You are on page 1of 36

Journal of Network and Computer Applications 215 (2023) 103633

Contents lists available at ScienceDirect

Journal of Network and Computer Applications


journal homepage: www.elsevier.com/locate/jnca

Blockchain for healthcare systems: Architecture, security challenges, trends


and future directions
Andrew J a, Deva Priya Isravel b, K. Martin Sagayam c, Bharat Bhushan d, Yuichi Sei e, *,
Jennifer Eunice c
a
Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka 576104, India
b
Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamil Nadu 641114, India
c
Department of Electronics and Communication Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamil Nadu 641114, India
d
Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Uttar Pradesh, Greater Noida, 201310, India
e
Department of Informatics, The University of Electro-Communications, 1828585, Japan

A R T I C L E I N F O A B S T R A C T

Handling Editor: M. Atiquzzaman Blockchain has become popular in recent times through its data integrity and wide scope of applications. It has
laid the foundation for cryptocurrencies such as Ripple, Bitcoin, Ethereum, and so on. Blockchain provides a
Keywords: platform for decentralization and trust in various applications such as finance, commerce, IoT, reputation sys­
Blockchain tems, and healthcare. However, prevailing challenges like scalability, resilience, security and privacy are yet to
Consensus algorithms
be overcome. Due to rigorous regulatory constraints such as HIPAA, blockchain applications in the healthcare
Cryptocurrency
industry usually require more stringent authentication, interoperability, and record sharing requirements. This
Distributed ledger
Healthcare data article presents an extensive study to showcase the significance of blockchain technology from both application
Security & privacy and technical perspectives for healthcare domain. The article discusses the features and use-cases of blockchain
in different applications along with the healthcare domain interoperability. The detailed working operation of
the blockchain and the consensus algorithms are presented in the context of healthcare. An outline of the
blockchain architecture, platforms, and classifications are discussed to choose the right platform for healthcare
applications. The current state-of-the-art research in healthcare blockchain and available blockchain based
healthcare applications are summarized. Furthermore, the challenges and future research opportunities along
with the performance evaluation metrics in realizing the blockchain technology for healthcare are presented to
provide insight for future research. We also layout the various security attacks on the blockchain protocol with
the classifications of threat models and presented a comparative analysis of the detection and protection tech­
niques. Techniques to enhance the security and privacy of the blockchain network is also discussed.

1. Introduction payments (Carson et al., 2018). Blockchain technology guarantees


expedient and reliable services (Prashanth Joshi et al., 2018). This has
In recent, there is an increase in the fascination with blockchain been made possible through the transparent and distributed nature of
technology. Blockchain has become popular through the success of the blockchain. Concretely, blockchain systems are considered as a
cryptocurrency (Narayanan et al., 2016). There is a potential increase in secure platform (Ramachandran and Kantarcioglu, 2017) where the
blockchain-based applications extended in fields such as healthcare (Yue participant’s actions on the blockchain are recorded and the incessant
et al., 2016), (Zhang et al., 2018a), finance (Treleaven et al., 2017), accretion of the chain makes any changes in the block computationally
commerce (Liu et al., 2019a), IoT (Miller, 2018), automobile (Sharma challenging without detection (Zhu et al., 2019).
et al., 2019), social services (Zheng et al., 2018a), risk management Blockchain technology has gained momentum in recent years and is
systems (Fu and Zhu, 2019), government’s transactions (Ølnes et al., also attracted by businesses (Weber et al., 2016), industry (Friedlmaier
2017), financial department (Ojo and Adebayo, 2017), and royalty et al., 2017), and the research community (Shrestha and Vassileva,

* Corresponding author. Department of Informatics, The University of Electro-Communications, 1828585, Japan.


E-mail addresses: andrewj.research@gmail.com (A. J), i.devapriya@gmail.com (D.P. Isravel), martinsagayam.k@gmail.com (K.M. Sagayam), bharat_
bhushan1989@yahoo.com (B. Bhushan), seiuny@uec.ac.jp (Y. Sei), jennifer23.phd@gmail.com (J. Eunice).

https://doi.org/10.1016/j.jnca.2023.103633
Received 20 September 2022; Received in revised form 19 March 2023; Accepted 29 March 2023
Available online 3 April 2023
1084-8045/© 2023 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

2018), (Bhushan et al., 2021). Blockchain mechanism allows people to contributed to improved healthcare support for medical personnel and
transact with each other over the internet in a “peer-to-peer” fashion. other stakeholders in healthcare facilities in terms of verified and
Cryptocurrencies encourage end-users to deliver services in an auto­ authenticated records (Koteska et al., 2017)– (Gökalp et al., 2018),
mated, peer-to-peer, and trustless way. Blockchains are decentralized interoperability (Agbo et al., 2019)– (Prakash, 2016), efficient storage of
peer-to-peer systems that implement a public, trustless, append-only health records (Puthal et al., 2018), (Gökalp et al., 2018), (Kuo et al.,
ledger. Blockchain technology is a trustless system because the sys­ 2019), (McGhin et al., 2019)– (Liang et al., 2018a) and security systems
tem’s activities are completely decentralized, transparent, and are (Kuo et al., 2017), (Linn and Koo, 2016)– (Liang et al., 2018b).
conducted independently and perfectly in a trustless manner. The Several literature reviews of blockchain technology for various do­
trustless system is formed by having all the peers the ledger members. mains are previously published (Shi et al., 2020)– (Sookhak et al.,
Hence it becomes a distributed ledger, that records all the transactions 2021). However, there’s still a lack in the literatures that focus on
performed in the blockchain and maintains the history of the trans­ blockchain based healthcare and various security and privacy issues.
actions. This decentralized ledger provides many sources of legitimacy Although few literatures that covers the some of the aspects, a complete
for each transaction; also, the rules are pre-defined and are not unique to overview of all the aspects involved in of blockchain based healthcare
each wallet user. It uses a distributed network of nodes to check trans­ still scarce. Table 1 shows how this survey is different some of the recent
actions through a mining process. Blockchains do not eliminate trust but literature review papers. Hence, in this article a complete overview of
it distributes them across the many actors of the system and expects blockchain for healthcare sector. At first, we explore the features of
them to participate with well-defined protocols (Treiblmaier and Sil­ blockchain technology. Although there are many features of blockchain,
laber, 2021). A specific protocol is established by a set of rules that we explored some of the key features such as immutability, trans­
automatically promote patrons based on their compliance with the parency, traceability, secure data exchange, decentralization, and time
guidelines. It is a trustless system with a constantly updating database of and cost-effectiveness in the context of healthcare. Then we methodo­
records that are shared and distributed among the participating peers logically present use cases of blockchain technology in various domains
without the need for trust authority. To digitally move money from one such as e-commerce, digital identities, online voting, healthcare, IoT,
account to another, the underlying blockchain infrastructure is used to digital gaming, insurance claim processing, and cross border payment.
facilitate the transfer while also ensuring sender identity and currency Next, we explore the operations of blockchain with its working model
validity. In a centralized system, a single third party is used to establish and types of consensus algorithms in the healthcare context. Then, the
trust. In a decentralized system, trust is created based on public-key healthcare architecture of blockchain technology is explored. The
cryptography and a consensus system. Blockchain technology also en­ layered architecture and classifications of the blockchain are presented
ables asset transactions between untrustworthy parties (Ismail and in detail. Then, we discussed some of the major research challenges and
Materwala, 2019). The legitimacy of transactions in an untrusted envi­
ronment is ensured by spreading the ledger among many nodes in the
network and updating it via consensus. As a result, a trust mechanism is Table 1
crucial for reducing the danger of engaging with fraudulent competitors Feature wise comparison of some recent blockchain survey literature with this
in a blockchain network. survey.
Blockchain has laid the foundation for cryptocurrencies such as Characteristics (Shi (Mukta (De (Sookhak This
Ripple (Armknecht et al., 2015), Bitcoin (Radziwill, 2018), Ethereum Covered et al., et al., Aguiar et al., Survey
(Dannen, 2017), and so on. Bitcoin (Nakamoto, 2008) is top-rated as the 2020) 2022) et al., 2021)
2020)
first cryptocurrency. As the current economy is depending on digital
verification for all business transactions, blockchain offers opportunities Blockchain ✓ ✓ ✓ ✓ ✓
Architecture
for open-based decentralized platforms and services (Lindman et al.,
overview
2017). This novel technology provides transaction and payment plat­ Discussion on ✓ ✓ ✓ ✓ ✓
forms for a wide range of ingenious financial implements like Consensus Protocol
micro-payments (Lundqvist et al., 2017), peer-to-peer lending, and Features of blockchain ✓ ✓ ✓ ✓ ✓
in healthcare
simultaneously simplifies and lowers the cost of transactions. Every
Healthcare blockchain ✕ ✕ ✕ ✓ ✓
transaction is considered as a digital block that requires to be validated applications
by the consensus of many participants in the network before their Use cases of ✕ ✕ ✕ ✓ ✓
approval into the network. Since the traditional databases were not blockchain in
immune to vulnerability, the blockchain has emerged to ensure the se­ healthcare
Highlights the security
curity of data as they are cryptographically verified (Tosh et al., 2017).
✕ ✓ ✓ ✕ ✓
and privacy
Healthcare systems are designed to satisfy our health requirements, challenges of
and as our population ages, so do our productivity demands (Hollander blockchain in
et al., 2007). In addition, like in the instance of COVID 19, we can healthcare
observe the importance of real-time information. In terms of COVID 19, Presents up-to-date ✕ ✕ ✕ ✕ ✓
consensus protocol
the information on a patient’s health is highly valuable (e.g., tempera­ available in
ture or symptoms) (Halim et al., 2021), (Mahmood, 2021). As the healthcare
population ages and more people develop chronic illnesses, there is a Comparative analysis ✕ ✕ ✕ ✕ ✓
greater awareness of health issues and a need for better patient care on various security
and privacy attacks
(Khatri et al., 2021). Internet of Things (IoT) and Internet of Medical
and its defense
Things (IoMT) are the recent technological advancements in the field of mechanism
healthcare services. However, the challenges are such technologies are Security and Privacy ✕ ✕ ✕ ✕ ✓
centralized computation, processing, and storage as there is a possibility enhancing
of data manipulation, mistrust, privacy delusion, and failure at a single techniques for
blockchain
point. The other important challenge in electronic and all-pervasive Discussion on various ✕ ✕ ✕ ✕ ✓
healthcare is protecting the security of all internet-enabled equipment performance
(Islam and Young Shin, 2020). Integrating blockchain with healthcare metrics available for
yields decentralization in computation, storage, and improved security. blockchain in
healthcare
The broad and promising potential of blockchain technology has

2
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

future research directions of blockchain in healthcare. Finally, the These agreements let individuals or businesses to carry out more
various security attacks on the blockchain are paraphrased. We formu­ complicated transactions than merely standard cryptocurrency ex­
lated a threat model to categorize the various types of attacks on the changes. It is suitable for decentralized distribution applications and
blockchain. We compared all the state-of-the-art techniques to identify decentralized autonomous organizations. Blockchain 3.0 has a broader
and combat such attacks using a table. scope for distributed applications like enterprise blockchain. Health­
In summary, the contributions of this article is as follows. care, cybersecurity, supply chain management, and manufacturing are
some of the blockchain 3.0 application. Blockchain 4.0 has evolved to
1) Presented an overview of blockchain in healthcare with its features support industry 4.0 and healthcare 4.0. It seeks to enhance the user
and use cases. experience within the industry. Metaverse and Rchain are some of the
2) Provided insight on the working model of blockchain, operations, types of blockchain 4.0. Blockchain 5.0 is the upcoming or current
architecture, and classification of blockchain. generation blockchain. It is aimed to reduce the traditional drawbacks
3) Presented various types of consensus algorithms in the context of and security issues of the blockchain. Hashgraph, Hedra, and Relictum
healthcare. pro are some of the example applications of Blockchain 5.0. The over­
4) Presented a comparative analysis on present healthcare blockchain view of the evolution of the blockchain over the years is depicted in
applications, and a detailed study on various security attacks on the Fig. 1.
blockchain.
5) Discussed the techniques to enhance the security and privacy of the 2.1. Blockchain in healthcare
blockchain network.
6) Finally, the performance evaluation metrics of blockchain are pre­ Blockchain technology has a lot of potential in the healthcare in­
sented with the current challenges and road map for future research. dustry due to the failure of conventional health information exchange
(HIE) and personal health record (PHR) based exchanges to deliver on
The rest of the article is organized as follows: Section 2, introduces their promise of a shared coalescent Electronic Health Records (EHR),
blockchain and its features in line with healthcare technology. Section 3, competing interests and a variety of other factors continue to expose the
explores the healthcare use cases of blockchain technology along with trust failure inherent in conventional health information exchange in­
other domains. Then section 4, describes the operations of blockchain termediations (McFarlane et al., 2016)– (Andrew et al., 2019b). Hence,
technology and present the layers of the blockchain architecture. Section healthcare has become a prime candidate for blockchain technology and
5 discusses the detailed review of the classification of blockchain. In has been a focal point recently. The overview of blockchain technology
Section 6, we presented the various consensus algorithms for healthcare for healthcare is shown in Fig. 2. The components of healthcare block­
blockchain. Section 7 presents the threat model and various security chain are the healthcare professionals and patients who generate the
attacks on blockchain technology. In section 8, we discussed the per­ data, medical cloud, and blockchain network which contain distributed
formance metrics of blockchain, and identified the challenges and ledger and smart contracts. Fig. 3 shows the global google trends on the
research opportunities. Finally, section 9 concludes the article. topic “Blockchain - Healthcare” there is clear evidence of the increase in
the interest among the research community.
2. Overview of blockchain The Healthcare industry has unique requirements such as security,
interoperability, non-repudiation, access control, authentication, medi­
Blockchain is a peer-to-peer distributed ledger technology and ar­ cal data sharing, and mobility. Fig. 4 shows the pictorial representation
chitecture platform that was originally introduced for the financial in­ of healthcare industry requirements. In the era of Industry 4.0, health­
dustry by Satoshi Nakamoto (Wright, 2019) in 2008 but it has now care data is being collected in the form of files, wearable sensors, and
progressed to the point of being considered a basic technology for a other applications. The digitized health records are in the form of
variety of decentralized applications (Iansiti and Lakhani, 2017). Electronic Health Records (EHR), Electronic Medical Records (EMR),
Blockchain is a fusion of cryptography and peer-to-peer communication and Personal Health Records (PHR). It is essential to provide access
technologies. It consists of several blocks that are linked using crypto­ control to such data with appropriate authentication. Also, to avoid
graphic hash functions. The blockchain is a basic yet clever method of tampering attacks, the query to retrieve healthcare data must be audited
sending and receiving data in an automated and secure manner. A block with appropriate access control (Suzuki and Murai, 2017). Further, to
is created by one of the participants in a transaction to start the process. protect the health records, encryption is not an efficient way. If different
Thousands of computers spread throughout the internet are confirming encryption mechanisms are equipped to encrypt different types of health
this block. The confirmed block is added to a chain, which is then stored records it raises interoperability issues (Xu, 2016)– (Vithanwattana
throughout the internet, establishing not only a unique record but also a et al., 2016). Improper security to the healthcare data also leads to
distinct record with a unique history. Hence, in blockchain, the trans­ various privacy issues (Andrew et al., 2019a), (Andrew Onesimu and
actions are considered valid when the consensus of blocks agrees Karthikeyan, 2021), (Onesimu et al., 2021). Interoperability is another
through contracts. The decentralized nature of blockchain technology major requirement in healthcare data. Data sharing and transmission
makes the trust decentralized therefore trust among the users of the across multiple sources is known as interoperability (Azaria et al.,
system is essential for sharing keys. 2016). The principle of interoperability is using centralized data storage.
Over the years blockchain has evolved tremendously. We list out 5 Storing all data in centralized storage is challenging in healthcare data
different version of blockchain as blockchain 1.0 to 5.0. The blockchain as it can lead to slow access, security, and privacy issues. Healthcare
1.0 version released by Nakamoto is the most basic type of decentralized data generally scales over time so transmitting all the data through
ledger for keeping track of transactions and storing data across untrusted channels to centralized storage is not feasible. Also, secure and
numerous machines is this one. In plain English, the information con­ timely access to the data is challenging due to its centralized nature.
tained in the initial blockchains was restricted to the values of a “thing” Medical data sharing is essential for various medical researches so it is
that underwent ownership changes over time. The “thing” we are important to ensure consistency, accessibility, and scalability during
referring to was typically a form of digital currency such as bitcoin, data sharing (Tseng et al., 2016), (Roehrs et al., 2017). In the healthcare
ripple and so on. Blockchain 2.0 is also known as the rise of Ethereum sector, mobility is becoming more of a need as patients become more
which is the enhanced version of cryptocurrency proposed by Vitalik mobile and expect that their data be portable as well. The capacity to
Buterin (2014). The first blockchain with a smart contract system built transfer data is becoming increasingly crucial as smart gadgets, sensors,
in was Ethereum. Smart contracts are a collection of scripts that are and other internet-connected devices grow more common. Mobile
automatically executed when specific criteria are met, to put it simply. health, healthcare IoT, and wireless are some of the categories of

3
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Fig. 1. Evolution of Blockchain over the years.

Fig. 2. Overview of blockchain technology for healthcare.

mobility. Mobile health involves sensors, smartphones, and wireless healthcare sector. Healthcare IoT provides vital advantages to the pa­
body area networks (WBAN). The challenges in mobile health are secure tients and the doctors. The patients can be remotely monitored and
data sharing, trust, access control, and user consent management. The accessed on various health conditions. However, data collection and
wearable body sensors of WBAN also face the challenges such as sharing are associated with various security and privacy challenges
network availability, flexibility, accountability, data integrity, and so (Onesimu et al., 2021), (Andrew and Karthikeyan, 2019).
on. Healthcare IoT is another area that provides mobility in the

4
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

considerably more problematic. With the use of Internet of Things-


enabled devices, medical data can be produced instantly. Recent de­
velopments in the usage of blockchain technology, also known as
distributed ledger technology provide solutions to challenges associated
with data access and data interchange. Personalized digitalized health
records have the potential to enable patients to control their care by
providing them with granular, individualized, and secure access to their
medical data (Sun et al., 2020). Personalized health records enable the
development of a new platform that combines smart contracts, digital
interventions, and gathering and access to medical data. The system
aims for patients to use their data to support their medical care and to
offer robust consent mechanisms for data sharing between various in­
stitutions and apps. The adoption of blockchain-based solutions for the
personalized healthcare record is essential to implement a combination
of event-driven smart contracts, health record data, and patient moni­
Fig. 3. Google trends data visualization on the topic Blockchain - Healthcare. toring and control system.

2.2. Blockchain user requirements 2.2.2. Security


At every stage of hospital operation, the Healthcare system is in
The lack of cooperation across medical institutions exists due to charge of managing enormous amounts of data generation, information
privacy concerns, technical difficulties, and a lack of a system for sharing, storage, and analysis. It delivers strong, multi-layered security
reaching an agreement on how data should be utilized or shared. Health to all data transfers to the cloud and adopts other cutting-edge digital
data is not always accessible to patients and other medical institutions in technologies for safeguarding the system against information loss or
real time. The common and most prominent user requirements of misuse. The platform often adheres to the strictest data security and
blockchain-based healthcare systems that can solve potential problems privacy regulations imposed by a nation. The hospital system is shielded
are shown in Fig. 5 and are explained. against hacks because it is hosted on cloud-based servers that are situ­
ated outside of the facilities. Overall, blockchain-based healthcare sys­
2.2.1. Personalized healthcare records tem encourages openness, safeguards privacy, guard against data theft
Confidential information on surgical procedures, treatments, and and provide a safe and secure environment for hospitals to continue
recovery is contained in medical records. These documents are still operating. Creating a blockchain network between two healthcare or­
manually archived on paper in conventional healthcare systems. Elec­ ganizations allows organizations to communicate data over a distributed
tronic health records are fragmented and dispersed across several or­ database with Hyperledger without requiring each user to have trust in
ganizations and geographical areas, even though healthcare supply every other user. Additionally, it enables the quick, secure, and trans­
chains are becoming more digital, and there is no complete system to parent interchange of medical transactions.
update and share these records in real time. Due to concerns about pa­
tient data confidentiality and privacy, this situation may become

Fig. 4. Healthcare industry requirements.

5
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

privilege if they wish to obtain one. For the patient, this means that he
must first provide permission for any access to his medical records. The
patient can also independently grant temporary access and grant or
remove any access privileges for or from other users of the system.

2.3. Features of blockchain in healthcare

Various features make blockchain technology the most appealing


and considered to be more advantageous than the conventional method
of the transaction (Watanabe et al., 2015). This section discussed some
of the blooming features of blockchain technology. Fig. 6 shows the
pictorial representation of blockchain features.

2.3.1. Transparency
It is one of the most interesting properties of blockchain technology.
All transactions executed can be viewed by all the participants (Un­
derwood, 2016). Because of this, data integrity is assured. They cannot
be compromised as they are digitally verified after the consensus from
all the participants. Any sort of modification or change has to be
approved by every participant and therefore deletion or tampering with
data is not possible without everyone’s consensus. However, there are
issues related to implementing transparency. The high cost and energy
consumption of blockchain might stymie its deployment. Furthermore,
if it is not feasible to verify that transactions verification and smart
Fig. 5. User requirements of healthcare blockchain. contracts are valid, the ledger’s integrity may be jeopardized. The
change policy must also be made visible to blockchain users (Fontana
2.2.3. Performance et al., 2018). Many difficulties are only solved when the infrastructure
Many processes are streamlined and integrated by blockchain-based that leverages this ledger is built. However, there is no legal requirement
healthcare systems greatly boosts the system’s speed, agility, and effi­ to describe this infrastructure, resulting in a shortage of documentation
ciency. It improves a healthcare facility’s performance and patient- regarding the software or firmware code. As a result, all of these con­
treatment capacities because of its intra-operability and flexibility. cerns must be taken into account throughout the infrastructure devel­
The platform features are specifically created for a variety of tasks, opment so that blockchain may be used in democratic settings and
including management of OPDs, IPDs and diagnostics, emergency care successfully support transparency.
response, invoicing and payments, and operations. The system can grant In the modern healthcare system, patients’ data is already kept
role-based control to users, enabling them to access a single function or a electronically at hospitals as EHR. However, inter-organizational trust
number of them, and assisting in the monitoring and tracking of all and openness have always been a problem. The blockchain can alleviate
activities required for the provision of healthcare. this problem by offering an immutable ledger with restricted data ac­
cess. Data can’t be erased after its been captured, so it is available always
2.2.4. Reliability to check later on-demand. Transparency is the extent to which all
The blockchain-based healthcare system is extremely resilient to any
technological disruptions, downtime, or breakdowns experienced by
other technological systems. From the perspective of data security, it is
quite secure and has an intuitive and sophisticated user interface that
makes them simple to use. Its upkeep tasks can be divided into pre-
scheduled intervals based on when they are least demanding, and
upgrading doesn’t require much time. The medical records are remotely
updated and enhanced without impairing the daily routine activities.
The availability of the system and resources at all times is crucial for the
success of the system.

2.2.5. Interoperability
Patient consent, governance, security, privacy, and patient partici­
pation are just a few of the issues that the move towards patient-centered
interoperability raises. By providing a framework for the safe exchange
of data, blockchain technology provides an alluring approach to over­
coming these difficulties. In summary, blockchain offers a high-level
framework for how a patient may communicate securely with several
stakeholders, identify themselves across each institution, and aggregate
their health data in a durable manner.

2.2.6. Access control


A doctor should request consent from the patient before accessing
the patient’s medical records. The system will deny access if the doctor’s
actions are not taken otherwise. Similar to this, a doctor should
personally inquire with a patient about granting a regular access
Fig. 6. Features of blockchain.

