You are on page 1of 10

Blockchain for Electronic Health Records

Dr. Priyanka Tyagi


Pratyush Prashar Shubham Kumar Mishra
Department Of Computer Science And
Department Of Computer Science And Department Of Computer Science And
Engineering
Engineering Engineering
School Of Engineering And
School Of Engineering And School Of Engineering And
Technology(SET)
Technology(SET) Technology(SET)
Sharda University
Sharda University Sharda University
Greater Noida, India
Greater Noida, India Greater Noida, India

201900578.pratyush@ug.sharda.ac.in 2019576062.shubham@ug.sharda.ac.in
Priyanka.tyagi@sharda.ac.in

Abstract—Systems for managing electronic health records health records [3]. Compared to other data sources,
(EHRs) demand the use of efficient technology for healthcare information is frequently much more valuable
exchanging health data. Medical record storage solutions for trade on the black market: The average price of a
could potentially be exposed to numerous security attack medical record breach is about $380, which is double the
vectors under current management practices. Blockchain average price of all data breaches related to industries [3].
solutions for the healthcare industry, however, can offer a Because of popular attack methods for standard EHR
decentralized, personal, and secure method of processing
record, incidents like the one above show that the
EHRs. In this study, we introduce PREHEALTH, a
distributed ledger technology and Identity Mixer-based EHR
healthcare industry can sustain significant financial
management solution that protects patient privacy (Idemix). loss[5].
The permission blockchain foundation of the Hyperledger A expandable, irreversible, clear, and secure remedy
Fabric is used in the proof-of-concept execution described in needs to be put in place quickly in order to meet the above
the paper. The recommended procedure securely keeps difficulties given the growing push toward EHR. Avoiding
patient records while upholding confidentiality and the possibility of a single point of failure or single point of
unlinkability. The effectiveness and viability of the plan for
attack, medical data could be handled in a decentralised
deployment on a large scale in the actual world are
demonstrated by experimental performance evaluation
manner using a cutting-edge technique that is impervious
findings. to common attack vectors. Getting all participating
healthcare providers on the same page is essential to
preventing or appropriately responding to insider threats
and inadequate security.
Keywords—component, formatting, style, styling, insert
In order to combat the aforementioned security issues,
(key words)
current EHR storage and delivery methods make use of
specific technologies. They specifically use access control
I. INTRODUCTION rules like role-based access control (RBAC) and attribute-
The use of paper-based medical records has frequently had based access control (ABAC), which limit unauthorised
an impact on traditional healthcare practices, and clients' entry to the system based on predetermined
electronic patient records have developed from these positions and qualities [6]. Additionally, a personal, three-
documents. [1]. As a result, electronic health records factor authentication that is personal mechanism could be
(EHRs) frequently include extremely personal medical utilized in relation to the wireless sensor networks geared
data that is shared with patients, pharmacists, and toward healthcare (WSNs)[7]. To further hide clients'
healthcare professionals [2]. Data storage on distributed or identities and maintain secerecy, encryption in conjunction
cloud servers is a feature of current EHR management with pseudonymization approach is used.However, access
strategies; this practice can have a variety of functionality control procedures may leak personal data, and encryption
and financial repercussions. Additionally, in line with procedures may adversely impact system performance.
Coventry and Branley [3], health maintenance institutions [7].
are exposed to a variety of cybersecurity dangers, such as
malware and ransomware.
EHR management and storage providers can be
successfully attacked via ransomware, which encrypts
data until a ransom is paid, or by compromising the EHR
repository. [3]. The National Health Service (NHS) lost
£92 million as a result of the WannaCry cyberattack,
which infected unprotected servers and computers and 70
out of 236 NHS foundations have encrypted medical data.
[4]. Additionally, the Medjack (Medical Device Hijack)
cyberattack employed malware which contaminated
numerous unsecured medical equipment, undermined
network security, broke client privacy, and gained access
to
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
A. The following is a summary of the contributions made
CONTRIBUTIONS by our work:

In this article, we suggest Healthcare That the Respects B. Creation of PREHEALTH, a medical record system
Privacy (PREHEALTH), an EHR management system that protects privacy. This makes use of Identity Mixer
that protects patient privacy. Patients and other (Idemix) software and distributed ledger technologies.
healthcare professionals can use PREHEALTH to keep Idemix is a cryptographic protocol that uses zero-
medical records on an unchangeable the distributed knowledge proof (ZKP) and offers preserving your
ledger protects Data security. This unchangeable record privacy features like unlinkability and secerecy.
safeguards facts from exploitation and abuse while
enabling authorised blockchain participants, such as C. An assessment of PREHEALTH's security and
medical professionals, to query non-personal robustness against common attack vectors.
data.Keeping the collected personal data's privacy
D. The performance of PREHEALTH is empirically
personal as well as isolating data for auditing and
compared to analogous blockchain technology solutions
compliance checks are other features of PREHEALTH.
and to a conventional record that provides applicable
context for column-level encryption.

