Storage Standards and Solutions Data Storage Shari
Storage Standards and Solutions Data Storage Shari
Review
Storage Standards and Solutions, Data Storage, Sharing,
and Structuring in Digital Health: A Brazilian Case Study
Nicollas Rodrigues de Oliveira 1 , Yago de Rezende dos Santos 1 , Ana Carolina Rocha Mendes 1 ,
Guilherme Nunes Nasseh Barbosa 1 , Marcela Tuler de Oliveira 2 , Rafael Valle 3 , Dianne Scherly Varela Medeiros 1
and Diogo M. F. Mattos 1, *
Abstract: The COVID-19 pandemic has highlighted the necessity for agile health services that enable
reliable and secure information exchange, but achieving proper, private, and secure sharing of EMRs
remains a challenge due to diverse data formats and fragmented records across multiple data silos,
resulting in hindered coordination between healthcare teams, potential medical errors, and delays in
patient care. While centralized EMR systems pose privacy risks and data format diversity complicates
interoperability, blockchain technology offers a promising solution by providing decentralized storage,
ensuring data integrity, enhancing access control, eliminating intermediaries, and increasing efficiency
in healthcare. By focusing on a Brazilian case study, this paper explores the significance of EMR
standards, security challenges, and blockchain-based approaches to promote interoperability and
secure data sharing in the healthcare industry.
Citation: Oliveira, N.R.d.; Santos,
Y.d.R.d.; Mendes, A.C.R.; Barbosa, Keywords: healthcare standards; blockchain
G.N.N.; Oliveira, M.T.d.; Valle, R.;
Medeiros, D.S.V.; Mattos, D.M.F.
Storage Standards and Solutions, Data
Storage, Sharing, and Structuring in
1. Introduction
Digital Health: A Brazilian Case
Study. Information 2024, 15, 20.
The healthcare sector is a typical example where sharing personal data between
https://doi.org/10.3390/ organizations is essential, and access to these data is intrinsically distributed. Healthcare
info15010020 professionals in many organizations need to analyze patient data to perform their tasks.
However, these data are typically stored in silos in distinct locations and different formats,
Academic Editor: Shmuel Tomi Klein
making it difficult to share. Thus, the complexity of the medical system prevents the
Received: 26 November 2023 patient’s entire medical history from being easily accessed when needed. In this way, much
Revised: 23 December 2023 information is lost or exhaustively repeated, making the diagnosis and treatment of the
Accepted: 24 December 2023 patient difficult and harming the patient’s journey.
Published: 29 December 2023 According to research from the Johns Hopkins American Hospital, medical errors rank
as the third leading cause of death in the United States, often stemming from systemic issues
like poorly coordinated care [1]. Overcoming the challenge of coordinating patient care
can be achieved through secure and accurate sharing of patients’ data, granting healthcare
Copyright: © 2023 by the authors.
teams access to comprehensive health histories, facilitating early diagnosis, and improving
Licensee MDPI, Basel, Switzerland.
treatment efficacy. Achieving these benefits is made possible through standardized elec-
This article is an open access article
tronic medical records (EMRs) stored in computerized healthcare environments, containing
distributed under the terms and
conditions of the Creative Commons
vital personal information like diagnoses and treatments, distributed among hospitals and
Attribution (CC BY) license (https://
clinics where the patient received treatment. EMRs streamline patient data monitoring and
creativecommons.org/licenses/by/ access, enabling seamless care integration between medical teams and health facilities, thus
4.0/). providing patients with various levels of care with pertinent medical information. While
sharing these data benefits the patient, leading to more accurate diagnoses and appropriate
treatments, it poses a significant challenge concerning privacy and security, given the highly
sensitive nature of the information stored in EMRs. Often, patient data are shared without
explicit consent among untrusted entities such as healthcare professionals, pharmacies,
patient families, and other physicians [2]. Although efforts are made to share patient data
through secure institutional medical systems, non-institutionalized and insecure means of
communication are sometimes used for simplicity and immediacy. During the COVID-19
pandemic, there has been a notable emphasis on streamlining consultations and enhancing
information exchange among patients, healthcare providers, and health organizations.
Consequently, patient records have gained increased importance in public health [3], as
they offer valuable data on diagnoses and prescribed medications, enabling identifying
individuals belonging to COVID-19 risk groups, among other applications. The broader
availability of patient data in electronic formats has significant implications for decision
making and continuity of care in both the public and private sectors, fostering seamless
data exchange between these realms. Timely data regarding disease outbreaks is crucial
in effectively coordinating national-level public health policies and prevention strategies.
Furthermore, the benefits of efficient data sharing extend to patients, who can access their
information, including laboratory and imaging results, with the ability to port these data to
other healthcare providers or organizations. Facilitating efficient and automated communi-
cation between patients and medical teams [4] enables universal access to data, promoting
transparency and ultimately enhancing patient satisfaction.
The significance and relevance of data availability have been steadily increasing, with
numerous establishments implementing this accessibility. In 2019, for instance, there was
a notable rise in patient information in electronic format. Key improvements compared
to 2018 included patient registration data (89% compared to 79%), the primary reasons
for patient consultations (64% compared to 50%), and admission, transfer, and discharge
records (56% compared to 43%) [5]. Notably, electronic systems in public establishments
have seen remarkable growth in functionalities in recent years, particularly concerning the
listing of all laboratory test results (from 17% in 2016 to 41% in 2019), patients using specific
medications (from 18% in 2016 to 40% in 2019), and having medical prescriptions (from
29% to 51%) [5]. These improvements indicate an evolution in the level and complexity
of adopted electronic systems, leading to reduced fragmentation in care provision, thus
enhancing quality efficiency and minimizing gaps in care [6]. However, as data digitization
practices advance and sensitive data generation increases significantly, the systems must
address many challenges.
EMR systems predominantly rely on centralized client–server architectures, where a
central authority holds full access to the entire system. However, this architecture brings
forth particular challenges concerning privacy and security. System vulnerabilities can lead
to failures and create opportunities for cyber attackers to breach patient data [7]. Manag-
ing these systems becomes a delicate task, requiring preserving privacy while ensuring
data accessibility for authorized entities. Moreover, records are frequently stored in frag-
mented formats within local databases, hindering patients from accessing a comprehensive,
consolidated electronic medical record [8].
Data format standardization is fundamental for achieving interoperability within the
healthcare sector, entailing a unified language for exchanging and interpreting medical
data and enabling diverse systems to communicate seamlessly. However, attaining such
standardization presents notable challenges due to the escalating number of healthcare
applications, EMRs, and medical devices, which have led to a rapid proliferation of varied
data formats. This fragmentation poses substantial hurdles for healthcare professionals,
researchers, and policymakers aiming to harness the power of data to enhance patient care,
advance research endeavors, and facilitate evidence-based decision making.
Blockchain technology is emerging as a promising avenue for standardizing and
achieving interoperability in EMRs. It aims to facilitate the verification and registration
of EMRs through a consensus among peers participating in a peer-to-peer network. This
Information 2024, 15, 20 3 of 36
approach ensures reliable execution of data access policies, thereby upholding data in-
tegrity, accountability, and non-repudiation [9]. Blockchain technology becomes particularly
appealing for applications requiring input from multiple stakeholders, where trust is chal-
lenging to establish using conventional technologies. Moreover, it addresses the issues of
reliable activity tracking and data integrity while eliminating the need for intermediaries,
resulting in enhanced overall system efficiency [10]. The healthcare sector stands as a
promising candidate for leveraging blockchain’s potential, owing to critical factors such as
its potential to play a pivotal role in improving trust and transparency [11,12]:
• Decentralization: There is no need for an intermediary, and the database system is
available to anyone connected to the network with the necessary access level. The
monitoring, storage, access, and updating of data can be carried out in the various
systems that are part of the network;
• Transparency: The data registered and stored in a blockchain are transparent to users,
implying that all users can view the transactions carried out via blockchain;
• Immutability: Stored data cannot be modified, allowing stakeholders to prove with
mathematical certainty that the historical data stream is accurate and unmodified [10];
• Autonomy: The network nodes are independent and autonomous, being able to access,
transfer, store, and update data safely and without external intervention;
• Anonymity: The identity of the participants is anonymous, contributing to the privacy,
security, and reliability of the system;
This paper comprehensively examines the main standards employed for storing and
sharing EMRs, encompassing traditional ones, as well as emerging formats. Specific use
domains are thoroughly explored, including storage, sharing, structure, and terminologies.
