| Literature DB >> 35404955 |
Huma Saeed1, Hassaan Malik1,2, Umair Bashir1, Aiesha Ahmad1, Shafia Riaz1, Maheen Ilyas1, Wajahat Anwaar Bukhari1, Muhammad Imran Ali Khan1.
Abstract
Blockchain technology (BCT) has emerged in the last decade and added a lot of interest in the healthcare sector. The purpose of this systematic literature review (SLR) is to explore the potential paradigm shift in healthcare utilizing BCT. The study is compiled by reviewing research articles published in nine well-reputed venues such as IEEE Xplore, ACM Digital Library, Springs Link, Scopus, Taylor & Francis, Science Direct, PsycINFO, Ovid Medline, and MDPI between January 2016 to August 2021. A total of 1,192 research studies were identified out of which 51 articles were selected based on inclusion criteria for this SLR that presents the modern information on the recent implications and gaps in the use of BCT for enhancing the healthcare procedures. According to the outcomes, BCT is being applied to design the novel and advanced interventions to enrich the current protocol of managing, distributing, and processing clinical records and personal medical information. BCT is enduring the conceptual development in the healthcare domain, where it has summed up the substantial elements through better and enhanced efficiency, technological innovation, access control, data privacy, and security. A framework is developed to address the probable field where future researchers can add considerable value, such as data protection, system architecture, and regulatory compliance. Finally, this SLR concludes that the upcoming research can support the pervasive implementation of BCT to address the critical dilemmas related to health diagnostics, enhancing the patient healthcare process in remote monitoring or emergencies, data integrity, and avoiding fraud.Entities:
Mesh:
Year: 2022 PMID: 35404955 PMCID: PMC9000089 DOI: 10.1371/journal.pone.0266462
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1PRISMA flow chart-based studies selection process.
List of the selected papers with details of QE, publication channel, year, H-index, and citation per year.
| Ref | H-index | Publication Channel | Citation per year | ||||
|---|---|---|---|---|---|---|---|
| 2018 | 2019 | 2020 | 2021 | Total | |||
| [ | 68 | Neural Computing and Applications | - | - | 1 | 1 | 2 |
| [ | 29 | Journal of healthcare and engineering | - | - | - | 1 | 1 |
| [ | 59 | Procedia Computer Science | - | 10 | 22 | 4 | 36 |
| [ | 37 | Computational and structural biotechnology journal | 6 | 29 | 26 | 4 | 80 |
| [ | 52 | Journal of Intelligent & Fuzzy Systems | - | 38 | 21 | 2 | 61 |
| [ | 43 | Sustainable cities and society | 19 | 67 | 112 | 15 | 242 |
| [ | 76 | Business Process Management Journal | - | 1 | 7 | 2 | 10 |
| [ | 153 | Sensors | - | 52 | 119 | 21 | 211 |
| [ | 67 | IEEE Internet of Things Journal | - | 10 | 13 | 1 | 26 |
| [ | 70 | Journal of medical systems | 4 | 14 | 10 | - | 30 |
| [ | 70 | Journal of medical systems | 10 | 69 | 135 | 13 | 245 |
| [ | 86 | IEEE access | 21 | 74 | 85 | 14 | 227 |
| [ | 44 | Cognitive Systems Research | 15 | 28 | 42 | 6 | 89 |
| [ | 20 | Future Internet | - | 2 | 6 | 2 | 12 |
| [ | 105 | Future Generation Computer Systems | - | 3 | 18 | 5 | 31 |
| [ | 16 | Electronics | - | 3 | 38 | 11 | 57 |
| [ | 70 | Journal of medical systems | 3 | 23 | 56 | 1 | 92 |
| [ | 93 | International Journal of Distributed Sensor Networks | 1 | 7 | 11 | 1 | 10 |
| [ | 17 | applied sciences | - | 1 | 8 | 1 | 10 |
| [ | 70 | Journal of medical systems | 4 | 35 | 42 | 9 | 103 |
| [ | 86 | IEEE Access | - | 5 | 18 | 3 | 28 |
| [ | 108 | Oncotarget | 18 | 56 | 57 | 11 | 154 |
| [ | 68 | The Journal of Behavioral Health Services & Research | 1 | 2 | 28 | 2 | 37 |
| [ | 86 | IEEE access | - | 9 | 49 | 4 | 74 |
| [ | 105 | Future generation computer systems | 1 | 17 | 56 | 8 | 88 |
| [ | 60 | Wireless Communications and Mobile Computing | - | 1 | 4 | 1 | 8 |
| [ | 17 | Applied sciences | 1 | 6 | 39 | 11 | 62 |
| [ | 70 | Journal of medical systems | - | 11 | 14 | 3 | 32 |
| [ | 86 | IEEE Access | 1 | 23 | 39 | 14 | 83 |
| [ | 70 | Applied Innovation | 2 | 34 | 46 | 8 | 103 |
| [ | 298 | Nature communications | 1 | 11 | 32 | 4 | 49 |
| [ | 17 | Applied Sciences | - | 7 | 14 | 2 | 22 |
| [ | 70 | Journal of medical systems | 5 | 41 | 59 | 12 | 136 |
| [ | 37 | Computational and structural biotechnology journal | 10 | 78 | 120 | 9 | 237 |
| [ | 127 | Journal of medical Internet research | - | 3 | 25 | 2 | 31 |
| [ | 70 | Journal of medical systems | 5 | 21 | 26 | 4 | 57 |
| [ | 99 | International Journal of Medical Informatics | - | - | 29 | 9 | 46 |