E. The Idemix suite is still being created and has not been
some present drawbacks which would have to be solved in
subsequent liberate, as the use of the mentioned
condition-of-the- architecture as art inside a health
document dissemination access is a vital benefaction. A
client using Idemix as a blockchain client can study,
change, and quota confidential clinical data while
maintaining their secerecy and isolation.

F. The remaining portions of the essay are structured as


follows. Information about the history of the used
distributed ledger technology is provided in Segment 2
and is necessary to ensure the paper's sustainability. In
Segment 3, the pertinent literature is discussed. The
PREHEALTH proof-of-concept execution,this also serves
as our testbed for evaluation, is provided in Segment 4.
Prehealth evaluation process and findings are presented
in Segment 5 and discussed in Segment 6, respectively.
Finally, Segment 7 summarises our findings and offers
ideas for additional research.

G.

BACKGROUND
One of the latest technologies that has caused the most
disruption is blockchain. The phrase refers to a
decentralized coeval-to-coeval network where non-trusted
parties update an auditable, append-only ledger. Although
the platform allows for the choice of both open and
anonymous(permissionless) access, it also allows for the
specification of the number of end clients and validators.
It has been suggested to construct a electronic
couponing method using a network of blockchains without
authorization built based on the Ethereum blockchain.
Scalability and secerecy are still lacking, but effective
non- repudiation and decentralization have been
accomplished. Sub chains is a modern blockchain
technology created on the public ledger for Bitcoin that
enables data storage through third-party services in their
records and synchronises them with the Bitcoin blockchain
network. Longo, Podda, and Saia [12] studied Subchains.
However, synchronisation and security issues have an
impact on the proposed scheme's scalability and secerecy.
On the other hand, Hyperledger Fabric, a blockchain Occupational work:
platform that is open source that has robust security and
identification capabilities, is an illustration of a Highly sensitive medical information is frequently
permissioned ledger[13]. In the cycle shown below for the contained in electronic health records (EHR), which are
execute-order-validate step, Hyperledger Fabric's periodically shared with patients, pharmacists, and
innovative planning [14,15] selects where business is healthcare professionals for clinical diagnosis and
conducted handled by running a piece of programming treatment[2]. Furthermore, where the patient has given
code (referred to as chaincode) created in Go, Java, or their necessary consent, important medical information
JavaScript. needs to be updated frequently and shared. Robust
accessibility, quick entrance, and the proper the records'
1. Execution. Using the appropriate endorsement encryption are also necessary in addition to this[2,19].
policy, a client application sends a transaction
proposal to endorsing coevals in order to call a There are presently a number of strategies for
chaincode function for interacting with the improving EHR management using blockchain technology
blockchain ledger. The endorsement is returned [20,21]. In their discussion of the differences between
to the client as soon as the endorsers have distributed and cloud designs for EHR storage, Yüksel et
completed the chaincode successfully. After that, al. [6] suggest that a centralised model may be constructed
a agreement is put together and inscribe using by utilising the pertinent decentralised situation and
character received from a Provider of methodologies architectures for the cloud. Architecture of
Membership Services (MSP), a party that clouds, in its broadest sense, speaks of the organised
manages all of the mates and accreditors storehouse and distribution of enormous amounts of
identities inside each organisation. medical history among distant unaffiliated service
providers. By implementing appropriate identity
2. Sequence. The ordering service receives management-based security measures, restriction of
constructed transactions from a client after that. access, integration of policy, and compliance supervision,
The groups of nodes in question are known as healthcare organisations and individuals can access the
ordure’s, and their function is to tranmit the data within the Cloud, fulfilling common requirements
sorted agreement to all other the network's like ascendible, accessibility, and worthwhile[1].
coevals after essentially combining several
transactions into a single block. Sharma, Chen, and Sheth [22] looked at kHealth, a
useful a system in the cloud manages health data obtained
3. Validation Phase. The local ledger state is then originating from Internet of Things (IoT) gadgets while
updated once each coeval confirms received protecting privacy. Since their method makes use of a
transactions in light of the endorsement policy. In variety of differential encryption and homomorphic
particular, Hyperledger Fabric exhibits distinctive privacy techniques, it intends to create individualised
security techniques including individual data sets, health predicting models by applying effective but
which permit sure authorised clients to view just computation- intensive privacy protections. As a side note,
particular data[16]. Coevals employ local state a scalability improvements compromise privacy-protection
records [14,16] like CouchDB, MongoDB, and procedures.