6
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

stakeholders in a supply chain have a shared understanding of and ac­ access to digital signatures and prevents fraud and theft of data (Peter­
cess to product-related information. In (Sunny et al., 2020), a blockchain son et al., 2017). A successful data exchange necessitates data sharing
traceability solution was proposed that impacts the visibility of various that is trustworthy, compliant, secure, auditable, and useful. Blockchain
supply chain distribution network designs, as well as how technologies technology has a number of interesting methods for facilitating easy,
like the Internet of Things (IoT) and smart contracts help to expand traceable, and trustworthy data transmission across data ecosystem
blockchain’s possibilities (Zhang et al., 2018a). players. Blockchain can keep data immutable, auditable, and
single-version-of-truth, ensuring transparency, privacy, interoperability,
2.3.2. Traceability and security.
Traceability is another property that allows for the immutable A DASS-CARE, a Blockchain-based architecture for decentralized,
tracking of transactions across the network (Benchoufi et al., 2018). transparent, scalable, and secure access to healthcare services, including
Since all events are transparent to all the peers it is easy to trace who is medical data was proposed by Al-Karaki et al. (2019). This framework
responsible for each event and when it occurred and whom all agreed to can considerably simplify the process of real-time access and changes
the execution of the transaction is known. This feature makes every without jeopardizing patient data security, integrity, or confidentiality.
participant own the responsibility and be genuine with all the trans­ Medical data exchange and protection plan based on the hospital’s
actions. Many firms are now offering blockchain-enabled traceability private blockchain was proposed by Liu et al. (2019b). This system
solutions as a result of the blockchain hype over the recent few years, but meets a variety of security requirements, including decentralization,
they have failed to enhance the overall quality of data gathered and openness, and tamper resistance. Doctors can retain medical data or
exchanged. This has, understandably, led to considerable skepticism retrieve patient historical data via a secure system that respects their
about the utility of blockchain in supply chain scenarios. Each new privacy (CHELLADURAI et al., 2021). A symptom-matching technique is
transaction added to a block will be both immutable and timestamped. also provided between patients. It enables patients who have the same
This makes it simple to trace data and ensures that the information symptoms to undertake mutual authentication and generate a session
contained within the block cannot be tampered with. Any businesses key for future ailment communication.
that register any specific data or transaction on the blockchain must be
trustworthy to secure traceability and authenticity. 2.3.5. Decentralization
Raw material suppliers, manufacturers, distributors, pharmacies, The decentralized nature of blockchain confirms that there is no
hospitals, and patients are all part of the healthcare supply chain, which central authority (Patel, 2019). This makes the system more secure and
is a complicated network of numerous separate organizations. Due to pleasant with synchronized transactions. Blockchain utilizes consensus
several variables, including a lack of information, centralized manage­ mechanisms across the network of peers to securely transact with other
ment, and conflicting stakeholder behavior, tracking supply across this users rather than relying on a single authority, also to vindicate trans­
network is difficult. Drug traceability (tracking and tracing) is becoming actions and record data in an incorruptible fashion. Therefore, ledger
increasingly important, with some nations mandating it (Musamih et al., information that is stored is honest and accurate. It provides unalterable
2021a). Therefore, traceability of drugs has become an important transaction records and high QoS delivery. The computing power of the
element of the pharmaceutical supply chain, as it ensures product system is distributed which makes the network simple to manage and
authenticity and attempts to track and trace the product’s chain of operate. These QoS-aware transactions are made effective with block­
custody along the supply chain. chain mechanisms. The QoS parameters include data integrity with
end-end traceability, availability, responsibility, high level of reliability,
2.3.3. Immutability and increased customers. Choosing the data that will be stored in
Immutability is another important feature of blockchain (Gordon distributed ledgers is very crucial for delivering reliable quality. Some
and Catalini, 2018). It is defined as the capacity of a blockchain ledger to data can be stored in local databases instead of sending all system data
remain unmodified, and the blockchain remains unaltered and persis­ onto the blockchain network. Only data from applications that require
tent. It’s also crucial to understand that blockchains are decentralized immutability will be packed inside blocks otherwise. This reduces the
and distributed in nature, with a consensus reached among the nodes costs of storage, replication, and search for the decentralized applica­
that hold the data copy. This agreement assures that the data’s tions that have been built (Dao et al., 2020). The computing power of the
uniqueness is preserved. Centralized databases are vulnerable to secu­ system is distributed which makes the network simple to manage and
rity breaches and hacking, and thus require third-party assurance to operate.
remain safe. Blockchain maintains ledgers to record all transactions In healthcare applications, due to a lack of defined data formats,
(Fanning and Centers, 2016). Ledgers are distributed among the block­ dependable communication medium, interoperability difficulties, and
chain participants. Once a transaction is packed into the blockchain it is secure platforms to ensure users’ security and privacy (Andrew Onesimu
impossible to tamper, all the transactions that are recorded in the blocks and Karthikeyan, 2021), data exchange across multiple stakeholders is
using hash keys. The hash keys are linked to the previous and next now exceedingly difficult. Shuaib et al. (2021a), presented a decen­
blocks. Every block validates the transactions using the same algorithm. tralized electronic health record system, which, when compared to
Thus, any changes in the transaction generate a different hash key and it existing systems, enables greater security and efficient exchange of
can be identified by other blocks of the network. Blockchain keeps its electronic health record data. A permissioned Blockchain based on an
ledgers in a never-ending state. The ledgers are shared with all the nodes IBFT consensus algorithm, a threshold signature method, and a decen­
and it synchronizes with each other in real-time. Tampering of the tralized file system is all part of the proposed system.
ledgers would require 51% of control over the network which is prac­
tically difficult among millions of users (Tschorsch and Scheuermann, 2.3.6. Time and cost-effective
2016). The conventional method of transactions can take days for the
remission of demand drafts and cheques, specifically beyond working
2.3.4. Secure data exchange hours. But with blockchain technology, all transactions are performed in
To ensure the security of data exchange, blockchain does not require a short period (Lombardi et al., 2018). This is an essential feature for
a third party or an authority on its governance. To guarantee consistency healthcare as slow access to healthcare data can lead to serious loss.
and reliability, blockchain adopts the decentralized consensus-based Healthcare participants can engage in online transactions at their ease
access mechanism (Pop et al., 2018). Blockchain cryptocurrencies from any location. Also, the blockchain diminishes exchange charges
secure and prevent counterfeiting transactions through public-key and overhead expenses which are not present in this system. Trans­
cryptography. The identity network security system allows authorized actions on the blockchain are reasonable, as the only nominal costs are

7
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

incurred by the parties involved. However, blockchains can become transaction is validated with the unique ID to create a block. Each block
costly and inconvenient because of their complexity and encrypted are interlinked with its fingerprints. Consensus will help to verify and
distributed nature. When compared to “traditional” payment methods interlink chains of blocks (Cachin and Vukolić, 2017). Thus the content
like cash or debit cards, transactions might take a long time to complete. in the block is verified in the network and can store any type of real-time
The transactions take longer to complete as the number of users on the data like financial transactions, contract information, or digital asset,
network grows. The entire transaction might take many days to etc. For example transaction of equities in the stock market is depicted in
complete. Fig. 7. At the outset, the list of abbreviations used throughout this article
Blockchain technology is particularly well-suited to information- is listed in Table 2 to help in reading.
intensive databases and medical applications, resulting in lower An equities market includes asset custodian (bank), broker, invest­
healthcare costs, particularly in terms of platform maintenance and se­ ment manager, central securities depositories (CSD), and central coun­
curity, accessibility, and data redundancy. Reference (Radjenovic, terparties (CCP). The steps involved in the transaction are as follows.
2019) presented a cost-saving role of blockchain in the healthcare sys­
tem. The various attributes reduce the cost and maintenance of the 1. To buy and sell blocks of securities, the asset custodian uses a client
pharmaceutical industry. application to initiate a transaction or a block. Transactions can be
initiated by any peer in the network.
3. Operations of blockchain 2. The broker receives the transactions in order to verify the orders.
3. The broker transmits the proposed order to an investment manager,
Healthcare could be transformed by blockchain technology, which who will disseminate the transactions to all peers for consensus.
would put the patient at the center of the ecosystem and improve the 4. If the sequence of transactions is accepted, each validating node
security, privacy, and interoperability of health data. By increasing the carries out the transactions and adds them to the ledger. Next, a copy
efficacy, disintermediation, and security of electronic medical data, this of the ledger is sent to each network peer.
technology may offer a fresh approach to health information exchanges 5. The central counterparty will control the cash flow for the order
(HIE). Although it is not a miracle cure, this brand-new subject is transaction and do the confirmation.
developing quickly and offers plenty of opportunity for research, fund­ 6. The asset ledger is maintained by the central securities depository,
ing, and proof-of-concept testing. The actual value of interoperability who also collaborates with custodians. It manages the movement of
might be unlocked via a blockchain-based health information exchange. funds, assets, and security services.
Blockchain-based systems have the ability to lessen or do away with the
costs and friction associated with present middlemen. For those involved
in the health care ecosystem, the blockchain’s promise has broad ram­ 3.2. Architecture of blockchain
ifications. Utilizing this technology provides the ability to integrate
disjointed systems, produce insights, and improve care value assess­ To understand the working of blockchain technology, a layered
ment. A statewide blockchain network for electronic medical informa­ approach is followed. The architectural layers are more generalized to
tion could eventually increase productivity and boost patient health suit the diversity of any application. To attract more customers, the
outcomes. This section discuss the basic working model of a blockchain. business that requires high scalability and reliability can utilize the
blockchain to improve its services.
3.1. Working model of blockchain
3.2.1. Layered blockchain architecture
Blockchain has the power to enhance the services offered in trade This section details the layered architecture of blockchain. The layers
finance. Blockchain combines distributed, decentralized, cryptographic in the architecture are the application layer, execution engine layer, data
peer-to-peer networking model. It provides a platform for secure digital model layer, consensus layer, and network layer. Fig. 8 shows the hi­
cryptocurrencies. Blockchain offers tremendous opportunities to the erarchy of layers in the blockchain. Table 3 lists the various blockchain
trade industry, society, and economy. Blockchain technology is used in development platforms available based on these layers (Glaser, 2017)–
multiple areas and is challenged to meet real-time application re­ (Brakeville and Perepa, 2018).
quirements such as security, high performance, scalability, and efficient
consensus models. Blockchain offers an alternative method for elimi­ 3.2.1.1. Application layer. It is the topmost layer in the blockchain ar­
nating the intermediary involved in the transaction process. The chitecture. It provides a graphical user interface for users to interact
blockchain provides traceability and security of the user’s crypto­ with the system. The various tools are Ethereum, solidity, parity, etc.
currencies. The blockchain is designed to exchange goods and services The data in blockchain are immutable and transparent and cannot be
without the need for trust or central authority. It has the potential to modified. It is resilient to illegitimate access and fraudulent activities.
eliminate this vulnerability with transparent transactions. The application layer is divided into two sub-layers they are application
The blockchain is composed of blocks each consisting of digital in­ layer and the execution layer. The end-users use the application layer to
formation. Each block is tied combined to form a chain. Each block interact with the blockchain network. The application layer consists of
contains three parts. The block stores data about the transactions, par­ APIs, user interfaces, frameworks, etc. The smart contracts, underlying
ticipants involved in the transactions, and the cryptographic codes that rules, and chain code are in the execution layer. The actual code is
distinguish blocks from each other. The working of blockchain can be executed and the rules are present in this sublayer. The application layer
summarized in four steps. They are. sends the instructions to the execution layer. The security challenges of
this layer represent the security issues related to the centralized nodes
1. The transaction is executed that are involved in cryptocurrency transactions. Some of the challenges
2. The transaction is verified and then validated include DDOS attacks, unauthorized access to the server, obtaining
3. The transaction is stored in the block sensitive information by cracking the password, host security, etc.
4. The block is hashed and added to the blockchain Therefore, the application developers must guarantee that their software
is fully tested and does not include any known vulnerabilities (Wang
Blockchain operates in an environment where all the business parties et al., 2019).
network with a secure and synchronous record of transactions. The
blockchain ledger records every flow of transactions from start to end. 3.2.1.2. Execution engine. The contract will be executed at runtime.
Here, the user’s data are secure with the owner’s private key and each Execution time should be deterministic and fast during the execution of

8
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Fig. 7. Processes inequities in stock market.

multiple contracts in the single transaction block. To avoid inconsis­


Table 2
tency in transaction deterministic execution is followed. Caterpillar
Abbreviations.
engine (López-Pintado et al., 2017) is one of the blockchain execution
Abbreviation Full Name engines that provide operations such as process model deployment,
CCP Central counterparties instance creation for the deployed model, and control and record
CSD Central securities depositories execution. A smart contract running in the blockchain network facili­
EVM Ethereum Virtual Machine
tates contract negotiation, verification, implementation. Execution of
FBA Federated Byzantine agreement
IoT Internet of Things
smart cards neglects the third party costs and provides more security and
P2P Peer to Peer reliability (Chen et al., 2018). The challenges of this layer involve the
PBFT Practical Byzantine Fault Tolerance threats and risks to smart contracts. The goal of the attack is to take over
PoET Proof of Elapsed Time the contract control flow and disrupt the transaction’s atomicity. The
PoS Proof of Stake
majority of these attacks are the result of a failure to make explicit
DPoS Delegated Proof of Stake
LPoS Leased Proof of Stake function visibility or to perform appropriate permission checks, allow­
PoI Proof of Importance ing an attacker to access or alter a function or variable that should not be
PoC Proof of Capacity accessible. Therefore to prevent data manipulation and establish trust,
PoB Proof of Burn
before the construction of smart contracts, it is important to protect
dBFT Delegated Byzantine fault tolerance
PoW Proof of Work
against existing vulnerabilities. It should go through a series of security
PoA Proof of Authority checks before being released. To prevent losses, professionals must
TEE Trusted Execution Environment execute timely code optimizations, conduct frequent code audits, and
UTXO Unspent transaction outputs monitor anomalous behavior of deployed contracts.
PoLe Proof of Learning
PoDL Proof-of-Deep-Learning
S-PoDL Separate Proof-of-Deep-Learning 3.2.1.3. Data model. The data model ensures simplicity for crypto­
HDPoA Honesty-based distributed Proof of Authority currencies. The data model varies from one application to another. The
SG-PBFT Score Grouping-PBFT data include transaction data, master data, and reference data. It rep­
DR-BFT Dynamic Random Byzantine Fault Tolerance
resents the blockchain shared database, blockchain data structure, and
physical storage. The transactions in a blockchain are arranged in blocks
in a P2P network. Without a common consensus, data cannot be altered.
The blockchain data structures have two main components they are
pointer and linked list. The location of another variable is referred to by
the pointers. The chained blocks are linked lists where each block points
to the previous block. A Merkel tree consists of many hashes. The Merkel
root is situated in each block which contains the information of the
previous block, timestone, nonce, and the version number, etc. The se­
curity of the blockchain depends on the hash power of the participating
members. The blockchain generally pays members in the form of virtual
cash to promote node involvement. However, a centralization problem
arises if the members fail to work with this.

3.2.1.4. Consensus layer. The consensus layer is one of the most


important layers in the blockchain. The consensus algorithm is called a
conclusion algorithm. Without a consensus algorithm, there is no
blockchain. The validation of blocks is done by a consensus algorithm.
This layer is called to be the crucial layer among all the layers in the
Fig. 8. Layers of blockchain. blockchain. The consensus layer’s responsibility is to make all users

9
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Table 3
Comparison of Blockchain platforms.
Layers Ethereum Ripple Hyper Ledger Parity Sawtooth Lake

Application Cryptocurrency Cryptocurrency Smart Contract Smart Contract Smart Contract


Execution Engine EVM – Dockers EVM TEE
Data model Account-based UTXO based Account-based Account-based Account-based
Consensus PoW Ripple consensus ledger PBFT PoA PoET
Network P2P P2P P2P P2P P2P

agree upon a common transaction rule. Globally accepted sets of medical data, a concept that is becoming more prevalent with the advent
transactions are designated for information verification. The consensus of customized treatment and wearables. Both of these situations have
algorithm in blockchain has two types one is permissionless and the important moral implications that must be addressed.
other is permissioned. A permissionless blockchain is also known as a Healthcare domain has seen a tremendous growth since the
probabilistic model that includes networks such as Ethereum, Bitcoin, advancement of technologies like industry 4.0. The paper based system
etc. The other type is Permissioned which follows a deterministic algo­ has moved to electronic healthcare records and electronic medical re­
rithm such as Hyperledger Fabric. These blockchains have some nodes cords for better patient data management and healthcare research. In
which validate the ordering nodes and decide whether they are truly the current era, telemedicine and internet of medical things (IoMT) are
false. The consensus layer receives threats from various types of attacks some of the recent advancement which is transforming the healthcare
such as bribe attacks, long-range attacks and Sybil attacks. Therefore, domain. Blockchain can play a major role in transforming the healthcare
it’s important to look into a more secure and quicker consensus mech­ domain. The evolution of healthcare systems over recent years is shown
anism while also making existing assaults more difficult. in Fig. 9 and the major healthcare challenges are shown in Fig. 10. Each
level of the healthcare supply chain may well benefit from blockchain
3.2.1.5. Network layer. The other name for the network layer is Peer to technology. Raw material supply, logistics, manufacturing, wholesale
Peer (P2P) layer. The computer nodes are distributed and shared to distribution, and service providers are among them, as are electronic
reach the end of the goal in a P2P computer network. The transaction is health records (EHR), verifying patient data, and even analyzing patient
performed on the blockchain through the nodes. The nodes are of two information. Blockchain has many applications in healthcare and is used
types they are Full node and Half node. A full node is used to ensure the in a variety of applications such as enhancing mobile health applica­
verification, validation, transaction of the mining rules. The P2P layer tions, monitoring devices, sharing and storing electronic medical re­
maintains the valid current state of the blockchain network by cords, clinical trial data, and insurance information storage, among
communicating, propagating, and discovering through each node. Its other things (Omar et al., 2021). Fig. 11 shows the various application of
responsibility is to propagate or broadcast transactions among peers. the blockchain in the healthcare system.
One of the key issues is to fully utilize the underlying network band­ Healthcare practitioners and researchers tussle with broken data,
width for transmission. hold-up communications, and unequal workflow tools. Another issue is
the absence of secure connections that can associate all autonomous
4. Use cases of healthcare blockchain healthcare frameworks to set up an end-to-end reachable system (Xiang
and Zhao, 2022). The healthcare sector is struggling to manage and
Blockchain is on the verge of changing the healthcare system; due to maintain an e-health record (Zhang et al., 2018a). The applications of
its decentralized principles, blockchain can increase patient information blockchain technology will provide trustless transactions via decen­
accessibility and security, overturning the healthcare hierarchy and tralization with virtual anonymity. It provides an immutable feature, to
establishing a new system in which people govern their treatment (Singh prevent the manipulation of data from a single entity and for duplication
et al., 2021). In a traditional healthcare system, sensitive medical re­ of entries. Blockchain can be enforced to ensure the secure transaction of
cords lack a safe framework, resulting in serious data breaches. Another confidential information such as patient records, compiling episodes,
concern is that patients do not yet have complete control over their disease records, lab results, treatment taken, ambulance services, etc.

Fig. 9. Evolution of healthcare systems.

10
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

stored electronically, patients’ appointments are managed, billing and


accounts are handled, and lab tests are performed (Shahnaz et al., 2019).
They’re included in a lot of the EHR systems utilized in the healthcare
industry. The main goal is to deliver medical records that are safe,
tamper-proof, and shareable across several platforms. With numerous
granularities of management by the patient, physicians, regulators,
hospitals, insurers, and others, blockchain maintains each patient’s full
medical history, offering a safe way to record and preserve compre­
hensive health information for each patient.

4.2. Drug traceability

Every year, a huge number of people are harmed or killed as a result


of taking counterfeit medications. Pharmaceutical companies suffer
significant financial and reputational losses as a result of medicine
counterfeiting. Instead of utilizing a standard supply chain management
system, blockchain-based drug traceability enables to improve the effi­
ciency of the supply chain by preventing fraud and counterfeit products.
In (Musamih et al., 2021a) a drug traceability system was designed by
Musamih et al., that enables stakeholder and their interactions with the
smart contract, as well as the medication tracking system. The smart
contract, decentralized storage system, and on-chain resources are ex­
pected to be accessed by stakeholders via software devices with a
front-end layer signified by a dApp that is connected to the smart con­
tract, on-chain services, and decentralized storage system via an API. A
G-coin blockchain was developed by Tseng et al. (2018), to create
Fig. 10. Major challenges of healthcare domain. transparent drug transactions and protect public health data.

are verified by digital signature for each user and recorded in the ledger 4.3. Cryptocurrency payments
in minimum duration of time (Zhang et al., 2022a). However, an in­
tricacy within the healthcare industry adds several challenges to There are several benefits to cryptocurrency payments in healthcare.
employing blockchain technology. With blockchain technology, a ledger keeps track of all transactions. The
To share the information across organizations by using blockchain as stored data contains all of the information about the coin’s owners. This
a distributed ledger among networks, Hyperledger Fabric (Wutthikarn guarantees that the transactions that are taking place are genuine.
and Hui, 2018) is the solution in this electronic health record. Com­ Digital money is not controlled by the bank or the government because it
panies like Ripple, Ethereum, Quorum, Corda, NEO, NEM, and certain is a decentralized currency. The individual who created the digital
other companies have launched many Blockchain platforms. Tele­ money retains ownership of the currency. Blockchain enables patients to
surgery (Vora et al., 2017) which allows a doctor to perform real sur­ make exchanges. The shortfall of mediators like merchants, represen­
geries with the help of robots and wireless communication systems is the tatives, and banks doesn’t need the endorsement of a focal office for
application of telemedicine. It saves time, expenses, and also the executing the exchanges. It makes the entire charging measure simpler.
shortage of doctors can be overcome with this. Medblocks (Enescu et al., The patients that take a crack at clinical exercises are effectively
2018) is one of the blockchain based applications that is trying to recognizable through the framework (Kombe et al., 2018). It checks the
enhance the medical and other fields for decentralization. legitimacy of the subtleties presented by them and the qualification of
the exchanges.
4.1. Patient data management
4.4. Clinical trials and data security
Blockchain has been used widely for patient data management
mainly to improve security and cost-effectiveness. Medical data are In clinical studies, it is critical to collect authentic and correct data.

Fig. 11. Applications of blockchain in healthcare system.

11
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

This is important to correlate, measure, and make analyses. Also, from monitoring patient health conditions and providing data for analysis,
the standpoint of a patient, it adds a layer of safety and security to the the healthcare sector is creating a lot of interest in the use of IoT to help
personally identifiable and sensitive information that a patient would be patients and physicians. Hospitals could become “smart hospitals” with
concerned about if it were breached into locations where identity theft the IoT, easing various procedures for medical professionals. Kumar
may occur. Several studies have explored the importance of blockchain et al. (2023) have proposed an secure data transmission for an IoT
for clinical trials (Jahankhani et al., 2019)– (Omar et al., 2020). From enabled healthcare system which is orchestrated by blockchain. The
the beginning of the procedure, with registration and informed proposed approach ensure secure data transmission and data integrity
permission, to the release of results and drug administration, clinical through zero knowledge proof. The data security issues with inter­
trials are being made more transparently available with blockchain planetary file system addressed through Ethereum smart contracts.
technology. Brooks Iyengar Quantum Byzantine Agreement-centered Blockchain
Networking is another approach proposed for secure healthcare IoT by
4.5. Device tracking Zhao et al. (2023). The main objective of this approach is to maintain
confidentiality and to protect the privacy of the healthcare data that are
Another important way to revolutionize healthcare is by tracking shared over the blockchain. This approach also addresses the healthcare
medical devices from their manufacture through their decommissioning. blockchain issues such as authentication, consensus latency,
All hospitals struggle with managing a pool of medical equipment that is throughput, delay, and security levels. With the aid of various smart
utilized by numerous departments and patients. Time is important in a particles and the usage of multimedia in the healthcare architecture,
medical emergency to locate the appropriate supplies. Therefore, med­ patient data can also be stored, processed, and transmitted online in a
ical device monitoring and tracking are critical to enable rapid device variety of formats, including text, voice, and photos. However, to
retrieval and avoid unnecessary repurchasing and fraud analytics from address the pertaining challenges like data management and data pro­
the supply chain to decommissioning (Jafri and Singh, 2022). A tection Taloba et al. (2023) suggested an multimedia data processing
blockchain-based approach has several advantages over conventional system for healthcare IoT. Further this system aims to solve the problems
location monitoring methods. The most noticeable features of block­ with the healthcare domain such enrollment of the diagnosis, and secure
chain are its immutability and tamper-proof nature. To help with reg­ and faster transactions. Baucas et al. (2023) in his study proposed pri­
ulatory compliance blockchain technology can be used to create an vate blockchain with federated learning to address fog-IoT privacy and
immutable log that reveals the device’s location, where it has been security challenges. The fog-IoT network is focused on addressing the
during its history, as well as its maker reseller and its serial number. This problems with wearable IoT devices such as adaptive issues, privacy,
blockchain-based approach prevents a malicious person from changing integrity and security.
or removing a device’s location history from the database. Blockchain
enables us to gain crucial insight into how the loaned-out medical 4.8. Health insurance: claims processing
equipment is used, confirm that they are in authorized areas, and finally
guarantee that clients utilize them. Some of the benefits include locating With the rise in health issues, health insurance has become a ne­
equipment easily during an emergency, maintaining an inventory pro­ cessity in people’s life. Medical emergencies might be difficult for those
cess log and automating the utilization process. who cannot afford high costs. In the event of a medical emergency,
health insurance helps people pay for healthcare services and offers
4.6. Secure healthcare setups financial security from the fear of debt. Security, privacy, and fraud
concerns might arise with regard to health insurance and its many ad­
Smart Healthcare has advanced to a high level of sophistication in vantages. Due to the significant losses it causes for individuals, busi­
terms of efficiently supplying and dictating medical health care to pa­ nesses, and governments, fraud has been a sensitive topic in the health
tients while maintaining the privacy of their data, as well as the process insurance industry during the past few years. Therefore, the develop­
of presenting real-time accurate and trusted data to medical practi­ ment of technologies to identify fraudulent instances and payments is
tioners (Chakraborty et al., 2019). IoT has also performed admirably in crucial for both national authorities and commercial companies.
the healthcare sector, facilitating simpler diagnosis and monitoring of Claiming insurance is one of the frustrating processes where the in­
patients. surance processors have to check for fraudulent claims, segmented data
sources, and abandoned policies that the customers state and also the
4.7. Healthcare internet of things (IoT) process is very huge. This technology provides risk-free management
and transparency and allows the insurers to take ownership of assets to
The internet of things (IoT) envisions a wholly connected world, be insured (Raikwar et al., 2018). Nowadays the insurance system is
where things can communicate and interact with each other through heavily dependent on transactions. To address productivity and security
data (Reyna et al., 2018). There are numerous smart applications in requirements, many Fintech systems use an immutable ledger for
several industries like smart homes, wearables, smart cities, smart grid, finding double-spending of cryptocurrencies which was created by
automotive, etc. The expansion of IoT generates huge volumes of data. Blockchain technology (Raikwar et al., 2018). Blockchain-based insur­
To ensure the creditability of its data is a major issue to be maintained. ance system provides two insurance service models, one for personal
One way to provide creditability in IoT data is via blockchain technology web identity security of end-users and another one for data security of
by providing a distributed service authorized by every participant which commercial websites, which is proposed for web identity security. For
guarantees that the data remains immutable. authentication, evidence of the claim is automatically uploaded. To
Blockchain technology for the healthcare industry has the potential make the trust between the insurer and policyholder stronger, contracts
to improve IoT data security and transparency while also enabling IoT are applied automatically (Guo et al., 2018).
efficiency, scalability, and standardisation in the future. In order to
protect the devices from hackers and keep track of who has accessed the 4.9. Blockchain technology for Covid-19
data, patients will be able to decide who has access to the data acquired
by blockchain-enabled IoT devices used in healthcare. Supply chain The Covid-19 global pandemic has changed all aspects of humanity.
payments may be automated using blockchain-based systems powered Information technology was hugely used to manage and control the
by smart contracts, depending on the specific conditions monitored by transmission, testing and vaccination. To handle this moment of
IoT sensors. extraordinary medical crisis, the focus shifted to the digital health
Due to sensors that may be integrated with small devices for community to offer potential health solutions to lessen the impact of this