By addressing security and privacy challenges in accessing medical data, this paper em-
phasizes access control mechanisms available on commercial and open-source platforms.
These challenges encompass incompatible data models, varying terminology and coding
systems, diverse implementation practices, and privacy and security concerns, necessitating
harmonized policies and regulations across health data domains. The contributions of this
work are twofold. Firstly, we provide a comprehensive overview of the primary standards
and solutions implemented in the Brazilian healthcare system. Secondly, we delve into the
advantages of incorporating blockchain technology to enhance legacy healthcare systems
and address the main challenges associated with such adoption. The paper also delves into
proposals utilizing blockchain technology for data sharing and access policy management,
providing fundamental concepts for readers’ understanding.
Figure 1 visually depicts the paper’s structure. The solid arrows indicate the recom-
mended sequence of sections for readers already familiar with basic blockchain technology
concepts, while the dashed arrows point to a detour through Section 3, which provides an
introduction to the fundamentals of blockchain technology.
Agency (Agência Nacional de Saúde Suplementar—ANS), the National Council of Health Secre-
taries (Conselho Nacional de Secretários de Saúde—CONASS), and the National Health Council
(Conselho Nacional de Saúde—CNS), are responsible for the adoption and implementation
of these standards. Simultaneously, international standards find widespread adoption in
developing healthcare systems in various countries. Understanding and selecting these
standards are pivotal to ensuring interoperability among diverse health systems available
in the market, ultimately promoting enhanced efficiency, safety, and quality in healthcare
services. It is worth noting that all standards detailed in this work are in the Brazilian
healthcare context and, therefore, are included in the article’s case study.
Conformity
BMMs
Foundation
expressed in service–object pair (SOP) classes. These classes represent services, such as
storage using network, media, or web, operating on types of information objects, such as
CT or MRI images.
Figure 3. Example of an FHIR resource with the document structure sections highlighted.
Figure 4 illustrates the comprehensive model of DICOM services and functions, spec-
ifying their roles in transporting image data, associated information, real-time commu-
nication, and direct file access. The general service model encompasses functionalities
for storing, providing access to, and processing DICOM images. This includes transac-
tions of DICOM documents with outputs for message exchange, web services (REST API),
real-time transmission, and file export to physical media. These functions are part of the
DICOM application and are usually made available on an online server. At the bottom of
the figure, the communication and transport protocols tailored for each service type are
depicted. These protocols form the foundation for integrating systems that consume data
from the DICOM application. This integrated approach ensures seamless interaction and
interoperability across various DICOM services.
Information 2024, 15, 20 9 of 36
Thus, the choice of which data and values must be in the message depends on the context
of the request and its respective flow. Figure 6 shows the message flow for transferring
immunization information from one health information system to another. The issuing
system could be an EMR system, an immunization information system (IIS), or another
type of health information system. An event such as an update or new record inserted in
the issuing system initiates the creation and sending of a VXU message (vaccination update)
containing an updated immunization record. The receiving system processes the message
according to the used profile, applying local business rules. After successful processing,
the receiver sends an acknowledgment message (aAcknowledgement—ACK) and adds the
new record to the receiving system [15].
Figure 6. Sequence diagram of the flow specification for updating a patient’s immunization history
using the HL7 V2 standard. Adapted from [15].
<observationEvent>
<id root="2.16.840.1.113883.19.1122.4" extension="1045813"
assigningAuthorityName="GHH LAB Filler Orders"/>
<code code="1554-5" codeSystemName="LN"
codeSystem="2.16.840.1.113883.6.1"
displayName="GLUCOSE^POST 12H
CFST:MCNC:PT:SER/PLAS:QN"/>
<statusCode code="completed"/>
<effectiveTime value="200202150730"/>
<priorityCode code="R"/>
<confidentialityCode code="N"
codeSystem="2.16.840.1.113883.5.25"/>
<value xsi:type="PQ" value="182" unit="mg/dL"/>
<interpretationCode code="H"/>
<referenceRange>
<interpretationRange>
<value xsi:type="IVL_PQ">
<low value="70" unit="mg/dL"/>
<high value="105" unit="mg/dL"/>
</value>
<interpretationCode code="N"/>
</interpretationRange>
</referenceRange>
Figure 7. Example of a patient glucose test result message in the HL7 V3 standard.
which serves as a coding standard for medical procedures used in private health plans. The
TUSS table defines medical procedures’ nomenclature and corresponding identifier codes,
groups, and subgroups. To facilitate seamless integration of this standard into healthcare
provider systems, the ANS has made the TUSS standard available as a spreadsheet in
xlsx format (available at https://www.gov.br/ans/pt-br/arquivos/assuntos/consumidor/
o-que-seu-plano-deve-cobrir/correlacaotuss-rol_2021_site.xlsx (accessed on 24 Septem-
ber 2023)). By providing the terminology in this format, TUSS enables users to swiftly
search for procedure codes, utilizing the standardized procedure names and available
tools within electronic spreadsheet software. Moreover, the table format expedites the
incorporation of new standard updates into databases, enabling integrated systems to stay
up to date quickly.
The Systematized Nomenclature of Medicine—Clinical Terms (SNOMED CT)
(available at https://www.snomed.org/five-step-briefing (accessed on 24 September 2023))
is a multilingual clinical terminology standard used to represent medical concepts in
healthcare systems, with a focus on integrating terminologies from multiple countries.
The standard has a broad scope, with more than 350,000 medical concepts specified in its
terminology. To organize this vast collection of concepts, the standard organizes terms into
three components:
• Concepts: Unique and computable identifier, used to guarantee the uniqueness of
each term;
• Descriptions: Description of a uniquely and completely captured clinical idea called
a fully specified name—(FSN), together with a set of synonyms that store the term
name information in the multiple languages supported by the standard;
• Relationships: Records relationships between concepts, which can be of different
types specified by the pattern. Relationships can represent a hierarchy between
concepts, so that a concept always has at least one “is a” relationship, which defines
its type.
In addition to specifying terminology, SNOMED CT specifies implementation forms
for storing terminology data in systems, also serving as a basis for aiding in developing
medical applications. Despite being a non-profit foundation, SNOMED charges a fee for
membership in the organization and access to terminology if the user comes from a region
without federated bodies to the foundation (available at https://www.snomed.org/get-
snomed (accessed on 24 September 2023)).
The Logical Observation Identifiers Names and Codes (LOINC) aims to eliminate
ambiguity in the clinical records’ observation fields, proposes a comprehensive terminology
for various types of observations related to exam and laboratory test results. It has emerged
as a widely used database for categorizing and identifying observations from laboratory
tests and clinical data, encompassing clinical observations, questionnaires, and other health
assessments. This standard establishes a set of numerical codes and standardized names,
facilitating efficient communication and data sharing between different healthcare systems.
In contrast to other terminologies, LOINC’s primary objective is to create distinct codes for
each type of test, exam, and observation to be utilized in the observation fields of communi-
cation standards, such as HL7 V2. Furthermore, LOINC enhances traditional terminologies
with semantics, enabling their combination to expand the capacity for specifying and
exchanging information in medical records messages.
To achieve its goal, LOINC employs a logical framework consisting of six specification
dimensions: (i) component (or analyte), representing the substance or entity being mea-
sured or observed; (ii) property, representing the characteristic or attribute of the analyte;
(iii) time, representing the time interval during which an observation was made; (iv) sys-
tem, representing the specimen or substance on which the observation was performed;
(v) scale, defining the quantification or expression of the observation value; and (vi) method
(optional), representing a high-level classification of how the observation was conducted,
generally employed when the technique influences the clinical interpretation of results. This
systematic categorization ensures clarity and consistency in defining and communicating
Information 2024, 15, 20 13 of 36
Step Value
ine Analyte Leukocytes
Property NCnc (Number concentration)
ine Time Pt (Point in time)
ine System CSF
Scale Qn (Quantitative)
ine Method Manual Count
ine
Leukocytes: NCnc: Pt: CSF: Qn: Manual count
FSN
ine
Leukocytes [#/volume] in Cerebral spinal fluid by Manual count
LCN
ine
WBC # CSF Manual
Short Name
The World Health Organization (WHO) has developed the International Classifica-
tion of Diseases (ICD), now in its 11th edition, known as ICD-11, to enhance the statistical
survey of causes of death and morbidity worldwide. This classification system plays a
pivotal role in large-scale decision-making processes, intelligently influencing government
planning and resource allocation. Consequently, data-driven planning significantly im-
proves the quality of health services provided to the population [18]. The ICD-11 constitutes
a systematically organized database, offering categories for diseases, disorders, health-
related conditions, external causes of illness or death, anatomical details, environmental
factors, activities, medications, vaccines, and other health-influencing information. Each
classification level within the base is precisely specified according to its respective cate-
gories and assigned unique and sequential alphanumeric identification codes, establishing
a hierarchy of related diseases [19].