LevelDB to store data. [15]. Docker containers
can participate in Hyperledger Fabric as
participants. A successful application execution
requires the following factors and consistently in
a digital environment, these containers [17] are a An efficient and personal e-medical cloud system was
device for software that encapsulates dependents presented by Dubovitskaya et al. [8] in which medical data
and programming code. Applications are also is securely disseminated utilising patient-specified access
developed in a secure, isolated environment control mechanisms over local and cloud-stored records
thanks to Docker's robust security features. On using public-key cryptography. This execution's drawback
top of Hyperledger Fabric, a number of stems from the potential wrongdoing of reputable cloud
technologies can be added to improve privacy server providers who might compromise secerecy by
and safety. This also applies to Idemix suite of inferring sensitive data obtained from the IP address of the
cryptographic protocols [18], which makes use of client. A patient made it potentially be linked to a
ZKP to offer unlinkability and secerecy. Each pseudonym by a pretextual assault.
participant must utilise an IDemix identification Casino et al. [23] explored how using blockchain
certificate to conduct absolutely every transaction technology might benefit a variety of healthcare-related
on an electronic ledger, or. applications, such as the control of electronic medical
records,the fight against prescription fraud, and medical
study that is patient-focused.
Abbreviations and Acronyms
With the new attribute-based signcryption (ABSC)
Define abbreviations and acronyms the first time they technology called the cuckoo filter, Ming and Zhang [24]
are used in the text, even after they have been defined in established effective PPAC (privacy-preserving access
the abstract. Abbreviations such as IEEE, SI, MKS, CGS, control) method cloud-based technologies for EHR to
sc, dc, and rms do not have to be defined. Do not use ensure efficiency and confidentiality of calculation. They
abbreviations in the title or heads unless they are offered comprehensive privacy protections in addition to
unavoidable. comparative performance evaluation findings. But no
inquiry has been made into whether the GDPR is being
followed.
Information from personal health records (PHRs) was Ethereum-based system that focus on the supply-chain for
dispersed into data blocks by Roehrs et al. [25]. Although pharmaceuticals. The architecture created by Bocek et al.
the data storage appears to be centralised from a logical [32]The warmth data that IoT sensors collect in this study
perspective, it is actually decentralised across the is used to enable mobile devices to unite to an HTTP
participating devices. The authors stated that many server. The HTTP server functions as a blockchain node
businesses can implement their suggested protocol, and use smart contracts to store the data in PostgreSQL
openPHR, because it is practical, adaptable, and elastic. records. Even though it is not decentralised at every level,
Although their planning is depicted in great points, the their realistic scenario is capable plus could be modified
usefulness of their ideas is called into question. The for an EHR exercise folder. The gathered information is
writers also pointed out that their solution still lacks exposed and susceptible in cases where the HTTP server is
security and privacy. It should be highlighted that an EHR taken over by intruders or breaks down. Therefore, given
is administered by a healthcare facility, but the patient has the sensitive nature of EHR data, its use in an EHR
control over a PHR.. EHRs and PHRs can both be scheme is not recommended.
evaluated based on speed and adaptability indicators,
protecting your privacy features, however, as they are both Blockstack is an important and well-known distributed
stored and distributed electronically. record platform that explains blockchain technology [33].
By default, Blockstack uses the Gaia dispersed record,
There are other methods that make use of a backbone which can accumulate record locally in consumer web
technology comparable to ours[26,27]. Using the browsers rather than on a centralised server, improving
permissioned blockchain Hyperledger Fabric, Ichikawa et confidentiality. The Blockstack structure can be switched
al. [26] demonstrated options for storing medical records to another platform; it is presently developed on top of the
gathered through mobile devices. The previous Bit coin complex.