12
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

epidemic (Kapoor et al., 2020). The COVID-19 pandemic presented transparent and integrated data sharing along the entire supply chain
significant difficulties for the world’s medical community. Digital (Sookhak et al., 2021).
healthcare proved to be well-suited to offer creative solutions to combat
the epidemic. Some of the solutions include creating reliable surveil­ 4.12. Healthcare Waste Management
lance systems, telehealth, innovative diagnostic and clinical
decision-making tools, expanding the use of wearables to track physio­ Healthcare waste management has become a challenging task due to
logical indicators, and creating interactive chat services to disseminate the spread of COVID-19. The increase in waste is due to hospital waste
information about COVID-19 to the general public. To lessen the effect and vaccine waste. The general public’s use of face masks is one strategy
of COVID-19 waste on the environment and public health, great effort to combat COVID-19. In the case of health workers, it is crucial to
has been made to improve the Healthcare Waste Management (HCWM) maintain patient and employee safety in addition to using other personal
system. Several blockchain-based solutions were employed to address protective equipment. As a result of the majority of masks are made of
many pressing issues (Shah et al., 2021). The following section details non-renewable petroleum-based materials, hospital trash has increased
the healthcare sectors that benefitted from using blockchain dramatically, adding to environmental contamination. In addition to
technologies. sharps, tainted blood, body, and tissue parts, chemicals, medications,
and radioactive materials, these leftovers might be categorised as
4.10. Vaccination registration and monitoring healthcare waste. Reverse logistics (RL), which includes managing and
disposing of hazardous or non-hazardous waste from packaging and
Lockdown was implemented by governments all around the world to product, has emerged as a significant alternative for the effective man­
slow down the transmission rate. Overseeing the population’s testing agement of Healthcare waste. Healthcare Waste Management indicators
and immunization process was a monumental task for healthcare pro­ have proven to be very significant to assess hospital waste and aid in
viders. To increase effectiveness and save more lives, procedures must environmental management. So an Analytic Hierarchy Process (AHP)
be streamlined. To ensure data provenance, smart contracts were multi-criteria analysis method was used to weigh the different indicators
created to automate the process of logging and documenting events and prioritize the criteria (de Aguiar Hugo and Lima, 2021). The eval­
relevant to the distribution and delivery of COVID-19 vaccines. To aid in uation tool designed was enabled to identify the good indicators of
controlling the severity of the pandemic situation a Digital Vaccine waste.
Passport (DVP) system was proposed to prioritize safe vaccines for the Another type of waste is the overproduction and underutilization of
needed patients and automate testing certificates using blockchain vaccines due to large-scale vaccine production. Transparency, trace­
technologies (Nabil et al., 2022). As blockchain offers distributed system ability, accountability, trust, and security elements are typically absent
with increased privacy, transparency, and authenticity, the DVP system from the systems and technology used today to handle waste data about
incorporated private blockchain Hyper-ledger Fabric to provide seam­ COVID-19 vaccinations. Therefore, a five-phase blockchain-based solu­
less testing and immunization. The system was able to improve cost tion was proposed. The blockchain-based solution includes trash
efficiency. assessment, production and delivery, consumption, production, and
commitment. To assure accountability for all activities made by the
4.11. Vaccine distribution participating parties and minimize any extra waste brought on by
overproduction, overordering, or underconsumption, the entire life
One of the best ways to stop the spread of infectious diseases is cycle of a COVID-19 vaccination is managed by several smart contracts.
through vaccination. Due to the perishability of the products and the Ethereum-based smart contract was written using REMIX IDE and
necessity for stringent transit and storage regulations to ensure people’s implemented on Kovan Testnet (Musamih et al., 2022). The proposed
health and safety, the vaccine supply chain is different from regular solution was able to overcome large-scale data storage and obtain higher
supply chains (Musamih et al., 2021b). Inefficiencies, such as poor de­ throughput by using the PoA consensus algorithm. Better data privacy
livery plans or a lack of interoperability, cause the supply of vaccinations was achieved by using a private permissioned Ethereum blockchain.
to halt or delay. Additionally, in the event of pandemics, the large Regulators were able to leverage smart contracts and alter the block­
number of doses required for the deployment of a mass vaccination chain’s setup to suit their demands by using a private permissioned
campaign compels governments to create an appropriate logistical blockchain without centralized authorities. Incorporating the commit­
network and organize a quick and effective vaccination distribution. ment smart contract ensured that every entity is responsible for any
Physical restrictions include a shortage of medical staff, poor infra­ waste generated and thereby waste was reduced.
structure, and inadequate storage systems. Specialized storage equip­
ment is needed to ensure the preservation of the vaccines. Due to the 4.13. Supply chain management
restricted capacity and availability of ultra-freezers, an effective man­
agement system is needed to avoid vaccine validity time. Communica­ Healthcare providers must manage the Healthcare Supply Chain
tion issues among supply chain participants can make vaccination (HCSC) process effectively both during pandemics like COVID-19 and in
supply and demand unpredictable, resulting in inefficiencies and their everyday operations. As every day, volumes of cargo are trans­
regional imbalances. Security concerns, such as those involving poten­ ported both domestically and abroad, healthcare providers continue to
tial cyberattacks or tampering with health data; maintaining the integ­ struggle with purchasing, ordering, forecasting, and distribution pro­
rity of this data is important. cedures despite considerable advancements in new technologies and
A model was created to simulate the potential improvement of the treatment choices. In manufacturing supply chains, the healthcare in­
supply chain performance using the blockchain, consisting of better dustry likewise faces significant challenges in streamlining and con­
communication among players but also in the automation of the pro­ trolling healthcare operations. Group Purchasing Organizations (GPOs)
curement process through smart contracts, starting from the real and are significant players in the HCSC and provide providers discounts for
current vaccine allocation criteria (Rinaldi et al., 2022). In this way, the volume purchases as well as vendor selection. To increase the effec­
national vaccination programme was implemented on demand. The tiveness of the contracting process in HCSC and to streamline the
simulation model developed enabled the procurement process of the administration of GPO contracts, a blockchain-based solution that
vaccine to be automated through smart contracts. Each region’s in­ makes use of Ethereum smart contracts and a decentralized storage
ventory was monitored via smart contracts and appropriate inventory system was proposed (Omar et al., 2021). Manufacturing, distribution,
policies were defined and applied. The analysis showed improved per­ GPOs, and healthcare providers can all be connected within the same
formance in vaccine distribution by reducing stock levels with decentralized Ethereum network using a blockchain-based GPO contract

13
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

solution. The solution incorporates the key processes involved in drug by increasing the visibility and transparency of such transportation
and device procurement. The proposed architecture allowed access only systems. CryptoCargo, a smart container system that uses blockchain
to registered stakeholders to smart contracts and guaranteed trust and technology to monitor shipping conditions and identify any infractions
transparency. The system improved cost efficiency by avoiding pricing that could jeopardize the shipment’s contents was proposed (Alkhoori
discrepancies with stakeholders. et al., 2021). Smart contracts are used to record these violations on the
The success of a global immunization campaign and the speedy roll- blockchain, which offers secure and immutable storage, enhancing its
out of a vaccine depends on the existence of a functioning, transparent trustworthiness in a context where there are many parties and little
distribution network that can be audited by all key stakeholders. In the room for trust.
vaccine supply chain things such as food, commodities, and pharma­ To enable the awareness of all network peers, smart contracts are
ceutical drugs are can get damaged while in transit. Numerous factors, established to monitor and track the right vaccine distribution condi­
including poor storage practices, exposure to air or sunshine, and tions against the safe handling norms defined by vaccine producers. In
incorrect storage conditions, might contribute to this. Basic shipment order to administer vaccines, a tamper-proof, transparent side effect
tracking has been improved with the help of the Internet of Things (IoT) solution, an Ethereum test network Ropsten, a prototype was developed

Table 4
Comparative analysis on present blockchain healthcare applications.
Companies Adopted Private Public Federated Token Smart Platform Application
Blockchain Technology Usage Contract

MedRec ✕ ✓ ✕ ✕ ✓ Ethereum Healthcare data management


BurstIQ ✓ ✕ ✕ ✕ ✓ Bitcoin & Ethereum Healthcare data management
MediLedger ✓ ✕ ✓ ✕ ✓ Ethereum Pharmaceutical supply chain
MedicalChain ✕ ✕ ✓ ✓ ✓ Hyperledger Fabric, Securely storing EHR
Ethereum
SimplyVital Health ✕ ✕ ✓ ✓ ✓ Health Nexus Securely storing EHR
Factom ✓ ✓ ✕ ✓ ✓ Bitcoin Securely storing EHR
Robomed Network ✕ ✓ ✕ ✓ ✓ Ethereum Medical data aggregation
Guardtime ✕ ✓ ✕ ✓ ✓ Ethereum Supply chain management
Healthureum ✕ ✓ ✕ ✓ ✓ Ethereum Healthcare data management
Iryo ✓ ✓ ✓ ✓ Ethereum Clinical data management
Gem ✓ ✓ ✓ ✕ ✕ All type of cryptocurrencies Patient centric approach to healthcare
Chronicled ✓ ✕ ✕ ✕ ✓ Ethereum Pharmaceutical supply chain
DokChain ✕ ✕ ✓ ✓ ✓ Hyperledger Sawtooth Financial and clinical data
Coral Health ✕ ✓ ✕ ✓ ✓ Ethereum Medical data aggregation
Patientory ✕ ✓ ✕ ✓ ✓ Bitcoin, Ethereum Securely storing EHR, Supply chain
management
EncrypGen ✕ ✓ ✕ ✓ ✓ My-Gene, Chain market Sell and share DNA information and genomic
data securely.
Blockpharma ✓ ✕ ✕ ✓ ✓ Blockpharma developed an app which Drug counterfeiting and traceability. Verify the
will control the origins of purchased authenticity of drug box.
medication.
Nebula Genomics ✓ ✕ ✕ ✕ ✓ Ethereum Enhance genomic data protection through
encryption. Acquire and manage large genomic
data.
Embleema ✓ ✕ ✕ ✕ ✓ Ethereum Provide personalized medicine unifying
clinical, real-world, molecular data, analytics
and regulatory submissions
Avaneer ✓ ✕ ✕ ✕ ✓ Fast Healthcare Interoperability Transparent, Secure and easy navigation
Resources (FHIR) and distributed through healthcare decisions and eliminate the
ledger administrative burdens
ProCredEx ✓ ✕ ✓ ✓ ✓ r3 Corda Securely transfer Credentials Data
Dentacoin ✕ ✓ ✕ ✓ ✓ Ethereum, Subscription-based platform Connect patients and dentists.
that connects patients to dentist via
Dental coins’
Clinicoin ✓ ✕ ✕ ✕ ✓ Ethereum Wellness and fitness community
Akiri ✓ ✕ ✓ ✓ ✓ All type of cryptocurrencies Create a 360-degree network of trust, only
subscribers by providing ultra-secure private
network
Curisium ✕ ✓ ✕ ✕ ✓ Patient state-centered platform effective approach to contract and rebate
management
DOC.AI ✓ ✕ ✕ ✓ ✕ All type of cryptocurrencies Intersection of artificial intelligence,
cryptocurrency, and medical software to
provide secure and confidential data.
SOLVE.CARE ✕ ✓ ✕ ✓ ✕ Bitcoin, Ethereum Reduce administrative costs of Healthcare
FarmaTrust ✕ ✓ ✕ ✓ ✓ Hyperledger Pharmaceutical supply chain and healthcare
services
iSolve ✓ ✕ ✕ ✕ ✓ All type of cryptocurrencies Clinical supply chain and patient records
security
Professional ✓ ✕ ✓ ✕ ✓ Hyperledger Identity and Credentials verification
Credentials
Exchange Inc.
Simply Vital Health ✓ ✕ ✓ ✓ ✓ Hyperledger Sensitive medical records maintenance
Inc.
Guardtime Limited ✓ ✕ ✕ ✓ ✓ Keyless Signature Infrastructure Secure data exchanges and data privacy
Blockchain
Hashed Health LLC ✓ ✕ ✓ ✓ ✓ All type of cryptocurrencies Healthcare supply chain

14
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

(Antal et al., 2021). On the Etherscan, the outcomes of each on-chain a blockchain is primarily meant to safely eliminate centralized author­
action were verified and checked. The outcomes for an ity. In P2P transactions, a block of chains is created to ensure decen­
Ethereum-based implementation demonstrate the viability in terms of tralization. Before being put into the system’s immutable database, each
transaction throughput and cost in terms of gas consumption. The pro­ transaction is connected to the preceding transaction through the
posed system was able to successfully address monitoring campaign, cryptographic hash Merkle tree as a block of the chains. As a result,
including increased efficiency and transparency of COVID-19 vaccine every node in the network is compatible with the blockchain transaction
distribution while ensuring traceability and a strict audit of storage and ledger. Anyone with a computer and an Internet connection will be able
delivery conditions. Transparency and accuracy of registration and to sign up as a node and receive a full blockchain record. The technology
management of the waiting list for immunization were guaranteed. is safe because of the repetition of synchronized public blockchains with
Table 4 presents the comparative analysis of the recent companies that each network node. However, the challenges of this type of blockchain
adopted blockchain technology for healthcare services. The details are huge power usage during the transaction and adding a new node
present in the table are some of the recent top companies that provide (Anoaica and Levard, 2018).
solutions for healthcare systems through blockchain technology.
Table 5 summarizes the recent state-of-the-art literature with a focus 5.2. Permissioned blockchain
on healthcare blockchain. The table identifies the major objective of the
literature and it is observed that patient centric healthcare system and The permissioned blockchain is a system with a well-defined user
efficient healthcare data management are the major objectives. It is and restricts the access to perform diverse actions in the blockchain. The
noticed that the major techniques are Hyperledger fabric, federated transactions are validated and processed only if the participants already
learning and other cryptographic techniques. Federated learning is a are a member of the ledger. The trust has to be proven to validate the
technique that preserves the individual’s privacy through collaborative transaction. A smart contract can be executed and validated only by
learning. The healthcare data that are used for predictive and decision approved entities on the blockchain. This enables trusted information to
making systems’ utilizes federated learning technique. Further, we be shared easily and in a secure context, and with the privacy that
identified the various performance evaluation methodologies that used businesses need to operate effectively. It doesn’t have computing-based
to evaluate the different blockchain systems. mining to reach consensus instead PBT algorithm is used to agree on
It is realized that the healthcare blockchain system should meet the consensus without mining. In Permissioned public blockchain, anyone
following user and system requirements; access control, access revoca­ who meets certain predefined criteria can download the protocol and
tion, privacy preserving, access to patients, interoperability, predictive validate the transaction. It uses a PoS model to prove the user’s
model, and decision making. These requirements could vary based on ownership for assuring the amount of currency. The permissioned pri­
the major focus of the blockchain system. Table 6 compares the user and vate blockchain operates in a closed and restricted manner. Only the
system requirements that are met in the recent healthcare blockchain member of the consortium can validate the transactions through voting
literature presented in Table 5. or multiparty consensus algorithm. The private platform is hyperledger
which is a modular blockchain platform consensus model to create and
5. Classification of blockchain for healthcare systems allow multiple approaches to advance cross-industry blockchain
technologies.
A blockchain is a cryptographic-based P2P network in which a
distributed ledger is resistant to tampering and alteration. In the
blockchain, performing a transaction without relying on a middleman, 5.3. Federated blockchain
furnishes an essential trust layer for business transactions. Since every
peer of the network holds the same authenticated, non-repudiable A federated blockchain is also called a consortium blockchain which
duplicate of the ledger, the blockchain information can be easily veri­ is an integration of public and private blockchains. It’s a semi-
fied by each peer in the network (Vukolić, 2017), (Ellervee et al., 2017). decentralized blockchain, in which various organizations work
Fig. 12 shows the detailed classification of blockchain. The blockchains together to make decisions on how to provide blockchain services to
can be classified into broadly two types: Permissionless blockchain and users. Federated blockchain is different from private blockchain it is
Permissioned blockchain. Table 7 presents a suitability level of block­ accessible only to a closed group whereas private blockchain has
chain types for the challenges in healthcare domain. The following centralized management with a strict cryptographic model to validate
section discusses the types of blockchain. the transactions (Li et al., 2018).

5.1. Permissionless blockchain 5.4. Hybrid blockchain

A permissionless blockchain is a public blockchain that is available to The hybrid Blockchain is unique type blockchain that has all of the
everyone over the network. The permissionless blockchain allows benefits of a public blockchain, including security, transparency,
anyone to join and participate in the network. Each transaction is vali­ immutability, and decentralization, but it also controls access to trans­
dated and processed by the participants through a consensus algorithm. actions, views, and changes in any way. Hybrid blockchains are those
It does not depend on any identity within the ledger. No trust is required that are managed by a single entity but have some supervision from the
between the participating modes. In the blockchain, every party can public blockchain, which is necessary to conduct certain transaction
participate in the transactions and run a node. Every party can create validations. Some examples of hybrid blockchains are open to the pub­
smart contracts and perform transaction verification on the network. lic, while others are private. Hybrid is renowned for being to some
The decentralization of permissionless systems must be distributed to extent decentralized, whereas Federated is known for being fully
ensure seamless network operations when a single entity failed in the decentralized. The advantages of hybrid blockchain are as follows.
network or edits parts of it. Generally, the mining model used by per­
missionless blockchain is PoW mining where the hashing technique 1. Allows one to work in a closed loop
helped to build trust (Gervais et al., 2016). The consensus method used 2. Changes can be made easily as per the requirement
by bitcoin is the PoW model and Ethereum PoS model (Fairley, 2019). In 3. Transaction cost is less when compared with other blockchain
the private permissionless blockchain, anyone can participate in the 4. Immune to attacks by hackers and their by provide advanced security
validation of transactions. The model used here is a federated byzantine 5. Offers privacy of data while still communicating with outsiders.
agreement (FBA) (Mazieres, 2015). In a digital asset exchange situation, 6. Enables verification of transactions by public.

15
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Table 5
Comparison of recent state-of-the-art healthcare blockchain literature’s objectives, main technique, contributions and performance evaluation methodologies.
Reference Major Objective Main Technique Contribution Focus Performance evaluation Methodology

Gohar et al. (2022) A patient centric healthcare Hyperledger fabric • A blockchain based data sharing Data integrity, access control,
framework for healthcare framework for cloud and IoT for better interoperability, and security analysis.
systems interoperability interoperability.
Rehman et al. Secure health monitoring Federated Learning (FL) •Blockchain framework for collaborative Accuracy, Sensitivity, Specificity, Negative
(2022) system model training from IoMT devices predictive value, False positive rate, False
• To enhance the patient’s privacy through discovery rate, and False negative rate.
FL by adding noise.
• To design an intrusion detection system to
further security enhancements
Al-Sumaidaee et al. Healthcare governance data Hyperledger fabric •To enhance information flow and Transaction per second, Latency,
(2023) management fragmentation problem between healthcare Throughput, and Send rate.
organizations
•To deal with mistrust between two parties
through fixed and linear network rate
controllers.
Liu et al. (2022a) Healthcare cyber physical Federated Learning (FL) •To ensure honest data sharing by hospitals FL aggregation performance, Incentive
systems for FL data training evaluation
•To create new blocks, a FL training-based
consensus procedure is used.
•Reward points to hospital that honestly
share their data
Azbeg et al. (2022) Secure healthcare IoT system Ethereum blockchain and • Secure and private data collection and Security and privacy analysis, Scalability
for patient monitoring and data InterPlanetary File sharing and processing time
storage System (IPFS). • Reliable data storage through IPFS.
• Mobile DApp to track and monitor patient
health
Zhang et al. Hierarchical data sharing for Ciphertext-policy • Improved trustworthiness of shared Computational costs (key generation,
(2022b) healthcare IoT attribute-based keyword personal health records. offline encryption), Storage costs.
search (CP-ABKS) • Efficient key distribution with key leakage
resistance
• Faster computation without information
leakage.
Younis et al. (2022) Blockchain based architecture Symmetric key • Decentralized access control to healthcare Data driven keys similarity, Model
for telehealth applications cryptography and Smart data complexity, computational overhead,
contracts • Secure data transmission between patient smart contract performance
and cloud through data driven mechanism
• Smart contract based personalized access
control
Ren et al. (2022a) Blockchain-powered tensor Tensors, graph networks, • Efficient modelling of distributed Classification accuracy
meta-learning-driven and Ethereum healthcare data through tensor-prototype
intelligent healthcare system graph network.
• Feature representation of healthcare data
through tensor convolution and pooling
layers.
Liu et al. (2022b) Anonymous remote healthcare Shamir Secret Sharing • Efficient authentication protocol not only Security analysis, computation overhead
data Sharing over blockchain Scheme, Proxy Re- for anonymization but also to reveal (encryption, re-encryption, & decryption)
encryption: malicious nodes identity
• On-chain off-chain based remote health­
care data sharing
Egala et al. (2023) Blockchain based decentralized Hyperledger fabric, • To establish trust between healthcare Security analysis, throughput, response
distributed smart healthcare Machine learning models stakeholders for data sharing time, classification accuracy
system • Selective sharing mechanism for patient
centric access control
• Machine learning based model for health
data monitoring
Stephanie et al. Ensemble integrated federated Federated Learning • To develop a secure multiparty Classification accuracy, model training
(2022) learning scheme for medical computation based federated learning time
image classification model
• To develop deep learning model that
collaboratively trained by heterogeneous
models from healthcare institutions.
Abdellatif et al. Secure decentralized health Ethereum and • To design a blockchain and edge Latency, computational cost.
(2021) system for efficient medical Hyperledger fabric computing based healthcare system for
data exchange medical data exchange.
• An automated patient monitoring system
that securely exchange critical data
through edge devices
Dewangan and Patient-centric IoMT-based Symmetric key • To store patient health records in a Security analysis, IoT simulations time (ms)
Chandrakar blockchain to collect and store cryptography securely adhering to GDPR regulations. versus the number of devices, number of
(2022) patient data • Miner selection algorithm between cloud messages, number of transactions.
server and doctor node to avoid bias in
blockchain.
(continued on next page)

16
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Table 5 (continued )
Reference Major Objective Main Technique Contribution Focus Performance evaluation Methodology

Abou El Houda Blockchain based collaborative Federated learning • To build a robust distributed machine Classification accuracy, F1 Score, confusion
et al. (2022) distributed learning framework learning model where clinicians can matrix
securely collaborate
• Secure aggregation of local learning
models through secure multiparty
computation.
Ren et al. (2022b) Task offloading strategy for Public key cryptography • Hierarchy network framework with Throughput, time efficiency, and task
resource constrained fog-edge centralized control and distributed success ratio
healthcare devices. computing for smart healthcare IoT
applications.
• task offloading strategy with a low latency,
secure and reliable decision-making algo­
rithm with emergency handling capacity

Table 6
Healthcare blockchain user and system requirements that are met in Table 5.
Reference Access Control Access Revocation Privacy Preserving Access to Patients Interoperability Predictive Model Decision Making

Gohar et al. (2022) ✓ ✓ ✓ ✓ ✓ ✕ ✕


Rehman et al. (2022) ✕ ✕ ✓ ✕ ✕ ✓ ✓
Al-Sumaidaee et al. (2023) ✓ ✕ ✓ ✓ ✕ ✕ ✕
Liu et al. (2022a) ✓ ✕ ✓ ✕ ✓ ✓ ✓
Azbeg et al. (2022) ✓ ✓ ✓ ✓ ✓ ✕ ✕
Zhang et al. (2022b) ✓ ✓ ✓ ✓ ✓ ✕ ✕
Younis et al. (2022) ✓ ✓ ✓ ✓ ✓ ✕ ✕
Ren et al. (2022a) ✓ ✕ ✕ ✕ ✕ ✓ ✓
Liu et al. (2022b) ✓ ✓ ✕ ✓ ✓ ✓ ✕
Egala et al. (2023) ✓ ✓ ✓ ✓ ✓ ✓ ✓
Stephanie et al. (2022) ✓ ✕ ✓ ✓ ✕ ✓ ✓
Abdellatif et al. (2021) ✓ ✕ ✓ ✓ ✓ ✕ ✕
Dewangan and Chandrakar (2022) ✓ ✓ ✓ ✓ ✓ ✕ ✕
Abou El Houda et al. (2022) ✓ ✕ ✓ ✓ ✕ ✓ ✓
Ren et al. (2022b) ✓ ✓ ✕ ✓ ✕ ✕ ✓

Table 7
Suitability level of blockchain types for the challenges in healthcare domain.
Type Permissionless Permissioned Federated Hybrid
Blockchain Blockchain Blockchain Blockchain

Patient Data • Medium •Medium • High • Medium


Management
Drug • Medium •High • High • Medium
Traceability
Cryptocurreny • High • High • High • High
Payment
Clinical Trials • Low •High • High • Medium
and Data
Security
Healthcare IoT • Medium •High • High • Medium
Health • High •Medium • Medium • Medium
insurance
claim
processing
Healthcare • Medium •Medium • Medium • High
waste
management
Supply chain • High •High • High • High
management
Fig. 12. Classification of blockchain.

