| Literature DB >> 35684652 |
Iris Cathrina Abacan Pilares1, Sami Azam1, Serkan Akbulut1, Mirjam Jonkman1, Bharanidharan Shanmugam1.
Abstract
Electronic Health Records (EHR) are the healthcare sector's core digital strategy meant to improve the quality of care provided to patients. Despite the benefits afforded by this digital transformation initiative, adoption among healthcare organizations has been slower than desired. The sheer volume and sensitive nature of patient records compel these organizations to exercise a healthy amount of caution in implementing EHR. Cyberattacks have also increased the risks associated with non-optimal EHR implementations. An influx of high-profile data breaches has plagued the sector during the COVID-19 pandemic, which put the spotlight on EHR cybersecurity. One objective of this research project is to aid the acceleration of EHR adoption. Another objective is to ensure the robustness of the system to resist malicious attacks. For the former, a systematic review was used to unearth all the possible causes why the adoption of EHR has been anemic. In this paper, sixty-five existing proposed EHR solutions were analyzed and it was found that there are fourteen major challenges that need to be addressed to reduce friction and risk for health organizations. These were privacy, security, confidentiality, interoperability, access control, scalability, authentication, accessibility, availability, data storage, data ownership, data validity, data integrity, and ease of use. We propose EHRChain, a new framework that tackles all the listed challenges simultaneously to address the first objective while also being designed to achieve the second objective. It is enabled by dual-blockchains based on Hyperledger Sawtooth to allow patient data decentralization via a consortium blockchain and IPFS for distributed data storage.Entities:
Keywords: blockchain; cryptography; distributed file system; electronic health record; privacy; security
Mesh:
Year: 2022 PMID: 35684652 PMCID: PMC9183171 DOI: 10.3390/s22114032
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Electronic database search.
| Electronic Database | Type | URL |
|---|---|---|
| CDU | Digital Library | |
| IEEE Xplore | Digital Library | |
| MDPI | Digital Library | |
| Science Direct—Elsevier | Digital Library | |
| Springer | Digital Library | |
| Wiley online library | Digital Library | |
| Google Scholar | Search Engine | |
| Researchgate | Social networking site |
Search queries used for the systematic review.
| Search Queries | |
|---|---|
| SQ1 | “electronic health record” AND blockchain OR cryptography OR security OR privacy OR decentralise |
| SQ2 | “electronic health record” AND blockchain OR cryptography OR security OR privacy OR distributed file system |
| SQ3 | “personal health record” AND blockchain OR cryptography OR security OR privacy OR decentralise |
| SQ4 | “personal health record” AND blockchain OR cryptography OR security OR privacy OR decentralise |
Inclusion and Exclusion Criteria.
| List of Inclusion and Exclusion Criteria | |
|---|---|
|
| |
| IC1 | Should be listed in one of the chosen databases |
| IC2 | Should be published in the last 10 years (2011–2021) |
| IC3 | Should contain at least one of the keywords |
| IC4 | Should be published in a journal, conference, or magazine |
| IC5 | Title, abstract, and full text should match the study being searched for |
|
| |
| EC1 | Duplicate items |
| EC2 | Studies not written in English |
| EC3 | Proposed solution is not designed for EHR nor PHR |
| EC4 | Full text cannot be obtained |
Figure 1Systematic review flow diagram.
Summary of scores for assessing the quality of papers.