Hyperledger Fabric v0.5 version, nevertheless, on which
the authors based their model and which PREHEALTH is The creation of an innovative hybrid EHR
based lacks the personal information collecting administration method is explored in [34] in the context of
attributes.Furthermore, the Idemix suite is not supported a decentralized confidentiality blockchain explanation
by their model, making it impossible to generate the created on a permission less blockchain system that
required privacy warranty. Their system is generally combines cloud storeroom for health information from
capable of storing information in a permanent ledger, yet Internet of Things devices. The use of encryption with
without providing end clients with any privacy protection. symmetric and asymmetric keys that is not too heavy to
It should be emphasised that a system update would not be ensure efficient client authorization and secerecy is one of
possible without a complete redesign of their architecture the suggested solution's main benefits; nevertheless,
in order to include the personal data collection feature. performance effectiveness and GDPR observance possess
Similar to this, Liang et al. [27] simulated a actual not been investigated
situation with numerous collaborating parties using Hyper Features of PREHEALTH:
ledger Fabric.End clients, apparel technology, health
professionals, assurance firms, block chain systems, and In contrast to earlier methods, PREHEALTH allows
Online record are among the entities represented in their for the efficient and secure management of extremely
system. However, as Hyper ledger Fabric developed, new sensitive health data across the permissioned blockchain
issues emerged that they did must now address in the network of Hyperledger Fabric. The levels of consent and
event that the planning is revised as well as updated to right of entry arrange that Hyper ledger Fabric provides
include the personal data collection functionality in a later make it ideal for handling medical report since it offers a
release. The authors provide useful indicators on the personal, extensible, and vastly configurable
viability of each query on their system in the conclusion, communications explanation [35]. Another benefit of
but crucial practical facts are omitted. PREHEALTH is that its protecting your privacy features
comply with GDPR [36], particularly because it chains the
Although MeDShare [28] uses lots of ideas from our right to be elapsed and uses various stages of information
job, the fundamental blockchain structure is not anonymization as well as the ability to set a fixed lifetime
deliberately chosen. A proposed solution is not given as for kept records. Similar to this, clients can request a
much attention by the writers as they do the basic smart removal operation on the blockchain system if they prefer
contracts and data blocks are the fundamental units of the to delete their data [37]. A hash demonstrating the
blockchain system.. existence of the data in the ledger would also continue to
Developed on the Ethereum blockchain system, the exist, but it is computationally unfeasible under reasonable
permission less blockchain execution known as MedRec time limitations to correlate with the identity of the
[29] illustrates auditable and decentralized EHR information owner..
management. It compromises data and client confidentiality Table one contrasts PREHEALTH with other
by introducing both problematic transaction scalability machines in the literature whose demonstrations provide
and a chance that a transaction can be linked to a specific either proof- of-principle applications that can be applied
person. Other authors have been inspired by MedRec to in real-world settings or in-depth suggestions..This chart
improve upon it and work to fix its flaws [30]. summarises the underlying technology for each proposal
The MediBchain system [31] is built on the Ethereum and includes Checkmarks or Xmarks to indicate whether
network and offers a permissioned coeval-to-coeval or not the proposal complies with GDPR requirements, as
method. To provide adequate scalability, it makes use of a well as whether or not presentation and extensibility
server infrastructure hosted in the cloud. Linkability is still evaluation results similar to those in part 3 have been
a problem, even if the participating parties' data is still in completed.
encrypted form. The transaction cost, which is not
quantifiable, is another issue. Modum.io [32] is another
EXPERIMENTATION ENVIRONMENT The weakest link is typically a person with regard to
The creation of a system that provides secerecy, security, technology like Hyper ledger Fabric that deal with
and tolerable scalability is the main goal of the study. In uniformity and authorizes; this is a legacy from old IT
order to do this, it was decided to execute numerous systems. It is susceptible to hostile client to make arbitrary
Docker containers, each of which included a fundamental study and inscribe queries to the blockchain ledger in
component of the Hyperledger Fabric network, in a mass situations when a blockchain client's personal certificates
situation, as shown in outline two. In exacting, to build are stolen or exposed. The system's security may be
up a system using Hyperledger Fabric composed of jeopardised in accordance with stated policy. Since no
individuals and organisations that have set up distributed one, not even the administrators, has full authorization or
Couch DB ledgers and the chaincode for them[14,15], a authority over the ledger in our situation, this scenario is
Debian Stretch mass situation [38] runs a dockerized a implausible. The chaincode that is being run by every
command-line environment. coeval in the blockchain network could also pose a risk to
Outline three shows the summary for each Hyper ledger the systems. Although Chaincode operates independently
Fabric action involving a distributed ledger. Three from outside interference, it could have problems. For the
different organisations, each with three coevals and a purpose of finding defects at the pre-production stage,
different MSP, are deployed. Except for those from thorough inspection and testing are essential [14]. Last but
Organization 1's coevals, who look after a secret data not least, given that blockchain technology is still
collection, every coeval keeps a duplicate of the ledger relatively new and provides advanced security measures
book. This is meant to serve as an example of a extensible that were previously impractical, it is still feasible that
and secrecy-protecting EHR administration resolution. additional faults and attacks will be found in the
The primary features of the projected test bed are as future.Utilizing quantum computing, which undergone
follows, as outlined in segment 2: significant development during the recent years, is one
 The proposed transaction is sent to the ordering potential threat. The aforementioned issue may put at risk
service after a coeval has been verified by the all methods depending on standard encryption techniques
MSP. and hashing techniques. Utilizing quantum-robust
 A transaction is verified by the ordering service techniques as a preventative countermeasure is therefore
using the corresponding chaincode, and the recommended [39].
public ledger is updated. (b) Secerecy Assessment
 To check, recognize, and revise their localized Extraction of pertinent data obtained through dealings with
version of the ledger, all coevals are informed of blockchain clients and chaincode is the main focus of the
public ledger changes. assessment of the confidentiality and disconnected
between modern users and communication. The client
identity library is used in particular to examine exposed
identity information in interactions between common
clients and Idemix-based clients [40]. placed within the
chaincodeIt It should be remembered that the library listed
above offers a unique way to learn about the validators'
personal information because the outlined communication
route makes use of the TLS cryptographic procedure,
which effectively encrypts pertinent data. In contrast,
blockchain transactions only use a public key encryption
The following are the technical requirements for the
for signature, which is not disclosed any personal
proof-of-concept deployment: Intel Core i7 6th
information.
