockchain.
(Vazirani et al. 2019) considered blockchain is the method to handle the medicinal
data effectively. They involved many research types and have discussed the possibility
of profits and drawbacks of the blockchain technique without submission of any
evidence. It is finalized that the blockchain is more suitable for healthcare records
management on the cloud network whereas controlling safety and confidentiality
of information. (Rouhani et al. 2018) emerged with a method for addressing the
restriction of authorization. They have utilized a sample of Hyperledger domain to
control and manage healthcare data by the patient. (Wu and Tsai 2018) have surveyed
literature of healthcare management systems and discovered 2 programs for offering
network security. They planned to use a distributed system and creating policies for
medical data management (Namasudra and Deka 2018, a).
Shen et al. (2019) recommend a system to share healthcare data by blockchain
and peer to peer networks called as MedChain. It has calculated these mechanisms
to medicinal information generation through medicinal inspection and information
gathered from IoT sensing gadgets and other mobile phone applications. It described
several problems of the medicinal management mechanism and explained the method
of solving with the help of blockchain technique. It has introduced the existing
investigate techniques on healthcare sector by distributed ledger method with an
essential function for developing into the effective method as well as recommended
IoMT deliverance utilizing network protocols. Vora et al. (2018) proposed neglecting
of patient data like name, address and so on automatically and provide the blockchain
method to manage the health record digitally. The ultimate aim of the research is to
monitor the efficiency of the system to view the working of the proposed framework
which manages the requirements of patient, physicians and others.
Zhang et al. (2018) have promoted blockchain importance related to system for
healthcare and blockchain working technique gives valuable healthcare plan. Jamil
et al. (2019) studied the problems about drug rules and the process of standard-
izing drugs utilizing blockchain. They have displayed the challenges to discover
obscured drugs and projected blockchain as a method for identifying counterfeits.
Lee and Yang (2018) employed on the fingernail investigation management method
by blockchain and microscopy sensing devices. Human nails are highly peculiar and
replicate the physiological personality of the individuals. They have used microscope
sensing devices for capturing images of the nails and utilized in image pre-processing
method to obtain a clearer image. A deep neural network used to monitor the feature
extraction technique. Blockchain technique was utilized in order to secure user infor-
mation and gives privacy and security so some modification in the scheme is tracked
and recorded through the ledger. (Agbo et al. 2019) tested standardized survey of
existing studies of blockchain applications. They have selected sixty-five research
for addressing their doubts. It represents that blockchain can have potential tech-
niques for various healthcare use cases that comprise managing electronic health-
care records, biomedical research, drugs supply chain. On the other hand, they have
also determined the statement that still there is necessity to build extra thoughtful of
260 D. A. Pustokhin et al.
blockchain method. Modernization has been decreased slowly in medical sector due
to incompetency and serious policy.
Azaria et al. (2016) proposed these policy problems resulting in bad performance
in the EMR mechanism. They have planned blockchain based solution called MedRec
to manage a large number of medicinal data in EMR process. They have established
a typical and novel technique to access medical record, which offers reasonable
inspection access log method. MedRec allows both patients and doctors for sharing
the medicinal information between third parties utilizing distributed ledger tech-
nique. It provides motivation for researchers and other health persons who take
part in the data mining. MedRec allows vagueness of data and data accessibilities
to the miners as a bonus to involve in the network. (Zhang et al. 2017) reviewed
regarding blockchain and smart contracts functioning of blockchain based smart
contracts has the capacity to deal with various medicinal problems. In their research
they hold various primary step to approve blockchain technique and address the
various difficulties in blockchain implementation. They have explained that evolu-
tion of blockchain based applications could point medical problems in good effective
manner.
Kumar et al. (2018) introduced diverse blockchain apps for medical sector. They
have focused problems and challenges in adopting blockchain technique and discov-
ered smart contract for blockchain based medicinal methods. There are numerous
benefits to the distributed ledger system as reviewed with identity management, elim-
inating third parties, sensitive information handling, and protection to the personal
data. In the case other diverse centralized networks, the functions of the network
carry on even when separate nodes fail. It raises trust as the reliability of the agent.