Chatterjee, 2018). There is always a trade-off among consistency,


6. Consensus algorithms in healthcare
availability, and partition fault tolerance (CAP) while applying
consensus algorithms. Consensus protocols have three key properties:
Consensus mechanism of blockchain is one of the key elements of the
Safety, Liveness, and Fault Tolerance. This section details and provides
distributed healthcare blockchain. Consensus mechanism (Baliga, 2017)
insights into the most widely used consensus algorithms of the distrib­
have been the focus of active research for the recent years and allow.
uted healthcare blockchain. The summary of various consensus algo­
Through this technique, distributed peers consent to validate the
rithms and its characteristics are presented in Table 8.
transaction. There are multiple consensus algorithms created under
different presumptions to address distinct issues. Still there isn’t a
consensus mechanism that is perfect for all issues. Different consensus
algorithms can be used for different healthcare use cases (Salimitari and

17
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

6.1. Proof-of-work (PoW) two positions on the hash table as some of the values are inserted into
the hash function. The hash result is put into one of the values if any one
Proof-of-Work (PoW) was first proposed by D.Work in the year 1993 position of the two is blank. When there is a new has value the old one
(Vukolić, 2015). It is the way of accepting a block that is most frequently will be removed and replaced if none of the available two values are
employed by numerous peers. Choosing a participant to authenticate a blank. Proof of Work (POW) consensus is proposed by Liu et al. (2019c)
transaction becomes essential to creating the blockchain because a in the year 2012. By a committee of miners with success factors, the
network of distributed peers for a blockchain lacks a central authority to block is appended. The original Proof of Work is much easier to set. With
approve or confirm the transactions (Zhang and Lee, 2020). Any unique the computing power available miners will be able to find all the
peer must confirm the addition of a block before it can be added to the possible nonces. Each miner will have to find the possible number of
chain. A miner is a unique peer or node that has the ability to compile all nonces for their created block. Once the nonce is received the finder will
transactions into blocks and offer confirmation. Mining is the process of send the block to validate and put the block in a temporary array.
doing this. The miners are given a challenging puzzle to solve that takes
a lot of time and effort but is simple to verify in this approach. Prior to 6.3. Proof-of-stake (PoS)
producing the proof of work, the puzzle is randomly solved using a
number of trial and error techniques. A new block can be created and the Proof-of-Stake (PoS) was first introduced in the year 2012 as an
transactions are verified by the miner who has solved the problem. alternate method to the PoW consensus model. To tackle the problem of
Hashing the input values is one of the techniques. If the number of users intensive computational involved in solving the cryptographic puzzle in
and the network are high, the hash of the previous block will be con­ PoW, the Proof-of-Stake (PoS) was developed (King and Nadal, 2012). It
tained in the current block, which makes the process computationally is a protocol that saves computational resources and is called a proba­
costly. The likelihood of new block generation is limited because all bilistic protocol. This model states that in the distributed network of
previous blocks must be recreated before a new block can be generated. peers, any peer who owns a large number of coins can become a miner to
Therefore, data manipulation is not feasible. The PoW consensus model validate and confirm the transactions. The power that the miner has is
is used by Ethereum and Bitcoin. Though it is widely used, the high proportional to the number of coins that they own. For example, if a
bandwidth requirement makes it incompatible with healthcare IoT miner has 20% of the blockchain coins then they can mine only 20% of
services. the blocks in the chain. The miner with a greater number of coins has the
power to validate and verify the legitimacy of the transactions. As a
single miner takes a centralized approach and has control over the entire
6.2. Variants based on proof-of-work blockchain, it is not ideal for situations where users have fewer coins. To
avoid fake stake attacks, an approach with more miners would be
A large amount of computational effort has been extended to check secure. The varied PoS by cryptocurrencies such as Bitcoin, Peercoin
with negligible effort whether it allows verifying a Proof-Of-Work. (King and Nadal, 2012), Litecoin (Haferkorn and Diaz, 2015), and Nxt
Tromp et al. (Tromp, 2014), The author have proposed a plan indi­ (Popov, 2016). The minimal requirement of energy and hardware re­
cating the cuckoo hash function. This provides an opportunity for the quirements make PoS suitable for healthcare systems.
miners to append the block easier and pay only little effort. The result of
the hash table will depend on two different hash functions. There will be

Table 8
Consensus algorithm and its characteristics.
Algorithm Proposed Hash Healthcare Accessibility Example Limitations
Year Power Applicability

Proof-of-Work (PoW) 1993 ✓ ✕ Open Bitcoin High network bandwidth requirement


Proof-Of-Stake (PoS) 2012 ✓ ✓ Open Ethereum Pseudo-random way to solve the blocks.
Delegated Proof-of-Stake (DPoS) 2014 ✓ ✓ Open Bitshare Costs more towards centralization
Leased Proof-Of-Stake (LPoS) 2018 ✓ ✓ Open Waves Malicious activities can be orchestrated
Proof-Of-Importance (PoI) 2018 ✓ ✓ Open NEM Increased cost
Practical Byzantine Fault Tolerance (PBFT) 1999 ✕ ✓ Prop Hyperledger Works well only with less number of
nodes
Delegated Byzantine Fault Tolerance (dBFT) 2019 ✕ ✕ Prop NEO Lack of anonymity
Proof-of-Capacity (PoC) 2019 ✓ ✕ Open Burstcoin Large storage requirement
Proof-of-Activity (PoA) 2014 ✓ ✕ Prop Bitcoin Longer delay
Proof-of-Burn (PoB) 2018 ✓ ✕ Prop Slimcoin Higher power consumption
Proof of Elapsed Time (PoET) 2016 ✕ ✓ Prop Sawtooth Reliance on a specialized hardware’s
security
Stellar Consensus Protocol (SCP) 2018 ✕ ✓ Prop Stellar Inefficient in terms of number of
messages sent
Paxos Consensus algorithm 1998 ✓ ✓ Open Ethereum Can determine one value at a time
Multi-paxos consensus algorithm 2015 ✓ ✓ Open Chubby Inu Implementation is difficult
Raft Consensus Algorithm 2014 ✓ ✓ Open Bitcoin Too many requests from servers can
choke the system
Zab Consensus Algorithm 2007 ✓ ✓ Open Ethereum Additional data exchange is needed for
leader election
Proof of Learning (PoLe) 2020 ✕ ✓ Prop Bitcoin High energy consumption
Proof-of-deep-learning (PoDL) 2019 ✕ ✓ Prop Bitcoin, Computation overhead
Litecoin
Separate proof-of-deep-learning (S-PoDL) 2021 ✕ ✓ Prop Bitcoin Improvement required to support delay
sensitive applications
Honesty-based distributed proof of authority 2022 ✓ ✕ Prop Ethereum Does not support larger number of nodes
(HDPoA)
Score Grouping-PBFT (SG-PBFT) 2022 ✓ ✓ Prop Bitcoin Consensus time is more
Dynamic Random Byzantine Fault Tolerance 2021 ✕ ✓ Prop Bitcoin Computation overhead
(DR-BFT) consensus algorithm

18
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

6.4. Delegated proof-of-stake (DPoS) primary node sends the request message to the other entire node, who
then sends the reply to the client. This model works well in a small
As PoS lacks security because fakes stakes are miner, a better network with fewer nodes and does not support scalability. As the
consensus model is required wherein multiple verifiers of the trans­ network scales, the number of messages exponentially rises and this
actions are present. The Delegated Proof-of-Stake (DPoS) works by the creates a message overhead. This is mostly in enterprise networks and
principle of voting and electing miners (Chaumont et al., 2019). The used platforms such as tender mint, hyperledger fabric, etc. Castro et al.
election process allows the stake holds to identify witnesses and dele­ (M. C. and Liskov, 2010) have proposed a method that replicates the
gates for managing blocks. Delegates can make core changes to the algorithm that can withstand byzantine faults. Byzantine fault tolerance
blocks and witnesses can create and validate the transactions. As there algorithm is very important for software errors and malicious attacks.
are delegates and witnesses for every blockchain, misuse of the power Dhillon et al. (2017), proposed a method where Hyperledger Fabric used
can avoid by active voting. Since every peer has an opportunity to Practical Byzantine Fault Tolerance (PBFT) as it can handle 1/3 mali­
participate in the voting system, the model follows a democratic cious byzantine. The processes are divided into phases like prepared,
approach to the consensus algorithm. Some DPoS performs the voting committed, and pre-prepared. If the received node is 2/3 of all the nodes
continuously to elect new delegates and witnesses. So this keeps the which shows that a node would enter the next phase. Hence every node
miners under pressure in losing during the election. Some DPoS take the must be known to the network. This technique is well-suited for
stake size to select the voters. This is done to reduce the mining pool and third-party-controlled private blockchains, such as the Hyperledger
to avoid peers with small stakes from managing the blockchain. This initiatives. However, because of their restricted scalability and a low
model supports scalability with reduced computational power and tolerance for malicious activity, it is not the ideal solution for permis­
prevents the system from attacks. This method suffers from centraliza­ sionless, public blockchains. PBFT offers high throughput, low latency,
tion if there are limited delegates. DPoS is employed by cryptocurrencies and minimal computational overhead such properties make it applicable
such as Bitshares, Steem, etc. The efficiency of voting out malicious to healthcare systems.
nodes makes this protocol safety and thus it is highly applicable for
healthcare data sharing. 6.8. Delegated Byzantine Fault Tolerance (dBFT)

6.5. Leased Proof-of-stake (LPoS) It operates in the same way as PBFT, but this does not need all nodes
to participate in order to add new block, making it more flexible. When
Leased Proof-of-Stake (LPoS) was proposed in the year 2018 that there are less than (n − 1)/3 aberrant nodes, PBFT ensures the system’s
operates similarly to PoS, but with a few enhancements. The centrality liveness and security. In comparison to other protocols, the PBFT’s
problem in PoS is addressed by LPoS. By providing a leasing option, it consensus is more consistent and accurate. PBFT is ineffective, though,
allows nodes with low balances to participate in block verification. because of its high level of complexity, when there are a lot of partici­
Wealth holders with larger balances can lend their cash to nodes with pating nodes. In dBFT (ontology/consensus/dbft at master ⋅ ontio/on­
lower balances for a certain period through leasing. During the lease tology ⋅ GitHub, 2023), some nodes are designated as representatives for
contract, the least amount will remain in the ownership of the wealth other nodes, and they follow a consensus procedure similar to PBFT.
holders, but it will enhance the chances of nodes with low balances Hence, this model is suitable for healthcare blockchain systems. Dele­
solving a block. When these nodes solve a block, the prize will be gated randomization Byzantine fault tolerance (DRBFT) is proposed by
distributed proportionately among the wealth holders. This makes the Zhan et al. (2021) to suit blockchain for large scale asynchronous
system more decentralized and secure. Since LPoS is based on monetary network applications. Random selection algorithm is used to fairly select
benefits it is less applicable to healthcare IoT however, it is suitable for participating nodes to execute PBFT. The proposed algorithm satisfies
other e-healthcare services. the properties such as unpredictability, uniform distribution, and
impartiality.
6.6. Proof-of-importance (PoI)
6.9. Stellar Consensus Protocol (SCP)
Proof-of-Importance (PoI) is an improvement for PoS that finds a
most trustworthy node for validating the transactions. There is no Stellar Consensus Protocol (SCP) is one of the variants of Byzantine
guarantee that the person more stake can dominate the blocks in the Fault Tolerance that is proposed in the year 2018 (Barry et al., 2018). It
chain as in PoS. Instead of focusing just on node balances for deter­ provides microfinance services with minimal latency. SCP consists of
mining the next winning node, it considers a variety of criteria, nomination and ballot protocol steps. The nomination protocol executed
including a node’s reputation, which is determined by a system-defined first then these values are distributed to all of the quorum’s nodes, who
mechanism, and the number of transactions that have happened to or will vote for one of the candidate values. At the conclusion of the pro­
from that node. PoI has consistently good yields and has a minimal la­ cedure, values for that slot are universally picked. After then, the ballot
tency. It also doesn’t need a lot of computing or network resources. Such procedure is started, which entails federated voting to approve or reject
features makes PoI suitable for healthcare systems. Also, the healthcare the nomination protocol’s acquired values. Each participating Stellar
organizations reputations can be utilized for decision making by the Core node (also known as a validator or validator node) in SCP chooses
users. which group of additional nodes they want to trust. Open network
membership (anyone can join as a Core node thanks to the flexibility of
6.7. Practical Byzantine Fault Tolerance (PBFT) user-defined trust) and decentralized control are made possible by
user-defined trust. On the Stellar network, validators receive no finan­
Practical Byzantine Fault Tolerance (PBFT) is a complex and efficient cial compensation. Instead, people are encouraged to sign up as vali­
consensus algorithm that has partially trusted and faulty nodes in the dators since they are enhancing the network’s security and resilience,
blockchain network proposed by Castro et al. (Castro and Liskov, 2002). which is advantageous for the Stellar-based businesses and services. SCP
This system works asynchronously with request and response messages is one of the good choices for healthcare blockchain systems due to its
between the nodes. Arriving at a consensus in a distributed network is security and privacy options.
carried by even if there are faulty nodes with correct or incorrect in­
formation. There are 5 phases in message sending in PBFT. The messages 6.10. Proof-of-capacity (PoC)
are request, pre-prepare, prepare, commit, and reply (M. C. and Liskov,
2010). The client sends a request message to the primary node. The Proof-of-Capacity (PoC) is an improvement of PoW. PoC requires

19
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

dedicated processing power and hard disk capacity for mining the next solving the following block. Whereas this method is useful for creating
blocks. PoC is relatively faster than PoW because of its dedicated ca­ cryptocurrencies, it is ineffective for healthcare applications since it
pacities. Memory space is made available to service providers by PoC. requires the existence of a financial system and the burning of coins,
Through a decentralized network, this concept enables you, the miner, neither of which are present in healthcare networks. PoB is used by
to exchange your free disc space for money. The more room you have, Slimcoin, a cryptocurrency.
the more likely you are to use the service offered in exchange for the
mining return. PoC consumes less energy than other models since it just 6.15. Paxos consensus algorithm
uses your available memory space to validate blocks. The technique is
supported as a more environmentally friendly alternative to prior Paxos consensus algorithm was developed to address the issue of
consensus mechanism algorithms, such as proof of work, therefore it consensus in distributed networks. Paxos is a metaphor for reaching a
should come as no surprise (PoW). Burstcoin is presently adopting this consensus under uncertain circumstances. In the event of network par­
mining method. The advantages of PoC are low energy consumption, titioning or server outages, distributed systems can continue to function
low maintenance and affordability, decentralized network, shorter predictably with the Paxos algorithm. Distributed storage can perform
mining time, reusable space. There are few limitations that includes it as predictably as a thread-safe data structure as long as a client appli­
favors space hoarders, it is less secure, and has limited research. How­ cation can connect with important roles in a distributed system (De
ever, it is not suitable for healthcare systems as the node is selected Prisco et al., 2000). Many of Paxos’ characteristics are accomplished by
based on the capacity. the idea of a ballot. A ballot is essentially a one-of-a-kind identifier that
is connected to every transaction. For each partition key, Paxos ballots
6.11. Proof-of-activity (PoA) are tracked independently. The total throughput and availability are
increased and there is more availability when transactions are not co­
Proof of Activity (PoA) is a hybrid consensus technique that com­ ordinated, but there is no mutual order provided. Transactions cannot,
bines PoW with PoS. In PoW, miners compete to solve a hash function in therefore, cross partitions. The coordinator, or the node carrying out the
order to locate the next block. The solved block, on the other hand, will transaction, starts by generating a new ballot and requesting storage
simply include a header and the miner’s address, with no transaction. from the nodes that control the relevant token range’s data. If the ballot
Then transactions are added to the block, and a set of validators is picked is older than the one they already know, replicas won’t store it, and if it
to sign the new block based on the solved block’s header in order to doesn’t respond to the replica, the coordinator won’t move forward. The
establish consensus. This is accomplished through the use of evidence of coordinator should keep up to date information and allows a single
stake. This method is more secure against attacks, but it may result in transaction to be modified at a time. Paxos is frequently employed when
longer delays, which may be unacceptable for time-sensitive healthcare huge datasets, such as files or databases, need to be replicated and
applications. durability is required. The protocol makes an effort to advance even
when a limited number of replicates remain unresponsive. Computation
6.12. Proof-of-elapsed-time (PoET) overhead of Paxos algorithm is high. To overcome the drawback, Raft
was developed.
This is another consensus algorithm that allows a network of par­
ticipants to decide the mining rights and become a validator. Here, every 6.16. Multi-paxos consensus algorithm
participant is equally likely to become a validator. To enable this timer is
employed and time is different for every participant. Every participant is The extension to Paxos is the multi-paxos algorithm that can suitable
assigned a random time to wait and the first participant whose timer for distributed environment. Paxos ensure that one of the suggested
expires and who had a short duration is allowed to create and add a new values is selected. However, in a distributed system to choose a sequence
block to the blockchain (Chen et al., 2017). This method applies a simple of values, or to obtain consistent ordering over a set of values, multi-
approach that does require high computational power. However, this paxos consensus algorithm is useful. The proposal is started by the
method requires special hardware to set the time. This model is used by leader, who is chosen by Multi-Paxos. The preparation stage can be
enterprise distributed hyperledger. bypassed to convert the two-phase process into a one-phase process,
which increases efficiency, if the leader initiates all suggestions. No
6.13. Directed-acyclic-graph (DAG) specific leader is assumed by Multi-Paxos. Instead, it enables concurrent
requests from various leaders without jeopardizing security. To allow
This Direct Acyclic Graph (DAG) ledger transaction works on a peer- continuous proposal, the Multi-Paxos can be enhanced to avoid the
peer validation. Any node that wants to perform a transaction must preparation phase and proceed to the acceptance phase. Applying multi-
verify at least one previous transaction with the new transactions (Cao paxos enables to improve the efficiency the blockchain with multiple
et al., 2020). DAG is a distributed peer grading system. Instead of having transactions.
a group of miners to validate the transaction, DAG uses the very trans­
action that the user performs to confirm each other’s transaction. The 6.17. Raft consensus algorithm
advantage of using the DAG is it increases the operation speed and does
not require miner selection. It is reliable and increases the security of the Raft is a successor to the Paxos algorithm and it is a leader-based
blockchain. consensus algorithm designed to manage larger-sized networks
Though most of the Blockchain design is distributed and decentral­ (Huang et al., Member). In a closed distributed environment of the Raft,
ized, centralization of the power and control can occur because it re­ the main server is considered a leader and the other remaining nodes are
quires a witness node to mitigate the attacks to the blocks. To overcome called followers. The leader is responsible for data updates and transi­
these central points of control and failure some advanced consensus tion log replication. The leader accepts client requests and transmits
algorithms are required. heartbeat messages to all followers periodically when it is alive and
configurable. Some followers will notify their peers and call for an
6.14. Proof-of-burn (PoB) election if the leader cannot be reached (due to death or a network
outage). Raft separates the essential components of consensus, such as
Proof of Burn (PoB) is based on the concept of burning coins, which leader election, log replication, and safety, to make them easier to grasp.
entails transferring coins to an address that cannot be recovered. Ac­ It also enforces a higher level of coherency to minimize the number of
cording to the number of bitcoin burned, miners are given precedence in states that need to be taken into account. The new entries are added to

20
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

the log by the leader and data flows from the leader to other servers. throughput with a smaller block generation interval. The extra overhead
Node failover must be established to assure availability because the was reduced and increased consensus output.
leader is the system’s single point of failure. This failover is known as a
leader election in Raft and all the nodes are assumed to be trustworthy
6.22. Proofs of Space (PoS)/proof of capacity
and have no malicious intent.
Proofs of Space (PoS) is a method that works similar to PoW that
6.18. Zab consensus algorithm
considers disk resources rather than computation (Dziembowski et al.,
2013). A system called Proof of Space (PoS) is used to confirm and
Zab is a ZooKeeper Atomic Broadcast consensus algorithm designed
validate statements. The PoS approach allows the user to commit
for ZooKeeper coordination service as a crash-recovery mechanism
necessary disk space on their computer for transaction computation.
(Flavio et al., 2011). The three stages of Zab are synchronization,
Instead of computational power, PoC storage capacity shows financial
broadcast, and discovery. One iteration of this protocol is executed at a
investment in the network. Because of this, proof-of-capacity may have a
time by each process, and at any point, a process may stop the current
smaller environmental impact than proof-of-work. By assigning some
iteration and begin a new one by moving to the discovery phase. Ac­
kind of memory, proof-of-capability requires network users to prove
cording to the protocol, the Zab process might play the leading or fol­
they have a vested financial interest in the network’s success. The proof
lower roles. A leader simultaneously performs the primary job and
achieved decentralized consensus in the blockchain. It is used to defend
suggests transactions following the primary’s broadcast call sequence.
against Sybil’s attack. Proof-of-Spacetime (PoST) allows the participant
Followers accept transactions following the protocol’s steps. A leader
of the network to have allocated storage capacity for an allotted period.
also carries out a follower’s instructions. A leader oracle is implemented
by each process, and it offers the identification of the potential leader. A
process seeks advice from its leader oracle in the discovery phase to 6.23. Honesty-based distributed proof of authority (HDPoA)
identify which other process it should follow. The primary process ex­
ecutes client activities while using Zab to propagate the relevant in­ The Internet of Things (IoT) is capable of being dynamic and
cremental state changes to backup processes. This is how ZooKeeper adaptable to any changes, including changes in device statuses, loca­
implements a primary-backup strategy. Zab must ensure that if it de­ tions, and network connectivity. IoT systems can grow by integrating a
livers a given state change, then any other changes it depends upon must significant number of devices that produce enormous volumes of data.
be supplied first because an incremental state change depends on the One of the issues with a consensus algorithm deployed in IoT space is
order in which changes were previously generated. that some devices lack resources and computation power. Applying
blockchain to IoT provides several benefits over traditional systems,
6.19. Proof of Learning (PoLe) including increased security through the guarantee of data integrity and
accountability and reliable control over numerous devices. An Honesty-
Scaling up the network and training data as well as autonomous based distributed proof of authority (HDPoA) was proposed to enhance
neural network (NN) architecture design have led to significant per­ data integrity and security (Alrubei et al., 2022). The proposed HDPoA
formance advances in deep learning. Proof of Learning (PoLe) directs the algorithm when deployed on multiple devices showed improved per­
processing power used for block consensus toward neural network formance in terms of energy consumption and hash power. The security
optimization (Liu et al., 2021). The entire blockchain network receives analyses exhibited that HDPoA is secure and appropriate for
access to the training and test data, and the consensus nodes then train blockchain-enabled IoT applications.
NN models on it to demonstrate learning. As a fundamental part of PoLe,
a secure mapping layer (SML) was implemented as a layer of linear NN
6.24. SG-PBFT (score Grouping-PBFT)
to prevent cheating by consensus nodes. A new block is added to the
blockchain after the network’s consensus has been reached. The PoLe
To support secure authentication in IoT of connected vehicles, SG-
protocol was evaluated and achieved improved transaction processing
PBFT (Score Grouping-PBFT) Consensus algorithm was developed (Xu
and stable block generation.
et al., 2022). The distributed architecture of the blockchain-enabled to
reduce the burden on the centralized server and decreased the single
6.20. Proof-of-deep-learning (PoDL)
point of attack. By adopting the score grouping mechanism, the
consensus process was optimized and the performance of the SG-PBFT
To support multi-access edge computing (MEC) applications and
consensus algorithm was improved when compared with traditional
ensure security and privacy, a proof-of-deep-learning (PoDL) consensus
PBFT. Consensus efficiency was increased by increasing the throughput
algorithm was developed (Chenli et al., 2019). PoDL can be applied to
and less communication overhead.
any PoW-based application. The algorithm uses deep learning to main­
tain blockchains rather than pointless hash calculations. As components
are added to block headers incrementally, the PoDL can be applied to 6.25. Dynamic random byzantine FaultTolerance (DR-BFT)
any cryptocurrency-based PoW. In the proposed work, PoDL applied
energy recycling blockchain. The DL models are trained with the In edge computing, data integrity is a difficult problem to solve. The
training dataset and the accuracy is verified with the test dataset. majority of current consensus algorithms are unable to handle edge
computing in a dynamic network where nodes can join or leave the
6.21. Separate proof-of-deep-learning (S-PoDL) blockchain network at any time. Dynamic RandomByzantine Fault
Tolerance (DR-BFT) consensus algorithm was proposed to protect the
A computational efficient consensus algorithm called Separate proof- data in edge computing (Fan et al., 2021). By offloading data processing
of-deep-learning (S-PoDL) was proposed (Luo et al., 2021). The S-PoDL and storage to edge servers that are physically adjacent to the end de­
performed two-stage computation using an accounting technique to vices, edge computing makes data processing real-time and lessens the
generate blocks quicker and apply them in blockchain enable MEC ap­ pressure on data centers. String Consensus, Data Correctness Validation,
plications. S-PoDL divides all nodes into several parts for training and Binary Consensus are the three sub-algorithms that makeup
different deep-learning models. In the consensus process, the accounting DR-BFT. The proposed DR-BFT algorithm when applied to a dynamic
authority of N nodes is obtained. As the number of modes increased, the network was able to get guaranteed agreement, validity and termination
accounting authority also increased. The S-PoDL improved the with low system overhead.

21
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

7. Security & privacy challenges because many fraudsters and hackers have come in many now. In recent,
governments, healthcare providers, telecommunications companies,
Blockchain technology is essentially secure. The data entered in banks, and businesses of all sizes depend on digital identity. No
blockchain cannot be changed or modified hence it is said to be more Centralized Authority, Secured Blinded Infrastructure, Decentralized,
secure. Additionally, it has a very good consensus mechanism that is Secured, and Private Data Architecture, Privacy and Controls, Book
used to make a decision and cryptographic proofs that make the Keeping, Audit, and Billing are the policies used here. Secure Key
blockchain impossible to hack. Even though blockchain is very secure Technologies’ blockchain-based environment (Wolfond, 2017) permits
and impossible to hack it has some security issues. Some of the security different accomplices to fortify verification and give character trait
attacks their effect, detection method, and how to protect them are approval, as a texture of trust and as a strong establishment to grasp
presented in Table 9 and their explanation is listed below. Fig. 13 shows another computerized time.
the taxonomy of the threat model for blockchain. Some attacks will duplicate their identities to act as the valid user for
Table 9 shows the layer-wise security challenges in blockchain a transaction. There are four types of identity-based attacks they are 1)
technology. The layers in blockchain can be classified as physical, Replay Attack 2) Impersonation Attack 3) Sybil Attack 4) Key Attack.
network, transport, and application layer. The different types of security Each of the attacks is explained below.
attacks on each layer are presented along with the system design
challenges. 7.1.1. Replay attack
The attack in the form of the network where the valid transmission is
7.1. Digital identities repeated or delayed maliciously or by fraud is called a replay attack
(Khan and Salah, 2018). A replay attack (cyber-attack) is also called a
There are many problems in the current identity management sys­ playback or duplication attack. In a network, the transmitted valid data
tem. Users don’t have control over their data because users register in is repeated where the malicious entity is intercepted. An exploit that
various online portals and their data is present in different databases. occurs when two forked cryptocurrencies allow transactions to be valid
Users cannot simultaneously update their credentials in all the databases across both the chains. Owing to the validity of the data from an
(Pilkington, 2016). This limitation can be overcome by utilizing block­ authorized user, the attacks were treated as normal data transmission by
chain technology. With blockchain users get more control over every the security protocols. With the actual data, the process of recording
single data element, such as user attributes and credentials that can only timestamps continuously is called time stamping which is one of the
share with trusted parties and also included in the system as distributed ways for preventing the replay attack. During the signature process if
consensus. It improves accessibility, the privacy of their data, and has blockchain generates a private key there are chances of the key being
control over their data. The data in the documents of IDs, e-residency, leaked, Huang et al. (2018) propose an idea of LNSC that generates
passports, birth certificates, wedding certificates, etc., which are recor­ temporary private keys for each session so that the key is changed every
ded in the databases of an individual cannot be modified or tampered time and hence difficult to find out the key and elliptical curve
with. It reduces identity management costs, eases the monitoring pro­ encryption to calculate the hash function.
cess, and improves customer service and efficiency. It offers a protected
method to oversee character in the advanced world that stops clients to 7.1.2. Impersonation attack
share a large amount of weak individual data. An impersonation attack or collusion attacks (Gupta et al., 2018) are
It has become a highly critical problem for the public and private an attacks in emails that attempt to gain access over the individual or a
sectors to identify the people with their identity and authentication company to share that information or data to the corporate. A business
email compromise is also known as a CEO attack which is a popular
Table 9 example of an impersonation attack. CEO fraud is a type of attack that
Layer wise security challenges in Blockchain. targets a specific organization or individual. An impersonation attack
contains an email coming from a trusted source. A valid user performs
Layers Security Modules Attack Type System design
challenges unauthorized operations and this type of attack might occur when the
private key is leaked. To get illegal payment an impersonation attack
Physical Tamper evidence, Physical damage Device connection,
Layer Tamper response, Jamming recovery, condition
may be launched. Wang et al. (2018), proposed a system called a
Detachment monitoring, Distributed incentive-based cooperation mechanism. This mechanism
detection hides the user’s private information, user privacy, and transaction
Data Layer Key management, Quantum attack Merkle tree, data verification. Ling et al. (Lin et al., 2018), proposed a method for
Cryptographic blocks and code
detecting these types of attacks called an ECDSA algorithm. ECDSA is a
components vulnerability
Network Anonymous Manipulation Node’s network signature that is attribute-based which is available only to valid users to
Layer internet based attacks topology, Privacy generate a valid signature. When the corresponding operation fails the
communication cryptanalytic protection issues, impersonation attempt will be detected.
technology attacks Centralized/
Decentralized mixer
Consensus PoS, PoW, BFT, 51% attack Scalability, security
7.1.3. Sybil Attack
Layer Sharding assumptions, When a person creates several accounts in a network and tries to take
complexity, over the network, this kind of security threat in an online system is
reconstruction called a Sybil attack. This attack is nothing but it happens when a single
Incentive Strategic behavior Selfish mining Rewards distribution,
person tries to create multiple social accounts in media. In a peer-to-peer
Layer detection, block withholding,
Optimization unsustainable problem network, a node in a network operates multiple identities at the same
mechanism time. To gain the majority of influence in the network and to carry out
Contract Formal validation, Service based Formal verification, illegal actions in the system is the aim of this attack. The capability to
Layer Sandbox attacks Privacy issues, create and operate multiple identities is there for a single computer.
environment, Test Exploited code
network
Proof of Work consensus algorithm in Bitcoin is used to prove the
Application Regulatory Identity based Authentication, authenticity of any block that is added to the blockchain. The main aim
Layer mechanism attack Identity management, of the eclipse attack is only a single node. To protect this type of attack
Reputation based trust establishment ‘Trust Chain’ is proposed by Otte et al. (2020). The Trust chain uses a
attacks
mechanism called PoW to check the validity of the transaction. An

22
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Fig. 13. Blockchain threat model.

immutable chain is temporarily created by to trust chain to solve this user credentials, permission, products, etc., belong to the application
issue. The consensus algorithm is used to detect these types of Sybil data. In case of any data, there is a distributed copy of the data, this
attacks. A Trust chain along with a consensus algorithm is used to check distributed data prevents a tampering attack as there are many copies of
the trustworthiness in an online community. the same data and no official copy is needed. In case of any exploits,
there is a chance of vulnerability that tamper with the Bitcoin address.
7.1.4. Key Attack To avoid these kinds of attacks Wang et al. (2020), used a method called
It occurs when there is leakage of data from the private keys. Huang public-key cryptosystem. To hide the data such as transactions and to
et al. (2018), explain this attack using an electric vehicle. In an electric encrypt the amounts Wang et al. (2020) proposed a method called a
vehicle if the same private key is used for a long time there are chances homomorphic pallier encryption system. This encryption method cre­
of the key being leaked. To deal with this attack Huang et al. (2018), ates a dumb account that can receive the transaction of the bitcoins but
proposed a method called a mutual authentication mechanism between it cannot be spent. If the input sum and the output sum are positive then
the charging piles and the electric vehicles. It uses the temporary private there is equality in the transaction. If there is any negative-sum, then
key and elliptical curve-based encryption to ensure safety against the there are chances that there can be an attack. This is how the tampering
leakage of the private key. attack can be detected.

