| Literature DB >> 34476701 |
Priti Tagde1,2, Sandeep Tagde3, Tanima Bhattacharya4,5, Pooja Tagde6, Hitesh Chopra7, Rokeya Akter8, Deepak Kaushik9, Md Habibur Rahman10.
Abstract
Blockchain and artificial intelligence technologies are novel innovations in healthcare sector. Data on healthcare indices are collected from data published on Web of Sciences and other Google survey from various governing bodies. In this review, we focused on various aspects of blockchain and artificial intelligence and also discussed about integrating both technologies for making a significant difference in healthcare by promoting the implementation of a generalizable analytical technology that can be integrated into a more comprehensive risk management approach. This article has shown the various possibilities of creating reliable artificial intelligence models in e-Health using blockchain, which is an open network for the sharing and authorization of information. Healthcare professionals will have access to the blockchain to display the medical records of the patient, and AI uses a variety of proposed algorithms and decision-making capability, as well as large quantities of data. Thus, by integrating the latest advances of these technologies, the medical system will have improved service efficiency, reduced costs, and democratized healthcare. Blockchain enables the storage of cryptographic records, which AI needs.Entities:
Keywords: Artificial intelligence; Blockchain; Data security; Electronic health records; e-Health
Mesh:
Year: 2021 PMID: 34476701 PMCID: PMC8412875 DOI: 10.1007/s11356-021-16223-0
Source DB: PubMed Journal: Environ Sci Pollut Res Int ISSN: 0944-1344 Impact factor: 4.223
Fig. 1Block chain and artificial intelligence security in e-Health
Challenges with blockchain adoption and core priorities in deploying secure blockchain-based EHR systems
Malicious software can use security flaws to create decentralized applications based on the built blockchain. These malicious attacks take advantage of security flaws in smart contract implementation to aid other crimes like identity theft and data theft. | Three goals must fulfill in terms of the following: 1. Confidentiality: Only authorized users have access to the information. 2. Integrity: data must be correct when in transit and must not be tampered with by an illegitimate group. 3. Availability: Access to information and services for legal users is not unfairly withheld. | (Liang et al. | |
The main challenge in protecting patient data privacy is to present a framework for data privacy and integrity on a blockchain-based EHR that leverages cryptographic methods. This feature makes it impossible to identify a specific patient based on his current account number. In any similar system should rectify the flaws in the protection of patient data. For starters, patients should easily exchange their data because employing blockchain-based frameworks within EHR demands a lot of computer power and takes a long time to finish each task. Second, adding a new node to the blockchain network, which new patients require, necessitates a series of measures to ensure that the patient is trustworthy. | The following requirements must be met for public blockchain privacy protection in healthcare applications: (1). Links among transactions should not be accessible or visible. (2). The information of transaction patterns should be revealed only to their participants. However, a healthcare application built on a private or consortium blockchain can set up an access control policy to meet the data security requirements. (3). The privacy protection of transactions in a public blockchain setting is a “double-edged sword.” A well-behaved patient, on the one hand, wants to keep his identity and actions confidential. (4). On the other hand, an opposing party may use the privacy protection mechanism to conduct an illicit transaction. From the standpoints of legal traceability and accountability, the security of blockchain transactions in healthcare applications could be constrained so that the authority is trustworthy. (5). Researchers should look into how to monitor a particular user and collect all of the messages he has sent out while keeping the user’s critical information private. (6). One potential research problem is to improve privacy in a blockchain with untrustworthy ambient assumptions and low processing costs from a development standpoint. (7). Secure multiparty computation is a potential approach for allowing an untrusted third party to do calculations on patient data without infringing on their privacy. | (Liang et al. | |