Information security is also helped by insufficiency in intermediaries. Since, it is
an opportunity for safety violations in the present practice of 3rd parties collecting
personal information. The 3rd parties might develop into excess by utilizing the
blockchain, efficiently maximizing the safety of the user.
Blockchain and Ethereum as safe domain to handle every sensible data. It
describes blockchain is distributed system for solving business issues and has large
capacity. During the blockchain transaction, encryption protects the data and every
transaction is associated with earlier transactions or a proof (Namasudra et al. 2020b).
A blockchain transaction is verified on the nodes utilizing programs. It could not
possible for individual to do a transaction. At last, blockchains are transparent that
allow all user at any time to follow the transactions. Smart contract is a safe method
which supports to avoid intrusion by other parties. Ethereum is a distributed network
operating smart contracts. These facilitate developers for building markets to the
movements of funds based on commands specified in the earlier period. The most
important characteristics of Blockchain are Payment, Immutability, fast transmission,
Decentralization, and confirmation within no time.
(Liang et al. 2017) utilized the cloud services state and decide the cloud proof as
a data unit to locate the activity of the user rapidly and to collect data source. By
fixing the original information into blockchain activities, it creates and executes
ProvChain, as well as design for the grouping and confirmation of cloud data
provenance. On examining the efficiency of the simulation outcomes portrayed that
10 Challenges and Future Work Directions in Healthcare Data … 261
ProvChain provides safety features for cloud storage software, containing low over-
head reliability, consumer privacy, and deceptive provenance. (Mackey et al. 2019)
reviewed blockchain working is broadly discovered in the medical field by various
business stakeholders to develop the business function. It could support in optimizing
patient results, reducing the cost and standardization of the entire method. They have
carried out research from diverse physicians on blockchain conceptualization and
exploitation of blockchain framework in the medicinal organization.
The blockchain offers several advantages for medical researchers, health care
suppliers, and individuals. It will explore and adapted medicine for creating a single
saved location to all health information, track adapted information in concurrent
and a group of information access authorizations at a granular level. The health
researchers require inclusive datasets for different kinds of diseases, accelerate
biomedical detection, way the progress of drugs rapidly, and create individual treat-
ment devices according to genetics, lifecycle, and atmosphere. By incorporating
the patients of various ethnic and socio-economic surroundings and from several
geographic regions, the allocated information method of Blockchain will give a large
series of datasets. It gives correct data to longitudinal learns as blockchain gathers
health information above the person life span.
The health care blockchain would widen the gathering of health information from
the set of people presently under-served with the medicinal community or not usually
contained in science. A distributed information surroundings of blockchain generates
that it simple to make audiences to be concerned and to the normal public for making
outcomes further reflective. The healthcare blockchain would possibly support the
growth of novel breed of “smart” health care supplier apps which will circumvent
the most recent medicinal explore and grow customized cure ways.
10.5 Challenges
The blockchain gives a reliable solution for particular healthcare function challenges
namely safety, confidentiality, integrity, disturbing, interoperability, accessibility,
and concurrent updates of medical information, mainly if executed perfectly. But,
blockchain has limitations and restrictions. Although the benefits of blockchain tech-
nology, growth, and use in healthcare functions assumed severe research challenges
that need extra research. The challenges caused by blockchain technology are listed
as follows.
(1) Security.
262 D. A. Pustokhin et al.
Structural design and the working of blockchain skills have numerous particular
safety vulnerabilities. The blockchain protection vulnerabilities are frequently
connected to issues through the traditional consensus system utilized for veri-
fying and confirming transactions. Consensus system techniques are inca-
pable of preventing these security threats in the shared blockchain mecha-
nism. For conquering these safety threats, the propose of consensus systems
have minimum importance. Specifically, a protocol with counter evaluates
that will avoid these attacks must be given inside a perfect result. Security
bugs permit malicious software performance for implementing decentralized
functions according to grow blockchain.