7.2. Manipulation based attack 7.2.3. Overlay attack


The user enters a piece of confidential information on a website any
The attacks which involve unauthorized access and destruction of malware that overlays its window on the top of the other and steals the
the data are termed manipulation-based attacks. They are broadly confidential information. When the target application is running, the
classified into four types they are 1) False Data injection Attack 2) overlay attack opens a new window similar to the original window and
Tampering Attack 3) Overlay Attack 4) Modification Attack. The steals the information from the user. To the original encrypted amount,
explanation of all the attacks is listed below. the attacker adds a forged encrypted amount by the receiver’s public
key. Wang et al. (2020), used a method called timestamp to detect these
7.2.1. False data injection attack types of attacks. Every attack is joint with the timestamp to keep all the
When any attack joins with the sensor it creates an event that does transactions unique. To resist these types of attacks different inputs are
not occur, this type of attack is called a false data injection attack. Due to given under the same trader so that the trader can distinguish the two
the generated false data, the system data is misled without having any different linked transactions and hence the overlay attack is resisted.
control. To prevent this attack Liang et al. (2019), proposed a method
called a distributed voting algorithm where the consensus mechanism is 7.2.4. Modification attack
used to carry out the interaction among the nodes. Each node has the When an attacker modifies, steal or capture important information in
power to verify the correctness of the node. When there is a positive the personal system or from an organization then this type of attack is
agreement among the nodes the data is considered to be correct. When called a modification attack. In some cases, the attacker edits and
negative agreement has arrived among the nodes the false data injection changes the personal data or the organization data. This type consists of
is identified. modifying the broadcast transaction or response message. Huang et al.
(2018), use the temporary private key for each session agreement and
7.2.2. Tampering attack elliptical curve encryption to calculate the hash function.
To modify the data certain parameters are exchanged between the
client and the server to modify the application data. The data such as

23
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

7.2.5. Man-in-the-middle attack The interaction is aborted if the agent refuses to sign in a transaction.
The communication between two or more persons can happen with
some man or any server as centralized. These types of communication 7.4.3. Double Spending Attack
made are always centralized. When user A sends some information to B, If an attacker spends the same Bitcoin on multiple users to gain extra
it is passed on to B by any communication in between. There is a pos­ amounts then this type of attack is called a Double spending attack.
sibility that the man in the middle between A and B could even change Aitzhan et al. (Aitzhan and Svetinovic, 2018) proposed a method called
some information and pass it to the other. So there are chances that a multi-signature transaction where some keys must sign a transaction to
wrong information may be exchanged between two sources. This type of spend tokens. Wang et al. (2020), use the timestamp to detect the attack
attack is called a Man-in-the-Middle attack. To resist this attack Lin et al. and PoW mechanism to prevent this attack. Hence by these proposed
(2018), used mutual authentication between two parties. Elliptical methods, the double-spending attacks can be reduced. The user should
curve encryption is used by Huang et al. (2018), for protection. validate the transaction immediately to get a valid transaction. This step
should to taken to reduce all the double-spending attacks. If the user
7.3. Reputation-based attacks validates the transaction the same cannot be used again.

Any agent or an attacker that can control his reputation or the duties 7.4.4. Collusion attack
is called reputation-based attacks. They are classified into two types they The hash tries to find out two inputs that produce the same hash
are 1) Hiding Blocks Attack 2) Whitewashing Attack. The explanation of value. The nodes can collide with each other to maximize profit. He et al.
both attacks is listed below. (2018), proposed an incentive mechanism and a pricing strategy that
can reduce the selfish behavior between the two nodes. Further research
7.3.1. Hiding Blocks Attack is going on to reduce these types of attacks.
In a transaction, there is a positive impact and a negative impact. In
this attack, the agent will reveal the transaction that has a positive 7.5. Cryptanalytic attacks
impact and hide the negative impact on reputation. Otte et al. (2020),
used a chain of temporarily ordered interactions for each agent. Each of The attack which is based on the cryptographic algorithm to break
the records presented has an individual sequence. Any agent can request the keys is a cryptanalytic attack. A Quantum attack is one type of
specific records of others. The agents will stop interacting with them if cryptanalytic attack.
they refuse to provide the records to the agents.
7.5.1. Quantum attack
7.3.2. Whitewashing attack To expose the keys by breaking the cryptographic algorithm is the
When an attacker resets a poor reputation with a new identity by aim of this attack. Yin et al. (2017), investigate the quantum attack. The
rejoining the system, this type of attack is called a whitewashing attack. design of this attack is to solve the elliptical curve digital algorithm. It is
This attack affects the performance significantly. It can get rid of identity used to get the private key from the elliptical curve public key. The
and make a new one when the agent has a negative reputation. To attacker can duplicate the signature of valid users. Yin et al. (2017)
prevent this type of behavior there is no system yet proposed. But by proposed an idea such as a lattice-based signature scheme that allows
providing low priorities to the agents of new identities it can be reduced. many sub-private keys. Hence in this way these attacks can be reduced.

7.4. Service-based attacks 7.6. MiscellaneousAttacks

The attack where the attackers aim to make any service unavailable Some of the other attacks that do not fall under any of the five cat­
or make it behave differently from its original behavior. In other words, egories are listed below. The attacks are 1) Eclipse Attack 2) Timejacking
it can be said that an attacker can change or modify the data to duplicate Attack 3) Race Attack 4) Finney Attack 5) Vector 76 Attack.
values rather than getting the original values. Some of the attacks
available under this attack are 1) DDoS Attack 2) Refusal to Sign Attack 7.6.1. Eclipse attack
3) Double Spending Attack 4) Collusion Attack. Attacking the decentralized network through which an attacker at­
tacks a specific network rather than attacking the whole network, this
7.4.1. DDoS attack type of attack is called a Sybil attack. The node in a decentralized
DDoS is a short form of Distributed Denial of service. It is a type of network does not let all the nodes connect to another network, instead,
DoS attack. In one or more web servers, multiple systems flood the this node connects to only a selected group. This type of attack is a
bandwidth or the targeted system, this type of attack is called a simple attack that an actor may deploy to the interface with nodes on a
Distributed denial-of-service attack. In this attack, multiple systems network. Eclipse attack is nearly the same attack as that of a Sybil attack.
overwhelm the targeted system with more traffic than it can handle. As the similarities are the same between both the attacks the bot will
Some of the types of DDoS attacks are traffic attacks, bandwidth attacks, flood the network with many fake accounts or peers. Sybil attack is
and application attacks. The main objective of the DDoS attack is to targeted to wide attack in a whole network.
prevent valid users from accessing the website. The attackers need to
send more requests than the victim server can handle to make the DDoS 7.6.2. Timejacking attack
attack to be successful. DoS attack uses only one system and one internet The attacker can change the node network and convert them into an
connection to the targeted system whereas the DDoS attack uses mul­ accepting blockchain only when the attacker can change or broadcast a
tiple systems to flood the targeted systems. duplicate or fake timestamp of the transaction when Bitcoin is connected
to it. It means that the attacker can make full use to make of double-
7.4.2. Refusal to Sign Attack spend on the network. The internal clock present in the Bitcoin is
An agent who is intended to harm can decide whether to sign in a responsible for the timestamps. This timestamp is the foundation of the
transaction or not. He will decide not to sign in a transaction that is of no blockchain. Timejackers connect to multiple peers and report inaccurate
use to him. No method has been proposed to reduce or stop this type of timestamps that could speed up or slow down the nodes. Alternation of
attack but it is possible to take preventive measures against these types the network timer counter of the node is done in a timejacking attack.
of attacks. Otte et al. (2020), proposed a method to not interact with any For accepting an alternative blockchain an external force is given here.
unwanted agents or split the whole transaction into smaller amounts. Bitcoin timestamp handling is exploited by a timejacking attack. Node

24
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

system time and restricting acceptance time ranges are prevented using information.
this attack.
8.1. SmartPool
7.6.3. Race attack
This network accepts only one transaction. This type of attack is SmartPool is mining pool system proposed by Loi et al. (Luu et al.,
called a race attack. In this attack, the attacker will send the same coin to 2017). The problem addressed by SmartPool is that the vast computing
different vendors in a similar kind following one after another by using power of the users in centralised pools is controlled by the operators of
multiple machines. This will happen when the vendors deliver the goods those pools. Currently, just 10 mining pools account for at least 95% of
before the confirmation. During the mining process, the vendors will Bitcoin’s mining power, while 6 pools account for 80% of the Ethereum
realize that the transaction was canceled due to the same coin sent to network’s mining power. This leads to cryptocurrency attacks such as
multiple vendors. The vendor who accesses the coin first will get the double spending, network partitioning and 51% attacks. Through the
coin. This is the reason this type of attack is called a race attack. While getblocktemplate protocol, which now only allows an option between
creating conflict between two transactions this race attack is obtained. mining with a transaction set selected by the pool or mining an empty
The transaction which has no confirmation shops and services which block, bitcoin pools currently provide miners just a limited amount of
accept payment can be exposed to a so-called ‘race attack’. The trans­ influence over transaction selection. The scenario is even worse in
action is done without any confirmation here. This risk can be but not Ethereum because miners in controlled pools are still not theoretically
eliminated. able to reject the transaction set chosen by the operator. Replacing the
pool protocol with a decentralized network of miners instead of
7.6.4. Finney Attack centralized miners would combat the situation. However, they are not
The slight variation in the double-spend attack is the Finney attack. compatible for Ethereum based blockchain. Hence, SmartPool is devel­
In a Finney attack, the attacker creates two transactions. Once the block oped to enhance the security of the Ethereum cryptocurrency through
is mined the participation of miners is required as it is a fraudulent decentralized pool of miners, that is scalable and efficient in terms of
double-spending attack. The attacker includes several transactions in his number of participants. For secure and efficient verification, augmented
generated blocks that can transfer some coins between his address. After Merkle tree is introduced. SmartPool gives miners the freedom to choose
the attacker double-spends the same coin using zero-confirmation pay­ the transaction they want in the block. Security, fairness, efficiency and
ments after the blocks have been released in the network. To perform decentralization are the core of SmartPool protocol.
this attack the user needs a lot of mining power. Hence the success
probability depends upon the computing power. These types of attacks 8.2. Proof-of-work based framework
are exposed when the trader or merchant is exposed when accepting the
payment that can be confirmed or unconfirmed transactions. This attack Blockchain performance cannot be enhanced without impacting
works when the merchant accepts unconfirmed transactions. their security. The tradeoff between the performance and security in the
PoW consensus algorithm is studied by Gervais et al. (2016). A novel
7.6.5. Vector 76 attack quantitative framework is proposed to analyze the performance and
Vector 76 attacks are also called one-confirmation attacks. For any security tradeoffs with the parameters of PoW. The security of PoW is
transaction, there is only one confirmation message hence it is one based on the idea that no single entity should possess more than 50% of
confirmation attack. In other words, the attack that performs a double- the processing power since that individual may effectively take over the
spending attack on Bitcoin exchange by using previously mined blocks system by maintaining the longest chain. The proposed quantitative
in a network is called a Vector 76 attack. The places where traders can framework consists of PoW blockchain simulator and security model as
buy, sell, or exchange Bitcoin in a digital marketplace are called Bitcoin their major components. Consensus and network parameters are given
exchange. This attack is a combination of a race attack and a Finney as input to PoW blockchain. The performance of the blockchain is
attack. measured through stale block rate, block propagation time, and
throughput. Security model on the other hand gets the security param­
8. Security and privacy enhancing techniques eters as the input along with the stale block rate of PoW blockchain and
ensures optimal adversarial strategy and security provisions. As stale
All data must be given to every node in the blockchain network in blocks produce chain forks, which slow down the growth of the main
order to provide the traceability and verifiability of data on the network, chain and have severe performance and security ramifications, they are
which unquestionably poses some privacy issues. There is always a bad for the security and performance of the blockchain. Stale blockages,
chance that attackers might get privacy based on specific nodes’ trans­ on the one hand, provide the network’s adversary a competitive edge.
action data by connecting anonymous network addresses to their real On the other side, stale blocks consume more bandwidth and are often
addresses. Anonymization is one of the common technique to address to not rewarded for mining. The proposed framework enhances the secu­
address the privacy issues. The anonymization process removes the rity of the blockchain by combating the attacks such as selfish mining,
identification information from the transaction process without double spending, and eclipse attacks.
affecting its actual process. Additionally, because data saved on the
blockchain cannot be removed or modified once it has been disclosed, 8.3. Oyente
anybody may access it publicly without the need for any protective
measures. Similarly, security issues are also prevalent in blockchain Smart contracts are readily able to manage massive quantities of
network due to the nature of the network. Therefore it is important to virtual currencies with a value of hundreds of dollars each, creating
enhance the security and privacy of the blockchain network. Public key financial incentives that are strong enough to draw competitors. In
cryptography, hash functions, homomorphic encryption, secure multi- contrast to conventional distributed application platforms, smart con­
party computation, trusted execution environment, and zero- tract platforms like Ethereum run in open (or permissionless) networks
knowledge proof are some of the security and privacy enhancing tech­ where anybody may participate. As a result, the execution of these
nologies. Since smart contracts are kept on the blockchain, they logically systems is susceptible to manipulation attempts by arbitrary attackers, a
inherit the network’s privacy features. The blockchain privacy protec­ vulnerability that is only present in traditional permissioned networks
tion method for smart contracts is built mostly on a mixture of crypto­ like centralized cloud services. Oyente is a symbolic execution tool
graphic technologies. Table 11 presents the various security and privacy proposed by Luu et al. (2016) to find potential security bugs in Ethereum
enhancing techniques with the attacks it can combat and other smart contracts. The Ethereum global state and the bytecode of the

25
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Table 10
Summary of security attacks.
Attack Type Type of Attack Name Attack Effect Detection Method Protection Technique
Consensus
Algorithm

Identity-based PoID Replay Spoof the communication between One-time private-public key pair Elliptical Curve based Encryption (Huang
attacks two parties (Lin et al., 2018), (Huang et al., et al., 2018)
2018)
Impersonation Gain Access ECDSA Algorithm (Lin et al., Distributed Incentive-Based Approach (
2018) Wang et al., 2020), (Wang et al., 2018)
Sybil Peer to peer in which multiple Consensus Algorithm (Otte Trust Chain (Otte et al., 2020)
fraudulent identities are created et al., 2020)
Key Leakage of data from private keys Mutual authentication Elliptical curve based approach (Huang
mechanism (Huang et al., 2018) et al., 2018)
Manipulation PoW&PoA False Data False event is created Negative Agreement (Liang Distributed Voting Algorithm (Liang
based attacks Injection et al., 2019) et al., 2019)
Tampering Leakage of data Negative sum between the input Homomorphic Paillier Encryption (Wang
sum and the output sum (Wang et al., 2020)
et al., 2020)
Overlay The forged encrypted amount is Timestamp (Wang et al., 2020) Different input among the same traders (
overlayed above the original Wang et al., 2020)
amount.
Modification Data from a person or an The temporary private key for Elliptical Curve based Approach (Huang
organization is modified each session (Huang et al., 2018) et al., 2018)
Man-in-the- Data transfer between two partieTs Mutual Authentication (Huang Elliptical curve encryption (Huang et al.,
Middle can be modified by the man in et al., 2018) 2018)
between the two parties.
Reputation-based PoS&PoA Hiding Blocks There is a negative and positive Negative reputation (Otte et al., Immutable chain (Otte et al., 2020)
attacks impact based on the transactions. 2020)
Whitewashing Negative reputation is hidden Nil Lower priorities of new agents (Otte et al.,
2020)
Insider attack Trusted insider with high privilege Smart metering infrastructure ( Calculating reputation score from
behave maliciously Singh et al., 2022) neighbors (Singh et al., 2022) (Zhang
Selfish node Sending fake information to other Indirect reciprocal incentive et al., 2022c)
attack nodes for its benefit mechanism (Zhang et al., 2022c)
Service-based PoLe&PoI DDoS Attack Denial of service to the legitimate The hijacked network is Ethereum blockchain based
attacks nodes leveraged with a great number authentication (Ibrahim et al., 2022)
of requests
Refusal to Sign Unfavorable transactions are not Nil Interaction is aborted if the agent sign is
signed missing or transactions are split to lesser
amounts
Double The attacker spends the same Bitcoin Multisignature Transactions ( Timestamp (Wang et al., 2020)
Spending on multiple users. Aitzhan and Svetinovic, 2018)
Collusion Nodes collude with each other to Nil Node reputation is calculated based on
lower the reputation of the target the average of all scores from the nodes (
node Dennis and Owen, 2015).
Miscellaneous PoS Quantum The attacker duplicates the signature Elliptical curve public key (Yin Lattice-based Signature (Yin et al., 2017)
attacks of valid users. et al., 2017) An Anti-Quantum Transaction
Authentication Approach in Blockchain
PoW Eclipse Monopolize all the incoming and Lookup Method Limit the number of nodes per IP address
outgoing connections (Heilman and increase the number of connections. (
et al., 2015) Marcus et al., 2018)
PoET Timejacking Skew’s target node timestamp by Node uses network time to Network encryption randomized port
connecting the target with multiple validate a new block negation (Apostolaki et al., 2017)
peers
PBFT Race The attacker created two Conflicting transaction message The minimum number of transactions
transactions one is genuine and the should be done
other is fraudulent.
PoB Finney Attack The pre-mined block will hold a Unbroadcasted blocks Confirm the transaction before it is
fraudulent transaction processed.
SCP Vector 76 Combines Finney and race, it Using a Single Direct Connection Connect the outgoing to a well-connected
Attack requires single confirmation node

smart contract are inputs to the Oyente tool. First, the CFG Builder will 8.4. Town Crier
statically construct the smart contract’s CFG (Control Flow Graph) from
the bytecode. Then, using static symbolic execution, EXPLORER simu­ In most cases, smart contracts must communicate with off-chain data
lates the execution of a smart contract in accordance with Ethereum sources. However, there is no assurance that the data offered by such
state and CFG data. Because some jump targets are not constants and sources is reliable. HTTPS seems to provide solution to this problem
should be determined during symbolic execution, CFG will be further however, smart contract cannot have network access and digital sign is
enhanced and improved through this procedure. Oyente is capable of missing. To authenticate the data feeds of smart contracts Zhang et al.
addressing the security issues such as transaction ordering dependence, (2016) proposed a system called Town Crier. The architecture of Town
timestamp dependence, mishandled exceptions, and reentrancy Crier (TC) consists of a TC contract and TC server. The TC contract is the
vulnerability. interface between the user and the TC server. The main objective of TC is
to authenticate and digitally sign the data feeds that are retrieved from
web sources. Another key objective of TC is to achieve the security

26
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Table 11
Techniques to enhance and security and privacy of the blockchain technology.
Technique Security Privacy Attacks Minimization Security Model Security/Privacy Guarantees
Enhancement Enhancement

SmartPool ✓ 51% attack, Block withholding Augmented Merkle tree Security, fairness, efficiency and
attack, decentralization
Proof-of-Work ✓ Eclipse attack, Double spending Stale block rate, mining power, Optimal throughput, Optimal tradeoff
based attack, Selfish mining attack, mining costs, propagation between performance and security
Framework ability
Oyente ✓ Double spending attack, Ethereum Virtual Machine, CFG transaction ordering dependence, timestamp
resource exhaustion attack, builder, Symbolic execution dependence, mishandled exceptions, and
tool reentrancy vulnerability
Town Crier ✓ ✓ DoS attack, Relay attack, Side Blockchain simulator, trusted Gas sustainability, hybrid trusted computing
channel attack computing server, enclave base minimization.
Ekiden ✓ ✓ Integrity attack, Side channel Randomization, Key Correct execution, consistency, secrecy,
attack, Rewind attack management, Distributed key graceful confidentiality degradation
generation
Hawk ✓ Deanonymization attacks, front- Pseudonymity, Decentralized On-chain privacy, Contractual security,
running attacks, identity attacks Smart Contracts Transactional privacy
Engima ✓ Incentive attack, Identity attack Secure multiparty computation, Distributed hash-table for storage, Privacy
Secret sharing scheme enforcing computation, heavy processing
Zether ✓ Replay attack, fron-running ElGamal encryption, Anonymity, Confidentiality, Zero knowledge
attacks Anonymization proofs, Interoperability

properties such as gas sustainability and trusted computing base. The 8.7. Zether
security model of TC consists of TC contract, data sources, enclave,
relay, blockchain and network communication. Relay module is Zether is fully decentralized confidential payment model proposed
responsible for the communication between enclave, blockchain and by Bünz et al. (2020). Zether is similar to Ethereum and Libra and it
network environments. TC is designed to be robust even when the relay addition it provides privacy preserving payments with trustless mech­
is attacked. Hence, TC ensures security and privacy of data feeds. anism in smart contracts. Zether guarantees confidentiality of the
transactions through cryptographic proofs. Zero knowledge proof is one
8.5. Hawk of the important building block of Zether that enhances interoperability
through ZK-proof mechanism called Σ-Bullets. Zether also makes it
Hawk is a privacy preserving smart contract framework designed to possible for arbitrary smart contracts to communicate with one another
address the privacy issues with the smart contracts. Kosba et al. (2016) for uses like consensus, voting, and payment channels. Zether still has a
proposed a decentralized smart contract system that avoids storing the lot of drawbacks, the most obvious of which is the exorbitant price.
transactional information directly on the blockchain. The Hawk frame­ Another is that privacy leaking might result via Ethereum’s gas process.
work allows programmers to split the contract into private and public
parts. The private part contains the financial and identification infor­ 8.8. Ekiden
mation whereas the public part can have other information which can be
revealed to the outside world. Hawk program can be divided into three Smart contracts are suffer from poor performance due to the
pieces. They are the blockchain program that executes by all nodes, complexity and confidentiality. Secure multi party computation and
executed by the users, and executed by managers. Hawk manager is a zero knowledge proof system tried to address the smart contract issues
trusted node and not a third party who can see the user inputs however, however, due to complexity of the cryptographic approaches makes it
he protects the privacy of the users not only from the public but also complicated. Trusted execution environment (TEE) provides a reason­
between the smart contracts. Hawk manager has the control to abort the able solution to the aforementioned problem as it isolates the applica­
protocol during mishap and users can be compensated appropriately. tions that runs on the environment and protects confidentiality.
Utilizing TEE for blockchain application is challenging to address this
8.6. Engima Ekiden a privacy and confidentiality preserving blockchain system is
proposed by Cheng et al. (2019). Ekiden’s TEE-based computations can
Enigma is privacy preserving decentralized computation platform guarantee secrecy so that strong encryption primitives like functional
proposed by Zyskind et al. (Zyskind Oz et al., 2015). It is based on secure encryption and black box obfuscation, which are known to TEE, may be
multiparty computation model for verifiable secret sharing. A highly utilized successfully. TEE also offers the randomization of reliable
optimized variant of SMPC is used by Enigma, a decentralized compu­ sources. Ekiden executes smart contracts in TEE over private data on
tation platform, to implement a verifiable secret-sharing method to off-chain processing nodes, and then employs a remote attestation
guarantee the anonymity of its computational model. A customised protocol to confirm the chain execution’s accuracy. Ekiden illustrates
distributed hash table is used by Enigma to encrypt off-chain private that blockchains and trusted enclaves have complimentary security
data and communicate secret information. Enigma offers independent qualities and may be coupled to offer a strong, general framework for
control and security of personal data, much like Bitcoin, while doing confidentiality-preserving, reliable, and effective smart contracts.
away with the need to rely on reliable outside parties. Unlike the typical
blockchain redundancy systems, Enigma distributes data among the
9. Performance evaluation metrics of healthcare blockchain
nodes in a way that each node maintains a copy of all the transactions.
On the blockchain as well as Enigma, the code is run. Executing Enigma
The performance evaluation metrics of blockchain are used to assess
can guarantee both secrecy and correctness, as opposed to the block­
the quality, performance, and scalability of blockchain applications, as
chain’s ability to guarantee only the latter.
well as to set benchmarks to compare against different blockchain ver­
sions (Zaabar et al., 2021)– (Khan et al., 2021). The following are some
of the frequent metrics that are monitored while running the blockchain
application.