Generation processor, running at 2.4 GHz, with 8GB
Additionally, the authors of [15] emphasised that because
of RAM and a 256GB solid state drive . Each data
Hyper ledger basics offers a wide arrangement liberty,
record, exactly, has six spheres, two of which depict
specific boundary must be changed in order for secerecy
delicate patients. Information and are encrypted as part
and the efficiency of the block chain system measures to
of the personal data gathering. The variables are
be correctly identified plus evaluated. These parts are
specifically divided into the patient's Name, Address,
separated into fixed and dynamic variables, and the
Country of Residency, DOB, a Test sphere that can
current segment inspect them as follows.
contain record relating to each use case, and lastly a
created system- Fixed variables:
specific ID. Additionally, Organization 1 is the only
entity with access to the data from a personal collection, 1. Number of institution, coevals and authorities: Three
which comprises of the patient's Name and Address in the organizations were created, each involving three coevals
first two fields. Only the remaining non-sensitive who served as certifiers and a three-person instructing
information may be accessed by Organizations 2 and 3. repair due to complexity and technical restrictions.
Last but not least, coeval times for study and inscribe
2. Endorcment: The transaction request for each
queries are quantified as a component of assessment of
transaction proposal must be signed by at least one coeval
the suggested remedy.
from any corresponding organisation, cutting down on
Assessment:
unneeded coordinating with other countersign parties.
(a) Protection Assessment
Vibrant variables
explicit secerecy and seclusion of contact, was made.
1. Provider of association services: Unlike the current Additionally, experimental performance indicators for
X.509 public key certificate process, Idemix expertise blockchains, including their extensibility, stability, review,
requires a unique validation contributor [41]. and economical, be evaluated in relation to particular
2. Client registration process: Idemix client registration ecological conditions along with factors. The deployment
necessitates specific CLI commands. To allow for a client of an investigational proof-of-notion to a report context
to sign up as well as engage the block chain system, a was examined after testing.
suitable CLI docker bud vase was created, as shown in Additionally taken into consideration were the
outline two. In this container, pertinent Idemix options calculation and evaluation of quantifiable characteristics
were treated as argument lines for commands. and performance indicators in relation to the experimental
execution. Extensibility, stability, review, and economical
of the blockchain were effectively authenticated, in addition
Performance Evaluation to the use of cutting-edge Idemix technology. Our findings
For different volumes of EHRs, we designed inquiry specifically show that the suggested EHR management
period for PREHEALTH, a PostgresSQL record strategy enables the contract history of medicinal report
imitating a typical EHR administration explanation, and shall not be altered and adequately inspected, even on a
the experimentation prototypes for MedRec and Block vast scale, lacking a major presentation slide.
stack (10, 100, 1000, 10,000, 100,000 and 1,000,000).
Information was effectively encrypted using effective
Table 2 encryption techniques; as a result, a malevolent another
and Figure 4 present the findings. Even though both party cannot contact important data. Additionally, a
blockchain technologies, notably Medrec and blockchain ledger is immune to specialised command
Blockstack, as well as a conventional PostgreSQL injection threats like SQL injection, which specifically
record, enforce increased over time, cost per inquiry, targets a particular information record format. [42].
PREHEALTH shows resourceful study and inscribe Additionally, each relative blockchain coeval was
query time metrics. mounted with the MSP directory having the necessary
Notably, PREHEALTH performs significantly better cryptographic material, making it impossible for an
when there are a lot of records. From the experiments that attacker to negotiation the gathered system by using
have been done, it is clear that the contract time for each forged cryptographic components by pretending to be a
interpret query using a PostgreSQL record is increasing blockchain coeval. The solution also included a personal,
directly and will surpass PREHEALTH at roughly isolated blockchain topology that was immune to external
1,200,000 records. Therefore, it is evident that security threats and where recognised blockchain coevals
PREHEALTH is capable of handling each query in a and orderers would directly reveal their identities in the
actual situation where there are countless entries that case of misbehavior. All validator identities are made
have been stored. public in the case of a consent personal blockchain
Additionally, it should be mentioned that the Proof of consortium that would deploy PREHEALTH. Therefore, if
the actor tried to alter with the EHRs or blockchain contact
Authority consensus technique was used to construct the
them, they would be identified. Last but not least, the
MedRec prototype in an experimental setting in order to
execution was connected to a personal, inaccessible
successfully deploy local nodes. Contrastingly, the blockchain topology that was impervious to outside safety
commercial MedRec programme operates using a tedious intimidation and where recognized blockchain coevals and
evidence of job consensus method [29], resulting in more orderers would immediately divulge their identities in the
accurate measures of query time. event of misbehavior. Every validator's identity is made
Normative experiments were also run on our suggested public under the scenario of a authorized personal
PREHEALTH solution's CPU and Memory performance. blockchain association using PREHEALTH. As a result,
Table 3 and Figure 5 show the microchip consumption of the actor would disclose their individuality upon making
PREHEALTH coevals during the process for study and an attempt to alter EHRs or blockchain transactions
inscribe queries over different EHR measures (1000, themselves.
