Taking control of your own pervasive mHealth Data: A Proof of Concept using a configurable Blockchain and mHealth application on iOS and Android devices (Preprint)

2021 ◽  
Author(s):  
Arijit Sengupta ◽  
Hemang Chamakuzhi Subramanian

BACKGROUND Background: Blockchains offer a promising new distributed technology to address the challenges of data standardization, system interoperability, security, privacy, and accessibility for all data. However, integrating pervasive computing with blockchain’s ability to store privacy-protected mHealth data while providing HIPAA compliance is a challenge. Patients use a multitude of devices, apps, and services to collect and store mHealth data. Before the advent of blockchains, providing anonymized privacy controlled single point of access for different data sources for each user was a challenging problem. We present the design of an IoT-based configurable blockchain with different mHealth applications on iOS and Android collecting the same user’s data. We discuss the advantages of using such a blockchain architecture and demonstrate two things – the ease with which users can retain full control of their pervasive mHealth data and the ease with which HIPAA compliance can be accomplished by provider(s) who choose to access user data. We also allude to the future of shareable and tradeable data with our paper. OBJECTIVE Objective: The purpose of this paper is to design, evaluate and test IoT-based mHealth data using wearable devices using an efficient configurable blockchain designed and implemented ground up to store such data. The purpose of this paper is to demonstrate the privacy-preserving and HIPAA-compliant nature of pervasive computing-based personalized healthcare systems that give users total control of their own data. METHODS Methods: This paper followed the methodical design science approach adapted in information systems wherein we evaluate prior designs, propose enhancements with a Blockchain design pattern published by the same author(s), and use the design to support IoT transactions. We prototype both the blockchain and the IoT-based mHealth applications in different devices and test all use cases that formed the design goals for such a system. Specifically, we validate the design goals for our system using the HIPAA checklist for businesses and prove compliance of our architecture for mHealth data on pervasive computing devices. RESULTS Results: Blockchain-based personalized healthcare systems provide several advantages over traditional systems. They support the following features: provide and support extreme privacy protection, ability to share personalized data, provide the ability to delete data upon request, and support the ability to work on data. CONCLUSIONS Conclusions: We conclude that blockchain(s) and specifically the CHASM architecture presented in this paper, with configurable module(s) and a Software as a service Model provide many advantages for patients using pervasive devices that store mHealth data on the blockchain. Among them, is the ability to store, retrieve and modify one(s) generated healthcare data with a single private key across devices. This data is transparent and stored perennially and provides patients the privacy and pseudo-anonymity in addition to very strong encryption for data access. Firms and Device manufacturers would be benefited from such an approach wherein they relinquish user data control, while giving users the ability to select and offer their own mHealth data on data marketplaces. We show that such an architecture complies with the stringent requirements of HIPAA for patient data access.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 572
Author(s):  
Aitizaz Ali ◽  
Mohammed Amin Almaiah ◽  
Fahima Hajjej ◽  
Muhammad Fermi Pasha ◽  
Ong Huey Fang ◽  
...  

The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system.


2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2018 ◽  
Author(s):  
Mian Zhang ◽  
Yuhong Ji

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology that maintains the Bitcoin transaction ledger. Blockchain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare. Blockchain technology has the potential of securely, privately, and comprehensively manage patient health records. In this work, we discuss the latest status of blockchain technology and how it could solve the current issues in healthcare systems. We evaluate the blockchain technology from the multiple perspectives around healthcare data, including privacy, security, control, and storage. We review the current projects and researches of blockchain in the domain of healthcare records and provide the insight into the design and construction of next generations of blockchain-based healthcare systems.


Author(s):  
Booma Devi Sekar ◽  
JiaLi Ma ◽  
MingChui Dong

The proactive development in electronic health (e-health) has introduced seemingly endless number of applications such as telemedicine, electronic records, healthcare score cards, healthcare monitoring etc. Yet, these applications confront the key challenges of network dependence and medical personnel necessity, which hinders the development of universality of e-health services. To mitigate such key challenges, this chapter presents a versatile wired and wireless distributed e-home healthcare system. By exploiting the benefit of body sensor network and information communication technology, the dedicated system model methodically integrates some of the comprehensive functions such as pervasive health monitoring, remote healthcare data access, point-of-care signal interpretation and diagnosis, disease-driven uplink update and synchronization (UUS) scheme and emergency management to design a complete and independent e-home healthcare system.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Jiaqing Mo ◽  
Zhongwang Hu ◽  
Yuhua Lin

Wireless medical sensor networks (WMSNs) play an important role in collecting healthcare data of the remote patient and transmitting them to the medical professional for proper diagnosis via wireless channel. To protect the patient's healthcare data which is private-related and sensitive, some authentication schemes for healthcare systems using WMSN have been proposed to ensure the secure communication between the medical sensors and the medical professional. Since cryptanalyzing the security defects of authenticated protocols is crucial to put forward solutions and propose truly robust protocols, we scrutinize two state-of-the-art authentication protocols using WMSN for healthcare systems. Firstly, we examine Ali et al.’s enhanced three-factor based authentication protocol and show that although it provides a formal proof and a security verification, it still fails to resist offline dictionary guessing attack, desynchronization attack, and privileged insider attack and contains a serious flaw in the password change phase. Secondly, we investigate Shuai et al.’s lightweight and three-factor based authentication protocol and point out that it cannot achieve high security level as they claimed; it is actually subject to offline dictionary guessing attack and privileged insider attack, and it also has a design flaw in the password change phase. In addition, we suggest several countermeasures to thwart these security weaknesses in these two schemes for WMSN and the similar kinds.


2021 ◽  
pp. 155335062110035
Author(s):  
Auriel T. August ◽  
Kunj Sheth ◽  
Arthur Brandt ◽  
Vivian deRuijter ◽  
Janene H. Fuerch ◽  
...  

The combination of computing power, connectivity, and big data has been touted as the future of innovation in many fields, including medicine. There has been a groundswell of companies developing tools for improving patient care utilizing healthcare data, but procedural specialties, like surgery, have lagged behind in benefitting from data-based innovations, given the lack of data that is well structured. While many companies are attempting to innovate in the surgical field, some have encountered difficulties around collecting surgical data, given its complex nature. As there is no standardized way in which to interact with healthcare systems to purchase these data, the authors attempt to characterize the various ways in which surgical data are collected and shared. By surveying and conducting interviews with various surgical technology companies, at least 3 different methods to collect surgical data were identified. From this information, the authors conclude that an attempt to outline best practices should be undertaken that benefits all stakeholders.


Sign in / Sign up

Export Citation Format

Share Document