27
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

9.1. Transaction throughput how much CPU is used. Loops will use up a many of the CPU resources in
the contract with encryption. Committing the block and computing the
Transaction throughput is a measure of the number of actions that hash of the global state both take a significant amount of CPU time. The
are completed within a time frame. This statistic is used to determine encryption methods, hash calculations, and consensus procedures used
how long it takes to append valid data to blocks. This helps to determine in Transaction per CPU varies from one application to the next. As a
how fast the transactions are processed by the blockchain. The entire result, we’ll need a metric to track CPU use when smart contracts are
number of committed and validated records is divided by the total operating. The following equation is used to calculate the Transactions
amount of time it takes to commit (validate, and store) those data (in Per CPU for every node n in the blockchain network (Kombe et al.,
seconds). 2018).
Transaction throughput = Total committed transactions/time taken to commit Count(Trsac in(a, b))
TCn = ∫b (Trsac / GHz . s) (5)
(1) a
F × CPU(t)
To improve the blockchain’s throughput, developers use numerous
where the frequency of a single CPU core is F, while the CPU con­
strategies which include roll-ups, sidechains, nation channels, new
sumption of a blockchain programme from a to b is CPU(t). Then TC for
consensus mechanisms, and block length increases. The consensus
the whole blockchain network of N nodes can be calculated as follows,
mechanism of a blockchain platform determines a decentralized pro­

tocol’s transaction throughput. For example, a proof-of-work (PoW) TCn
blockchain like Bitcoin has a decreased throughput as compared to a TC = n (Trsac / (GHz.s)) (6)
proof-of-stake (PoS). Other elements that affect throughput include a N
blockchain’s block length, site visitors, and complexity of transactions.
9.5. Transaction per memory second (TMS)
9.2. Transactions per second (TS)
TMS (Zheng et al., 2018b) is a measurement that represents the
Transactions per Second (TS) (Kombe et al., 2018) is a metric used to consumption of physical and virtual memory for transactions of
determine the number of records or transaction records that have been blockchain-based programmes. The following formula was used to
submitted and saved per second. It is used to figure out the processing determine the TMS of a node (n) linked to a blockchain network between
capability of a blockchain network and its scalability requirement. time period a and b with the execution of a specific number of trans­
However, in most cases, the number of records sent to the blockchain actions (Trsac).
( /
network and the quantity of data saved in the ledger are measured
Count (Trsac from (a, b))
independently. To increase the transaction per second, there should be TMSn = ∫ b Trsac (MB.s) (7)
PMEM (t) + VMEM (t)
an increase in the block size and a decrease in the block time. It is a

measured as follows,
where PMEM (t) and VMEM (t) are the physical and virtual memory occu­
Count(Trsac from(a, b)) pied by blockchain application between the time a and b. The TMS of the
TSn = (Trsac / s) (2)
b− a whole blockchain network can be calculated as follows
∑ ⎛ /
where a and b are time periods, Trsac is the number of transactions, s is TMSn
the number of seconds, and TPSn specifies the particular node for which TMS = n ⎝ Trsac (MB.s) (8)
N
the TPS is calculated. Therefore, TS for all nodes (N) can be calculated by
the average TS as follows,

Trsacn 9.6. Transactions per disk input/output (TDIO)
TS = n (Trsac / s) (3)
N A dedicated storage is allocated for blockchain applications to
maintain data along with the world state. TDIO (Zheng et al., 2018b) is a
9.3. Transaction latency (TL) metric that tracks the measure of the input/output while performing the
blockchain operations such as contracts execution and block commits
Transaction Latency (TL) (Zaabar et al., 2021) metric is used to during a particular time period. The TDIO for a specific node n in
calculate the time taken for a transaction to be confirmed and sent to the blockchain network is calculated as follows,
blockchain network to be written to the ledger (or rejected). This sta­
Count(Trsac from (a, b))
tistic is calculated by comparing the time transactions were submitted to TDIOn = ∫ b (Trsac / kbs) (9)
the time they were verified and stored using their timestamps. This a
DiskR (t) + DiskW (t)
measure can also reveal how quickly consensus techniques are being
implemented. Blockchain transaction latency is the time in filing a where DiskR (t) and DiskW (t) denotes the amount of data disk read and
transaction to a blockchain network and the first validation of the write performed in-between the time period a and b. The overall TDIO
transaction. It also represents the time to wait after pressing the send for the blockchain network can be calculated as follows,
button and seeing the appearance of the transaction on the screen. ∑ ⎛ /
TDIOn
TL = Netθ × Trsacct − Trsacst (4) TDIO = n ⎝Trsac (kbs) (10)
N

where Netθ represents the network threshold, Trsacct denotes the


transaction confirmation time, and Trsacst denotes the transaction sub­ 9.7. Blocks per hour/blocks per day
mission time.
Blocks per hour/blocks per day (Ferretti and D’Angelo, 2020) metric
9.4. Transactions per CPU (TC) allows to track how quickly records are submitted and stored on the
blockchain network, as well as how quickly the network can execute its
Smart contracts need a lot of CPU resources when they’re being consensus method. Based on a block’s capacity, the number of blocks
executed. The business logic implemented in the contract determines that can be processed may be determined accordingly. As timestamp is

28
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

attached to each block that is formed, it helps to track how many blocks 10.1. Data privacy
are generated and appended during specific time intervals, such as an
hour or a day. The results of these tests are used to evaluate the block­ The key feature of blockchain is transparency. Since the user’s
chain system’s performance and scalability. transaction is traceable and transparent, measures must be taken to
protect the transaction privacy of users (Ben Hamida et al., 2017),
9.8. Full node/Partial Node Ratio (Kumar and Mallick, 2018). The users should be assigned a private key
to each transaction so that the attacker will not be able to infer any
Active nodes represent the total number of unique nodes that have actual coins or information from the cryptocurrency. A
downloaded the blockchain application. This enables us to measure and blockchain-based privacy-preserving model is proposed to protect social
evaluate how many people have downloaded the blockchain application network data. This model protects sensitive information through a
and are currently utilizing it. The measure can also provide the IP distributed blockchain system and non-sensitive information is pro­
address and geographic location of each node that downloaded the cessed by the primary system. In (Chen et al., 2019) a method is
application. This measure may also provide information on whether the designed to solve the data synchronization problem. The data security
blockchain application is easily accessible for download. and efficiency are ensured through a stochastic homomorphic elliptic
Full Node/Partial Node Ratio (Su et al., 2022) metric is used to curve cryptography encryption model. However, data privacy is a
determine the number of active full nodes and partial nodes on a prevalent challenge in blockchain especially when it is dealing with
blockchain network, as well as the ratio of full to partial nodes. The Full healthcare data. Healthcare data contains personal sensitive information
nodes locally store the full Blockchain Ledger. Therefore, they download that needs to be protected. Any form of personal information leak would
each block and transaction that ever occurred at the Blockchain. This affect the individual. Hence, health data privacy requires research focus
allows for a bitcoin to operate in a trustless manner. Also, the full nodes on blockchain technology. Providing tamper-resistance and
are secure and not affected by attacks. Partial nodes don’t store complete non-repudiation in e-health systems is a new study field that has just
ledger and so are called lightweight nodes. They download only a developed in the healthcare industry. A Privacy Preserving Biometric
portion of the blockchain that is required for the transactions. Knowing Authentication (PPBA) system was created to ensure patient privacy
this ratio is significant because if a blockchain network has no opera­ when accessing healthcare services by requiring anonymous patient
tional full nodes, the historical data in the whole copy of the blockchain authentication (Sarier, 2022). This method of blockchain-based safe
would be lost. biometric identification offers processing and offline encryption in the
encrypted domain scheme. The public blockchain that ensures the data’s
10. Discussions, challenges & research opportunities integrity is used to host the infrastructure required for online authenti­
cation. The approach decreases the number of transactions required for
Blockchain technology has a lot of potential in the healthcare in­ authentication, allowed for the revocation of biometric identities, and
dustry due to its popular features of decentralization, immutability, has auditing capabilities for bad actors. The findings demonstrated that,
consensus mechanisms, and increased capacity. In this article, we have even when the templates are stored as encrypted, the proposed archi­
presented the concept of blockchain technology with its applicability to tecture resulted in a natural defense against these attacks. The
healthcare systems. The features of the blockchain are very well aligned blockchain-based PPBA system employs transaction fees as a deterrent
with the requirements of the healthcare industry thus it integrating against hill-climbing attacks. The General Data Protection Regulation
blockchain technology in the field of healthcare has become inevitable. (GDPR) demands that the use of biometric data be kept private. Private
At first, the features of blockchain are presented in line with the matching of sensitive biometric data was secured as per the GDPR using
healthcare systems. Secondly, we presented the various use cases of the same cryptographic method. This was done using secure sketches
blockchain and its applicability with more light on the healthcare which are provably the secure biometric template protection mecha­
domain. We have identified patient data management, drug traceability, nisms. As data integrity and auditing are the two primary advantages,
cryptocurrency payment, clinical trials and data security, and secure integrating blockchain-based PPBA systems enabled the prevention of
healthcare setups as the applications of blockchain technology in threats.
healthcare. Fig. 4 Compares the features of the applications. Then, we
presented the working model of blockchain with the layered architec­ 10.2. Block size and scalability
ture of blockchain. The different types of blockchain such as permis­
sioned blockchain, permissionless blockchain, and consortium The maximum capacity for a block to be filled with transactions is
blockchain are explained in terms of healthcare blockchain systems. referred to as block size. If the network’s capacity is exceeded, the block
The consensus mechanism is one of the key features of blockchain. will be denied. A blockchain is a type of decentralized database. As a
The various consensus algorithms are presented along with their result, distributed ledger denotes that each node processes each trans­
applicability to the healthcare domain. A comparative analysis of action and contains a copy of the complete ledger state. In the healthcare
various consensus algorithms and their characteristics is presented in system, however, simply the relevant ledgers for certain nodes would
Table 8. We noticed few consensus algorithms are not suitable for the suffice, rather than a complete copy of the ledger (Zhang et al., 2018b).
healthcare domain due to their limitations such as high bandwidth, huge Unprocessed patient data, such as genomics and vital organs, is another
power consumption and transmission delay. Finally, we presented the illustration of the block size issue. Despite the fact that larger data
security challenges for blockchain technology. Though blockchain is packets on-chain result in greater storage costs, there is more data
secure and immutable still there are a number of security challenges that accessible on-chain to audit (Odhran et al., 2019). As a result, main­
are yet to be addressed. In order to make the blockchain more promising taining a balance in the ever-present store and exchange transactions is
for healthcare applications, the security challenges must be carefully critical. Another important challenge in implementing blockchain
evaluated during implementation. A detailed comparative analysis of technology is handling the decentralized system with a huge number of
the security attacks is provided in Table 10. Further, we discuss the peers. The volume of the transaction involved is enormous. As a result
challenges and research opportunities in healthcare blockchain transaction processing rate and the latency of communication increase.
technology. Due to the consensus protocol, the latency between the transaction
This section presents the challenges and research opportunities submission and confirmation is affected.
based on the literature review presented in this article. The following are
some of the most prevalent challenges that require considerable
research and attention.

29
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

10.3. Number of nodes and system responsiveness is difficult and time-consuming. For example, every validator on the
Ethereum blockchain must confirm each transaction. Depending on the
In a blockchain-based system, a node is a component. It is the tech­ data load, this effect causes a relatively slower network. Furthermore,
nology’s basis, and it symbolizes each thing linked to the network. When owing to its irreversible nature, blockchain may be unsuitable for a
more nodes are connected to the network, the internode latency grows variety of different applications. In some emergencies, the blockchain
logarithmically with each new node. Furthermore, in a Communication system was unable to handle some patient problems, such as the
area, as the number of nodes grows, so does the amount of computa­ unpredictability of access. Furthermore, access to their data by a sur­
tional resources available. In the healthcare field, it is envisaged that geon was not previously permitted during an emergency. Because there
vast communities will be connected, which would include the usage of are now insufficient acceptable methods, patients are often hesitant to
blockchain. As a result of the growing use of blockchain, a large number participate or provide their permission for data sharing. As a result, in
of transactions will be produced and recorded. After numerous entities situations like these, a reasonable duration length is required to achieve
agree on every transaction related to the transactions in the ledger, the a quick response from the system, as well as agreement from all parties
blockchain-distributed ledger will add new transactions. Although this on the important transactions.
approach appears to be complicated, it is successful since the blockchain
is restricted in size (Al-Jaroodi and Mohamed, 2019). Some parties who 10.7. Data transmission cost
employ short-term data sharing use pre-authorization fees to reduce the
amount of memory needed on the blockchain. As the number of users Data transmission systems based on blockchain enables small and
who are part of the blockchain network increases, the responsiveness of large file transfers by avoiding nonrepudiation difficulties with secure
the system slows down. With a large number of participants, to perform data transport. Although data transmission is included in practically all
even a single transaction requires consensus from all participants, which Internet-based apps, few of them consider confidentiality to be an aspect
makes it complicated and leads to degradation of system responsiveness of data security. Because a dishonest participant can deny the fact of a
(Koteska et al., 2017). particular data transmission instance if a data transmission scheme is
carried out without the approval of a third party or a central computer, it
10.4. Data analysis and visualization is easy to raise conflicts while transmitting valuable data, especially
digital goods. Signing and encrypting can be used to overcome the dif­
Analyzing and extracting intelligence from the blockchain network is ficulty described above. Digital signature techniques, on the other hand,
complex. Digital currency analysis and capturing data are very crucial in often presuppose public key infrastructure (PKI), which adds to the
private organizations to satisfy intelligence analysis and management complexity of certificate administration and makes them unsuitable for
needs (Vo et al., 2018). It helps to reveal suspicious activity while per­ distributed networks (Jin et al., 2020). So the blockchain technology has
forming fraud, security, and compliance investigations. Entity identifi­ provided a powerful tool for achieving automated data transfer. While
cation, Privacy protection, Network portrait, Network visualization, blockchains do not require a central authority to store data, they do not
Market Effect Analysis, Illegal behavior detection, and Transaction eliminate the requirement for any kind of authority. Because of the
pattern recognition are the seven problems in blockchain data analysis nature of the health-care industry and the fact that its data is frequently
(Yang et al., 2019). personal and sensitive, blockchain applications will rely on regulation,
monitoring, and standards and protocols. Any blockchain’s consensus
10.5. Transactions and blockchain audit method is not dependent on technology, but rather on an agreement
among the attendees. Blockchain is being utilized to produce unique and
A blockchain transaction is a method of transacting business with sophisticated treatments to enhance current medical data and personal
numerous parties in a network. As developers continue to find the most health record management, sharing, and processing standards. In the
up-to-date techniques for conducting blockchain transactions, the healthcare business, where it has provided considerable value through
blockchain market is progressing. When the blockchain system expands enhanced efficiency, remote access, technical innovation, personal pri­
up the technology for large transaction volume, however, difficulties vacy, and security of data management operations, blockchain tech­
arise. The Ethereum blockchain, in particular, necessitates the verifi­ nology is experiencing a conceptual metamorphosis (Tandon et al.,
cation of every transaction by every validator on the network. This is a 2020).
contributing element to the network’s poor performance as a result of
the data load. As a result, reaching a consensus or verifying digital 10.8. Commercial applications
identification will take a long time. Auditing a blockchain brings several
complexities. Firstly, real-time analysis is difficult because of the pos­ The application of blockchain to commercial applications is in high
sibility of forks, which guarantees no reliability of data. The streamline demand and yields numerous benefits. The well-known Bitcoin is the
of financial reports and audit processes are required to manage the first use of blockchain in business. Non-monetary blockchain applica­
network. The written records could still have been tampered and the tions include securities clearance, logistics, HR management, health­
blockchain could be rebuilt if a majority of the participants reach a care, strategic planning, personal database administration, and so on. In
consensus. In this perspective, it becomes extremely difficult for a reg­ terms of Business as a service (BaaS), the blockchain platform is
ulatory authority to audit blockchain and to check whether the data and employed in a variety of fields. There would be a plethora of circum­
transactions have been tampered with or not. Therefore, it is a challenge stances in which BaaS may be used. The number of benefits an appli­
to secure the data and prevent vulnerabilities from fraudulent users. cation receives from both blockchain technology and services
determines how well it fits into BaaS (Song et al., 2021), (Frommelt,
10.6. Consensus algorithm selection 2020). The various domains where blockchain technology can be
applied. Manufacturing is the first domain, with a desire for traceable
The consensus algorithm is a mechanism that makes all blockchain goods. Food tracking, for example, is an appropriate use of BaaS to
peers agree with the same message and ensures that the latest block assure the food’s origin and checkpoints before reaching end-consumers.
added to the chain is correct. It should guarantee that the message stored In this situation, BaaS might assist in providing information about the
by the peer will not create any fork attack and the system remains food source as well as ensuring that the food is not infected throughout
protected from malicious attacks. If the consensus of peers agrees upon delivery from the sender to the recipient. The second domain is e-pay­
the transaction’s validity, then the transaction is considered valid. ments that follow predetermined rules or contracts. For example, the
However, arriving at an effective consensus with a large number of users payment of royalties to publishers. When it comes to royalties, it’s

30
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

important to know when and how they’ll be paid. Because the block­ advantageous results. Blockchain’s transparent ledger architecture en­
chain is based on smart contracts, this is an ideal BaaS application ables it to handle the flow and transactions of black money. With these
because pre-defined requirements might be incorporated into the smart successes, governments around the world are now examining the po­
contract to aid automate these payments. The financial management of a tential of applying blockchain technology to have more effective rules
company is the third domain. BaaS solutions that provide money man­ over the nation’s finances and economy. Also, the concept of blockchain
agement and product provenance, for example. It provides end-to-end can help with the management of massive volumes of data, which is
traceability and counterfeiting services, which assist businesses in quite advantageous for governmental institutions.
addressing challenges such as data tampering and lack of information Businesses are utilizing blockchain technology to build a distributed
transparency. The fourth domain is an immutable, verifiable, and network of IoT devices. Integrating blockchain-based solutions in IoT
authenticated public ledger or information-sharing system. access control enables the management of device-to-device communi­
cation and operations like software updates, error handling, monitoring
10.9. Administration of business processes energy usage, etc.
Using blockchain technology can monitor hiring, spending, and re­
Future research should look at how smart contracts and distributed leases at every stage of the supply chain while reducing delays and
ledger technology enable digital integrity, demand-supply chain man­ human error. With traceability, blockchain can help ensure that prod­
agement, customer order secrecy, and inter-organizational business ucts are both legal and fair trade-certified. The potential for blockchain
processes using blockchain. Inadequate infrastructure and significant to prevent income losses from illicit goods.
hurdles to blockchain implementation remain important problems for a Nowadays, trade between nations is discouraged since it is an inef­
variety of businesses (Dutta et al., 2020). Some of the major roadblocks fective and disorganized process that slows down commerce. Foreign
are a lack of knowledge of blockchain implementation, data storage trade is likewise rife with faults, dishonesty, and counterfeiting. Adding
centers and maintenance expenses, scalability concerns, data ownership cryptocurrency using blockchain technology will enable us to solve a lot
issues, a lack of top management and organizational support, qualified of these issues. Most of the fraud and inefficiency can be addressed by
technical employees, partner trust, and legal challenges. combining payment methods, paperwork, and regulation through a
single digital international system. This will usher in a new era marked
10.10. Laws and regulations by increased trade and improved international relations.
As blockchain technology continues to develop and grow with
Although the blockchain has altered society in many ways, it has also greater advancements, not only in cryptocurrency but also in several
posed legal and legal institutions with new challenges. Due to the nov­ commercial applications including smart contracts, automated tracking,
elty of blockchain technology and the lag in legal supervision, it sparked and rule enforcement. The effects of blockchain will impact businesses
a slew of legal difficulties, particularly in its early stages of development and society.
(Lu, 2019a). A thorough grasp of the blockchain’s properties aids in the
creation and improvement of blockchain-related legislation and regu­ 11. Conclusion
lations. Many governments are implementing blockchain technology
and tightening regulatory controls. Delegation of authority and legal Blockchain technology offers the potential to address some of the
interpretation and jurisdiction issues, privacy protection and online real issues that the healthcare industry encounters. Due to the general ledger
names issues, reliability and deletion rights issues, and transparency and and block-related architecture, the biggest potential of blockchain
personal data privacy difficulties are only a few examples. Furthermore, technology in the healthcare sector is its highly explored applications,
technology and law are mutual substitutes in the fields of national and namely: security, integrity, decentralized nature, availability, and
social governance (Lu, 2019b). In a social setting, if the cost of a tech­ authentication principles. The healthcare industry is having trouble
nology solution is less than the cost of a legal solution, the technical adjusting to a rising technology infrastructure that includes Internet-
instrument can take the place of the legal form as the primary way of enabled devices, Internet of Things (IoT), smart devices, and sensing
generating orders. Blockchain-enabled distributed trustworthy data­ gadgets. As a result of these technologies’ ability to help the healthcare
bases and smart contracts have the chance of breaking down technical industry to better serve its patients in an increasingly interconnected
and legal barriers and creating new governance models. world, malicious actors can use vulnerabilities in such technologies to
gain access to and duplicate data, making it more difficult to share re­
10.11. Future directions cords between hospitals. This can lead to obsolete data, which can lead
to health issues or misdiagnosis, as well as difficulties authenticating a
It is essential to think about blockchain technology’s future and how patient’s identification. According to the research reviewed in this
the discipline itself might be a potential career for people with experi­ study, blockchain technology has the potential to address a variety of
ence in blockchain as its importance develops. Blockchain is a perma­ existing challenges in the healthcare sector. The objective is to give
nent, uncrackable digital database that records transactions in a patients authority and ownership over their medical data, allowing them
verifiable manner. Several firms from numerous industries have been to share it with whomever they choose in a safe setting. Hence, this
drawn in by the potential of blockchain technology and its uses. article provides an in-depth survey of various features of blockchain,
Blockchain technology has been incorporated into several studies and uses cases, architecture, types of blockchain, consensus algorithms for
has the potential to be accepted internationally due to its disruptive healthcare blockchain, various security challenges, and performance
qualities. evaluations metrices. Furthermore, we presented several comparative
For obvious reasons, cybersecurity is where blockchain technology is analyses on blockchain and its features with healthcare applications.
most likely to take off in the future. Despite the Blockchain ledger is Blockchain has several advantages that may be applied to the
open and distributed, the data is still secure and verifiable. Data is healthcare industry to address a variety of issues related to data sharing
encrypted using cryptography to eliminate security flaws like unau­ and security. Blockchain, on the other hand, is not a solution that can be
thorized data tampering. Centralized systems run the major hazards of pushed into any circumstance. Instead, a thorough analysis of particular
data loss, hacking, and human error. Blockchain technology can be used blockchain concerns and their implications for the healthcare industry is
to increase security and resistance to hackers of cloud storage. required. Mining incentives, which are a key component of blockchain,
The promise of blockchain technology has been proven reliable in as well as particular blockchain assaults that may bring the entire system
terms of its goal of tracking financial assets. Several financial organi­ to a stop, have not been thoroughly explored in the healthcare industry.
zations invested in this technology after seeing its potential and The potential of blockchain technology in the health industry is