For queries in the ICD-11 database, WHO provides three main components: a REST
API over HTTP, a web graphical user interface (available at https://icd.who.int/browse1
1/l-m/en (accessed on 24 September 2023)), and a coding tool where users can assemble
the correct ICD-11 code for a disease and its additional information. The tool is helpful
for testing and validating software that uses the ICD-11 coding system. Figure 8 shows
Information 2024, 15, 20 14 of 36
the web interface of the ICD coding tool, highlighting an ICD-11 code generated just by
selecting the characteristics of a disease. The user can search for keywords and select the
desired combination of factors for a record. The example shows the code generated for
the COVID-19 disease confirmed by a laboratory test, with the virus in its SARS-CoV-2
Omicron variant, with the patient in isolation.
Figure 8. ICD-11 web application provided by the WHO presenting a negotiation tool.
nodes. PBFT guarantees security and liveliness even with up to (n − 1)/3 malicious
nodes out of a total of n nodes. The algorithm involves four steps: (i) the client
sends a transaction request to the leader; (ii) the leader forwards it to other nodes;
(iii) these nodes execute the request; and (iv) sends a response to the client that
expects 2 f + 1 consistent responses, where f is the maximum tolerated number of
failed responses. PBFT deals with faulty leaders through alternation-based (round-
robin) lead exchange. The mechanism has the advantages of low energy consumption
and fast execution time compared to other mechanisms resistant to Byzantine faults.
However, it has limitations in more extensive networks due to increased message
exchange and vulnerability to impersonation attacks (Sybil). PBFT is a practical
consensus mechanism that ensures reliable communication and agreement between
nodes while mitigating the impact of malicious nodes [26].
First introduced on the Ethereum trust computing platform, the smart contract consists
of a self-executing application stored on the blockchain, translating the clauses of an actual
contract into code. Through a known and accessible address, the smart contract has content
that all network participants can inspect. Internally, a smart contract contains contractual
rules agreed between the parties, which make the violation computationally prohibitive and,
therefore, not advantageous to potential violators. In contrast to non-deterministic contracts,
which make consensus unfeasible due to the randomness of the results achieved by different
network nodes, smart contracts are naturally deterministic [9,20], which guarantees the
convergence of the network overview. Since all interactions with a contract take place
via signed messages, it is possible to track all participants involved in the operation of
the contract. Contract triggering can be triggered by any change in state or transaction
record on the blockchain, facilitating negotiation, validation, and trade execution without
the need for third parties [22]. Due to the immutability of the blockchain, any mistakes
made in the code of an already implemented smart contract are not amenable to correction.
Furthermore, changes in the circumstances related to the performance of the contract, such
as changes in laws and regulations, are equally complex to be accounted for by the contract
already implemented. These changes require extensive and potentially costly reviews of
the smart contract code by experts.
espionage linked to the theft of patents and industrial intellectual property. Negligence
and naivety exhibited by users often become crucial factors leading to the compromise
of entire infrastructure and systems, irrespective of the attackers’ intentions. Instances
of weak passwords, sharing of credentials, and inattentive access to websites and web
addresses can swiftly lead to the leakage of personal data. Thus, establishing mecha-
nisms ensuring electronic medical records’ transparency, confidentiality, and integrity is
paramount in the present landscape. Promising technologies such as blockchain and smart
contracts should serve as guiding principles in shaping the future of computer security in
the healthcare domain.
One of the essential concerns when handling EMRs is that these data are private and
belong to patients but are fully controlled by health institutions [30]. Another concern is
related to identity management (IM), as it increases the trust and privacy in EMR [31]. IM
for electronic medical record storage and query systems tends to be centralized, introduc-
ing a single point of failure and an access bottleneck for the entire system [2]. Therefore,
although there are different blockchain-based proposals for storing and sharing electronic
records [2,32,33], there is an opportunity for improvement for offering a service safer and
adapted to the pains of the market. EMR systems are commonly implemented with poor
security practices, potentially compromising the privacy and confidentiality of patient
data [34]. In addition, sharing data for commercial purposes can also undermine trust in
health plans and operators. EMR systems contain information considered highly confiden-
tial for many reasons; therefore, there is a strong need for confidentiality. The integrity of
medical records becomes essential, as incorrect treatment based on erroneous data can be
fatal. Furthermore, availability is as essential as integrity, as system information must be
available for proper treatment at any time [35]. The main purpose of an EMR system is the
availability of patient data. In this sense, access control should not prevent any legitimate
request on behalf of the vital interest of patients [36].
Attribute of
Resource
Attribute of Conceded
Access Patient Details
User
Rejected
Environment
Attribute END
Purpose-based access control (PBAC) aims to relate data to specific purposes. This
mechanism uses roles and attributes to exploit ABAC and RBAC features. The central
idea of this model is to grant access through the prior understanding in which data can be
collected or accessed. The purposes are organized hierarchically through generalization
and specialization principles [42]. This fact can contribute significantly to the privacy of
sensitive data, although management may induce greater complexity depending on the
control of each purpose.
The XACML standard defines five main components that deal with access decisions:
policy administration point (PAP), policy enforcement point (PEP), policy decision point
(PDP), policy information point (PIP), and context handler (CH). PAP stores and manages
a persistent set of policies associated with destination identifiers. The PEP constitutes
integrating any system in which the resources to be protected are stored and managed. The
PEP receives access requests and blocks the flow of execution until a decision is made. At
the same time, the PEP propagates the requests to the PDP, which is the main decision-
making place for the incoming access request. The PDP retrieves all necessary attributes and
contextual information from the PIP, evaluates the defined policies, and decides according
to these policies. PIP is responsible for retrieving and storing attribute values. The context
handler (CH) is responsible for deriving the context of a given request.
Figure 11 displays the various interactions between the components of the XACML
standard, highlighting the chronological sequence of message exchanges during the access
request process. Prior to an access request, it is necessary that (1) the PAP write policies
and policy sets and make them available to the PDP. The access requestor (2) sends
an access request to the PEP, which may include subject, resource, and environment
attribute values. Subject attributes concern the patient in an emergency condition. The
PEP then (3) constructs a standard XACML request context and sends it to the PDP, which
(4) requests any additional subject, resource, and environment attribute values from the
PIP. The PIP obtains the requested attributes and (5) returns them to the PDP. In turn, the
PDP (6) asks the PAP for policies according to the purpose of the request. The PAP (7)
returns the request policies for the PDP to (8) evaluate the related policy and returns the
default XACML response context to the PEP. Finally, the PEP (9) executes the authorization
decision, allowing or denying access.
9
Access
2 PEP
Request
3 8
4 7
• Data integrity: Electronic patient health information must be protected from unautho-
rized modification or destruction;
• Exception of consent: In exceptional situations where a patient’s life is at risk or in
other critical circumstances, health information may be disclosed and used without
the individual patient’s consent;
• Non-repudiation: To ensure that responsible authorities fulfill their obligations about
patient information, any relevant activities must be supported by verifiable evidence;
• Auditing: Regular monitoring of patient’s health information and comprehensive
recording of related activities are necessary to ensure data security. Patients must
be provided with assurances regarding the security and protection of their health
information.
The fundamental goal of the Health Insurance Portability and Accountability Act
(HIPAA) is to safeguard individuals’ health information, ensuring the proper flow of rele-
vant data for healthcare provision and promotion. This regulation strikes a delicate balance
between facilitating the use of essential health information and protecting the privacy of
those seeking medical care (available at https://www.hhs.gov/hipaa/for-professionals/
privacy/laws-regulations/index.html (accessed on 24 September 2023)). The United States’
diverse and extensive healthcare landscape necessitated a flexible and comprehensive
approach, enabling HIPAA to encompass various uses and disclosures requiring atten-
tion. A critical facet of HIPAA pertains to its handling of health information breaches.
