scholarly journals A Blockchain-Based Secure Inter-Hospital EMR Sharing System

2020 ◽  
Vol 10 (14) ◽  
pp. 4958
Author(s):  
Chin-Ling Chen ◽  
Yong-Yuan Deng ◽  
Wei Weng ◽  
Hongyu Sun ◽  
Ming Zhou

In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, and it is now widely applied in various fields. At the same time, with the growth of medical technology, medical information is becoming increasingly important in terms of patient identity background, medical payment records, and medical history. Medical information can be the most private information about a person, but due to issues such as operation errors within the network or a hacking attack by a malicious person, there have been major leaks of sensitive personal information in the past. In any case, this has become an issue worth studying to ensure the privacy of patients and protect these medical materials. On the other hand, under the current medical system, the patient’s EMR (electronic medical record) cannot be searched across the hospital. When the patient attends the hospital for treatment, repeated examinations will occur, resulting in a waste of medical resources. Therefore, we propose a blockchain-based secure inter-hospital EMR sharing system in this article. Through the programmatic authorization mechanism by smart contracts, the security of EMR is guaranteed. In addition to the essential mutual authentication, the proposed scheme also provides and guarantees data integrity, nonrepudiation, user untraceability, forward and backward secrecy, and resistance to replay attack.

2003 ◽  
Vol 31 (3) ◽  
pp. 429-433 ◽  
Author(s):  
Nancy E. Kass ◽  
Marvin R. Natowicz ◽  
Sara Chandros Hull ◽  
Ruth R. Faden ◽  
Laura Plantinga ◽  
...  

In the past ten years, there has been growing interest in and concern about protecting the privacy of personal medical information. Insofar as medical records increasingly are stored electronically, and electronic information can be shared easily and widely, there have been legislative efforts as well as scholarly analyses calling for greater privacy protections to ensure that patients can feel safe disclosing personal information to their health-care providers. At the same time, the volume of biomedical research conducted in this country continues to grow. The budget of the National Institutes of Health, for example, was $20,298 million in 2001, having more than doubled from a budget of $9,218 million 10 years before. This growing body of research includes increased efforts to use stored medical records as a source of data for health services, epidemiologic, and clinical studies.


2021 ◽  
Vol 11 (6) ◽  
pp. 2843
Author(s):  
Chin-Ling Chen ◽  
Zi-Yi Lim ◽  
Hsien-Chou Liao ◽  
Yong-Yuan Deng

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client’s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
SoonHyeong Jeong ◽  
Jun-Hong Shen ◽  
Byeongtae Ahn

Background/Motivation. Recently, a lot of interest in health is increasing due to the technology of the 4th industrial revolution. In particular, personal medical information through intelligent self-diagnosis is emerging as very important. However, such personal medical information causes many problems in security and reliability. Problem/Issues. Personal medical information accidents may occur on the server, but most of all, they occur more often in information sharing and data transmission. Therefore, in this paper, blockchain technology is applied to improve the reliability of such personal information management. Research Objective/Methodology. For intelligent healthcare incorporating blockchain technology, this study utilized the blockchain-based Internet of Things. In addition, information was accumulated using a number of measurement sensors to analyze individual ECG information. The measured biosignals were monitored for personalized diagnosis by analyzing the fused threshold. Result. In this paper, we implemented a monitoring system using measurement sensors to analyze individual biometric information. The implemented system information has improved reliability and security by incorporating blockchain technology.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Emanuele Perra ◽  
Eetu Lampsijärvi ◽  
Gonçalo Barreto ◽  
Muhammad Arif ◽  
Tuomas Puranen ◽  
...  

AbstractDespite the ubiquitous use over the past 150 years, the functions of the current medical needle are facilitated only by mechanical shear and cutting by the needle tip, i.e. the lancet. In this study, we demonstrate how nonlinear ultrasonics (NLU) extends the functionality of the medical needle far beyond its present capability. The NLU actions were found to be localized to the proximity of the needle tip, the SonoLancet, but the effects extend to several millimeters from the physical needle boundary. The observed nonlinear phenomena, transient cavitation, fluid streams, translation of micro- and nanoparticles and atomization, were quantitatively characterized. In the fine-needle biopsy application, the SonoLancet contributed to obtaining tissue cores with an increase in tissue yield by 3–6× in different tissue types compared to conventional needle biopsy technique using the same 21G needle. In conclusion, the SonoLancet could be of interest to several other medical applications, including drug or gene delivery, cell modulation, and minimally invasive surgical procedures.