31
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

overhyped, and its value may be exaggerated. The most difficult barriers Alkhoori, O., et al., 2021. Design and implementation of CryptoCargo: a blockchain-
powered smart shipping container for vaccine distribution. IEEE Access 9,
to the health sector’s digital transformation, like a lack of data inter­
53786–53803. https://doi.org/10.1109/ACCESS.2021.3070911.
operability, are not eliminated by blockchain, and it also doesn’t provide Alrubei, S., Ball, E., Rigelsford, J., 2022. HDPoA: honesty-based distributed proof of
any new benefits. authority via scalable work consensus protocol for IoT-blockchain applications.
While the data included in blockchain-based ledgers is intrinsically Comput. Network. 217, 109337 https://doi.org/10.1016/J.COMNET.2022.109337.
Nov.
secure and tamper-proof, this does not guarantee that the data inputted Andrew, J., Karthikeyan, J., 2019. Privacy-preserving internet of things: techniques and
are accurate or of acceptable quality. Together with user error, mali­ applications. Int. J. Eng. Adv. Technol. 8 (6), 3229–3234. https://doi.org/10.35940/
cious actors may try to sway people’s choices about giving their consent ijeat.F8830.088619.
Andrew, J., Karthikeyan, J., Jebastin, J., 2019a. Privacy preserving big data publication
and granting access to their data. With an increase in the number of on cloud using mondrian anonymization techniques and deep neural networks. In:
persons who are physically and intellectually weak in older populations, 2019 5th International Conference on Advanced Computing and Communication
this danger is especially significant. Only governance, regulation, and Systems. ICACCS, pp. 722–727. https://doi.org/10.1109/ICACCS.2019.8728384.
Mar. 2019.
enforcement are capable of controlling this vulnerability. Andrew, J., Mathew, S.S., Mohit, B., 2019b. A comprehensive analysis of privacy-
Healthcare organizations are not allowed to keep or transmit sensi­ preserving techniques in deep learning based disease prediction systems. J. Phys.
tive information due to the installation of Blockchain, which demands Conf. Ser. 1362 (1), 0–9. https://doi.org/10.1088/1742-6596/1362/1/012070.
Andrew Onesimu, J., Karthikeyan, J., 2021. An efficient privacy-preserving deep
trust in data repositories without relying on an unbiased broker to learning scheme for medical image analysis. J. Inf. Technol. Manag. 12, 50–67.
confirm a transaction. The combination of blockchain and AI technol­ https://doi.org/10.22059/jitm.2020.79191. Special Issue: The Importance of
ogies can raise the standard of treatment in healthcare systems. Human Computer Interaction: Challenges, Methods and Applications.
Anoaica, A., Levard, H., 2018. Quantitative description of internal activity on the
Healthcare will become more accessible and affordable as a result of the
ethereum public blockchain. 2018 9th IFIP Int. Conf. New Technol. Mobil. Secur.
reduction in medical sector expenditures. Blockchain adoption is being NTMS 2018 - Proc. 2018, 1–5. https://doi.org/10.1109/NTMS.2018.8328741.
impacted greatly by the expert shortage. Firstly, to meet the demand, January.
there aren’t enough people working on innovation. Secondly, hiring Antal, C., Cioara, T., Antal, M., Anghel, I., 2021. Blockchain platform for COVID-19
vaccine supply management. IEEE Open J. Comput. Soc. 2, 164–178. https://doi.
current blockchain professionals is expensive. It would be ideal if people org/10.1109/ojcs.2021.3067450. March.
were to learn more about Blockchain technology as it continues to gain Apostolaki, M., Zohar, A., Vanbever, L., 2017. Hijacking bitcoin: routing attacks on
popularity. cryptocurrencies. Proc. - IEEE Symp. Secur. Priv. 375–392. https://doi.org/10.1109/
SP.2017.29.
Armknecht, F., Karame, G.O., Mandal, A., Youssef, F., Zenner, E., 2015. Ripple: overview
Declaration of competing interest and outlook. Lect. Notes Comput. Sci. 9229, 163–180. https://doi.org/10.1007/978-
3-319-22846-4_10.
Azaria, A., Ekblaw, A., Vieira, T., Lippman, A., 2016. MedRec: using blockchain for
The authors declare that they have no known competing financial medical data access and permission management. Proc. - 2016 2nd Int. Conf. Open
interests or personal relationships that could have appeared to influence Big Data, OBD 2016 25–30. https://doi.org/10.1109/OBD.2016.11.
the work reported in this paper. Azbeg, K., Ouchetto, O., Andaloussi, S.J., 2022. Access control and privacy-preserving
blockchain-based system for diseases management. IEEE Trans. Comput. Soc. Syst.
1–13. https://doi.org/10.1109/TCSS.2022.3186945.
Data availability Baliga, A., 2017. Understanding blockchain consensus models. Persistent 4, 1–14.
Barry, N., Losa, G., Mazieres, D., McCaleb, J., Polu, S., 2018. The Stellar Consensus
Protocol (SCP). IETF, Draft.
No data was used for the research described in the article.
Baucas, M.J., Spachos, P., Plataniotis, K.N., 2023. Federated learning and blockchain-
enabled fog-IoT platform for wearables in predictive healthcare. IEEE Trans.
Acknowledgments Comput. Soc. Syst. 1–10. https://doi.org/10.1109/TCSS.2023.3235950.
Ben Hamida, E., Brousmiche, K.L., Levard, H., Thea, E., 2017. Blockchain for enterprise:
overview, opportunities and challenges. In: The Thirteenth International Conference
This work was supported in part by the JSPS KAKENHI under Grants on Wireless and Mobile Communications. ICWMC 2017.
JP21H03496 and JP22K12157, and in part by the JST, PRESTO under Benchoufi, M., Porcher, R., Ravaud, P., 2018. Blockchain protocols in clinical trials:
Grant JPMJPR1934. transparency and traceability of consent. F1000Research 6. https://doi.org/
10.12688/f1000research.10531.5.
Bhushan, B., Sinha, P., Sagayam, K.M., A. J, 2021. Untangling blockchain technology: a
References survey on state of the art, security threats, privacy services, applications and future
research directions. Comput. Electr. Eng. 90, 106897 https://doi.org/10.1016/J.
Abdellatif, A.A., et al., 2021. MEdge-chain: leveraging edge computing and blockchain COMPELECENG.2020.106897. Mar.
for efficient medical data exchange. IEEE Internet Things J. 8 (21), 15762–15775. Brakeville, S., Perepa, B., 2018. Blockchain basics: Introduction to distributed ledgers.
https://doi.org/10.1109/JIOT.2021.3052910. IBM Developer.
Abou El Houda, Z., Hafid, A.S., Khoukhi, L., Brik, B., 2022. When collaborative federated Bünz, B., Agrawal, S., Zamani, M., Boneh, D., 2020. Zether: towards privacy in a smart
learning meets blockchain to preserve privacy in healthcare. IEEE Trans. Netw. Sci. contract world. Lect. Notes Comput. Sci. 12059, 423–443. https://doi.org/10.1007/
Eng. 1–11. https://doi.org/10.1109/TNSE.2022.3211192. 978-3-030-51280-4_23/TABLES/1.
Agbo, C., Mahmoud, Q., Eklund, J., 2019. Blockchain technology in healthcare: a Buterin, V., 2014. A next-generation smart contract and decentralized application
systematic review. Healthcare 7 (2), 56. https://doi.org/10.3390/ platform. white Pap 3 (37), 1–2.
healthcare7020056. Apr. Cachin, C., Vukolić, M., 2017. Blockchain consensus protocols in the wild. Leibniz Int.
De Aguiar, E.J., Faiçal, B.S., Krishnamachari, B., Ueyama, J., 2020. A survey of Proc. Informatics, LIPIcs 91 (Jul). https://doi.org/10.4230/LIPIcs.DISC.2017.1.
blockchain-based strategies for healthcare. ACM Comput. Surv. 53 (2) https://doi. Cao, B., et al., 2020. Performance analysis and comparison of PoW, PoS and DAG based
org/10.1145/3376915. Mar. blockchains. Digit. Commun. Networks 6 (4), 480–485. https://doi.org/10.1016/j.
de Aguiar Hugo, A., Lima, R. da S., 2021. Healthcare waste management assessment: dcan.2019.12.001.
challenges for hospitals in COVID-19 pandemic times. Waste Manag. Res. 39 (1), Carson, B., Romanelli, G., Walsh, P., Zhumaev, A., 2018. Blockchain beyond the hype:
56–63. https://doi.org/10.1177/0734242X211010362 suppl. what is the strategic business value? McKinsey Q. 2018 (4), 118–127.
Aitzhan, N.Z., Svetinovic, D., 2018. Security and privacy in decentralized energy trading Castro, M., Liskov, B., 2002. Practical Byzantine Fault Tolerance and proactive recovery.
through multi-signatures, blockchain and anonymous messaging streams. IEEE ACM Trans. Comput. Syst. 20 (4), 398–461. https://doi.org/10.1145/
Trans. Dependable Secure Comput. 15 (5), 840–852. https://doi.org/10.1109/ 571637.571640. Nov.
TDSC.2016.2616861. Chakraborty, S., Aich, S., Kim, H.C., 2019. A secure healthcare system design framework
Al-Jaroodi, J., Mohamed, N., 2019. Blockchain in industries: a survey. IEEE Access 7, using blockchain technology. Int. Conf. Adv. Commun. Technol. ICACT 260–264.
36500–36515. https://doi.org/10.1109/ACCESS.2019.2903554. https://doi.org/10.23919/ICACT.2019.8701983, 2019-Febru.
Al-Karaki, J.N., Gawanmeh, A., Ayache, M., Mashaleh, A., 2019. DASS-CARE: a Chaumont, G., Bugnot, P., Hildreth, Z., Giraux, B., 2019. DPoPS: delegated proof-of-
decentralized, accessible, scalable, and secure healthcare framework using private-stake, a DPoS implementation under X-cash. a Monero based hybrid-privacy
blockchain. 2019 15th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 330–335. coin 1–46.
https://doi.org/10.1109/IWCMC.2019.8766714, 2019. Chelladurai, M.U., Pandian, D.S., Ramasamy, D.K., 2021. A blockchain based patient
Al-Sumaidaee, G., Alkhudary, R., Zilic, Z., Swidan, A., 2023. Performance analysis of a centric electronic health record storage and integrity management for e-Health
private blockchain network built on Hyperledger Fabric for healthcare. Inf. Process. systems. Heal. Policy Technol. 10 (4), 100513 https://doi.org/10.1016/J.
Manag. 60 (2), 103160 https://doi.org/10.1016/J.IPM.2022.103160. Mar. HLPT.2021.100513. Dec.

32
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W., 2017. On security analysis of proof-of- Conference on Hot Information-Centric Networking. HotICN, pp. 242–243. https://
elapsed-time (PoET). LNCS Lect. Notes Comput. Sci. 10616, 282–297. https://doi. doi.org/10.1109/HOTICN.2018.8606011. Jan. 2019.
org/10.1007/978-3-319-69084-1_19. October. Gupta, B.B., Sangaiah, A.K., Nedjah, N., Yamaguchi, S., Zhang, Z., Sheng, M., 2018.
Chen, G., Xu, B., Lu, M., Chen, N.-S., 2018. Exploring blockchain technology and its Recent research in computational intelligence paradigms into security and privacy
potential applications for education. Smart Learn. Environ. 5 (1), 1. https://doi.org/ for online social networks (OSNs). Future Generat. Comput. Syst. 86, 851–854.
10.1186/s40561-017-0050-x. https://doi.org/10.1016/j.future.2018.05.017.
Chen, Y., Xie, H., Lv, K., Wei, S., Hu, C., 2019. DEPLEST: a blockchain-based privacy- Haferkorn, M., Diaz, J.M.Q., 2015. Seasonality and interconnectivity within
preserving distributed database toward user behaviors in social networks. Inf. Sci. cryptocurrencies - an analysis on the basis of bitcoin, litecoin and namecoin. In:
501, 100–117. https://doi.org/10.1016/j.ins.2019.05.092. Oct. Lecture Notes in Business Information Processing, vol. 217, pp. 106–120. https://
Cheng, R., et al., 2019. Ekiden: a platform for confidentiality-preserving, trustworthy, doi.org/10.1007/978-3-319-28151-3_8.
and performant smart contracts. Proc. - 4th IEEE Eur. Symp. Secur. Privacy, EURO S Halim, A.H.A., Halim, M.H.A., Usman, S., 2021. Implementation of IoT and blockchain
P 185–200. https://doi.org/10.1109/EUROSP.2019.00023. Jun. 2019. for temperature monitoring in Covid19 vaccine cold chain logistics. Open Int. J.
Chenli, C., Li, B., Shi, Y., Jung, T., 2019. Energy-recycling Blockchain with Proof. -of- Informatics 9 (1), 78–87.
Deep-Learning. He, Y., Li, H., Cheng, X., Liu, Y., Yang, C., Sun, L., 2018. A blockchain based truthful
Dannen, C., 2017. Introducing Ethereum and Solidity: Foundations of Cryptocurrency incentive mechanism for distributed P2P applications. IEEE Access 6 (c),
and Blockchain Programming for Beginners, vol. 1. Springer. https://doi.org/ 27324–27335. https://doi.org/10.1109/ACCESS.2018.2821705.
10.1007/978-1-4842-2535-6. Heilman, E., Kendler, A., Zohar, A., Goldberg, S., 2015. Eclipse attacks on Bitcoin’s peer-
Dao, T.C., Nguyen, B.M., Do, B.L., 2020. Challenges and Strategies for Developing to-peer network. Proc. 24th USENIX Secur. Symp. 129–144. August.
Decentralized Applications Based on Blockchain Technology, vol. 926. Springer Hollander, M.J., Chappell, N.L., Prince, M.J., Shapiro, E., 2007. Providing care and
International Publishing. https://doi.org/10.1007/978-3-030-15032-7_80. support for an aging population: briefing notes on key policy issues. Healthc. Q. 10
Dennis, R., Owen, G., 2015. Rep on the block: a next generation reputation system based (3), 1–2. https://doi.org/10.12927/hcq.2007.18923.
on the blockchain. In: 2015 10th International Conference for Internet Technology Huang, X., Xu, C., Wang, P., Liu, H., 2018. LNSC: a security model for electric vehicle and
and Secured Transactions. ICITST, pp. 131–138. https://doi.org/10.1109/ charging pile management based on blockchain ecosystem. IEEE Access 6 (c),
ICITST.2015.7412073. Feb. 2016. 13565–13574. https://doi.org/10.1109/ACCESS.2018.2812176.
Dewangan, N.K., Chandrakar, P., 2022. Patient-centric token-based healthcare D. Huang, X. Ma, S. Zhang, and S. Member, “Performance Analysis of the Raft Consensus
blockchain implementation using secure internet of medical things. IEEE Trans. Algorithm for Private Blockchains,” pp. 1–7.
Comput. Soc. Syst. 1–11. https://doi.org/10.1109/TCSS.2022.3194872. Iansiti, M., Lakhani, K.R., 2017. The truth about blockchain. Harv. Bus. Rev. 2017,
Dhillon, V., Metcalf, D., Hooper, M., 2017. The Hyperledger Project. Blockchain Enabled 118–127. January-February.
Appl., pp. 139–149. https://doi.org/10.1007/978-1-4842-3081-7_10 Ibrahim, R.F., Abu Al-Haija, Q., Ahmad, A., 2022. DDoS attack prevention for internet of
Dutta, P., Choi, T.M., Somani, S., Butala, R., 2020. Blockchain technology in supply chain thing devices using ethereum blockchain technology. Sensors 22 (18), 6806.
operations: applications, challenges and research opportunities. Transport. Res. Part Islam, A., Young Shin, S., 2020. A blockchain-based secure healthcare scheme with the
E Logist. Transp. Rev. 142, 102067 https://doi.org/10.1016/J.TRE.2020.102067. assistance of unmanned aerial vehicle in Internet of Things. Comput. Electr. Eng. 84,
Oct. 106627 https://doi.org/10.1016/j.compeleceng.2020.106627. Jun.
Dziembowski, S., Faust, S., Kolmogorov, V., 2013. Proofs of Space, 616160. Ismail, L., Materwala, H., 2019. A review of blockchain architecture and consensus
Egala, B.S., Pradhan, A.K., Dey, P., Badarla, V., Mohanty, S.P., 2023. Fortified-Chain 2.0: protocols: use cases, challenges, and solutions. Symmetry 11 (10), 1–45. https://doi.
Intelligent Blockchain for Decentralized Smart Healthcare System. XX. IEEE Internet org/10.3390/sym11101198.
Things J. https://doi.org/10.1109/JIOT.2023.3247452. X. Jafri, R., Singh, S., 2022. 4 - Blockchain Applications for the Healthcare Sector: Uses
Ellervee, A., Matulevicius, R., Mayer, N., 2017. A comprehensive reference model for beyond Bitcoin. Elsevier Inc. https://doi.org/10.1016/B978-0-323-90615-9.00022-0
blockchain-based distributed ledger technology. CEUR Workshop Proc 1979, Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G., H., 2019. In: Al-Khateeb
320–333. (Ed.), Blockchain and Clinical Trial Securing Patient Data (Advanced Sciences and
Enescu, F.M., Bizon, N., Stirbu, C., Ionescu, V.M., 2018. Blockchain technology applied in Technologies for Security Applications).
health the study of blockchain application in the health system (II). In: Proceedings Jin, H., Chen, X., Lan, X., Guo, H., Zhang, H., Cao, Q., 2020. BNRDT: when data
of the 10th International Conference on Electronics, Computers and Artificial transmission meets blockchain. Secur. Commun. Network. 2020 https://doi.org/
Intelligence. ECAI. https://doi.org/10.1109/ECAI.2018.8679029. Apr. 2019. 10.1155/2020/8828984.
Fairley, P., 2019. Ethereum will cut back its absurd energy use. IEEE Spectr 56 (1), Kapoor, A., Guha, S., Kanti Das, M., Goswami, K.C., Yadav, R., 2020. Digital healthcare:
29–32. https://doi.org/10.1109/MSPEC.2019.8594790. the only solution for better healthcare during COVID-19 pandemic? Indian Heart J.
Fan, Y., Wu, H., Paik, H.Y., Dr-Bft, 2021. A consensus algorithm for blockchain-based 72 (2), 61–64. https://doi.org/10.1016/j.ihj.2020.04.001.
multi-layer data integrity framework in dynamic edge computing system. Future Khan, M.A., Salah, K., 2018. IoT security: review, blockchain solutions, and open
Generat. Comput. Syst. 124, 33–48. https://doi.org/10.1016/j.future.2021.04.020. challenges. Future Generat. Comput. Syst. 82, 395–411. https://doi.org/10.1016/j.
Fanning, K., Centers, D.P., 2016. Blockchain and its coming impact on financial services. future.2017.11.022.
J. Corp. Account. Finance 27 (5), 53–57. https://doi.org/10.1002/jcaf.22179. Jul. Khan, D., Jung, L.T., Hashmani, M.A., 2021. Systematic literature review of challenges in
Ferretti, S., D’Angelo, G., 2020. On the Ethereum blockchain structure: a complex blockchain scalability, 11, Page 9372 Appl. Sci. 11 (20), 9372. https://doi.org/
networks theory perspective. Concurrency Comput. Pract. Ex. 32 (12), e5493 10.3390/APP11209372. Oct. 2021.
https://doi.org/10.1002/CPE.5493. Jun. Khatri, S., Alzahrani, F.A., Ansari, M.T.J., Agrawal, A., Kumar, R., Khan, R.A., 2021.
Flavio, M.S., Junqueira, P., Reed, Benjamin C., 2011. Zab: High-Performance Broadcast A systematic analysis on blockchain integration with healthcare domain: scope and
for Primary-Backup Systems. IEEE. challenges. IEEE Access 9, 84666. https://doi.org/10.1109/access.2021.3087608,
Fontana, P., Diirr, B., Cappelli, C., 2018. Transparency Challenges in Blockchain, vol. 84687, Jun.
193. EGOV-CeDEM-ePart, 2018. King, S., Nadal, S., 2012. PPCoin : peer-to-peer crypto-currency with proof-of-stake. self-
Friedlmaier, M., Tumasjan, A., Welpe, I.M., 2017. Disrupting Industries with Blockchain: published Pap 19 (1). August.
the Industry, Venture Capital Funding, and Regional Distribution of Blockchain Kombe, C., Ally, M., Sam, A., 2018. A review on healthcare information systems and
Ventures. SSRN Electron. J., Jun https://doi.org/10.2139/ssrn.2854756. consensus protocols in blockchain technology. Int. J. Adv. Technol. Eng. Explor. 5
Frommelt, E., 2020. Liability Challenges in the Blockchain Ecosystem, vol. 21. UC Davis (49), 473–483. https://doi.org/10.19101/ijatee.2018.547023.
Bus. LJ, p. 165. Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C., 2016. Hawk: the blockchain
Fu, Y., Zhu, J., 2019. Big production enterprise supply chain endogenous risk model of cryptography and privacy-preserving smart contracts. Proc. - 2016 IEEE
management based on blockchain. IEEE Access 7, 15310–15319. https://doi.org/ Symp. Secur. Privacy, SP 839–858. https://doi.org/10.1109/SP.2016.55. Aug. 2016.
10.1109/ACCESS.2019.2895327. Koteska, B., Karafiloski, E., Mishev, A., 2017. Blockchain Implementation Quality
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Čapkun, S., 2016. On the Challenges: A Literature Review.
security and performance of Proof of Work blockchains. Proc. ACM Conf. Comput. Kumar, N.M., Mallick, P.K., 2018. Blockchain technology for security issues and
Commun. Secur. 24 (28), 3–16. https://doi.org/10.1145/2976749.2978341. Octo. challenges in IoT. Procedia Comput. Sci. 132, 1815–1823. https://doi.org/10.1016/
Glaser, F., 2017. Pervasive decentralisation of digital infrastructures: a framework for j.procs.2018.05.140.
blockchain enabled system and use case analysis. Proc. Annu. Hawaii Int. Conf. Syst. Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Jolfaei, A., Najmul Islam, A.K.M., 2023.
Sci. 2017, 1543–1552. https://doi.org/10.24251/hicss.2017.186. Janua. A blockchain-orchestrated deep learning approach for secure data transmission in
Gohar, A.N., Abdelmawgoud, S.A., Farhan, M.S., 2022. A patient-centric healthcare IoT-enabled healthcare system. J. Parallel Distr. Comput. 172, 69–83. https://doi.
framework reference architecture for better semantic interoperability based on org/10.1016/J.JPDC.2022.10.002.
blockchain, cloud, and IoT. IEEE Access 10, 92137–92157. https://doi.org/10.1109/ Kuo, T.T., Kim, H.E., Ohno-Machado, L., 2017. Blockchain distributed ledger
ACCESS.2022.3202902. technologies for biomedical and health care applications. J. Am. Med. Inf. Assoc. 24
Gökalp, E., Gökalp, M.O., Çoban, S., Eren, P.E., 2018. Analysing opportunities and (6), 1211–1220, Nov. https://doi.org/10.1093/jamia/ocx068.
challenges of integrated blockchain technologies in healthcare. Lect. Notes Bus. Inf. Kuo, T.T., Zavaleta Rojas, H., Ohno-Machado, L., 2019. Comparison of blockchain
Process. 333, 174–183. https://doi.org/10.1007/978-3-030-00060-8_13. platforms: a systematic review and healthcare examples. J. Am. Med. Inf. Assoc. 26
Gordon, W.J., Catalini, C., 2018. Blockchain Technology for Healthcare: Facilitating the (5), 462–478. https://doi.org/10.1093/jamia/ocy185.
Transition to Patient-Driven Interoperability,” Computational And Structural Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., Zhang, Y., 2018. Consortium blockchain for
Biotechnology Journal, vol. 16. Elsevier B.V., pp. 224–230. https://doi.org/10.1016/j. secure energy trading in industrial internet of things. IEEE Trans. Ind. Inf. 14 (8),
csbj.2018.06.003. Jan. 01. 3690–3700. https://doi.org/10.1109/TII.2017.2786307. Aug.
Guo, Y., et al., 2018. WISChain: an online insurance system based on blockchain and Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D., 2018a. Integrating blockchain for data
DengLu1 for web identity security. In: Proceedings of 2018 1st IEEE International sharing and collaboration in mobile healthcare applications. IEEE Int. Symp. Pers.

33
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Indoor Mob. Radio Commun. PIMRC 2017, 1–5. https://doi.org/10.1109/ Musamih, A., Jayaraman, R., Salah, K., Hasan, H.R., Yaqoob, I., Al-Hammadi, Y., 2021b.
PIMRC.2017.8292361. Octob. Blockchain-based solution for distribution and delivery of COVID-19 vaccines. IEEE
Liang, X., Shetty, S., Tosh, D., 2018b. Exploring the attack surfaces in blockchain enabled Access 9, 71372–71387. https://doi.org/10.1109/ACCESS.2021.3079197.
smart cities, 2018 IEEE Int. Smart Cities Conf. ISC2. https://doi.org/10.1109/ Musamih, A., Salah, K., Jayaraman, R., Yaqoob, I., Al-Hammadi, Y., Antony, J., 2022.
ISC2.2018.8656852. Feb. 2019. Blockchain-based solution for COVID-19 vaccine waste reduction. J. Clean. Prod.
Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y., 2019. Distributed blockchain-based 372 (August), 133619 https://doi.org/10.1016/j.jclepro.2022.133619.
data protection framework for modern power systems against cyber attacks. IEEE Nabil, S.S., Alam Pran, M.S., Al Haque, A.A., Chakraborty, N.R., Chowdhury, M.J.M.,
Trans. Smart Grid 10 (3), 3162–3173. https://doi.org/10.1109/TSG.2018.2819663. Ferdous, M.S., 2022. Blockchain-based COVID vaccination registration and
Lin, C., He, D., Huang, X., Choo, K.K.R., Vasilakos, A.V., 2018. BSeIn: a blockchain-based monitoring. Blockchain Res. Appl. 3 (4) https://doi.org/10.1016/j.
secure mutual authentication with fine-grained access control system for industry bcra.2022.100092.
4.0. J. Netw. Comput. Appl. 116, 42–52. https://doi.org/10.1016/j. Nakamoto, S., 2008. Bitcoin: A Peer-To-Peer Electronic Cash System. Decentralized Bus.
jnca.2018.05.005. February. Rev., 21260
Lindman, J., Rossi, M., Tuunainen, V.K., 2017. Opportunities and risks of blockchain Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S., 2016. Bitcoin and
technologies in payments - a research agenda. Janua Proc. Annu. Hawaii Int. Conf. Cryptocurrency Technologies: a Comprehensive Introduction. Princeton University
Syst. Sci. 2017, 1533–1542, Jan. Accessed: Dec. 10, 2019. [Online]. Available: https Press.
://aisel.aisnet.org/hicss-50/da/open_digital_services/3. Odhran, A. A. Vazirani, Brindley, D., Meinert, E., 2019. Design choices and trade-offs in
Linn, L.A., Koo, M.B., 2016. Blockchain for health data and its potential use in health IT health care blockchain implementations: systematic review, 2019 J. Med. Internet
and health care related research. In: ONC/NIST Use of Blockchain for Healthcare and Res. 21 (5), e12426. https://doi.org/10.2196/12426, 21, no. 5, p. e12426, May.
Research Workshop, pp. 1–10. Ojo, A., Adebayo, S., 2017. Blockchain as a next generation government information
Liu, C., Xiao, Y., Javangula, V., Hu, Q., Wang, S., Cheng, X., 2019a. NormaChain: a infrastructure: a review of initiatives in D5 countries. In: Public Administration and
blockchain-based normalized autonomous transaction settlement system for IoT- Information Technology, vol. 32. Springer, pp. 283–298. https://doi.org/10.1007/
based e-commerce. IEEE Internet Things J. 6 (3), 4680–4693, Jun. https://doi.org/ 978-3-319-63743-3_11.
10.1109/JIOT.2018.2877634. Ølnes, S., Ubacht, J., Janssen, M., 2017. Blockchain in government: benefits and
Liu, X., Wang, Z., Jin, C., Li, F., Li, G., 2019b. A blockchain-based medical data sharing implications of distributed ledger technology for information sharing. Elsevier Ltd
and protection scheme. IEEE Access 7, 118943–118953. https://doi.org/10.1109/ Govern. Inf. Q. 34 (3), 355–364. https://doi.org/10.1016/j.giq.2017.09.007. Sep.
ACCESS.2019.2937685. 01.
Liu, Z., Tang, S., Chow, S.S.M., Liu, Z., Long, Y., 2019c. Fork-free hybrid consensus with Omar, I.A., Jayaraman, R., Salah, K., Yaqoob, I., Ellahham, S., 2020. Applications of
flexible Proof-of-Activity. Future Generat. Comput. Syst. 96, 515–524. https://doi. blockchain technology in clinical trials: review and open challenges, 464 Arabian J.
org/10.1016/j.future.2019.02.059. Sci. Eng. 46 (4), 3001–3015. https://doi.org/10.1007/S13369-020-04989-3. Oct.
Liu, Y., Lan, Y., Li, B., Miao, C., Tian, Z., 2021. Proof of Learning (PoLe): empowering 2020.
neural network training with consensus building on blockchains. Comput. Network. Omar, I.A., Jayaraman, R., Debe, M.S., Salah, K., Yaqoob, I., Omar, M., 2021. Automating
201, 108594 https://doi.org/10.1016/j.comnet.2021.108594. procurement contracts in the healthcare supply chain using blockchain smart
Liu, Y., Yu, W., Ai, Z., Xu, G., Zhao, L., Tian, Z., 2022a. A blockchain-empowered contracts. IEEE Access 9, 37397–37409. https://doi.org/10.1109/
federated learning in healthcare-based cyber physical systems. IEEE Trans. Netw. ACCESS.2021.3062471.
Sci. Eng. https://doi.org/10.1109/TNSE.2022.3168025. Onesimu, J.A., Karthikeyan, J., Sei, Y., 2021. An efficient clustering-based
Liu, J., et al., 2022b. Conditional anonymous remote healthcare data sharing over anonymization scheme for privacy-preserving data collection in IoT based
blockchain. XX IEEE J. Biomed. Heal. Informatics 1–12. https://doi.org/10.1109/ healthcare services. Peer-to-Peer Netw. Appl 14 (3), 1629–1649. https://doi.org/
JBHI.2022.3183397. Xx. 10.1007/s12083-021-01077-7. Feb.
Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., Sassone, V., 2018. A blockchain- ontology/consensus/dbft at master ⋅ ontio/ontology ⋅ GitHub. https://github.com/ontio
based infrastructure for reliable and cost-effective IoT-aided smart grids. In: IET /ontology/tree/master/consensus/dbft. (Accessed 10 February 2023).
Conference Publications, vol. 2018, p. CP740. https://doi.org/10.1049/ Otte, P., de Vos, M., Pouwelse, J., 2020. TrustChain: a Sybil-resistant scalable blockchain.
cp.2018.0042. Future Generat. Comput. Syst. 107, 770–780. https://doi.org/10.1016/j.
López-Pintado, O., Garc\’\ia-Bañuelos, L., Dumas, M., Weber, I., 2017. Caterpillar: a future.2017.08.048.
blockchain-based business process management system. In: BPM (Demos). Patel, V., 2019. A framework for secure and decentralized sharing of medical imaging
Lu, Y., 2019a. Artificial intelligence: a survey on evolution, models, applications and data via blockchain consensus. Health Inf. J. 25 (4), 1398–1411. https://doi.org/
future trends. J. Manag. Anal. 6 (1), 1–29. https://doi.org/10.1080/ 10.1177/1460458218769699. Dec.
23270012.2019.1570365. Peterson, K., Deeduvanu, R., Kanjamala, P., Boles, K., 2017. A blockchain-based
Lu, Y., 2019b. The blockchain: state-of-the-art and research challenges. J. Ind. Inf. Integr. approach to health information exchange networks, 2016 NIST Workshop
15, 80–90. https://doi.org/10.1016/J.JII.2019.04.002. Blockchain Healthcare 1 (1), 1–10 [Online]. Available: http://kddlab.zjgsu.edu.
Lundqvist, T., De Blanche, A., Andersson, H.R.H., 2017. Thing-to-thing electricity micro cn:7200/research/blockchain/huyiyang-reference/A Blockchain-Based Approach to
payments using blockchain technology. In: GIoTS 2017 - Global Internet of Things Health Information Exchange.pdf.
Summit. Proceedings. https://doi.org/10.1109/GIOTS.2017.8016254. Aug. Pilkington, M., 2016. 11 Blockchain technology: principles and applications. Res. Handb.
Luo, X., Yang, P., Wang, W., Gao, Y., Yuan, M., S-PoDL, 2021. A two-stage Digit. Transform. 225.
computational-efficient consensus mechanism for blockchain-enabled multi-access Pop, C., Cioara, T., Antal, M., Anghel, I., Salomie, I., Bertoncini, M., 2018. Blockchain
edge computing. Phys. Commun. 46, 101338 https://doi.org/10.1016/j. based decentralized management of demand response programs in smart energy
phycom.2021.101338. grids. Sensors 18 (1), 162. https://doi.org/10.3390/s18010162.
Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A., 2016. Making smart contracts Popov, S., 2016. A probabilistic analysis of the Nxt forging algorithm. Ledge 1, 69–83.
smarter. Proc. ACM Conf. Comput. Commun. Secur. 24 (28), 254–269. https://doi. https://doi.org/10.5195/ledger.2016.46.
org/10.1145/2976749.2978309. October-2016. Prakash, R., 2016. Adoption of block-chain to enable the scalability and adoption of
Luu, L., Velner, Y., Teutsch, J., Saxena, P., 2017. Smart pool: practical decentralized Accountable Care. In: NIST Workshop on Blockchain & Healthcare (August).
pooled mining. In: USENIX Security Symposium, pp. 1409–1426. Prashanth Joshi, A., Han, M., Wang, Y., 2018. A survey on security and privacy issues of
M. C., Liskov, B., 2010. Practical Byzantine Fault Tolerance miguel. Juv. Delinq. Eur. blockchain technology. Math. Found. Comput. 1 (2), 121–147. https://doi.org/
Beyond Results Second Int. Self-Report Delinq. Study, no. February 359–368. 10.3934/mfc.2018007.
Mahmood, Z., 2021. Impact of Blockchain technology in healthcare sector during De Prisco, R., Lampson, B., Lynch, N., 2000. Revisiting the PAXOS algorithm 243, 35–91.
COVID-19 pandemic. In: Computer Science \& Information Technology: Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Das, G., 2018. Everything you
International Conference on AI, Machine Learning and Applications (AIMLA 2021, vol. wanted to know about the blockchain: its promise, components, processes, and
11, pp. 75–88. August 28\~{ } 29, 2021, Dubai, UAE. problems. IEEE Consum. Electron. Mag. 7 (4), 6–14. https://doi.org/10.1109/
Marcus, Y., Heilman, E., Goldberg, S., 2018. Low-resource eclipse attacks on ethereum’s MCE.2018.2816299. Jul.
peer-to-peer network. January IACR Cryptol. ePrint Arch. 236, 2018, [Online]. Radjenovic, Z., 2019. The cost- saving role of blockchain technology as a data integrity
Available: https://eprint.iacr.org/2018/236.pdf. tool: E-health scenario. KnE Soc. Sci. 339–352. https://doi.org/10.18502/kss.
Mazieres, D., 2015. The stellar consensus protocol: a federated model for internet-level v4i1.5998, 2020.
consensus. Stellar Dev. Found. 32. Radziwill, N., 2018. Blockchain revolution: how the technology behind bitcoin is
McFarlane, T.D., Dixon, B.E., Grannis, S.J., 2016. Client registries: identifying and changing money. Bus. World 25 (1). https://doi.org/10.1080/
linking patients. Heal. Inf. Exch. Navig. Manag. a Netw. Heal. Inf. Syst. 163–182. 10686967.2018.1404373. Penguin.
https://doi.org/10.1016/B978-0-12-803135-3.00011-6. Jan. Raikwar, M., Mazumdar, S., Ruj, S., Sen Gupta, S., Chattopadhyay, A., Lam, K.Y., 2018.
McGhin, T., Choo, K.K.R., Liu, C.Z., He, D., 2019. Blockchain in healthcare applications: A blockchain framework for insurance processes. In: 2018 9th IFIP International
research challenges and opportunities. J. Netw. Comput. Appl. 135, 62–75. https:// Conference On New Technologies, Mobility And Security, NTMS 2018 - Proceedings,
doi.org/10.1016/j.jnca.2019.02.027. vol. 2018, pp. 1–4. https://doi.org/10.1109/NTMS.2018.8328731. Mar.
Miller, D., 2018. Blockchain and the internet of things in the industrial sector. IT Prof 20 Ramachandran, A., Kantarcioglu, D.M., 2017. Using Blockchain and Smart Contracts for
(3), 15–18. https://doi.org/10.1109/MITP.2018.032501742. Secure Data Provenance Management. Accessed: Jun. 20, 2020. [Online]. Available:
Mukta, R., young Paik, H., Lu, Q., Kanhere, S.S., 2022. A survey of data minimisation http://arxiv.org/abs/1709.10000.
techniques in blockchain-based healthcare. Comput. Network. 205, 108766 https:// Rehman, A., Abbas, S., Khan, M.A., Ghazal, T.M., Adnan, K.M., Mosavi, A., 2022.
doi.org/10.1016/J.COMNET.2022.108766. Mar. A secure healthcare 5.0 system based on blockchain technology entangled with
Musamih, A., et al., 2021a. A blockchain-based approach for drug traceability in federated learning technique. Comput. Biol. Med. 150, 106019 https://doi.org/
healthcare supply chain. IEEE Access 9, 9728–9743. https://doi.org/10.1109/ 10.1016/J.COMPBIOMED.2022.106019. Nov.
ACCESS.2021.3049920.