(2) Privacy.
Present secure transmission structural designs of EHR disregard users or
patients’ privacy, like the replacing method useful every information without
the authorization of owners or noise in the data requester review. But, when
alive HER functions depend on a blockchain, after that the requester requires
specific patient information for providing personalised services. The key chal-
lenge of keeping the confidentiality of patient information is by offering a struc-
ture that utilizes cryptographic systems to information confidentiality and relia-
bility on a blockchain-based EHR. Some identical structures, shortcomings must
be addressed in preserving patient’s confidential information. Initially, patients
must allocate their information through the ease of utilization as employing
blockchain-based structures in HER needs maximum calculation power and get
substantial time for completing all the tasks. Secondly, further a novel node to
the blockchain network that novel patients require, it needs various steps for
verifying the honest patient.
(3) Latency and throughput restrictions.
In the case of transaction latency, a blockchain gets time to process transactions.
For instance, the bitcoin blockchains latency needs 10 min for verifying some
transactions in the network. Although the detail that 5 or 6 blocks should be
further to increase the chain previous to verification, the approval is to wait
around 1 h to verify all transactions. In contrast, the majority of usual database
methods only need a couple of seconds for confirming a transaction.
(4) Blockchain size.
If all devices conduct transactions like IoT-RPM and EHR, blockchains are
always enhancing and need to utilize stronger miners. A usual resource-
constraint IoMT tool is unable to handle the tiny size of blockchains. So,
compression systems in the blockchain with alternative manners like mini-
blockchains must be studied.
(5) Computing power limitations.
IoMT mechanism information collected with blockchain is regular calcula-
tion restricted, such that cryptographic systems cannot be utilized. Several
health-related functions, cryptosystems in resource-constraint tools that manage
sensor and actuator security has very restricted calculation resources concerning
memory as well as processing power. Specifically, it deals with recent and
protected public-key cryptography methods. A majority of blockchains employ
10 Challenges and Future Work Directions in Healthcare Data … 263
Thus, it is a plan for offering the growth and application of a platform to distribute
EHRs among different health care organizations in Malaysia utilizing blockchain
and regarding safety and confidentiality protocols to manage patient information. A
blockchain transaction in the HER method is determined as the procedure with that
patient information is updated, generated, removed, or transmitted among the several
nodes of a related network.
When the platform allows the simple identification of the specific node which
visits the supplier and the visit frequency, so allowing the gathering of confiden-
tial patient data namely names, disease, and present address. In addition, correctly
arrange the gathered data and defining the linked in a blockchain network are prob-
lems that have to be addressed. For conducting private and secret transactions, plan
for projecting a structure utilizing the concept of cryptographic protocols like trusted
implementation surroundings and non-interactive safe multi-party calculation that
allows private calculation of encrypted transactions previous to being accessible into
the blockchain.
10.7 Conclusion
Acknowledgement The work of K. Shankar was supported by RUSA–Phase 2.0 grant sanc-
tioned vide Letter No. F. 24-51/2014-U, Policy (TNMulti-Gen), Dept. of Edn. Govt. of India,
Dt. 09.10.2018.
References
Agbo, C. C., Mahmoud, Q. H., & Eklund, J. M. (2019, June). Blockchain technology in healthcare:
a systematic review. Healthcare: Multidisciplinary Digital Publishing Institute 7(2), 56
Azaria, A., Ekblaw, A., Vieira, T., & Lippman, A. (2016, August). Medrec: Using blockchain for
medical data access and permission management. In 2016 2nd International Conference on Open
and Big Data (OBD) (pp. 25–30). IEEE.