The regulation defines a breach as the unauthorized use or disclosure of protected health
information that compromises the security or privacy of such data under the “privacy rule”.
This rule sets stringent standards for safeguarding individuals’ medical records and other
personally identifiable health information. It mandates proper data protection measures
to ensure sensitive data privacy while entitling individuals to examine and obtain copies
of their health records. In case of a breach, it is presumed to be a violation unless the cov-
ered entity (insurance plans, hospitals, and clinics) or business associate can demonstrate
a low probability of compromising the confidentiality of health information based on a
risk assessment.
Certain exceptions are outlined in the definition of a violation. The first exception
involves unintentional acquisition, access, or use of protected health information by a
workforce member or someone acting under the authority of a covered entity or business
associate, as long as it is conducted in good faith and within the scope of their authority. The
second exception refers to the inadvertent disclosure of protected health information by an
authorized individual at a covered entity or business associate to another authorized person
within the organization. In both cases, the information cannot be further used or disclosed
without proper authorization governed by the “privacy rule”. The third exception encom-
passes situations where a covered entity or business associate possesses a good faith belief
that the unauthorized recipient of the disclosure would not retain the information (avail-
able at https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html
(accessed on 24 September 2023)).
issues, to improve the quality of care, facilitate the exchange of information between
professionals, and ensure the security of sensitive data. In this context, we explore some
of the solutions available on the market and proposals in the literature to promote the
integration and secure sharing of health data.
Figure 12. Overview of the AGHUx system’s modules and the interaction between these modules.
2023)). The platform has the advantage of the speed and agility with which the exam
is available for consultation. Once the exam is complete, the clinic can send it to the
dentist. The platform also offers a variety of features, such as a digital model tool capable of
analyzing the patient’s dental arch in a three-dimensional format. There is no information
available on how data access control is carried out.
Another commercial system is Alert (available at https://www.alert-online.com/br/
(accessed on 24 September 2023)), adapted for web and cloud. Alert is intended for the
complete management of the electronic clinical process through various products that
make up the solution. It includes several functionalities for monitoring the history of each
patient, scheduling and alerting appointments or medical procedures, assigning discharges,
issuing reports, teleservice, and order management. In addition, the software has an
internal planning and business intelligence system. The solution uses interoperability
standards, IHE, HL7, ITIL support, and international terminologies such as SNOMED, ICD,
and LOINC. Access to the various products is achieved through a single-sign-on (SSO)
mechanism that provides users with a centralized authentication scheme across the entire
Alert application domain. SSO supports the integration of Alert products with LDAP or
AD domains. Access to patient data is based on predefined profiles associated with each
professional registered in the system.
GestãoDS (available at https://www.gestaods.com.br/ (accessed on 24 September
2023)) is medical software with online scheduling, financial control, telemedicine, medical
marketing, and other features created to facilitate the management of clinics and offices. The
software also provides digital signatures and ensures data privacy when processing, main-
taining, and storing health-related information in compliance with HIPAA. The solution
provides several access permission levels, separated into user profiles. In addition, it offers
customized models of medical records and prescriptions according to the professional’s
standard of care.
record from IPFS. Other solutions, like MediBChain, provide privacy [46] and protect the
patient’s identity using pseudonymity through cryptographic public keys. The proposal
implements a permissioned blockchain-based patient-centric health data management
system. There is no information about the platform used.
Among the academic solutions, the AuditChain proposal provides multilevel access
control for patients, doctors, nurses, and hospital administrators for managing EMRs [47].
The proposal implements smart contracts using the Hyperledger Fabric platform [48,49].
The digital signature of the transaction uses public-key cryptography and serves as a
virtual token for access control. The Medblock proposal [50] implements a data-sharing
structure with an access control mechanism based on a signature scheme. Sensitive data
and pointers to the patient’s EMR are encrypted with a multi-signature scheme within the
blockchain. The access control engine cycles through the blocks until it finds the correct
block by comparing the signature with the collection of signatures in the ledger. The block’s
permission to see the encrypted content depends on the comparison result. Zhang et al.
propose the FHIRChain for data sharing between physicians and researchers based on
the FHIR standard [51]. FHIRChain meets five key interoperability requirements: user
identification and authentication, secure data exchange, authorized data access, consistent
data formats, and system modularity. Data access control is based on a smart contract that
outputs an access token and runs on the Ethereum platform. Access tokens are defined
for each data transaction, which uses asymmetric cryptography to protect off-chain data
pointers. The proposal uses the users’ digital health identities to encrypt the content
so that only users with the correct digital identity private keys can decrypt the content.
Dagher et al. propose Ancile, an Ethereum-based blockchain for a records management
system that utilizes smart contracts for tighter access control and data obfuscation [52].
Ancile maintains patients’ medical records in providers’ existing databases, and the referral
addresses to these records and their permissions for each record are stored in the smart
contract. Ancile is designed to store the Ethereum addresses of all nodes that can interact
with a registry, an access level, and a symmetric key encrypted with each node’s public
key. In contrast, Oliveira et al. developed an EMR distribution approach whose access
control is patient-centered [53]. The approach relies on a public-key infrastructure (PKI)
and blockchain technology. The idea is to inherit the trust in authenticity provided by
the PKI and the integrity and accountability provided by the blockchain. The proposal
is a distributed EMR with computationally simple infrastructure, refined access control,
and low overhead.
Rouhani et al. propose an ABAC system for sharing EMR data [54], while Maesa et al.
propose an ABAC system using the Ethereum blockchain platform [55]. By choosing to
store attribute values in the blockchain, the values cannot be changed due to the property
of immutability. On the other hand, the values are auditable, since their updates can only
be performed through transactions and thus registered in the blockchain. However, both
proposals do not consider that the attributes must be authenticated by the data processor
organizations whenever they interact with the access control system. As an asynchronous
system, the blockchain requires organizations to continually update the attributes of their
professionals on the blockchain, a fact that burdens the dynamic attributes of health
professionals. On the other hand, Ghorbel et al. propose keeping user attributes off-chain
and relying on trusted authorities to maintain a list of users associated with their verified
attributes [56]. Employing a smart contract, these authorities authenticate user attributes
when requesting user data. The authors use the Quorum platform, which implements a
permissioned version of the Ethereum blockchain. Internally, the Quorum platform adopts
a flexible consensus mechanism, capable of supporting RAFT consensus for crash fault
tolerance and variations in PBFT for Byzantine fault tolerance.
By associating blockchain technology and a signature scheme based on attributes over
multiple authorities, Guo et al. propose a distributed EMR system [57] that allows the
patient to manage personal health records (PHRs) safely. However, this facility also comes
at a performance cost as it creates overhead to sign the transaction by multiple authorities.
Information 2024, 15, 20 26 of 36
The proposal also suffers from confidentiality issues concerning the data stored on the
blockchain. Similarly, Dang et al. analyze the use of fog computing to store and protect
EMRs and use attribute-based signatures to ensure EMR privacy and confidentiality in fog
and cloud environments [58]. In turn, Yue et al. focus on providing fine-grained privacy
control [33]. The proposed system uses mobile phones to interact with an access control
gateway that controls block access on the blockchain. However, the gateway does not
track transactions. Daraghmi et al. propose an incentive-based consensus mechanism
that leverages the degree of reputation of healthcare providers concerning their efforts in
maintaining medical records and creating new blocks in the blockchain [59]. The access
control contract includes all the information related to specific permissions for each smart
contract based record. The proposal lists the Ethereum blockchain addresses for all users
with access permissions to the registry. The contract specifies the access level and symmetric
key encrypted with each user’s public key.
In Brazil, there is a notorious government solution for sharing health data on a na-
tional network, the National Health Data Network (Rede Nacional de Dados em Saúde—
RNDS) (available at https://www.gov.br/saude/pt-br/assuntos/rnds (accessed on 24
September 2023)). RNDS is an integration platform developed by DataSUS and the Exec-
utive Secretariat of the Ministry of Health. When fully consolidated, the RDNS intends
to include a digital repository of retrospective, concurrent, and prospective patient infor-
mation. Its use will allow numerous establishments to share cross-sectional information
on citizen service in an integrated, continuous, efficient, and quality manner. To simplify
the interoperability of citizen medical records, the RNDS makes the patient’s medical
record history available in a blockchain structure shared between states. The platform
architecture is shown in Figure 13. The platform has an infrastructure hosted in the cloud
with dedicated containers distributed to the federated states. Each container is subdivided
into informational and technological services, classified according to type, for example,
minimal data set or related to security, and according to the degree of maturity of service
development, as available or planned [60].
