| Literature DB >> 35343905 |
Hemang Subramanian1, Susmitha Subramanian2.
Abstract
BACKGROUND: Recent advancements in digital pathology resulting from advances in imaging and digitization have increased the convenience and usability of pathology for disease diagnosis, especially in oncology, urology, and gastroenteric diagnosis. However, despite the possibilities to include low-cost diagnosis and viable telemedicine, digital pathology is not yet accessible owing to expensive storage, data security requirements, and network bandwidth limitations to transfer high-resolution images and associated data. The increase in storage, transmission, and security complexity concerning data collection and diagnosis makes it even more challenging to use artificial intelligence algorithms for machine-assisted disease diagnosis. We designed and prototyped a digital pathology system that uses blockchain-based smart contracts using the nonfungible token (NFT) standard and the Interplanetary File System for data storage. Our design remediates shortcomings in the existing digital pathology systems infrastructure, which is centralized. The proposed design is extendable to other fields of medicine that require high-fidelity image and data storage. Our solution is implemented in data systems that can improve access quality of care and reduce the cost of access to specialized pathological diagnosis, reducing cycle times for diagnosis.Entities:
Keywords: blockchain; confidentiality; data; decentralized storage; design; diagnosis; digital pathology; implementation; limitation; nonfungible token standard; pathology; privacy; proof of concept; security; security and patient data confidentiality using design; software; storage
Mesh:
Year: 2022 PMID: 35343905 PMCID: PMC9002606 DOI: 10.2196/34207
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1An illustration of a digital pathology image from a slide used in an actual diagnosis by the coauthor (SS). The image is from a high-resolution microscopic scan and digitized slide that is presented to the clinical pathologist on a computer screen for further diagnosis.
Figure 2Technical challenges in digital pathology.
Figure 3Workflow of digital pathology system.
Figure 4Diagram represents the steps in the design science research methodology.
Problem definition and objectives.
| Problem definition | Importance and business outcome | Objectives of the solution |
| Long-term distributed and cost-effective storage of high-resolution images, metadata, and diagnoses provided by multiple users | Reduce the cost of adoption and utilization | Evaluation of alternate technologies that provide such storage; possibly separate the storage from the data transmission mechanism |
| Network transmission or the ability to share such high-resolution images and associated data | Improve speed of diagnosis for the disease | Mechanism to share data with others through the internet in a secure way |
| Data security | Improve security for all clinical data and provide access control | Mechanism to prevent unauthorized access of data |
| Data privacy | Improve the privacy of data in the system such that only the physician, pathologist, and patient can access these data | Mechanism to share the data on a need-to-know basis |
| Ability to maintain audit data transmission or data from shared access logs | Improve compliance using Health Insurance Portability and Accountability Act, General Data Protection Regulation, and privacy laws | A mechanism to trace how data have been shared among different users; store of logs should be perennial |
| Ability to maintain accuracy for creating a high-quality training data set for future application to artificial intelligence or deep learning models | Better training data can be stored on the network, and such data can facilitate better machine learning and artificial intelligence prediction | The mechanism above should have the ability to be audited, verified, and analyzed by third parties independent of the system |
| Reduce cost to the patient | Public infrastructure with well-established cryptographic protocols can enable the solution to scale significantly; network transmission is avoided by design | Network-attached storage costs are reduced for the solution; telemedicine and remote diagnosis are enabled easily |
| Improve the quality of care for the patient | Once higher accuracy for training data is established, the quality of care for the patient would have improved significantly | Machine-assisted diagnosis is possible |
| Ability to separate artifact ownership from token access | The pathological data record should explicitly state that the patient is the data owner, regardless of other individuals accessing the record | The metadata always explicitly records the ownership of the digital image by storing the patient’s pseudonymous information such as ID or wallet address that are unique to the patient |
| Ability to remove access after a prespecified time interval as per the legal and regulatory conditions | After a prespecified interval, the record should automatically be burned for all nonowners; those health care professionals who received the record should no longer have access to it | This functionality provides the ability to remove access to specific records and adhere to health care data storage and retrieval laws |
Figure 5Software architecture of the digital pathology system with blockchain and IPFS used for tokenizing, storing, and sharing access to the digital outputs of the health care system. IPFS: Interplanetary File System; NFT: nonfungible token.
Figure 6Illustration of a digital pathology workflow with nonfungible tokens applied to scanned images overall. NFT: nonfungible token.
