| Literature DB >> 35049504 |
Arijit Sengupta1, Hemang Subramanian1.
Abstract
BACKGROUND: Integrating pervasive computing with blockchain's ability to store privacy-protected mobile health (mHealth) data while providing Health Insurance Portability and Accountability Act (HIPAA) compliance is a challenge. Patients use a multitude of devices, apps, and services to collect and store mHealth data. We present the design of an internet of things (IoT)-based configurable blockchain with different mHealth apps on iOS and Android, which collect the same user's data. We discuss the advantages of using such a blockchain architecture and demonstrate 2 things: the ease with which users can retain full control of their pervasive mHealth data and the ease with which HIPAA compliance can be accomplished by providers who choose to access user data.Entities:
Keywords: HIPAA; accuracy; blockchain; data privacy preservation; mining; mobile apps; personal health data; security; transaction safety
Mesh:
Year: 2022 PMID: 35049504 PMCID: PMC8814930 DOI: 10.2196/32104
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Advantages of using blockchain for storing mobile health data.
| Property of blockchain-based solution | Objectives accomplished for the mHealth app | Standard database or local storage–based apps |
| Anonymity | A user need not register with his or her personal identifiers and is associated with the data using the private key and public key information. | Access needs to be given by the administrator of the database. |
| Decentralization | The data is stored on a public infrastructure supported by individual users on a globally distributed network. In our prototype, we tested this with 4 parallel nodes. | Data is centralized and may be controlled by ≥1 administrators. |
| Transactional safety | Each transaction comprising data is signed with the user’s private key, preventing others from manipulating the transaction. | Administrators are responsible for transactional safety. The database network subsystems are controlled by manufacturers. |
| Consistency | Irrespective of the type of data being sent on the network, the data is stored on the network as is without modification. In addition, the user may choose to encrypt the data before adding to the transaction payload and also for additional privacy. | The database can modify, alter, and change data when replicated. For example, in distributed databases, the design of the database could ensure that the data is compressed (potentially with loss of information). |
| Incentivization | Blockchain-based data marketplaces can enable users to be rewarded based on the validation of high-quality data that users can sell to other users. | Databases, by design, do not incentivize anyone. There is a central authority that decides all modes of access. |
| Perennial storage of data | Public blockchains provide a public space on the distributed ledger to store all kinds of data. With innovative architectures, it is possible for the storage of the data to also exist perennially on the blockchain. | Data can be deleted by administrators or anyone with administrative access. |
| Privacy preservation | Users who possess their own private key can access their data on the blockchain. | There is no privacy preservation by design. Administrators have all access rights and can give additional access to users. |
| Pervasive data access across multiple devices, apps, and systems | Users can access an infinite (theoretically) number of wallets, each of which can store a different type of health data. This provides a single-window clearance to all the user’s health data. | Users are limited by the number of access accounts they are provided with by administrators in the system. User accounts are not anonymized either. |
| Ability to control access to data | The user who has private and public keys can control the data entirely. He or she is the only person that can create the data and access the data (if it is encrypted with his or her key). | Any administrator can control the data. |
| Ability to prevent access to user data (delete) | Within the blockchain and the pervasive apps, multiple approaches enable individuals to prevent access to the data available on the blockchain. For example, using multi-sig wallets enables data storage to not be accessible after the deletion of one key. | The access is controlled by the database administrator per se. |
Figure 1A block diagram showing the process of uploading and managing data with PantherChain. BP: blood pressure.
Figure 2Use case model showing all use cases and dependencies. mHealth: mobile health.
Figure 3Unified Modeling Language (UML) class diagram of the PantherChain blockchain.
Figure 4Android implementation of our app running on an Android smartwatch.
Figure 5Different devices collecting health care data.
Figure 6Implementation of encrypted transaction payloads in PantherChain and health monitor app.
Governance mechanisms recommended for the blockchain.
| Type of governance | Description | Benefits | Challenges |
| Consortium-based governance, which is a user group comprising device manufacturers, users, and health app writers; prior apps have included IoTa-based power networks [ |
A group of firms, trusts, and user groups pool in resources and administer the whole network of nodes. Membership to the consortium would be rule-based and inclusive. Members could include private organizations, departments of health, and nongovernmental organizations, which are responsible for running and maintaining this structure. |
Such a design automatically ensures that the members of the consortium are invested in governance. Adoption is almost instantaneous as the network is already seeded by the consortium. As CHASMb is a configurable blockchain, underlying algorithms and methods can easily be altered, as quorum among consortium members is easy to accomplish. |
Typical issues of collusion, exclusion and nonadherence to the rules of governance could slow adoption or reduce the number of users. The consensus algorithm (and the miner plug) could be moved to proof of stake from proof of work, which is a change at the underlying level. However, with proof-of-work mining, the mining algorithm could be operated by the consortium itself. |
| DAOc [ |
Governance is typically decided by the voting rights of users who own crypto-tokens generated by the platforms and which are purchased in exchange for fiat currency. Voting rights are usually proportional to the share of tokens owned by those who choose to govern. |
Everyone ideally has a chance to participate in governance. It could potentially lead to faster adoption as governance is also incentivized. |
Governance is usually skewed among those token holders who hold the largest number of tokens. This could result in a dysfunctional blockchain if the tokenomics do not reward users appropriately. There are risks of rug pulls in the market. |
| Public blockchain [ |
This is similar to the creation of any large public blockchain. All users have equal rights on the network, and peer nodes handle the traffic. |
Public blockchains foster trust among individuals for easier adoption. Public blockchains are useful for internal purposes as well as external purposes. |
It involves extremely slow adoption. There are no special incentives to users and node runners. Network effects will become extremely difficult to run and maintain. Time taken to modify and roll out changes will disincentivize device manufacturers and users. |
| Private blockchain controlled by device manufacturers |
This blockchain is similar to hosting a set of nodes and controlling their data privately on the network. |
It is easy to set up as private investors are involved. Changes to the underlying blockchain are all dictated by individuals on the network overall. |
It is controlled by private actors. Decentralization of governance, modifications, and data is difficult to accomplish overall. |
aIoT: internet of things.
bCHASM: consensus, hasher, storer, miner.
cDAO: decentralized autonomous organization.
Figure 7Mean performance of application programming interface response times from PantherChain implementation.
Figure 8Depicting the simulators showing Android apps sending data to the blockchain.
Figure 9Blockchain submission modes for internet of things performance testing for different network and device combinations for the Heart Rate Monitor (HRM) app.
The 4 configurations and the type of data collected.
| Device | Type of data collected | Network configuration |
| iOS | Summary | Work; wired |
| iOS | Summary | Home; wireless |
| iOS | Detail | Home; wireless |
| Android | Detail | Home; wireless |