As a result of this challenge, the blockchain infrastructure’s total processing requirements may be increased. When a large number of smart devices or sensors are present, the problem becomes even more challenging because these devices’ computing capabilities are less than that of a typical computer. The IoT devices in the blockchain network are computationally demanding and include a large overhead bandwidth, resulting in data delays and significant processing power. Such devices may lack the computing capacity required to employ blockchain features, forcing them to function at suboptimal or potentially exorbitant speeds, prohibiting them from simultaneously running their original and blockchain software. | As medical data grows, research is being done on the scalability of blockchain in healthcare applications. | (Al et al. | |
| Interoperability | The capacity to transmit, analyze, and deal with the allocation across different blockchain networks without the use of an intermediary or central authority is referred to as blockchain interoperability. Because of the absence of interoperability, mass adoption may be nearly impossible. Existing EHR solutions rely on centralized local databases and offline architecture, whereas blockchain technology is decentralized and cloud-based. Moving healthcare systems in this direction and integrating blockchain technology will necessitate the development of an effective EHR system capable of fostering collaboration and interoperability across medical and scientific communities. | Researchers have seen an increase in interoperability efforts to bridge the gap between different blockchains. Many of them try to link private networks to public blockchains or vice versa. Prior approaches that concentrated on public blockchains and cryptocurrency-related tools were less valuable to corporate executives in the long run. | (Al et al. |
| As public ledgers, Bitcoin blockchain and Ethereum require transactions to be visible by default. | The Ethereum network provides pseudo-anonymity; transactions, for example, are connected to addresses that correspond to public keys derived from user-held private keys, rather than usernames or passwords. Public Ethereum, also known as zk-SNARKS (zero-knowledge succinct non-interactive argument of knowledge), is a cryptographic proof mechanism that allows a user to verify a transaction without exposing the transaction’s underlying data or engaging with the user who broadcast it. In the context of a blockchain, zk-SNARKs allow users to keep their transactions private while still verifying them according to the consensus process of the network. Once implemented, businesses will be able to transact in total anonymity on the same network as their competitors while benefiting from the security of the public Ethereum blockchain. | (Liang et al. | |
Blockchain technology will take time to gain consensus and confirm transactions, which could be an issue when integrating blockchains into healthcare applications that require real-time responses to events and data. A blockchain takes time to process transactions, which is known as transaction latency. The bitcoin blockchain, for example, has a delay of 10 min to confirm each transaction in the network. Although five or six blocks must be added to the chain before confirmation, it is recommended that each transaction be confirmed within 1 h. On the other hand, most traditional database systems only take a few seconds to confirm a transaction. | Lower latency has been linked to blockchain-based IoT devices, but they can be applied to other blockchain applications. The IoT network, which has a large number of devices communicating with each other at the same time, necessitates a network with latency. The consensus method confirms each block’s transaction, which significantly reduces latency affecting the application’s overall performance. | (Badr et al. |
Fig. 2Features of artificial security in e-Health
AI-based various tools used in healthcare
| References | |||
|---|---|---|---|
| Framingham risk score | It is a gender-specific algorithm and used to estimate the 10-year | Individuals with low risk have 10% or less CHD risk at 10 years, with intermediate risk 10–20%, and with high risk 20% or more. | (Nakhaie et al. (Damen et al. |
| QRISK3 | Prediction algorithm and use for | QRISK3 combines traditional risk factors such as age, systolic blood pressure, smoking status, and total serum cholesterol to elevated lipoprotein cholesterol ratio with body mass index, ethnicity, deprivation measures, family history, chronic kidney disease, muscular dystrophy, atrial fibrillation, diabetes mellitus, and antihypertensive treatment. | (Ho et al. (Laight |
| MELD score | It is a prospectively developed and validated chronic liver disease severity scoring system | MELD score uses a patient’s laboratory values for serum bilirubin, serum creatinine, and the international normalized ratio (INR) for prothrombin time to predict 3-month survival. In patients with cirrhosis, an increasing MELD score is associated with increasing severity of hepatic dysfunction and increased 3-month mortality risk. | (Hamilton et al. (Goldberg et al. |