| [ | 93 | Computers in Industry | - | - | 7 | 6 | 13 |
| [ | 86 | IEEE Access | - | - | 12 | 4 | 16 |
| [ | 153 | Sensors | - | - | 13 | 3 | 17 |
| [ | 89 | IEEE Transactions on Engineering Management. | - | - | 4 | 2 | 6 |
| [ | N/A | International Journal of Environmental Research and Public Health | - | - | - | 4 | 4 |
| [ | N/A | International Journal of Healthcare Information Systems and Informatics | - | - | 1 | 2 | 3 |
| [ | 86 | IEEE Access | - | - | 6 | 3 | 10 |
| [ | - | Electronics | - | - | 27 | 8 | 38 |
| [ | 86 | IEEE Access | 1 | 23 | 42 | 12 | 83 |
Fig 2Number of articles published per year.
Fig 3Country-wise publications of selected research studies.
Fig 4Constructs key framework.
Fig 5Major healthcare domains where BCT has been used.
Blockchain-based healthcare methods.
| Ref | Domain | Methods |
|---|---|---|
| [ | Sharing Health Information | MedRec |
| [ | Sharing Health Information | MedRec |
| [ | Sharing Health Information | Medicalchain |
| [ | Remote Care with IoT | Patient-Centric agent (PCA) |
| [ | Supply Chain for healthcare | Modum |
| [ | Security and Privacy | Decentralized sharing of health records (DSHR) |
Fig 6Role of blockchain in clinical trials.
Fig 7Sharing health information using BCT.
Fig 8Records of patients.
Fig 9Drug tracking.
Comprehensive description of reviewed studies.
| Ref | Methods | Description | Channel | Proposed / Implemented | Components |
|---|---|---|---|---|---|
| [ | Public blockchain | Details about the algorithm are provided. | multi-tier, public | Implemented | PBEDA, ECDH, MVP, and ECDSA |
| [ | MAM is used for real-time broadcasting activity via wearable’s | Algorithm details are provided. | IOTA | Implemented | Masked Authenticated Messaging for Tangle, Merkle hash technique, Merkle signature scheme, One-time signature |
| [ | Computing Edge | There was little information available on the outcomes and efficiency. | The channel was Ethereum | Proposed | WSN and Wireless sensor network controller v.2, computing Edge |
| [ | Not Available | MedRec was used to do a cost analysis, but no algorithm or data were given. | The channel was Ethereum | Proposed | Ethereum Go-client, QuorumChain algorithm, classification, smart contracts, cipher manager, proxy re-encryption |
| [ | UID system | Details about the algorithm are not provided. | Ethereum channel | Proposed | UID system, analytics of Big Data, history & registration contract |
| [ | Not Available | Details of the algorithm are provided, along with security margins that have been verified against defined criteria. | The channel was Bitcoin | Proposed | Internet of Things, Merkle tree, Diffie–Hellman key exchange, and digital ring signature |
| [ | Not Available | Details about the algorithm are provided. | The channel was Consortium | Implemented | Practical Byzantine fault tolerance consensus mechanism, |
| [ | PSO | Performance results from a static study based on specific assessment criteria | N/A | Implemented | ADB, boosting for ML, reverse engineering, feature selection & extraction |
| [ | Not Available | Details about the algorithm are not provided. no experiments. | Federated blockchain | Proposed | IoT sensors WBANs, oracle |
| [ | Proposed signature scheme based on Attribute | Details of mathematical and computational notations given for execution of scheme, performance, and security evaluation | Not Available | Implemented | Diffie-Hellman computational bilinear, MA-ABS scheme |
| [ | With the support of a genetic algorithm Proposed access control method based on blockchain | In terms of input and output strings, block creation, time processing, detailed simulation results are provided. | N/A | Implemented | Genetic algorithm, hash key cryptography, MD5 strings, discrete wavelet transforms. |
| [ | The proposed Blockchain-based eHealth Integrity Model uses a design-science methodology. | The integrity-verification algorithm’s details and test results have been released. | Permissioned blockchain | Implemented | Byzantine Fault in Practice Algorithm for tolerant consensus |
| [ | (HAR) Methods for recognizing human activity based on a uni model | Some mathematical notations and comprehensive findings for performance reassessment studies on three datasets have been given. | N/A | Implemented | For HAR (ECOC) framework, (SVM), Multi-class cooperative categorization technique, fog computing |
| [ | Not Available | For performance evaluation, precise mathematical and algorithmic notations are supplied, as well as the outcomes of experiments. | N/A | Implemented | The Merkle tree with order-preserving encryption |
| [ | Not Available | The applicability of blockchain in healthcare is discussed using a concept-based approach. | N/A | Proposed | Environment based on the blockchain |