10,000, and 100,000). PREHEALTH inaugurated 3
institutions, specifically the Health center, sanatorium,
and CommunityHealth, as seen in Figure 3. There are Conclusion and Future Work
three blockchain coevals for each company, namely EHR administration is essential now and will remain so in
Coeval 0, Coeval 1, and Coeval 2, accordingly. The the future. Responsive medical information of individuals,
blockchain coevals' average CPU utilization for read whose isolation is required respected, is contained in
queries is fair, hovering around 30%, whereas write EHRs. We suggested PREHEALTH, a method for storing
queries only manage a maximum CPU presentation of EHRs while protecting patient isolation. We conducted an
15.4%.The CPU presentation of the block chain coevals experiential contrast of our proof-of-concept execution
is often constant, with brief swings that are likely due to with other another ideas that have been made in the
equipment restrictions. As a result, it is not depicted in a literature and discovered that PREHEALTH, when the
plot because the typical memory overhead of every amount of data stored is substantial, delivers stronger
blockchain coeval across our experiments with different privacy assurances while imposing less query overhead. In
size of EHRs was negligible (below 2%). fact, Any number of EHRs can be interpreted by
Discussion PREHEALTH with a comprehend query time of 183 ms;
In the previous section, an experiential contrast of whereas the other compared workings comprehend query
PREHEALTH to the cutting-edge methods of the times are longer or increasing exponentially. In particular,
Hyperledger Fabric structure, that were used to achieve
On the MedRec platform, a read query in ten lakh EHRs preserving three-factor authentication protocol
takes 210 milliseconds, A Blockstack comprehend query for wireless sensor networks. Sensors 2019, 19,
takes 360 milliseconds., and a read query in a 4625. [CrossRef] [PubMed]
PostgreSQL record takes 136 millisecond. Additionally,
we have suggested and used quantifiable measures to 8. Dubovitskaya, A.; Urovi, V.; Vasirani, M.;
assess the presentation, extensibility, review, and stability Aberer, K.; Schumacher, M.I. A cloud-based
ehealth architecture for privacy preserving data
of the scheme.
integration. In Proceedings of the IFIP
In a future release, a potential extension of this work
International Information Security and Privacy
might concentrate on using enhanced Idemix Conference, Hamburg, Germany, 26–28 May
credentials. Technical issues with the Idemix technology 2015; pp. 585–598.
would be resolved if a credential is revoked and the
including unique identity characteristics are made 9. Angelis, S.D.; Aniello, L.; Baldoni, R.;
possible. At that point, a useful exploring new territory Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs
could be started conducive to create a manufacturing proof-of- authority: Applying the CAP theorem
EHR managing solution that protects patient privacy. to permissioned blockchain. In Proceedings of the
Additionally, a minimal Kubernetes cluster with a Italian Conference on Cyber Security, Milan, Italy,
blockchain solution could be used as a performance 6 February 2018.
benchmarking strategy, and a variety of customizable 10. Kuo, T.T.; Kim, H.E.; Ohno-Machado, L.
guideline might be studied within relation to their Blockchain distributed ledger technologies for
impact on the extensibility of blockchain. In particular, a biomedical and health care applications. J. Am.
performance-oriented cloud environment might be used Med. Inform. Assoc. 2017, 24, 1211–1220.
to create a complicated blockchain network that includes [CrossRef] [PubMed]
many blockchain coevals, orderers, backing plans, and 11. Podda, A.S.; Pompianu, L. An overview of
simultaneous interactions on the blockchain, effectively blockchain-based systems and smart contracts for
assessing criterions and looking at the extensibility as a digital coupons. In Proceedings of the
whole. IEEE/ACM 42nd International Conference on
Software Engineering Workshops, Seoul, Korea,
24 June– 16 July 2020; pp. 770–778.
REFERENCES 12. Longo, R.; Podda, A.S.; Saia, R. Analysis of a
Consensus Protocol for Extending Consistent
Subchains on the Bitcoin Blockchain.