Devi, D., Namasudra, S., & Kadry, S. (2020). A boosting-aided adaptive cluster-based under-
sampling approach for treatment of class imbalance problem. International Journal of Data
Warehousing and Mining (IJDWM), 16(3), 60–86.
10 Challenges and Future Work Directions in Healthcare Data … 265
Elhoseny, M., Shankar, K., & Uthayakumar, J. (2019). Intelligent diagnostic prediction and
classification system for chronic kidney disease. Scientific Reports, 9(1), 1–14.
Gordon, W. J., & Catalini, C. (2018). Blockchain technology for healthcare: Facilitating the transi-
tion to patient-driven interoperability. Computational and Structural Biotechnology Journal, 16,
224–230.
Hussien, H. M., Yasin, S. M., Udzir, S. N. I., Zaidan, A. A., & Zaidan, B. B. (2019). Asystematic
review for enabling of develop a blockchain technology in healthcare application: Taxonomy,
substantially analysis, motivations, challenges, recommendations and future direction. Journal
of Medical Systems, 43(10), 320.
Jamil, F., Hang, L., Kim, K., & Kim, D. (2019). A novel medical blockchain model for drug supply
chain integrity management in a smart hospital. Electronics, 8(5), 505.
Kathiresan, S., Sait, A. R. W., Gupta, D., Lakshmanaprabu, S. K., Khanna, A., & Pandey, H.
M. (2020). Automated detection and classification of fundus diabetic retinopathy images using
synergic deep learning model. Pattern Recognition Letters.
Kumar, T., Ramani, V., Ahmad, I., Braeken, A., Harjula, E., & Ylianttila, M. (2018, September).
Blockchain utilization in healthcare: Key requirements and challenges. In 2018 IEEE 20th Inter-
national Conference on e-Health Networking, Applications and Services (Healthcom) (pp. 1–7).
IEEE.
Lee, S. H., & Yang, C. S. (2018). Fingernail analysis management system using microscopy
sensor and blockchain technology. International Journal of Distributed Sensor Networks, 14(3),
1550147718767044.
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., & Njilla, L. (2017, May). Provchain:
A blockchain-based data provenance architecture in cloud environment with enhanced privacy
and availability. In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid
Computing (CCGRID) (pp. 468–477). IEEE.
Magyar, G. (2017, November). Blockchain: Solving the privacy and research availability tradeoff
for EHR data: A new disruptive technology in health data management. In 2017 IEEE 30th
Neumann Colloquium (NC) (pp. 000135–000140). IEEE.
Mackey, T. K., Kuo, T. T., Gummadi, B., Clauson, K. A., Church, G., Grishin, D., et al. (2019).
‘Fit-for-purpose?’—challenges and opportunities for applications of blockchain technology in
the future of healthcare. BMC Medicine, 17(1), 1–17.
Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S. K., &
Khanna, A. (2020). An efficient Lightweight integrated Blockchain (ELIB) model for IoT security
and privacy. Future Generation Computer Systems, 102, 1027–1037.
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security
in cloud computing. Concurrency and Computation: Practice and Experience, 31(3), e4364.
Namasudra, S., & Deka, G. C. (2018). Taxonomy of DNA-based security models. In Advances of
DNA Computing in Cryptography (pp. 37–52). Chapman and Hall/CRC.
Namasudra, S., & Deka, G. C. (Eds.). (2018a). Advances of DNA computing in cryptography. CRC
Press.
Namasudra, S., & Roy, P. (2017). Time saving protocol for data accessing in cloud computing. IET
Communications, 11(10), 1558–1565.
Namasudra, S., Chakraborty, R., Kadry, S., Manogaran, G., & Rawal, B. S. (2020). FAST: Fast
accessing scheme for data transmission in cloud computing. Peer-to-Peer Networking and
Applications, (in press).
Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2020a). Securing multimedia
by using DNA based encryption in the cloud computing environment. ACM Transactions on
Multimedia Computing Communications and Applications.
Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020b). The revolution
of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in
Engineering.
Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based
data security in the cloud computing environment. Computer Communications, 151, 539–547.
266 D. A. Pustokhin et al.
Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balusamy, B. (2017). Time efficient secure
DNA based access control model for cloud computing environment. Future Generation Computer
Systems, 73, 90–105.
Pustokhina, I. V., Pustokhin, D. A., Gupta, D., Khanna, A., Shankar, K., & Nguyen, G. N. (2020).
An Effective Training Scheme for Deep Neural Network in Edge Computing Enabled Internet of
Medical Things (IoMT) Systems. IEEE Access, 8, 107112–107123.
Peters, A. W., Till, B. M., Meara, J. G., & Afshar, S. (2017). Blockchain technology in health care:
A primer for surgeons. Bulletin of the American College of Surgeons, 12, 1–5.
Raj, R. J. S., Shobana, S. J., Pustokhina, I. V., Pustokhin, D. A., Gupta, D., & Shankar, K. (2020).
Optimal Feature Selection-Based Medical Image Classification Using Deep Learning Model in
Internet of Medical Things. IEEE Access, 8, 58006–58017.
Rouhani, S., Butterworth, L., Simmons, A. D., Humphery, D. G., & Deters, R. (2018, July).
MediChain TM: a secure decentralized medical data asset management system. In 2018 IEEE
International Conference on Internet of Things (iThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData) (pp. 1533–1538). IEEE.
Sivaram, A. M., Lydia, E. L., Pustokhina, I. V., Pustokhin, D. A., Elhoseny, M., Joshi, G. P., &
Shankar, K. (2020). An Optimal Least Square Support Vector Machine Based Earnings Prediction
of Blockchain Financial Products. IEEE Access.
Shen, B., Guo, J., & Yang, Y. (2019). MedChain: Efficient healthcare data sharing via blockchain.
Applied Sciences, 9(6), 1207.
Vazirani, A. A., O’Donoghue, O., Brindley, D., & Meinert, E. (2019). Implementing blockchains
for efficient health care: Systematic review. Journal of Medical Internet Research, 21(2), e12439.
Vora, J., Nayyar, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues, J. J. (2018,
December). BHEEM: A blockchain-based framework for securing electronic health records.
In 2018 IEEE Globecom Workshops (GC Wkshps) (pp. 1–6). IEEE.
Wu, H. T., & Tsai, C. W. (2018). Toward blockchains for health-care systems: Applying the bilinear
pairing technology to ensure privacy protection and accuracy in data sharing. IEEE Consumer
Electronics Magazine, 7(4), 65–71.
Zhang, P., White, J., Schmidt, D. C., & Lenz, G. (2017, October). Design of blockchain-based apps
using familiar software patterns to address interoperability challenges in healthcare. In PLoP-24th
Conference On Pattern Languages Of Programs.
Zhang, P., Schmidt, D. C., White, J., & Lenz, G. (2018). Blockchain technology use cases in
healthcare. In Advances in computers (Vol. 111, pp. 1–41). Elsevier.
Denis A. Pustokhin received the Ph.D. degree in logistics and supply chain management from
the State University of Management, Moscow, Russia. He is currently an Associate Professor with
the State University of Management. He has published more than 30 conferences and journal arti-
cles. His research interests include enterprise logistics planning, artificial intelligence, big data, the
Internet of Things, and reverse logistics network design.
Irina V. Pustokhina received the M.B.A. degree in logistics and supply chain management and
the Ph.D. degree in logistics and supply chain management from the State University of Manage-
ment, Moscow, Russia. She is currently an Associate Professor with the Plekhanov Russian
University of Economics, Moscow. She has published more than 40 conferences and journal arti-
cles. Her research interests include supply chain management, regional logistics development,
sustainable urban development, city logistics, intelligent logistics systems, big data technology
and applications, information management, and the Internet of Things.
10 Challenges and Future Work Directions in Healthcare Data … 267