Logistics ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 37
Author(s):  
Serkan Alacam ◽  
Asli Sencer

In the global trucking industry, vertical collaboration between shippers and carriers is attained by intermediaries, called brokers. Brokers organize carriers for a shipper in accordance with its quality and price requirements, and support carriers to collaborate horizontally by sharing a large distribution order from a shipper. Brokers also act as trustees, preventing the passing of private information of any party to the others. Despite these benefits, intermediaries in the trucking industry are involved in several sustainability problems, including high costs, high levels of carbon emissions, high percentages of empty miles, low-capacity utilizations, and driver shortages. Several studies have acknowledged the importance of improving collaboration to address these problems. Obviously, the major concern of brokers is not collaboration, but rather to optimize their own gains. This paper investigates the potential of blockchain technology to improve collaboration in the trucking industry, by eliminating brokers while preserving their responsibilities as organizers and trustees. This paper extends the transportation control tower concept from the logistics literature, and presents a system architecture for its implementation through smart contracts on a blockchain network. In the proposed system, the scalability and privacy of trucking operations are ensured through integration with privacy-preserving off-chain computation and storage solutions (running outside of the blockchain). The potential of this design artifact for fostering collaboration in the trucking industry was evaluated by both blockchain technology experts and trucking industry professionals.


2021 ◽  
Author(s):  
Merran McAlister ◽  
Christie Franks

This bulletin presents the findings of the latest survey of identity crime and misuse undertaken by the Australian Institute of Criminology as part of the Australian Government’s National Identity Security Strategy. In 2021, 9,956 people across Australia were surveyed about their experience of victimisation over their lifetime and during 2020. Nineteen percent of respondents had experienced misuse of their personal information in their lifetime and seven percent experienced it in the past year—a decline from 2019. Seventy-eight percent of respondents who reported victimisation in the past year experienced a financial loss as a result.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


2018 ◽  
Vol 13 (4) ◽  
pp. 815-839 ◽  
Author(s):  
Qinglong Gou ◽  
Fangdi Deng ◽  
Yanyan He

Purpose Selective crowdsourcing is an important type of crowdsourcing which has been popularly used in practice. However, because selective crowdsourcing uses a winner-takes-all mechanism, implying that the efforts of most participants except the final winner will be just in vain. The purpose of this paper is to explore why this costly mechanism can become a popularity during the past decade and which type of tasks can fit this mechanism well. Design/methodology/approach The authors propose a game model between a sponsor and N participants. The sponsor is to determine its reward and the participants are to optimize their effort-spending strategy. In this model, each participant's ability is the private information, and thus, all roles in the system face incomplete information. Findings The results of this paper demonstrate the following: whether the sponsor can obtain a positive expected payoff are determined by the type of tasks, while the complex tasks with a strong learning effect is more suitable to selective crowdsourcing, as for the other two types of task, the sponsor cannot obtain a positive payoff, or can just gain a rather low payoff; besides the task type, the sponsor's efficiency in using the solutions and the public's marginal cost also influence the result that whether the sponsor can obtain a positive surplus from the winner-takes-all mechanism. Originality/value The model presented in this paper is innovative by containing the following characteristics. First, each participant's ability is private information, and thus, all roles in the system face incomplete information. Second, the winner-takes-all mechanism is used, implying that the sponsor's reward will be entirely given to the participant with the highest quality solution. Third, the sponsor's utility from the solutions, as well as the public's cost to complete the task, are both assumed as functions just satisfying general properties.


2015 ◽  
Vol 44 (1) ◽  
pp. 12-21 ◽  
Author(s):  
Andrea Copeland

Abstract This article explores the possibility that public libraries can be repositories for digital community archives. The overarching goal is to establish a case for public libraries’ developing digital community archives that are participatory and which emphasize born-digital items rather than digitized physical items. This discussion follows my own research and experience in this area to include personal information management, social media and the personal archive, and the accidental community archive, and demonstrates that public libraries can focus on communities’ current events and people rather than solely on those from the past.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


Sign in / Sign up

Export Citation Format

Share Document