1. Abbas, A.; Khan, S.U. A review on the state-of- Computation 2020, 8, 67. [CrossRef]
the-art privacy-preserving approaches in the e- 13. Cachin, C. Architecture of the hyperledger
health clouds. IEEE J. Biomed. Health Inform. blockchain fabric. In Proceedings of the
2014, 18, 1431–1441. [CrossRef] [PubMed] Workshop on Distributed Cryptocurrencies and
2. Dubovitskaya, A.; Xu, Z.; Ryu, S.; Schumacher, Consensus Ledgers, Chicago, IL, USA, 25 July
M.; Wang, F. Secure and trustable electronic 2016; Volume 310, p. 4.
medical records sharing using blockchain. AMIA
14. Androulaki, E.; Barger, A.; Bortnikov, V.;
Annu. Symp. Proc. 2017, 2017, 650–659.
Cachin, C.; Christidis, K.; De Caro, A.; Enyeart,
[PubMed]
D.; Ferris, C.; Laventman, G.; Manevich, Y.; et
Sensors 2020, 20, 6587 14 of 16 al. Hyperledger fabric: A distributed operating
system for permissioned blockchains. In
3. Coventry, L.; Branley, D. Cybersecurity in Proceedings of the Thirteenth EuroSys
healthcare: A narrative review of trends, threats Conference, Porto, Portugal, 23–26 April 2018;
and ways forward. Maturitas 2018, 113, 48–52. pp. 1–15.
[CrossRef] [PubMed]
15. Thakkar, P.; Nathan, S.; Viswanathan, B.
4. Smart, W. Lessons Learned Review of the Performance benchmarking and optimizing
WannaCry Ransomware Cyber Attack; hyperledger fabric blockchain platform. In
Department of Health and Social Care: London, Proceedings of the 2018 IEEE 26th International
UK, 2018; Volume 1, pp. 10–1038. Symposium on Modeling, Analysis, and
5. Alvarez, M. Security Trends in the Healthcare Simulation of Computer and Telecommunication
Industry; Somers IBM: Somers, NY, USA, 2017; Systems (MASCOTS), Milwaukee, WI, USA,
pp. 2–18. Available online: 25– 28 September 2018; pp. 264–276.
https://www.ibm.com/downloads/cas/PLWZ76M 16. Papadopoulos, P.; Pitropakis, N.; Buchanan,
M (accessed on 17 November 2020). W.J.; Lo, O.; Katsikas, S. Privacy-Preserving
6. Yü ksel, B.; Kü pç ü , A.; Özkasap, Ö. Research Passive DNS. Computers 2020, 9, 64. [CrossRef]
issues for privacy and security of electronic 17. Boettiger, C. An introduction to Docker for
health services. Future Gener. Comput. Syst. reproducible research. ACM SIGOPS Oper. Syst.
2017, 68, 1– Rev. 2015, 49, 71–79. [CrossRef]
13. [CrossRef]
18. Androulaki, E.; De Caro, A.; Neugschwandtner,
7. Renuka, K.; Kumar, S.; Kumari, S.; Chen, C.M. M.; Sorniotti, A. Endorsement in Hyperledger
Cryptanalysis and improvement of a privacy-
Fabric. In Proceedings of the 2019 IEEE 30. Yang, H.; Yang, B. A blockchain-based approach
International Conference on Blockchain to the secure sharing of healthcare data. In
(Blockchain), Atlanta, GA, USA, 14–17 July Proceedings of the Norwegian Information
2019; pp. 510–519. Security Conference 2017, Oslo, Norway, 11–15
19. Abramson, W.; Hall, A.J.; Papadopoulos, P.; September 2017.
Pitropakis, N.; Buchanan, W.J. A Distributed 31. Al Omar, A.; Rahman, M.S.; Basu, A.; Kiyomoto,
Trust Framework for Privacy-Preserving S. Medibchain: A blockchain based privacy
Machine Learning. arXiv 2020, preserving platform for healthcare data. In
arXiv:2006.02456. Proceedings of the International Conference on
20. Hölbl, M.; Kompara, M.; Kamiš alic ́, A.; Nemec Security, Privacy and Anonymity in
Zlatolas, L. A systematic review of the use of Computation, Communication and Storage,
blockchain in healthcare. Symmetry 2018, 10, Guangzhou, China, 12–15 December 2017; pp.
470. [CrossRef] 534–543.
21. Mayer, A.H.; da Costa, C.A.; da Rosa Righi, R. 32. Bocek, T.; Rodrigues, B.B.; Strasser, T.; Stiller,
Electronic health records in a blockchain: A B. Blockchains everywhere-a use-case of
systematic review. Health Inform. J. 2020, 26, blockchains in the pharma supply-chain. In
1273–1288. [CrossRef] [PubMed] Proceedings of the 2017 IFIP/IEEE Symposium
on Integrated Network and Service Management
22. Sharma, S.; Chen, K.; Sheth, A. Toward practical (IM), Lisbon, Portugal, 8–12 May 2017; pp. 772–
privacy-preserving analytics for IoT and cloud- 777.
based healthcare systems. IEEE Internet Comput.