The technological services available include the Master Patient Index (MPI), a database
that unifies the information of each patient registered by a health organization. Being a
software design pattern, the backend for frontend (BFF) is responsible for delivering how
information will be stored and consulted, regardless of the specificities of each type of
graphical interface, for example, application and web portal. Electronic health services
(EHR-services) focus RESTful services on exchanging information between digital health
applications, especially PEC, portals, and web applications. The FHIR standard assists
in exchanging health information between different establishments and institutions. The
Repository of Terminologies in Health is a national virtual environment that houses classi-
fications, nomenclatures, terminologies, taxonomies, information models, and standard
definitions necessary for the standardization of semantic resources and information models
to be used in the health sector [60].
Among the technological security services, the most relevant is related to blockchain
technology. The RNDS provides for implementing a private and permissioned blockchain
based on Hyperledger Fabric and running the Raft consensus mechanism [61]. Each con-
tainer represents a blockchain node and will be located in a healthcare facility. The adoption
of the blockchain aims to store the history of interactions between patients and health pro-
fessionals, in addition to containing references to electronic health records. Currently, the
RNDS blockchain has only one node, which does not guarantee the characteristic properties
of the technology. The recovery process of any patient’s health data via blockchain needs to
satisfy some premises: (i) the access request must originate from an appropriate software
tool, and (ii) the applicant must be part of an establishment registered with the CNES and
have the correct credentials. If a professional requests access to any document or patient’s
medical record, it is only attended to with the patient’s consent and explicit authorization
in emergency medical circumstances or when the “opt-out” strategy is configured in the
context of care at the health facility. The “opt-out” strategy assumes in advance that the
patient authorizes the flexibility of the rules for accessing their data. Thus, if the patient
wishes to change the permission policy, they may do so upon request [61]. Internally, the
metadata are used in the ledger and distributed among the various network participants.
Clinical documents will be used in private data collection, a native feature of Hyperledger
Fabric, allowing a subset of organizations to endorse, confirm, or query private data
without creating a separate channel. This feature ensures document storage privacy and
economy. Since the documents will only be stored in the custodial organization and a
limited structure of backup organizations, there will not be eventual excessive storage of the
clinical documents. As shared in the ledger, the patient’s history will be accessible to any
organization, facilitating patient queries in healthcare facilities. Interoperability between
systems is ensured by adopting the FHIR standard and LOINC terminology for data traffic
and storage. Initially, the RNDS foresees transition microservices capable of converting
data sent in CDA, OpenEHR, and FHIR. In order to avoid incomplete or printed medical
records, the platform intends to implement smart contracts written in the GO language.
The smart contract inclusion ensures that the business rules involved in electronic medical
records are effectively complied with [61].
The RNDS complements the security added to the system by the blockchain, offering
services such as (i) issuance of digital certificates, that is, electronic documents containing
data about the individual or legal entity that uses it, serving as a virtual identity that confers
legal validity and aspects of digital security; (ii) eligibility service, a service validating the
available data that defines whether or not the health professional is qualified to access the
citizen’s data, applying rules for linking the professional with the health establishment,
professional category, installation certification, and electronic medical record; (iii) consent,
related to the opt-out consent model. By default, implicit consent is assumed until the
citizen chooses to explicitly revoke consent [60].
Preliminary evaluations using the architectural proof of concept estimate that the
RNDS will be able to support up to 1800 transactions per second (tps), a satisfactory rate
to support the annual number of services provided for in the SUS [61]. Currently, the
Information 2024, 15, 20 28 of 36
Ministry of Health provides three portals to access the information stored in the RNDS, the
ConectaSUS Cidadão, ConectaSUS Profissional, and ConectaSUS Gestão, aimed at patients,
health professionals, and managers. By accessing the portal, citizens obtain vaccination
history and other personal health records, health professionals view the entire clinical
trajectory and patients’ procedures, and managers can monitor the evolution of health
indicators, which is fundamental for coordinating public policies. Table 3 summarizes the
main features presented by healthcare solutions based on blockchains.
MedicalChain [44]
AuditChain [47]
FHIRChain [51]
MedChain [45]
Medblock [50]
MedRec [63]
Ancile [52]
RNDS †
Type Characteristics
Private Permissioned ✓ ✓
Public Permissioned ✓ ✓ ✓ ✓
Blockchain
Private Not Permitted ✓
Not Specified ✓1 ✓1 ✓1 ✓1
Proof of Work ✓ ✓ ✓ ✓
Prof of Participation ✓
Consensus Raft ✓
Consensus Mechanism
Practical Byzantine Fault Tolerance ✓ ✓
Consensus Hybrid or Proprietary ✓
Not Specified ✓2 ✓2
† Available at https://www.gov.br/saude/pt-br/assuntos/rnds (accessed on 24 September 2023). ✓1 : The
authors only report that the blockchain is permissioned, not specifying it as public or private. However, it is
assumed to be a private network. ✓2 : The authors only report that the consensus mechanism adopted is flexible.
plexity of handling and maintenance contribute to such systems being frequently linked
to poor usability [66]. In 2019, the Regional Center for Studies for the Development of
the Information Society (Centro Regional de Estudos para o Desenvolvimento da Sociedade da
Informação—Cetic.br) pointed out that only 20% of health establishments, whether private
or public, had a professional with health training allocated in their respective departments
from you. The percentage presence of internal IT teams in health establishments also
accompanies this shortage of health professionals working in the technical area shortage in
the Brazilian scenario. Around 21% of healthcare facilities have an internal team dedicated
to technical support in the IT area, while 39% have a service provider hired by the facilities.
Difficulties are reduced by prioritizing the creation of intuitive and user-enabled interfaces.
Intrinsic to blockchains, the immutability characteristic establishes that the stored data
cannot be changed after being registered in blocks. As each node in the network has a
replica of the chain, any attempt to modify data in one of these replicas is translated by
the participating nodes as an imminent attack. Therefore, these alteration attempts are
rejected, making it impossible to erase or edit the data, which cannot be performed by
the authors or by court order [20]. This feature imposes on blockchain-based systems the
need to deal with the irreversibility of records made on the chain. While authenticity is
tamper-proof on a blockchain, there are no guarantees about the accuracy of stored data.
Thus, blocks containing false or incorrect information cannot be removed or modified,
even if intentionally inserted. The inflexibility in handling data contrasts with the storage
needs present in EMR systems. Some data are temporarily stored because they do not
present critical or valuable attributes for future diagnoses. Other data, such as the address
or personal characteristics of patients, although not critical, require constant updates. Both
situations highlight that the indiscriminate data storage in the blockchain is a limiting
factor for adopting the technology, given the impossibility of deleting old records. Another
challenging factor is the exposure of private keys. If this happens, patient data will be
exposed to any individuals or entities holding the private key, with no possibility of using
a new key to re-encrypt the data already registered in the chain. Therefore, any key leak
permanently exposes the patient’s privacy if their data are recorded in jail [65].
Another sensitive aspect is data privacy and security since all nodes access data trans-
mitted by another node. When accessing their own information or medical history, patients
are dependent on an intermediary entity in the event of an emergency. This factor breaches
the privacy principles established in current data protection legislation. The expansion of
the computational power of modern systems poses severe threats to blockchain security,
especially when they are based on public-key cryptography. This vulnerability is related to
the assumption that classical computers cannot decompose large numbers quickly. How-
ever, this hypothesis is refuted by the emergence of quantum computing, an emerging
Information 2024, 15, 20 30 of 36
technology that intends to solve highly complex cryptographic challenges quickly and
efficiently. Among the alternatives to face this challenge, the replacement of conventional
digital signatures by quantum-resistant cryptography [69] stands out. At the same time,
PoW-based networks are also prone to breaching cryptographic security. This violation
occurs through the 51% Attack, a malicious action in which a group of miners owns the
majority fraction of the computational power of the blockchain network and, therefore,
these nodes dictate the process of adding blocks to the network [20]. Therefore, a health
system damaged by this attack can mean the loss of credibility for organizations.