34
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Ren, B., Yang, L.T., Zhang, Q., Feng, J., Nie, X., 2022a. Blockchain-powered tensor meta- Tromp, J., 2014. Cuckoo Cycle: a Memory-Hard Proof-Of-Work System, pp. 1–8.
learning-driven intelligent healthcare system with IoT assistance. IEEE Trans. Netw. Tschorsch, F., Scheuermann, B., 2016. Bitcoin and beyond: a technical survey on
Sci. Eng. 1–10. https://doi.org/10.1109/tnse.2022.3227317. decentralized digital currencies. IEEE Commun. Surv. Tutorials 18 (3), 2084–2123.
Ren, J., Li, J., Liu, H., Qin, T., 2022b. Task offloading strategy with emergency handling https://doi.org/10.1109/COMST.2016.2535718.
and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tseng, T.W., Yang, C.Y., Liu, C.T., 2016. Designing privacy information protection of
Tsinghua Sci. Technol. 27 (4), 760–776. https://doi.org/10.26599/ electronic medical records. Proc. - 2016 Int. Conf. Comput. Sci. Comput. Intell. CSCI
TST.2021.9010046. 75–80. https://doi.org/10.1109/CSCI.2016.0022. Mar. 2017.
Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M., 2018. On blockchain and its Tseng, J.H., Liao, Y.C., Chong, B., Liao, S.W., 2018. Governance on the drug supply chain
integration with IoT. Challenges and opportunities. Future Generat. Comput. Syst. via gcoin blockchain. Int. J. Environ. Res. Publ. Health 15 (6). https://doi.org/
88, 173–190. https://doi.org/10.1016/j.future.2018.05.046. 10.3390/ijerph15061055.
Rinaldi, M., et al., 2022. Improving the Distribution Vaccines Using the Blockchain Underwood, S., 2016. Blockchain beyond bitcoin. Commun. ACM 59 (11), 15–17.
Technology : the Italian Case Study, 2023. https://doi.org/10.1145/2994581. ACM New York, NY, USA.
Roehrs, A., da Costa, C.A., da Rosa Righi, R., 2017. OmniPHR: a distributed architecture Vithanwattana, N., Mapp, G., George, C., 2016. mHealth - investigating an information
model to integrate personal health records. J. Biomed. Inf. 71, 70–81. https://doi. security framework for mHealth data: challenges and possible solutions. Proc. - 12th
org/10.1016/J.JBI.2017.05.012. Int. Conf. Intell. Environ. IE 258–261. https://doi.org/10.1109/IE.2016.59. Oct.
Salimitari, M., Chatterjee, M., 2018. A Survey on Consensus Protocols in Blockchain for 2016.
IoT Networks [Online]. Available: http://arxiv.org/abs/1809.05613. (Accessed 25 Vo, H.T., Kundu, A., Mohania, M., 2018. Research directions in blockchain data
August 2021). management and analytics. Adv. Database Technol. - EDBT 2018, 445–448. https://
Sarier, N.D., 2022. Privacy preserving biometric authentication on the blockchain for doi.org/10.5441/002/edbt.2018.43. March.
smart healthcare. Pervasive Mob. Comput. 86, 101683 https://doi.org/10.1016/j. Vora, J., Tanwar, S., Tyagi, S., Kumar, N., Rodrigues, J.J.P.C., 2017. Home-based
pmcj.2022.101683. exercise system for patients using IoT enabled smart speaker, 2017, Dec. 2017. In:
Shah, H., Shah, M., Tanwar, S., Kumar, N., 2021. Blockchain for COVID-19: a IEEE 19th International Conference on E-Health Networking, Applications and
comprehensive review. Personal Ubiquitous Comput. https://doi.org/10.1007/ Services, vol. 2017. Healthcom, pp. 1–6. https://doi.org/10.1109/
s00779-021-01610-8. HealthCom.2017.8210826. Decem.
Shahnaz, A., Qamar, U., Khalid, A., 2019. Using blockchain for electronic health records. Vukolić, M., 2015. The quest for scalable blockchain fabric: proof-of-work vs. BFT
IEEE Access 7, 147782–147795. https://doi.org/10.1109/ACCESS.2019.2946373. replication. Lect. Notes Comput. Sci. 9591, 112–125. https://doi.org/10.1007/978-
Sharma, P.K., Kumar, N., Park, J.H., 2019. Blockchain-based distributed framework for 3-319-39028-4_9. Oct.
automotive industry in a smart city. IEEE Trans. Ind. Inf. 15 (7), 4197–4205, Jul. Vukolić, M., 2017. Rethinking permissioned blockchains. In: BCC 2017 - Proceedings of
https://doi.org/10.1109/TII.2018.2887101. the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 3–7. https://
Shi, S., He, D., Li, L., Kumar, N., Khan, M.K., Choo, K.K.R., 2020. Applications of doi.org/10.1145/3055518.3055526. co-located with ASIA CCS 2017, Apr.
blockchain in ensuring the security and privacy of electronic health record systems: a Wang, J., Li, M., He, Y., Li, H., Xiao, K., Wang, C., 2018. A blockchain based privacy-
survey. Comput. Secur. 97, 101966 https://doi.org/10.1016/J.COSE.2020.101966. preserving incentive mechanism in crowdsensing applications. IEEE Access 6,
Oct. 17545–17556. https://doi.org/10.1109/ACCESS.2018.2805837.
Shrestha, A.K., Vassileva, J., 2018. Blockchain-based research data sharing framework Wang, H., Wang, Y., Cao, Z., Li, Z., Xiong, G., 2019. An Overview of Blockchain Security
for incentivizing the data owners. In: Lecture Notes in Computer Science (Including Analysis, vol. 970. Springer Singapore. https://doi.org/10.1007/978-981-13-6621-
Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in 5_5.
Bioinformatics), vol. 10974. LNCS, pp. 259–266. https://doi.org/10.1007/978-3- Wang, Q., Qin, B., Hu, J., Xiao, F., 2020. Preserving transaction privacy in bitcoin. Future
319-94478-4_19. Generat. Comput. Syst. 107 (September), 793–804. https://doi.org/10.1016/j.
Shuaib, K., Abdella, J., Sallabi, F., Serhani, M.A., 2021a. Secure decentralized electronic future.2017.08.026.
health records sharing system based on blockchains. J. King Saud Univ. - Comput. Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.J.,
Inf. Sci. https://doi.org/10.1016/j.jksuci.2021.05.002 no. xxxx. 2015. Blockchain contract: a complete consensus using blockchain. In: IEEE 4th
Singh, A.P., et al., 2021. A novel patient-centric architectural framework for blockchain- Global Conference on Consumer Electronics. GCCE, pp. 577–578. https://doi.org/
enabled healthcare applications. IEEE Trans. Ind. Inf. 17 (8), 5779–5789. https:// 10.1109/GCCE.2015.7398721, 2015, Feb. 2016.
doi.org/10.1109/TII.2020.3037889. Aug. Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J., 2016.
Singh, J., Sinha, A., Goli, P., Subramanian, V., Shukla, S.K., Vyas, O.P., 2022. Insider Untrusted business process monitoring and execution using blockchain. Lect. Notes
attack mitigation in a smart metering infrastructure using reputation score and Comput. Sci. 9850, 329–347. https://doi.org/10.1007/978-3-319-45348-4_19.
blockchain technology. Int. J. Inf. Secur. 21 (3), 527–546. https://doi.org/10.1007/ LNCS.
S10207-021-00561-8/TABLES/5. Wolfond, G., 2017. A blockchain ecosystem for digital identity: improving service
Song, J., Zhang, P., Alkubati, M., Bao, Y., Yu, G., 2021. Research advances on blockchain- delivery in Canada’s public and private sectors. Technol. Innov. Manag. Rev. 7 (10),
as-a-service: architectures, applications and challenges. Digit. Commun. Networks, 35–40. https://doi.org/10.22215/timreview/1112.
Feb. https://doi.org/10.1016/j.dcan.2021.02.001. Wright, C.S., 2019. Bitcoin: a peer-to-peer electronic cash system. SSRN Electron. J.,
Sookhak, M., Jabbarpour, M.R., Safa, N.S., Yu, F.R., 2021. Blockchain and smart contract 21260 https://doi.org/10.2139/ssrn.3440802.
for access control in healthcare: a survey, issues and challenges, and open issues. Wutthikarn, R., Hui, Y.G., 2018. Prototype of blockchain in dental care service
J. Netw. Comput. Appl. 178, 102950 https://doi.org/10.1016/J. application based on hyperledger composer in hyperledger fabric framework, 2018.
JNCA.2020.102950. Mar. In: International Computer Science and Engineering Conference, 22nd. ICSEC.
Stephanie, V., Khalil, I., Atiquzzaman, M., Yi, X., 2022. Trustworthy privacy-preserving https://doi.org/10.1109/ICSEC.2018.8712639. Jul. 2018.
hierarchical ensemble and federated learning in healthcare 4.0 with blockchain. XX Xiang, X., Zhao, X., 2022. Blockchain-assisted searchable attribute-based encryption for
IEEE Trans. Ind. Inf. 1–10. https://doi.org/10.1109/TII.2022.3214998. Xx. e-health systems. J. Syst. Architect., 102417 https://doi.org/10.1016/J.
Su, Z., Wang, Y., Xu, Q., Zhang, N., 2022. LVBS: lightweight vehicular blockchain for SYSARC.2022.102417. Feb.
secure data sharing in disaster rescue. IEEE Trans. Dependable Secure Comput. 19 Xu, J.J., 2016. Are blockchains immune to all malicious attacks? Financ. Innov 2 (1),
(1), 19–32. https://doi.org/10.1109/TDSC.2020.2980255. 1–9. https://doi.org/10.1186/S40854-016-0046-5, 2016 21.
Sun, J., Ren, L., Wang, S., Yao, X., 2020. A blockchain-based framework for electronic Xu, G., et al., 2022. Journal of Parallel and Distributed Computing SG-PBFT : a secure
medical records sharing with fine-grained access control. PLoS One 15 (10), and highly efficient distributed blockchain PBFT consensus algorithm for intelligent
e0239946. https://doi.org/10.1371/JOURNAL.PONE.0239946. Oct. Internet of vehicles. J. Parallel Distr. Comput. 164, 1–11. https://doi.org/10.1016/j.
Sunny, J., Undralla, N., Madhusudanan Pillai, V., 2020. Supply chain transparency jpdc.2022.01.029.
through blockchain-based traceability: an overview with demonstration. Comput. Yang, X., Liu, J., Li, X., 2019. Research and analysis of blockchain data. Jul. In: Journal of
Ind. Eng. 150, 106895 https://doi.org/10.1016/j.cie.2020.106895. Physics: Conference Series, vol. 1237. https://doi.org/10.1088/1742-6596/1237/2/
Suzuki, S., Murai, J., 2017. Blockchain as an audit-able communication channel. Proc. - 022084, 2.
Int. Comput. Softw. Appl. Conf. 2, 516–522. https://doi.org/10.1109/ Yin, W., Wen, Q., Li, W., Zhang, H., Jin, Z., 2017. An anti-quantum transaction
COMPSAC.2017.72. authentication approach in blockchain. IEEE Access 6, 5393–5401. https://doi.org/
Taloba, A.I., et al., 2023. A blockchain-based hybrid platform for multimedia data 10.1109/ACCESS.2017.2788411.
processing in IoT-Healthcare. Alex. Eng. J. 65, 263–274. https://doi.org/10.1016/J. Younis, M., Lalouani, W., Lasla, N., Emokpae, L., Abdallah, M., 2022. Blockchain-enabled
AEJ.2022.09.031. and data-driven smart healthcare solution for secure and privacy-preserving data
Tandon, A., Dhir, A., Islam, N., Mäntymäki, M., 2020. Blockchain in healthcare: a access. IEEE Syst. J. 16 (3), 3746–3757. https://doi.org/10.1109/
systematic literature review, synthesizing framework and future research agenda. JSYST.2021.3092519.
Comput. Ind. 122, 103290 https://doi.org/10.1016/J.COMPIND.2020.103290. Nov. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W., 2016. Healthcare data gateways: found
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L., 2017. Security healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst.
implications of blockchain cloud with analysis of block withholding attack. In: 40 (10), 1–8. https://doi.org/10.1007/s10916-016-0574-6.
Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Zaabar, B., Cheikhrouhou, O., Jamil, F., Ammi, M., Abid, M., 2021. HealthBlock: a secure
Grid Computing. CCGRID, pp. 458–467. https://doi.org/10.1109/ blockchain-based healthcare data management system. Comput. Network. 200,
CCGRID.2017.111. Jul. 2017. 108500 https://doi.org/10.1016/j.comnet.2021.108500. Dec.
Treiblmaier, H., Sillaber, C., 2021. The impact of blockchain on e-commerce: a Zhan, Y., Wang, B., Lu, R., Yu, Y., 2021. DRBFT: delegated randomization Byzantine fault
framework for salient research topics. Electron. Commer. Res. Appl. 48 (April), tolerance consensus protocol for blockchains. Inf. Sci. 559, 8–21. https://doi.org/
101054 https://doi.org/10.1016/j.elerap.2021.101054. 10.1016/J.INS.2020.12.077.
Treleaven, P., Brown, R.G., Yang, D., 2017. Blockchain technology in finance. Computer Zhang, S., Lee, J.H., 2020. Analysis of the main consensus protocols of blockchain. ICT
(Long. Beach. Calif). 50 (9), 14–17. https://doi.org/10.1109/MC.2017.3571047. Express 6 (2), 93–97. https://doi.org/10.1016/j.icte.2019.08.001.

35
A. J et al. Journal of Network and Computer Applications 215 (2023) 103633

Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E., 2016. Town crier: an authenticated presently pursuing her Ph.D. degree in Computer Science and Engineering at KITS. She
data feed for smart contracts. Proc. ACM Conf. Comput. Commun. Secur. 24–28, received her B.E degree from Anna University in 2005. She received her M.E degree from
270–282. https://doi.org/10.1145/2976749.2978326. October-2016. Karunya University in 2008. Her areas of interest include computer networks, wireless
Zhang, P., Schmidt, D.C., White, J., Lenz, G., 2018a. Blockchain technology use cases in sensor networks and software defined networks.
healthcare. In: Advances in Computers, vol. 111. Academic Press Inc., pp. 1–41.
https://doi.org/10.1016/bs.adcom.2018.03.006
K. Martin Sagayam, K. Martin Sagayam received his Ph.D in the research field of Signal,
Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T., 2018b. FHIRChain:
Image processing and machine learning approaches in 2018. Master degree in Commu­
applying blockchain to securely and scalably share clinical data. Comput. Struct.
nication Systems from Anna University in the year 2012 and B.E degree in Electronics and
Biotechnol. J. 16, 267–278. https://doi.org/10.1016/J.CSBJ.2018.07.004. Jan.
Communication Engineering from Anna University in the year 2009. Currently, he is
Zhang, G., Yang, Z., Liu, W., 2022a. Blockchain-based privacy preserving e-health system
working as an Assistant Professor in the Department of Electronics and Communication
for healthcare data in cloud. Comput. Network. 203, 108586 https://doi.org/
Engineering at Karunya Institute Technology and Sciences (Deemed University). He has
10.1016/J.COMNET.2021.108586. Feb.
authored/ co-authored in several referred International Journals, and conferences. He is
Zhang, J., Yang, Y., Liu, X., Ma, J., 2022b. An efficient blockchain-based hierarchical
an active member in various professional bodies. His area of interest includes pattern
data sharing for healthcare internet of things. IEEE Trans. Ind. Inf. 18 (10),
recognition, artificial intelligence, big data security, privacy preserving and signal pro­
7139–7150. https://doi.org/10.1109/TII.2022.3145851.
cessing in imaging.
Zhang, B., Wang, X., Xie, R., Li, C., Zhang, H., Jiang, F., 2022c. A reputation mechanism
based Deep Reinforcement Learning and blockchain to suppress selfish node attack
motivation in Vehicular Ad-Hoc Network. Futur. Gener. Comput. Syst., Sep. https:// Bharat Bhushan, Bharat Bhushan (Senior Member, IEEE) received the B.Tech. degree
doi.org/10.1016/J.FUTURE.2022.09.010. (Hons.) in computer science and engineering, the M.Tech. degree (Hons.) in information
Zhao, Z., Li, X., Luan, B., Jiang, W., Gao, W., Neelakandan, S., 2023. Secure Internet of security, and the Ph.D. degree in computer science and engineering from the Birla Institute
Things (IoT) Using a Novel Brooks Iyengar Quantum Byzantine Agreement-Centered of Technology, Mesra, India, in 2012, 2015, and 2021, respectively. In the past, he worked
Blockchain Networking (BIQBA-BCN) Model in Smart Healthcare. Inf. Sci. (Ny). as an Assistant Professor with the HMR Institute of Technology and Management, New
https://doi.org/10.1016/J.INS.2023.01.020. Jan. Delhi; and a Networks Engineer with HCL Infosystems Ltd., Noida. He is an Assistant
Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H., 2018a. Blockchain challenges and Professor with the Department of Computer Science and Engineering (CSE), School of
opportunities: a survey. Int. J. Web Grid Serv. 14 (4), 352–375. https://doi.org/ Engineering and Technology, Sharda University, Greater Noida, India. He earned
10.1504/IJWGS.2018.095647. numerous international certifications such as CCNA, MCTS, MCITP, RHCE, and CCNP. He
Zheng, P., Zheng, Z., Luo, X., Chen, X., Liu, X., 2018b. A detailed and real-time has published more than 100 research papers in various renowned international confer­
performance monitoring framework for blockchain systems. In: Proceedings - ences and SCI-indexed journals, including Journal of Network and Computer Applications
International Conference on Software Engineering, pp. 134–143. https://doi.org/ (Elsevier), Wireless Networks (Springer), Wireless Personal Communications (Springer),
10.1145/3183519.3183546. Sustainable Cities and Society (Elsevier), and Transactions on Emerging Telecommuni­
Zhu, L., Wu, Y., Gai, K., Choo, K.K.R., 2019. Controllable and trustworthy blockchain- cations Technologies (Wiley). He has contributed more than 30 book chapters in various
based cloud data management. Future Generat. Comput. Syst. 91, 527–535. https:// books and has edited 14 books from the most famed publishers like Elsevier, IGI Global,
doi.org/10.1016/j.future.2018.09.019. and CRC Press. He is a member of numerous renowned bodies including IAENG, CSTA,
Zyskind Oz, G., Alex ’, N., ’ Pentland, S., 2015. Enigma: Decentralized Computation SCIEI, IAE, and UACEE. He has served as a Keynote Speaker (resource person) in numerous
Platform with Guaranteed Privacy. New Solut. Cybersecurity. https://doi.org/ reputed international conferences held in different countries including India, Morocco,
10.48550/arxiv.1506.03471. Jun. China, Belgium, and Bangladesh. He has served as a reviewer/Editorial Board Member for
several reputed international journals.
Andrew J, Andrew J, is currently working as an Assistant Professor in the Department of
Computer Science and Engineering (CSE) at Manipal Institute of Technology (MIT), Yuichi Sei, received his Ph.D. degree in information science and technology from the
Manipal, India. He received his Ph.D. in the year 2021 from Vellore Institute of Technology University of Tokyo, Tokyo, Japan in 2009. From 2009 to 2012, he was with the Mitsubishi
(VIT), Vellore, India. He received his Bachelor of Engineering (B.E.) in CSE in 2011 and Research Institute, Tokyo, Japan. He joined the University of Electro-communications,
received his Master of Engineering (M.E.) degree in in 2013 from Anna University, Tokyo, Japan in 2013, and is currently a professor in the Graduate School of Informatics
Chennai, India. He is a member of International Association of Engineers (IAENG), Internet and Engineering. He is also a visiting researcher at Mitsubishi Research Institute and an
Society, EAI Innovating Research and Computer Science Teachers Association. He is an adjunct researcher at Waseda University, Tokyo, Japan. His current research interests
active researcher published scientific research articles in reputed journals and conferences. include pervasive computing, privacy-preserving data mining, and software engineering.
He also served as speaker in many prestigious conferences worldwide. His research interest
include data privacy, healthcare data analysis, deep learning, machine learning, computer
Jennifer Eunice, received his Bachelor of Engineering and Master of Engineering from
vision, and blockchain technologies.
Anna University, Chennai, India in the year 2012 and 2014. Currently she is pursuing her
Ph.D., full time in Karunya Institute of Technology, India. Her research interest includes
Deva Priya Isravel, Deva Priya Isravel is an Assistant Professor in the Department of sign language recognition, transformer models, image and video processing, and deep
Computer Science and Engineering at Karunya Institute of Technology and Sciences. She is learning.

36

You might also like