| QE1. Is the Publication Pertaining to EHR or PHR? | QE2. Is the Proposed Solution Well Defined? | QE3. Are the Challenges Being Addressed by Their Proposed Solution Clearly Stated? | QE4. Did the Publication Define the Proposed Solutions’ Limitations? | QE5. Is the Proposed Solution Ready for Implementation? | Summary of Points | |
|---|---|---|---|---|---|---|
| 1 [ | 4 | 4 | 4 | 4 | 2 | 18 |
| 2 [ | 4 | 4 | 3 | 0 | 2 | 13 |
| 3 [ | 4 | 4 | 4 | 4 | 2 | 18 |
| 4 [ | 4 | 4 | 4 | 0 | 2 | 14 |
| 5 [ | 4 | 3 | 4 | 3 | 2 | 16 |
| 6 [ | 4 | 4 | 3 | 0 | 0 | 11 |
| 7 [ | 4 | 3 | 3 | 2 | 2 | 14 |
| 8 [ | 4 | 3 | 3 | 3 | 2 | 15 |
| 9 [ | 4 | 4 | 3 | 2 | 2 | 15 |
| 10 [ | 4 | 4 | 4 | 3 | 0 | 15 |
| 11 [ | 4 | 4 | 4 | 4 | 2 | 18 |
| 12 [ | 4 | 4 | 4 | 3 | 2 | 17 |
| 13 [ | 4 | 4 | 3 | 3 | 0 | 14 |
| 14 [ | 4 | 4 | 4 | 4 | 2 | 18 |
| 15 [ | 4 | 4 | 4 | 2 | 2 | 16 |
| 16 [ | 4 | 3 | 3 | 3 | 0 | 13 |
| 17 [ | 4 | 4 | 3 | 3 | 0 | 14 |
| 18 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 19 [ | 4 | 4 | 3 | 3 | 0 | 14 |
| 20 [ | 4 | 4 | 4 | 2 | 4 | 18 |
| 21 [ | 4 | 4 | 4 | 0 | 2 | 14 |
| 22 [ | 4 | 4 | 4 | 4 | 0 | 16 |
| 23 [ | 4 | 4 | 3 | 3 | 2 | 16 |
| 24 [ | 4 | 4 | 3 | 2 | 2 | 15 |
| 25 [ | 4 | 4 | 4 | 2 | 0 | 14 |
| 26 [ | 4 | 4 | 3 | 0 | 2 | 13 |
| 27 [ | 4 | 4 | 4 | 2 | 0 | 14 |
| 28 [ | 4 | 4 | 4 | 4 | 2 | 18 |
| 29 [ | 4 | 2 | 3 | 2 | 0 | 11 |
| 30 [ | 4 | 4 | 4 | 1 | 2 | 15 |
| 31 [ | 4 | 3 | 4 | 3 | 0 | 14 |
| 32 [ | 4 | 4 | 4 | 0 | 2 | 14 |
| 33 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 34 [ | 4 | 4 | 4 | 2 | 2 | 16 |
| 35 [ | 4 | 4 | 2 | 3 | 2 | 15 |
| 36 [ | 4 | 3 | 3 | 1 | 2 | 13 |
| 37 [ | 4 | 4 | 2 | 0 | 2 | 12 |
| 38 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 39 [ | 4 | 3 | 3 | 4 | 0 | 14 |
| 40 [ | 4 | 3 | 3 | 2 | 4 | 16 |
| 41 [ | 4 | 4 | 3 | 2 | 2 | 15 |
| 42 [ | 4 | 3 | 4 | 4 | 2 | 17 |
| 43 [ | 4 | 4 | 4 | 0 | 0 | 12 |
| 44 [ | 4 | 3 | 3 | 3 | 0 | 13 |
| 45 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 46 [ | 4 | 4 | 3 | 2 | 0 | 13 |
| 47 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 48 [ | 4 | 3 | 3 | 2 | 2 | 14 |
| 49 [ | 4 | 3 | 4 | 2 | 0 | 13 |
| 50 [ | 4 | 4 | 3 | 0 | 0 | 11 |
| 51 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 52 [ | 4 | 4 | 4 | 3 | 0 | 17 |
| 53 [ | 4 | 4 | 3 | 4 | 2 | 17 |
| 54 [ | 4 | 4 | 3 | 4 | 0 | 15 |
| 55 [ | 4 | 3 | 3 | 4 | 0 | 14 |
| 56 [ | 4 | 2 | 3 | 2 | 0 | 11 |
| 57 [ | 4 | 3 | 3 | 0 | 2 | 12 |
| 58 [ | 4 | 4 | 4 | 1 | 0 | 13 |
| 59 [ | 4 | 4 | 4 | 0 | 0 | 12 |
| 60 [ | 4 | 2 | 4 | 1 | 0 | 11 |
| 61 [ | 4 | 2 | 2 | 2 | 2 | 12 |
| 62 [ | 4 | 3 | 2 | 1 | 2 | 12 |
| 63 [ | 4 | 4 | 2 | 1 | 2 | 13 |
| 64 [ | 4 | 4 | 3 | 4 | 4 | 19 |
| 65 [ | 4 | 2 | 4 | 1 | 0 | 11 |
Figure 2Result of quality assessment of 65 papers.