Security layers, property of the security architecture, and implementation.
| Layers of the stack | Property of the security architecture | Implementation |
| Application layer and smart contract layer | Authentication | Users who require access to data are authenticated by their wallet (which contains a hash of the user’s public key and a private key). Each time a message is sent, it is signed and verified using ECDSAa. Only those users who can sign in to their wallets can access their corresponding data in the form of the NFTb. |
| IPFSc layer and smart contract layer | Data integrity | Data integrity is managed and maintained by the underlying blockchain and IPFS layers. One of the properties of the blockchain is that the data cannot be manipulated ever. Similarly, the original image or diagnosis file stored in the IPFS cannot be altered. Changing the file will give rise to a new CIDd, which will need minting a new token with different access controls. |
| Application layer for encryption and smart contract layer for storing the encrypted CID on the blockchain | Confidentiality of data | Although data stored on the blockchain is public information, the NFT being minted is minted off a JSON file’s CID stored in the IPFS. The application can encrypt and store the encrypted CID on the block in the associated NFT accessible only to the wallet owner. The encryption is done by the application and not by the blockchain or the blockchain’s smart contract. Each time a new token is minted, the resulting metadata file is uploaded onto the IPFS. The CID of the metadata file is encrypted by the application and stored on the blockchain as part of the contract. |
| Smart contract layer | Notarization | After signing with the owner’s public key, each piece of information is notarized and stored on the blockchain. Each time the NFT is transferred to a new owner, at the application layer, the NFT is signed by the new owner’s public address and later encrypted using the new owner’s keys for storage on the blockchain at the application level, so that only the new owner can access the contents of the NFT. |
| Application layer and smart contract layer | Access control | Access control for a token is currently maintained by means of a wallet (both public and private keys). However, this access control can be maintained and moderated by the user. |
| Blockchain and IPFS layer | Availability | This is moderated by the underlying blockchain and IPFS infrastructure that has a 99.99% availability. The only limitation is network availability, which controls the rate at which data can be deposited and pulled from the network. |
aECDSA: Elliptic Curve Digital Signature Algorithm.
bNFT: nonfungible token.
cIPFS: Interplanetary File System.
dCID: content identifier.
Figure 7User interface of the digital pathology system that displays 4 specific scans the corresponding physician has access to.
Solution requirements and how they are addressed in the implementation.
| Requirement | Implementation details | Benefits |
| Security | There are 2 layers of security for data in such a system. First, the IPFSa that stores images provide a high-security level by encrypting and splitting data into chunks stored on the network. Data are accessible only via a CIDb, which is a large 256-byte hex code. Next, the JSON metadata file, which addresses the CID that is encrypted within the blockchain, is only accessible by those who use their keys to access the contract address where the data are stored. Refer to Table 2 for the implementation details. | The 2-layer security of smart contract data will only enable the wallet owner to access the record’s contents. IPFS’s CID is impossible to guess randomly. |
| Privacy of data | Only the user who has access to the corresponding wallet can access the data on the blockchain, and all other users will be blind to the use of data. Refer to Table 2 for an explanation of how data confidentiality and privacy are handled in the design. | This feature of the blockchain provides users (patients), physicians, and others the additional layer of security. |
| Low-cost, high-fidelity file storage | The IPFS is a public infrastructure secured by nodes running globally. The smart contract code can communicate with the IPFS if contracts prefer pinning (or converting to static storage) the data. An alternate public storage mechanism is FileCoin, which builds an incentive mechanism atop the IPFS to reimburse users for providing high-end storage and availability. | There is no need for compression of data or the manipulation of original data files for long-term storage. Such a storage method enables storage of the original files at high fidelity for further analysis. |
| High performance | Data and smart contract access is enabled to the high-throughput data storage via the IPFS and metadata file that contains a data pointer (ie, CID of the actual image). We also refer to other decentralized storage systems such as FileCoin and Storj, which are paid alternatives to the IPFS wherein crypto tokens enable the QoSc layer to ensure data availability. As a result, the actual file is never moved on the network, and only access controls to the CID containing JSON files are altered. | Data transfer does not occur on the network, except for the image being scanned and stored on the IPFS. Data access is provided via metadata files that are minted into NFTs. |
| Low transmission cost | Data transmission is accomplished by just transferring the token ownership on the blockchain corresponding to the file. Therefore, the original file is not transmitted over the network; instead, the JSON file’s CID ownership is transferred to a different wallet on the blockchain. | The network transmission of the IPFS record means that only the minted token is transferred in ownership. The details of the token ID are stored and encrypted on the blockchain. Therefore, no actual data are transferring on the blockchain, reducing and improving bandwidth significantly. |
| Improve data accuracy | Every time the data are modified by the physician or other intermediaries, newer version-controlled files are created on the IPFS. | Higher accuracy of the data helps train artificial intelligence and machine learning models to improve prediction accuracy. |
| Ownership | Every specific period when NFTd ownership expires for legal reasons, such access is removed automatically through the smart contract’s burn functionality. Only patients who own the token obtain a chance to hold onto the token and access-associated digital images. The rest of the owners will not have access after the expiry (burn of the token). | The ownership of the digital asset is separated from the functionality of the smart contract. Although the NFT can be shared with multiple practitioners, the actual access is determined by the legal policy of the health care system for nonpatient access. Only patients can access their own NFTs after the record’s expiry date, where the NFT access is restricted for all others. |
aIPFS: Interplanetary File System.
bCID: content identifier.
cQoS: quality of service.
dNFT: nonfungible token.