| [ | Preprocessing of images | Details on the experimental results, classification training, and testing outcomes were given. | Bitcoin | Implemented | HOG, LBP, SVM, RFT, DNN |
| [ | Pearson’s correlation, compression ratio technique | The compression ratio and stability performance testing results were given. | N/A | Implemented | (BAQALC) proposed, (NGS), (SRA), LZW modification |
| [ | Methods of authentication | Details on the algorithm and how it performs in areas of operational costs were given. | Ethereum | Implemented | primitiveness verification (PV), preservation Submission |
| [ | Method of the primal-dual Varangian | The performance study results of a strategy for achieving Stackelberg equilibrium were disclosed. | N/A | Implemented | three-layer (Hierarchical architecture), edge computing |
| [ | Machine Learning(ML) | In place of simulation, experiment-based assessment, the proposed architecture is presented through workflow examples. | Exonum | Proposed | Inbreeding coefficient, DNN predictor, data temporal value, LifePound (utility crypto token) |
| [ | Not Available | There are just a few algorithmic notations, but comprehensive findings for Apache JMeter performance evaluation are supplied. | N/A | Implemented | Merkle tree, timestamped algorithm, Keyless signature infrastructure |
| [ | Not Available | Code scripts, access control methods, and performance assessment findings for access control and network overheads are all shared. | Permissioned blockchain on Ethereum | Implemented | (IPFS), (ABE), mobile cloud |
| [ | Not Available | For performance evaluation on many parameters, details of algorithmic notations are given together with findings. | Permissioned blockchain on Ethereum | Implemented | MediBChain protocol, (ECC) |
| [ | Not Available | For performance parameters, there are just a few algorithmic notations, but extensive simulation results are supplied | N/A | Implemented | The one-time transaction, Ring signature algorithm, stealth address, Cryptonote protocol |
| [ | Not Available | For numerous parameters, with the discussion of outcomes, there are few algorithmic notations from experiment-based and theoretical mathematical results | Permissioned blockchain | Implemented | consensus algorithm BFT smart, ECC, MedChain, modified digest algorithm |
| [ | Not Available | For simulated security analysis and performance evaluation, few explained algorithmic notation results are used. | Blockchain technology Hyper ledger | Implemented | SIFF |
| [ | Generating Sessional symmetric key | An in-depth look into simulated performance and security assessments. | Custom bitcoin and Ethereum | Implemented | PUA, Trei tree, mutual authentication protocol, HMAC |
| [ | Not Available | There are no experimental or simulation test results, but algorithmic notations and the syntax are described with analysis of specified security. | Consortium blockchain | Implemented | ABE and IBE, proposed d identity-based combine attribute, identity-based signature, signature, and encryption |
| [ | Not Available | There was only a brief discussion of the outcomes of simulated blockchain-based clinical trials. There is no explanation for the algorithm or syntax. | N/A | Implemented | artificial healthcare, Parallel healthcare system, IVRS, parallel execution |
| [ | Not Available | There is only a brief explanation of the method and the findings of the prototype implementation, which is mostly theoretical. | Consortium blockchain technology | Proposed | proposed proof of familiarity(PoF), API |
| [ | Proposed protocol privacy-preserving and Secure PHI sharing BSPP | Algorithm notations, system architecture, and protocol implementation, and performance assessment findings are all detailed. | Private, Consortium | Implemented | Bilinear maps, Consensus mechanism |
| [ | Case study involves | Through a case study, a detailed explanation of the proposed architecture and process is provided. There are no experiments or discussions on the algorithm or syntax. | Ethereum technology | Proposed | Oauth, Public-key cryptography—sign then encrypt mechanism, Solidity smart contract, FHIR, |
| [ | Not Available | There is not much explanation of the algorithm, but there are a lot of details about the experiment that was done to verify the system’s feasibility. | IOTA Tangle (DLT) | Implemented | (MAM) Masked authenticated messaging, GPS, IoT integration |
| [ | Not Available | Algorithm creation and performance assessment for processing time and transaction verification are discussed. | Ethereum technology | Implemented | MIStore, PBFT |
Fig 10Research framework.