Figure 3Distribution of Q1 and Q2 journal and their impact factor rating.
Figure 4Distribution of conference papers.
Proposed solutions that address EHR challenges and the technologies used.
| Technologies Used | Types of Blockchain | Proposal (P), Simulated (S), Implemented (I) | Privacy | Security | Confidentiality | Interoperability | Accessibility | Scalability | Availability | Authentication | Access Control | Data Integrity | Data Validity | Data Ownership | Data Storage | Ease of Use | Total | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 [ | Angular 4, Chaincode, Representational State Transfer (REST) Server (REST API), CouchDB, Fabric Client, Practical Byzantine Fault Tolerance (PBFT), Hyperledger Composer, Hyperledger Fabric, InterPlanetary File System (IPFS) | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 11/14 | |||
| 2 [ | Authentication Server, Certification Authority, Permissioned blockchain, Smart Contract | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 10/14 | ||||
| 3 [ | Chaincode, CouchDB, Health Insurance Portability and Accountability Act (HIPAA)-compliant cloud storage, Hyperledger Fabric (Membership Service [MS], Certificate Authority [CA], Solution Users [SU]), Orderer, PKI-based asymmetric encryption, Web Application | Permissioned | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 4 [ | Cloud storage, Hash table, Hyperledger Fabric | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 5 [ | Ateniese, Fu, Green, and Hohenberger Proxy Re-Encryption (AFGH PRE), Cloud storage, Hyperledger Fabric | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 6 [ | Cloud storage, Hyperledger Fabric, Proxy Re-encryption | Permissioned–Private | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 7 [ | Ethereum, IPFS, Proof of Authority (PoA), Smart contract, Certificate Authority (CA) | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 8 [ | Blockchain, Keyless Signature Infrastructure (KSI) | Not Defined | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 9 [ | Hyperledger Fabric, REST services | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 10 [ | Consortium Blockchain, Ethereum, Proof of Authorisation, Smart Contracts | Public Permissioned–Consortium | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 9/14 | |||||
| 11 [ | Consortium blockchain, Public-Coin Chameleon Hashing (PCCH), Smart Contracts, Proxy Re-Encryption (PRE), 2-party PRE decryption (2PD) | Permissioned–Consortium | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 12 [ | Attribute-Based Signcryption Algorithm (ABSC), Cloud Storage, Ethereum | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 13 [ | Ethereum, IPFS, Smart Contracts | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 14 [ | Ethereum, IPFS, Multi-Party Authorization (MPA), Reputation-governed Trusted Oracles (RGTO), Smart Contracts | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 15 [ | Burrows–Abadi–Needham (BAN) logic analysis, Cloud computing, Hyperledger Fabric | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 16 [ | Ethereum blockchain, Smart contracts | Private | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 17 [ | Attribute-Based Encryption (ABE), Blockchain, Identity-Based Encryption (IBE), Identity-based Signature (IBS) | New Design | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 18 [ | Amazon cloud, Ethereum, IPFS, Mobile app, Smart Contracts | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 19 [ | Ethereum, Smart Contracts, Symmetric Searchable Encryption | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 8/14 | ||||||
| 20 [ | Modex Blockchain Database (BCDB), MongoDB, Permissioned blockchain, Tendermint | Permissioned–Private | I | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 21 [ | Delegated Proof of Stake (DPoS) consensus mechanism, Proxy Re-Encryption (PRE), Private Blockchain (also used as storage) | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 22 [ | Consortium Blockchain, Ethereum, Off-chain Blockchain Systems (OCBS), Proof of Authority (PoA) | Public Permissioned–Consortium | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 23 [ | Certificate Authority, Kafka Ordering Consensus Mechanism (Orderers, Apache Kafka, Zookeeper), Hyperledger Fabric, Smart Contract | Permissioned | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 24 [ | Cloud storage, Ethereum, Smart contract, Searchable encryption | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 25 [ | Cyphertext Policy Attribute-Based Encryption (CP-ABE), Ethereum, Smart Contracts | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 26 [ | Attribute-Based Encryption (ABE), Attribute-Based Multi-Signature (ABMS), Hyperledger Fabric, Hyperledger Ursa Library, Off-chain edge node | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 27 [ | Ethereum, Smart Contracts, RPM (Remote Patient Monitoring), IoT, Django (python), PoA (proof of authority) | Public but permissioned via PoA | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 28 [ | Hyperledger Fabric, Hyperledger Composer, Hyperledger Caliper | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 29 [ | Ethereum, Cloud Storage (Data Lake), smart contracts | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 7/14 | |||||||
| 30 [ | Distributed applications, Ethereum, Hyperledger Fabric, PoW (Proof of Work) consensus mechanism, Smart contracts | PublicPermissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 31 [ | Blockchain (not specified), Smart contracts | Permissioned | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 32 [ | Certificateless Aggregate Signature scheme (CAS), Elliptic Curve Cryptography (ECC), Ethereum, CSP (Cloud Service Provider) | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 33 [ | Blockchain, Chord algorithm, Publish-Subscribe system, Routing Overlay | New Design | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 34 [ | Cloud storage, Ethereum | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 35 [ | Blockchain, Deep Learning, Ring Learning with Error (RLWE) lattice-based cryptography | Not Defined | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 36 [ | Ethereum | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 37 [ | Ethereum, IPFS, Permissioned Blockchain, Proof of Authority (PoA), Smart Contracts | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 38 [ | Distributed Ledger, Hyperledger Fabric, Idemix | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 39 [ | Ethereum, IPFS | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 40 [ | Identity as a stake consensus mechanism, Permissioned blockchain (also used as storage), Proof of Authority (PoA) | Permissioned–Private | I | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 6/14 | ||||||||
| 41 [ | Hyperledger Fabric | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 42 [ | Ethereum, IPFS, PRE, Trusted Oracles and Reputation System, Smart Contracts | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 43 [ | Blockchain (also used as storage), IoT, Mobile devices | Not Defined | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 44 [ | AI based intelligent agents, Blockchain (DLT), Smart Contract | Not Defined | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 45 [ | Attribute-Based Encryption (ABE), Advanced Encryption Standard (AES), Distributed Hash Table, Ethereum, IPFS, SC-ABSE (CP-ABE + SSE + smart contract) | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 46 [ | Consortium Blockchain, Private Blockchain, Proof of Conformance | Permissioned–PrivatePermissioned–Consortium | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 47 [ | Practical Byzantine Fault Tolerance (PBFT), Permissioned Blockchain | Permissioned–Private | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 48 [ | Attribute-Based Encryption (ABE), Blockchain. Cloud storage | Not Defined | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 49 [ | Attribute-Based Proxy Re-Encryption (ABPRE), Cloud storage | Not Specified/Own design | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 50 [ | Blockchain, delegated Byzantine Fault Tolerance (dBFT) consensus algorithm | Not Defined | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 51 [ | Blockchain-based data storage, Decentralising Attribute-Based Signature (DABS), Practical Byzantine Fault Tolerance (PBFT) consensus mechanism | Not Defined | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 52 [ | Advanced cryptographic techniques, Ethereum, Smart Contracts, PRE | Permissioned | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||
| 53 [ | Blockchain, Hash Table, IPFS, Machine Learning Unit, Smart contract, Smart device | Not Defined | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 54 [ | Ethereum, IPFS, Smart Contract | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 55 [ | Ethereum, Smart Contracts | Public | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 5/14 | |||||||||