Addressing the challenges related to interoperability is essential to harness the po-
tential of blockchain technology in healthcare. Interoperability refers to the ability to
exchange information between systems with heterogeneous characteristics. Achieving
interoperability between the two EMR systems requires that the broadcast messages be
based on standardized encoded data. While the absence of blockchain standards simplifies
the role of developers, this vagueness contributes to communication problems between
disparate systems. Thus, several blockchain networks based on different consensus mech-
anisms, transaction mechanisms, and smart contract functionalities exacerbated the lack
of interoperability between systems. In healthcare, the adoption of traditionally disparate
clinical technologies, technical specifications, and functional capabilities also impedes cre-
ation and sharing of data in a single format. Even when developed on the same platform,
different EMR systems are not interoperable, since they were designed to meet a health
institution’s specific needs and preferences. In practice, the lack of standardized data limits
the sharing of data electronically for patient care. A plausible solution to this problem
is the development of new standards that can be adhered to by legacy solutions. For
that purpose, the Enterprise Ethereum Alliance (available at https://entethalliance.org/
(accessed on 24 September 2023)) (EEA) introduced a standardized version of the Ethereum
blockchain [20,69].
In addition to the technical challenges related to blockchain adoption, healthcare
systems have several challenges. The interoperability challenges between systems, stan-
dardization, data integration, data security, and privacy stand out. Interoperability between
systems is vital for quick and easy access to accurate and up-to-date patient information to
make informed clinical decisions. However, health data management and interoperability
between systems are challenging due to the heterogeneity of information and systems.
The various systems must be developed considering good information security practices.
Health data must be standardized for consistency and interoperability across disparate
systems. Standards also govern the capture, storage, and retrieval of information. Thus,
the developed systems must comply with the internationally adopted standards, and there
should be regular backups and clear data retention policies to prevent loss. Compliance
with standards also ensures the quality of captured data. Additionally, it should be possible
to conduct regular audits of the data to improve the reliability of the information. Data
integration systems can also help connect different health systems and databases, allowing
data to be shared securely and efficiently. APIs can standardize how different systems and
databases communicate and interact, allowing information and data to be shared more
easily and securely. Some ongoing research projects and government actions in the area of
health systems integration are:
• Common Platform (available at https://cordis.europa.eu/project/id/225005 (ac-
cessed on 24 September 2023 )) is a research project funded by the European Union
that aims to develop a common platform for sharing health information between
different European countries. The project uses communication and security standards
to ensure that health data are shared securely and efficiently;
• Integrating Data for Analysis, Anonymization, and SHaring (iDASH) [70] is a research
project funded by the US government that aims to develop a platform for sharing
health data between different health organizations. The project employs anonymiza-
tion and security techniques to ensure that health data are shared safely and securely;
Information 2024, 15, 20 31 of 36
7. Conclusions
The rapid evolution of information and communication technology (ICT) tools in the
healthcare sector highlights the increasingly vital role of electronic systems and digital
platforms. The ability to efficiently and accurately share patient information across different
medical systems can revolutionize healthcare delivery, improve patient care, and drive
innovative research. However, the challenge lies in the inherent complexity and diversity of
data formats used in various medical systems, making interoperability difficult and crucial
to achieving these transformative goals. As a result, the complexity of the medical system
prevents easy access to a patient’s complete medical history when needed, leading to the
loss or repetitive collection of information, making diagnosis and treatment challenging
and negatively impacting the patient’s journey.
EMRs are pivotal in facilitating access to distributed data, enabling standardized
retrieval of patient information, and promoting care integration across healthcare teams
and various medical facilities. However, sharing sensitive patient data without appropriate
consent remains a significant concern, raising questions about data privacy and security in
such healthcare systems. The ongoing COVID-19 pandemic has emphasized the urgent
need to streamline care and exchange information between patients, physicians, and health-
care institutions. Patient records have gained even more importance in public health
decision making, as data on diagnoses and prescribed medications can be instrumental in
identifying individuals at risk of diseases like COVID-19. Moreover, the greater availability
of patient data in electronic formats holds immense value in decision-making processes and
ensuring continuity of care across both public and private healthcare sectors, encouraging
information exchange between these spheres. The early detection of disease outbreaks is
paramount in efficiently coordinating public health policies and prevention strategies at
the national level.
Despite the potential transformative impact of electronic healthcare systems, chal-
lenges persist. Most EMR systems are built on centralized client–server architectures,
posing concerns regarding data privacy and security vulnerabilities. Such vulnerabilities
can lead to system failures and open opportunities for cyber attackers to compromise
Information 2024, 15, 20 33 of 36
patient data. Additionally, patient records are often fragmented across local databases,
making it challenging to consolidate a comprehensive electronic medical history for each
patient. Standardization of data formats becomes a critical requirement for achieving
interoperability in the healthcare industry. Establishing a common language for exchanging
and interpreting medical data would enable seamless communication between different
systems, fostering greater collaboration and data sharing.
Blockchain technology is a potential solution for standardizing and facilitating interop-
eration between health systems. However, integrating blockchain into healthcare systems
comes with its technical challenges. Among the key concerns surrounding blockchain
adoption in healthcare are scalability, usability, immutability, privacy, security, and inter-
operability. Scalability becomes a potential obstacle in the widespread adoption of public
blockchains, as they may face limitations in transaction processing speed and block val-
idation time, potentially impacting medical examination analysis and timely diagnosis.
Usability is another crucial challenge, as managing and maintaining complex blockchain-
based systems, combined with a shortage of qualified professionals with expertise in health
and ICT, often leads to systems with low usability.
The immutability feature in blockchain poses unique challenges concerning data ma-
nipulation, as once data are written to a block, it cannot be modified or deleted. This char-
acteristic can be problematic for storing non-critical or temporary data. Additionally, the
transparency of blockchain networks and the reliance on intermediaries to access personal
health information can compromise patient privacy and confidentiality. Achieving robust
data privacy and security in blockchain-based healthcare systems remains a key concern.
Interoperability is essential to successfully exchanging information between hetero-
geneous systems within the healthcare industry. The lack of standardization and mul-
tiple blockchain networks with different consensus mechanisms, transaction methods,
and smart contract functionalities hinder interoperability efforts. Addressing these techni-
cal challenges is essential to leverage the full potential of blockchain technology and foster
collaboration and innovation in the healthcare sector.
In the digital health market, there is a growing awareness of the importance of interop-
erability between health information systems, as data security and access to comprehensive
patient information are crucial aspects of providing quality care. Current limitations in
interoperability also hinder effective integration between records scattered across various
clinics and hospitals, underscoring the urgency of addressing these issues. Developing
research projects and commercial products that focus on standardization and integration in
electronic medical record-sharing systems becomes crucial to realizing the transformative
possibilities in healthcare, promoting positive patient outcomes, and shaping a future
characterized by collaboration and innovation in the medical domain. Given the evidence
and arguments discussed externally in this article, we emphasize that our conclusions
are consistent and directly address the main challenges and potential solutions related
to the interoperability of electronic health systems, with a particular focus on the role of
blockchain technology.
References
1. Makary, M.A.; Daniel, M. Medical error—The third leading cause of death in the US. BMJ 2016, 353, i2139. [CrossRef] [PubMed]
2. Dubovitskaya, A.; Xu, Z.; Ryu, S.; Schumacher, M.; Wang, F. Secure and trustable electronic medical records sharing using
blockchain. In AMIA Annual Symposium Proceedings; American Medical Informatics Association: Bethesda, MD, USA, 2017;
Volume 2017, p. 650.
3. Stoeger, K.; Schmidhuber, M. The use of data from electronic health records in times of a pandemic—A legal and ethical
assessment. J. Law Biosci. 2020, 7, lsaa041. [CrossRef] [PubMed]
4. Hurst, W.; Tekinerdogan, B.; Alskaif, T.; Boddy, A.; Shone, N. Securing electronic health records against insider-threats: A
supervised machine learning approach. Smart Health 2022, 26, 100354. [CrossRef]
5. Cetic.br. Pesquisa Sobre o uso das Tecnologias de Informação e Comunicação nos Estabelecimentos de Saúde Brasileiros: TIC Saúde 2019;
Núcleo de Informação e Coordenação do Ponto BR (NIC.br): Sao Paulo, Brazil, 2020.
6. Janett, R.S.; Yeracaris, P.P. Electronic Medical Records in the American Health System: Challenges and lessons learned. Cienc.
