scholarly journals Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure

Author(s):  
Ryno Adlam ◽  
Bertram Haskins

The centralised architecture employed by electronic health records (EHRs) may constitute a single point of failure. From the perspective of availability, an alternative cloud-based EHR infrastructure is effective and efficient. However, this increased availability has created challenges related to the security and privacy of patients’ medical records. The sensitive nature of EHRs attracts the attention of cyber-criminals. There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. Features of blockchain platforms, such as decentralisation, immutability, auditability, and transparency, may provide a viable means of augmenting or improving services related to the security of EHRs. This study presents a series of experimental data flow configurations to test the application of blockchain technology to aspects of EHRs. The insights gained from these experiments are founded on a theoretical base to provide recommendations for applying blockchain technology to services related to the security of EHR infrastructure. These recommendations may be employed by developers when redesigning existing EHR systems or deploying new EHR systems.

Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1663
Author(s):  
Adam Ibrahim Abdi ◽  
Fathy Elbouraey Eassa ◽  
Kamal Jambi ◽  
Khalid Almarhabi ◽  
Abdullah Saad AL-Malaise AL-Ghamdi

The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary access control) and mandatory access control (MAC). However, these mechanisms are based on central authority management, which raises some issues such as absence of scalability, single point of failure, and lack of privacy. Recently, the decentralized and immutable nature of blockchain technology integrated with access control can help to overcome privacy and security issues in the IoT. This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. The mechanisms’ scalability, distribution, security, user-centric, privacy and policy enforcing are compared. In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.


2021 ◽  
Vol 13 (11) ◽  
pp. 5889
Author(s):  
Faiza Hashim ◽  
Khaled Shuaib ◽  
Farag Sallabi

Electronic health records (EHRs) are important assets of the healthcare system and should be shared among medical practitioners to improve the accuracy and efficiency of diagnosis. Blockchain technology has been investigated and adopted in healthcare as a solution for EHR sharing while preserving privacy and security. Blockchain can revolutionize the healthcare system by providing a decentralized, distributed, immutable, and secure architecture. However, scalability has always been a bottleneck in blockchain networks due to the consensus mechanism and ledger replication to all network participants. Sharding helps address this issue by artificially partitioning the network into small groups termed shards and processing transactions parallelly while running consensus within each shard with a subset of blockchain nodes. Although this technique helps resolve issues related to scalability, cross-shard communication overhead can degrade network performance. This study proposes a transaction-based sharding technique wherein shards are formed on the basis of a patient’s previously visited health entities. Simulation results show that the proposed technique outperforms standard-based healthcare blockchain techniques in terms of the number of appointments processed, consensus latency, and throughput. The proposed technique eliminates cross-shard communication by forming complete shards based on “the need to participate” nodes per patient.


2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


2019 ◽  
Author(s):  
Özlem Özkan ◽  
Yeşim Aydin Son ◽  
Arsev Umur Aydinoğlu

AbstractWith the increasing use of genetic testing and applications of bioinformatics in healthcare, genetic and genomic data needs to be integrated into electronic health systems. We administered a descriptive survey to 174 participants to elicit their views on the privacy and security of mobile health record systems and inclusion of their genetic data in these systems. A survey was implemented online and on site in two genetic diagnostic centres. Nearly half of the participants or their close family members had undergone genetic testing. Doctors constituted the only profession group that people trusted for the privacy of their health and genetic data; however, people chose to limit even their doctor’s access to their genetic/health records. The majority of the respondents preferred to keep full access for themselves. Several participants had negative experience or preconceptions about electronic health records: the medical reports of 9.7% of the respondents had been used or released without their consent, 15.1% stated that they avoided being tested due to violation risks, and 3.5% asked their doctors to enter a less embarrassing health status in their records. The participants wanted to see some regulations and security measurements before using any system for their health/genetic data. In addition, significantly more participants stating that storing genetic data in a mobile system was riskier compared to other health data. Furthermore, the comparative analysis revealed that being young, being a woman and having higher education were associated with having greater privacy concerns.


2011 ◽  
Vol 2 (2) ◽  
pp. 45-52 ◽  
Author(s):  
Brett Pirtle ◽  
Ashish Chandra

Healthcare industry leaders, government agencies and the general public are beginning to see the value that Electronic Health Records (EHR) systems bring through increased quality, reduced medical error rates, and improved care coordination. One subset of the EHR, known as the electronic personal health record (PHR), is gaining in popularity. Before PHRs will be widely adopted, many barriers to their use must be overcome. These include the costs to the developer, host, and patient. Patient access to electronic resources is a concern. Interoperability is another problem. It is not practical for physicians to convert different data formats so that different PHRs may be adopted. Finally, privacy and security concerns also impact EHR adoption. Patients want assurance that their data is secure and not used for marketing purposes. Despite these barriers, there is high consumer interest in PHR products. In future, it is expected that PHR programs will be certified, security and privacy will be enforced by legislation, and standards for interoperability will be developed. PHR will also incorporate additional decision support aids and may become part of a social network that promotes peer support for positive behavior change. This paper will provide an overview of all these issues pertaining to PHR.


2019 ◽  
Vol 9 (2) ◽  
pp. 42-49
Author(s):  
Lubov A. Belyanina

Blockchain technology has come up with solutions for the issues faced in the current healthcare system. Stakeholders and researchers can share electronic health records to find the solution to diseases. This not only improves the health sector, but it also provides information about other diseases. To maintain the security and privacy of the patient, a healthcare data gateway storage platform was created based on the blockchain technique. To overcome the problem, this article proposes a dengue diagnosis method based on nucleotides in the gene sequence, it needs only skin cells, hair, or a nail which can be collected easily from the patients. The proposed method not only diagnoses dengue, but also classifies serotypes using wavelet coefficients of EIIP indicator sequences.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xiaofeng Lu ◽  
Songbing Fu ◽  
Cheng Jiang ◽  
Pietro Lio

IoT technology has been widely valued and applied, and the resulting massive IoT data brings many challenges to the traditional centralized data management, such as performance, privacy, and security challenges. This paper proposes an IoT data access control scheme that combines attribute-based encryption (ABE) and blockchain technology. Symmetric encryption and ABE algorithms are utilized to realize fine-grained access control and ensure the security and openness of IoT data. Moreover, blockchain technology is combined with distributed storage to solve the storage bottleneck of blockchain systems. Only the hash values of the data, the hash values of the ciphertext location, the access control policy, and other important information are stored on the blockchain. In this scheme, smart contract is used to implement access control. The results of experiments demonstrate that the proposed scheme can effectively protect the security and privacy of IoT data and realize the secure sharing of data.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


Author(s):  
Lubov A. Belyanina

Blockchain technology has come up with solutions for the issues faced in the current healthcare system. Stakeholders and researchers can share electronic health records to find the solution to diseases. This not only improves the health sector, but it also provides information about other diseases. To maintain the security and privacy of the patient, a healthcare data gateway storage platform was created based on the blockchain technique. To overcome the problem, this article proposes a dengue diagnosis method based on nucleotides in the gene sequence, it needs only skin cells, hair, or a nail which can be collected easily from the patients. The proposed method not only diagnoses dengue, but also classifies serotypes using wavelet coefficients of EIIP indicator sequences.


Sign in / Sign up

Export Citation Format

Share Document