2018, 22, 42–51. [CrossRef] 33. Ali, M.; Shea, R.; Nelson, J.; Freedman, M.J.
Blockstack: A New Decentralized Internet.
23. Casino, F.; Dasaklis, T.K.; Patsakis, C. A Whitepaper. May 2017. Available online:
systematic literature review of blockchain-based https://pdos.csail.mit.edu/6.824/papers/blockstack
applications: current status, classification and open -2017.pdf (accessed on 17 November 2020).
issues. Telemat. Inform. 2019, 36, 55–81.
[CrossRef] 34. Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh,
R. A decentralized privacy-preserving healthcare
Sensors 2020, 20, 6587 15 of 16 blockchain for
24. Ming, Y.; Zhang, T. Efficient privacy-preserving IoT. Sensors 2019, 19, 326. [CrossRef] [PubMed]
access control scheme in electronic health
records system. Sensors 2018, 18, 3520. 35. Albeyatti, A. White Paper: Medicalchain.
[CrossRef] [PubMed] MedicalChain Self-Publication, 2018. Available
online:
25. Roehrs, A.; da Costa, C.A.; da Rosa Righi, R.
OmniPHR: A distributed architecture model to https://medicalchain.com/en/whitepaper/ (accessed on
integrate personal health records. J. Biomed. 17 November 2020).
Inform. 2017, 71, 70–81. [CrossRef] [PubMed] 36. Voigt, P.; Von dem Bussche, A. The eu general
26. Ichikawa, D.; Kashiyama, M.; Ueno, T. Tamper- data protection regulation (gdpr). In A Practical
resistant mobile health using blockchain technology. JMIR Guide, 1st ed.;
MHealth UHealth 2017, 5, e111. [CrossRef] [PubMed] Springer International Publishing: Cham, Switzerland,
Sensors 2020, 20, 6587 16 of 16 2017.
27. Liang, X.; Zhao, J.; Shetty, S.; Liu, J.; Li, D. 37. Davari, M.; Bertino, E. Access control model
Integrating blockchain for data sharing and extensions to support data privacy protection
collaboration in mobile healthcare applications. based on GDPR.
In Proceedings of the 2017 IEEE 28th Annual In Proceedings of the 2019 IEEE International
International Symposium on Personal, Indoor, Conference on Big Data (Big Data), Los Angeles, CA,
and Mobile Radio Communications (PIMRC), USA, 9–12
Montreal, QC, Canada, 8–13 October 2017; pp.
1– December 2019; pp. 4017–4024.
5. 38. Krafft, M.F. A Delphi Study of the Influences on
28. Xia, Q.; Sifah, E.B.; Asamoah, K.O.; Gao, J.; Du, Innovation Adoption and Process Evolution in a
X.; Guizani, M. MeDShare: Trust-less medical Large Open Source
data sharing among cloud service providers via Project: The Case of Debian; University of Limerick,
blockchain. IEEE Access 2017, 5, 14757–14767. Department of Computer Science & Information Systems:
[CrossRef] Limerick, Ireland, 2010. Available online:
29. Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. http://193.1.102.107/handle/10344/427 (accessed on 17
Medrec: Using blockchain for medical data November 2020).
access and permission management. In 39. English, E.; Kim, A.D.; Nonaka, M. Advancing
Proceedings of the 2016 2nd International Blockchain Cybersecurity: Technical and Policy
Conference on Open and Big Data (OBD), Considerations for the Financial Services Industry.
Vienna, Austria, 22–24 August 2016; pp. 25–30. 2018. Available online:
https://www.microsoft.com/en-us/cybersecurity/
content-hub/advancing-blockchain-cybersecurity
(accessed on 17 November 2020).
40. Hyperledger Fabric. Client Identity Chaincode
Library, 2017. Available online:
https://github.com/hyperledger/
fabric/blob/release-
1.1/core/chaincode/lib/cid/README.md
(accessed on 17 November 2020).
41. Chokhani, S.; Ford, W.; Sabett, R.; Merrill, C.;
Wu, S. RFC 2527: Internet X.509 Public Key
Infrastructure Certificate Policy and
Certification Practices Framework; Internet
Engineering Task Force (IETF), RFC: Fremont,
CA, USA, 1999.
Available online:
https://tools.ietf.org/html/rfc2527 (accessed on 17
November 2020).
42. Halfond, W.G.; Viegas, J.; Orso, A. A
classification of SQL-injection attacks and
countermeasures. In Proceedings of the IEEE
International Symposium on Secure Software
Engineering, Washington, DC, USA, March
2006; Volume 1, pp. 13–15.

You might also like