Saude Coletiva 2020, 25, 1293–1304. [CrossRef]
7. Tanwar, S.; Parekh, K.; Evans, R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur.
Appl. 2020, 50, 102407. [CrossRef]
8. Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International
Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany, 14–17 September 2016; pp. 1–3.
[CrossRef]
9. Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303.
[CrossRef]
10. Engelhardt, M.A. Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector. Technol.
Innov. Manag. Rev. 2017, 7, 22–34. [CrossRef]
11. Siyal, A.A.; Junejo, A.Z.; Zawish, M.; Ahmed, K.; Khalil, A.; Soursou, G. Applications of blockchain technology in medicine and
healthcare: Challenges and future perspectives. Cryptography 2019, 3, 3. [CrossRef]
12. Namasudra, S.; Sharma, P.; Crespo, R.G.; Shanmuganathan, V. Blockchain-based medical certificate generation and verification
for IoT-based healthcare systems. IEEE Consum. Electron. Mag. 2022, 12, 83–93. [CrossRef]
13. Health Level Seven International. HL7 Implementation Guide for CDA® Release 2: Consolidated CDA Templates for Clinical Notes (US
Realm) Draft Standard for Trial Use Release 2.1; Technical Report; Health Level Seven International: Ann Arbor, MI, USA, 2015.
14. DICOM Standards Committee. DICOM PS3.1 2023b. Technical Report; 2023. Available online: https://dicom.nema.org/
medical/dicom/2023b/output/pdf/part01_changes.pdf (accessed on 24 September 2023).
15. Savage, R. HL7 Version 2.5.1, Implementation Guide for Immunization Messaging; Technical Report; Centers for Disease Control and
Prevention: Atlanta, GA, USA, 2014.
16. Maani, R.; Camorlinga, S.; Arnason, N. A Parallel Method to Improve Medical Image Transmission. J. Digit. Imaging 2011,
25, 101–109. [CrossRef]
17. Massad, E.; Marin, H.d.F.; Azevedo Neto, R.S.d. (Eds.) O Prontuário Eletrônico do Paciente na Assistência, Informação e Conhecimento
Médico; USP: São Paulo, Brazil, 2003.
18. Harrison, J.E.; Weber, S.; Jakob, R.; Chute, C.G. ICD-11: An international classification of diseases for the twenty-first century.
BMC Med. Inform. Decis. Mak. 2021, 21, 206. [CrossRef] [PubMed]
19. World Health Organization. International Classification of Diseases, Eleventh Revision ICD-11; Technical Report; World Health
Organization: Geneva, Switzerland, 2022.
20. Mattos, D.M.; Medeiros, D.S.; Fernandes, N.C.; de Oliveira, M.T.; Carrara, G.R.; Soares, A.A.; Magalhães, L.C.S.; Passos, D.;
Carrano, R.C.; Moraes, I.M.; et al. Blockchain para Segurança em Redes Elétricas Inteligentes: Aplicações, Tendências e
Desafios. Sociedade Brasileira de Computação. 2018. Available online: https://research.tudelft.nl/en/publications/blockchain-
para-seguran%C3%A7a-em-redes-el%C3%A9tricas-inteligentes-aplica%C3%A7 (accessed on 24 September 2023).
21. Xu, X.; Weber, I.; Staples, M.; Zhu, L.; Bosch, J.; Bass, L.; Pautasso, C.; Rimba, P. A taxonomy of blockchain-based systems for
architecture design. In Proceedings of the 2017 IEEE international conference on software architecture (ICSA), Gothenburg,
Sweden, 3–7 April 2017; pp. 243–252. [CrossRef]
22. Pustokhin, D.A.; Pustokhina, I.V.; Shankar, K. Challenges and Future Work Directions in Healthcare Data Management Using
Blockchain Technology. In Applications of Blockchain in Healthcare; Springer: Singapore, 2021; pp. 253–267. [CrossRef]
23. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. Available online: https:
//bitcoin.org/bitcoin.pdf (accessed on 24 September 2023).
24. Tschorsch, F.; Scheuermann, B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv.
Tutor. 2016, 18, 2084–2123. [CrossRef]
25. Cachin, C.; Vukolic, M. Blockchain Consensus Protocols in the Wild (Keynote Talk). In Proceedings of the 31st International
Symposium on Distributed Computing (DISC 2017), Vienna, Austria, 16–20 October 2017; Richa, A.W., Ed.; Dagstuhl, Germany,
2017; Volume 91, pp. 1:1–1:16. [CrossRef]
26. Carrara, G.R.; Burle, L.M.; Medeiros, D.S.V.; de Albuquerque, C.V.N.; Mattos, D.M.F. Consistency, availability, and partition
tolerance in blockchain: A survey on the consensus mechanism over peer-to-peer networking. Ann. Telecommun. 2020, 75, 163–174.
[CrossRef]
Information 2024, 15, 20 35 of 36
27. Luh, F.; Yen, Y. Cybersecurity in Science and Medicine: Threats and Challenges. Trends Biotechnol. 2020, 38, 825–828. [CrossRef]
28. Rahman, A.; Hossain, M.S.; Alrajeh, N.A.; Alsolami, F. Adversarial Examples—Security Threats to COVID-19 Deep Learning
Systems in Medical IoT Devices. IEEE Internet Things J. 2021, 8, 9603–9610. [CrossRef]
29. Salim, M.M.; Park, J.H. Federated Learning-Based Secure Electronic Health Record Sharing Scheme in Medical Informatics. IEEE
J. Biomed. Health Inform. 2023, 27, 617–624. [CrossRef]
30. Lesk, M. Electronic medical records: Confidentiality, care, and epidemiology. IEEE Secur. Priv. 2013, 11, 19–24. [CrossRef]
31. Tormo, G.D.; Mármol, F.G.; Girao, J.; Pérez, G.M. Identity management–in privacy we trust: Bridging the trust gap in ehealth
environments. IEEE Secur. Priv. 2013, 11, 34–41. [CrossRef]
32. Zhang, X.; Poslad, S. Blockchain support for flexible queries with granular access control to electronic medical records EMR.
In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018;
pp. 1–6. [CrossRef]
33. Yue, X.; Wang, H.; Jin, D.; Li, M.; Jiang, W. Healthcare data gateways: Found healthcare intelligence on blockchain with novel
privacy risk control. J. Med. Syst. 2016, 40, 218. [CrossRef]
34. Jacquemard, T.; Doherty, C.P.; Fitzsimons, M.B. Examination and diagnosis of electronic patient records and their associated
ethics: A scoping literature review. BMC Med. Ethics 2020, 21, 76. [CrossRef]
35. Haas, S.; Wohlgemuth, S.; Echizen, I.; Sonehara, N.; Müller, G. Aspects of privacy for electronic health records. Int. J. Med. Inform.
2011, 80, e26–e31. [CrossRef] [PubMed]
36. de Oliveira, M.T.; Verginadis, Y.; Reis, L.H.; Psarra, E.; Patiniotakis, I.; Olabarriaga, S.D. AC-ABAC: Attribute-based access control
for electronic medical records during acute care. Expert Syst. Appl. 2023, 213, 119271. [CrossRef]
37. Nazerian, F.; Motameni, H.; Nematzadeh, H. Emergency role-based access control E-RBAC and analysis of model specifications
with alloy. J. Inf. Secur. Appl. 2019, 45, 131–142. [CrossRef]
38. Seol, K.; Kim, Y.G.; Lee, E.; Seo, Y.D.; Baik, D.K. Privacy-Preserving Attribute-Based Access Control Model for XML-Based
Electronic Health Record System. IEEE Access 2018, 6, 9114–9128. [CrossRef]
39. Peleg, M.; Beimel, D.; Dori, D.; Denekamp, Y. Situation-based access control: Privacy management via modeling of patient data
access scenarios. J. Biomed. Inform. 2008, 41, 1028–1040. [CrossRef] [PubMed]
40. Abomhara, M.; Yang, H.; Køien, G.M. Access control model for cooperative healthcare environments: Modeling and verification.
In Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI), Chicago, IL, USA, 4–7 October 2016;
pp. 46–54. [CrossRef]
41. Abomhara, M.; Ben Lazrag, M. UML/OCL-based modeling of work-based access control policies for collaborative healthcare
systems. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services
(Healthcom), Munich, Germany, 14–17 September 2016; pp. 1–6. [CrossRef]
42. Byun, J.W.; Bertino, E.; Li, N. Purpose Based Access Control of Complex Data for Privacy Protection. In Proceedings of the Tenth
ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 8–10 June 2005; SACMAT ’05; pp. 102–110.
[CrossRef]
43. Larrucea, X.; Moffie, M.; Asaf, S.; Santamaria, I. Towards a GDPR compliant way to secure European cross border Healthcare
Industry 4.0. Comput. Stand. Interfaces 2020, 69, 103408. [CrossRef]
44. Albeyatt, A. MedicalChain White Paper 2.1. Technical Report, MedChain White Paper 2.1, 2018.
45. Sandgaard, J.; Wishstar, S. MedChain White Paper 2.1. Technical report, MedChain White Paper 2.1, 2018. Available online:
https://medicalchain.com/Medicalchain-Whitepaper-EN.pdf (accessed on 24 September 2023).
46. Al Omar, A.; Rahman, M.S.; Basu, A.; Kiyomoto, S. MediBChain: A blockchain based privacy preserving platform for healthcare
data. In Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017
International Workshops, Guangzhou, China, 12–15 December 2017; Proceedings 10; Springer: Berlin/Heidelberg, Germany,
2017; pp. 534–543. [CrossRef]
47. Anderson, J. Securing, Standardizing, and Simplifying Electronic Health Record Audit Logs through Permissioned Blockchain
Technology. Unthrr, 2018. Available online: https://digitalcommons.dartmouth.edu/senior_theses/135/ (accessed on 24
September 2023).
48. Rebello, G.; Camilo, G.; Silva, L.; Souza, L.; Guimarães, L.; Alchieri, E.; Greve, F.; Duarte, O. Correntes de Blocos: Algoritmos
de Consenso e Implementação na Plataforma Hyperledger Fabric. Sociedade Brasileira de Computação, 2019. Available online:
https://dl.acm.org/doi/abs/10.1145/3544538.3544653 (accessed on 24 September 2023).
49. Agrawal, D.; Minocha, S.; Namasudra, S.; Gandomi, A.H. A robust drug recall supply chain management system using
hyperledger blockchain ecosystem. Comput. Biol. Med. 2022, 140, 105100. [CrossRef]
50. Fan, K.; Wang, S.; Ren, Y.; Li, H.; Yang, Y. MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 2018,
42, 136. [CrossRef]
51. Zhang, P.; White, J.; Schmidt, D.C.; Lenz, G.; Rosenbloom, S.T. FHIRChain: Applying blockchain to securely and scalably share
clinical data. Comput. Struct. Biotechnol. J. 2018, 16, 267–278. [CrossRef]
52. Dagher, G.G.; Mohler, J.; Milojkovic, M.; Marella, P.B. Ancile: Privacy-preserving framework for access control and interoperability
of electronic health records using blockchain technology. Sustain. Cities Soc. 2018, 39, 283–297. [CrossRef]
Information 2024, 15, 20 36 of 36
53. de Oliveira, M.T.; Reis, L.H.; Carrano, R.C.; Seixas, F.L.; Saade, D.C.; Albuquerque, C.V.; Fernandes, N.C.; Olabarriaga, S.D.;
Medeiros, D.S.; Mattos, D.M. Towards a blockchain-based secure electronic medical record for healthcare applications. In
Proceedings of the ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019;
pp. 1–6. [CrossRef]
54. Rouhani, S.; Belchior, R.; Cruz, R.S.; Deters, R. Distributed attribute-based access control system using permissioned blockchain.
World Wide Web 2021, 24, 1617–1644. [CrossRef]
55. Maesa, D.D.F.; Mori, P.; Ricci, L. A blockchain based approach for the definition of auditable access control systems. Comput.
Secur. 2019, 84, 93–119. [CrossRef]
56. Ghorbel, A.; Ghorbel, M.; Jmaiel, M. Accountable privacy preserving attribute-based access control for cloud services enforced
using blockchain. Int. J. Inf. Secur. 2021, 21, 489–508. [CrossRef]
57. Guo, R.; Shi, H.; Zhao, Q.; Zheng, D. Secure attribute-based signature scheme with multiple authorities for blockchain in
electronic health records systems. IEEE Access 2018, 6, 11676–11686. [CrossRef]
58. Dang, L.; Dong, M.; Ota, K.; Wu, J.; Li, J.; Li, G. Resource-efficient secure data sharing for information centric e-health system
using fog computing. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO,
USA, 20–24 May 2018; pp. 1–6. [CrossRef]
59. Daraghmi, E.Y.; Daraghmi, Y.A.; Yuan, S.M. MedChain: A design of blockchain-based system for medical records access and
permissions management. IEEE Access 2019, 7, 164595–164613. [CrossRef]
60. Santos, S.d.L.V.d.; Zara, A.L.d.S.A.; Lucena, F.N.d.; Ribeiro-Rotta, R.F.; Braga, R.D.; Amaral, R.G.; Pedrosa, S.M.; Kudo, T.N. Rede
Nacional de Dados em Saúde: O que Precisamos Saber?; Cegraf UFG: Goiânia, Brazil, 2022.
61. Tribunal de Contas da União (TCU). Levantamento de Aplicações Blockchain: Aplicações Blockchain no Setor Pública do Brasil (Apêndice
1); Sumário executivo; Tribunal de Contas da União (TCU): Brasília, Brazil, 2020.
62. Patel, V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform. J.
2019, 25, 1398–1411. [CrossRef]
63. Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. MedRec: Using blockchain for medical data access and permission management.
In Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016;
pp. 25–30. [CrossRef]
64. Chowdhury, M.J.M.; Ferdous, M.S.; Biswas, K.; Chowdhury, N.; Kayes, A.; Alazab, M.; Watters, P. A comparative analysis of
distributed ledger technology platforms. IEEE Access 2019, 7, 167930–167943. [CrossRef]
65. Lo, S.K.; Xu, X.; Chiam, Y.K.; Lu, Q. Evaluating suitability of applying blockchain. In Proceedings of the 2017 22nd International
Conference on Engineering of Complex Computer Systems (ICECCS), Fukuoka, Japan, 5–8 November 2017; pp. 158–161.
66. De Aguiar, E.J.; Faiçal, B.S.; Krishnamachari, B.; Ueyama, J. A Survey of Blockchain-Based Strategies for Healthcare. ACM
Comput. Surv. 2020, 53, 27. [CrossRef]
67. Yu, G.; Wang, X.; Yu, K.; Ni, W.; Zhang, J.A.; Liu, R.P. Survey: Sharding in blockchains. IEEE Access 2020, 8, 14155–14181.
[CrossRef]
68. Kaur, G.; Gandhi, C. Scalability in blockchain: Challenges and solutions. In Handbook of Research on Blockchain Technology; Elsevier:
Amsterdam, The Netherlands, 2020; pp. 373–406. [CrossRef]
69. Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for Healthcare Data Management: Opportunities, Challenges,
and Future Recommendations. Neural Comput. Appl. 2022, 34, 11475–11490. [CrossRef]
70. Ohno-Machado, L.; Bafna, V.; Boxwala, A.A.; Chapman, B.E.; Chapman, W.W.; Chaudhuri, K.; Day, M.E.; Farcas, C.; Heintzman,
N.D.; Jiang, X.; et al. iDASH: Integrating data for analysis, anonymization, and sharing. J. Am. Med. Inform. Assoc. 2011,
19, 196–201. [CrossRef] [PubMed]
71. Araujo Gomes de Castro, F.; Oliveira dos Santos, Á.; Valadares Labanca Reis, G.; Brandão Viveiros, L.; Hespanhol Torres, M.;
de Oliveira Junior, P.P. Telemedicina rural e COVID-19: Ampliando o acesso onde a distância já era regra. Revista Brasileira
Medicina Família Comunidade 2020, 15, 2484. [CrossRef]
72. Blandford, A.; Wesson, J.; Amalberti, R.; AlHazme, R.; Allwihan, R. Opportunities and challenges for telehealth within, and
beyond, a pandemic. Lancet Glob. Health 2020, 8, e1364–e1365. [CrossRef]
73. Chén, O.Y.; Roberts, B. Personalized Health Care and Public Health in the Digital Age. Front. Digit. Health 2021, 3, 595704.
[CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.