| ABCD2 score | Predict the risk of recurrent stroke soon after a transient ischemic attack (TIA). | ABCD2 is increasingly being used to stratify referrals to fast-track clinics. Patients with a low ABCD2 score referred to cerebrovascular services are more prone to have a noncerebrovascular diagnosis than those with a higher score. | (Galvin et al. |
| Nottingham Prognostic Index | Used to determine prognosis following surgery for breast cancer. | Its value is calculated using three pathological criteria: the size of the tumor, the number of involved lymph nodes, and the grade of the tumor. | (Gray et al. (McInnes et al. |
| XNAT | Developed for neuroimaging research. | XNAT anonymize any datasets of medical imaging data. | (Khvastova et al. |
| Swiss ADME | ADME modelling plays a pivotal role in drug discovery | It is the first web interface that enables batch calculations for hundreds of different molecules, allowing efficient pharmacokinetic optimization as well as chemical library analysis. | (Mishra and Dahima |
Role of artificial intelligence in different cancers
| Cancer | Background | Internal & external validation | Finding | Reference |
|---|---|---|---|---|
| Breast cancer | Evaluation of an AI system for breast cancer screening in which they introduce an artificial intelligence | The AI system outperformed all of the human readers in their analysis of six radiologists: the AI system’s area under the receiver operating characteristic curve (AUC-ROC) was 11.5%>normal radiologist’s AUC-ROC. | Clinical studies to increase the precision and reliability of breast cancer screening are now possible thanks to this thorough evaluation of the AI scheme. | (McKinney et al. |
| Prostate cancer | A blinded clinical validation analysis and implementation of an artificial intelligence (AI)-based algorithm in a pathology lab for routine clinical use to assist prostate diagnosis was described. | Set of 32 prostate CNB cases (selected from cases occurring between August 2014 and January 2018), comprising 159 parts, to calibrate the algorithm for UPMC-specific whole-slide image attributes (e.g., scanner and staining) and to verify the technical validity of the whole-slide images (e.g., file format and resolution). Internal test:benign vs cancer AUC was 0·997, specificity: 90·14% sentivity to be found | An AI-based algorithm for accurately detecting, grading, and evaluating clinically relevant findings in digitized slides of prostate CNBs was developed, externally clinically validated, and deployed in clinical practice. | (Pantanowitz et al. 2020) |
| Lung cancer | End-to-end design is particularly important when considering AI application in lung cancer | In the test dataset consisting of 6716 cases (86 cancer-positives) from the National Lung Screening Trial (NLST), this model achieved an AUC of 94.4% for lung cancer-risk prediction, which is considered to be a state-of-the-art performance. The model performed similarly with an AUC of 95.5% on an independent clinical validation set of 1139 cases. | Demonstrating a step toward automated image evaluation for lung cancer risk estimation using AI. | (Ardila et al. |
AI tools used in drug discovery
| Organic | A molecular design tool that aids in the synthesis of molecules with specific properties. | (Brown |
| DeepNeuralNet QSAR | A python-based system that uses computational methods to aid in the detection of compound molecular activity. | (Chan |
| Potential Net | Use to predict binding affinity of ligands | ( Pereira |
| DeltaVina | Rescoring drug–ligand binding affinity with a scoring function | (Wang and Zhang |
| Neural graph fingerprint | It aids in the prediction of novel molecular characteristics. | |
| DeepChem | Machine-learning model for drug discovery that employs a python-based AI system to find a suitable candidate | (Arora and Bist |
| DeepTox | A computer program that forecasts the toxicity of over 12,000 drugs. | (Mayr et al. |
| Hit Dexter | A machine-learning technique is being used to predict which molecules will respond to a biological assay. | (Ferreira and Andricopulo |
Key features and benefits of blockchain integration with AI
| Blockchain | AI | Blockchain and AI integration benefits |
|---|---|---|
| Decentralized | Centralized | Enhanced information security |
| Deterministic | Changing | Improved trust on robotic decisions |
| Immutable | Stochastic | Making decisions based on evidence |
| Date integrity | Volatile | Decentralized intelligence |
| Attacks resilent | Data, knowledge, and decision-making are all centered on data. | High efficiency |