| 56 [ | Ethereum, Hyperledger Fabric, Machine Learning | PublicPermissioned–Private | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 57 [ | Asynchronous BFT (ABFT) consensus mechanism, NPoS (Nominated Proof of Stake), Polkadot Relay Chain, CSP (Cloud Service Provider) | Public | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 58 [ | Blockchain, MA-ABS (Multi Authority–Attribute-Based Signature) | New Design | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 59 [ | Cipher text-based attribute encryption, Blockchain, Cloud | Permissioned | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 60 [ | Hyperledger Fabric | Permissioned–Private | P | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 61 [ | Hyperledger Fabric, CA | Permissioned Consortium | S | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 4/14 | ||||||||||
| 62 [ | Blockchain handshaker, Cloud, Public blockchain network (blockchain nodes, distributed ledger, and smart contracts), and User application | Public | S | ⚫️ | ⚫️ | ⚫️ | 3/14 | |||||||||||
| 63 [ | Blockchain and Distributed Ledger Based Improved Bio-Medical Security System (BDL-IBS), Blockchain, Distributed Ledger | New Design | S | ⚫️ | ⚫️ | ⚫️ | 3/14 | |||||||||||
| 64 [ | Hyperledger Fabric, IPFS, Distributed Applications, Smart Contracts | Permissioned | I | ⚫️ | ⚫️ | ⚫️ | ⚫️ | ⚫️ | 3/14 | |||||||||
| 65 [ | Health Records Blockchain System (HRBS), Identity Blockchain System (IBS) | New Design | P | ⚫️ | ⚫️ | 2/14 | ||||||||||||
| 59 | 63 | 32 | 16 | 15 | 22 | 13 | 30 | 42 | 38 | 13 | 27 | 37 | 11 |
⚫️—symbol used to mark that the challenge exists on that paper.
Figure 5EHR challenges and the technologies used as solutions.
Figure 6Number of papers addressing each EHR challenge.
How to address all the challenges found in proposed solutions.
| Challenge | Proposed Solution |
|---|---|
| Privacy | Patient information and medical activity are recorded on separate blockchains, while health records are stored in IPFS. |
| Security | PBFT consensus ensures security as long as not more than 1/3 of the validators are malicious. |
| Confidentiality | Patient information, medical activity, and health records are all encrypted via public-key cryptography. |
| Interoperability | Non-media files should be stored in JSON format to allow different applications to build compatibility independent of other applications |
| Accessibility | Data requesters (DR) are not required to be part of the consortium to submit a request. |
| Scalability | At any given period of time (epoch), a subset of validators is chosen to produce blocks to increase throughput. |
| Availability | Because all medical data are distributed either on blockchains or IPFS, data is available as long as the majority of nodes are online. |
| Authentication | System users have username and password to access applications as well as private and public keys to encrypt/decrypt data from blockchain/IPFS. |
| Access Control | Hyperledger Sawtooth provides fine-grained permissions to allow data owners (DO) to control access to their EHR data. |
| Data Integrity | True immutability due to distributed architecture ensures EHR data cannot be tampered with when the supermajority of nodes is honest. |
| Data Validity | DO and data providers (DP) need to sign off before EHR data is committed to the blockchain or uploaded to IPFS. |
| Data Ownership | DO needs to approve by decrypting or by creating the re-encryption key and sending it back to the DR. |
| Data Storage | EHR data is stored on IPFS, and redundant copies are distributed to consortium members to serve as a backup in case of ransomware attacks. |
| Ease of Use | Since Hyperledger Sawtooth core is separate from application layer; desktop, web, and mobile applications can be developed independently. |
Figure 7Hyperledger Sawtooth as the basis of the framework.
Figure 8EHRChain system architecture.
Figure 9Proposed EHRChain system workflow.
Figure 10Patient registration and information retrieval flow diagram.
Figure 11Patient information data structure and PIB commit.
Figure 12Patient registration sequence diagram.
Figure 13Patient verification sequence diagram.
Figure 14Data requester and EHR distribution flow diagram.
Figure 15EHR request fulfillment sequence diagram.
Figure 16Data provider EHR creation and commit process diagram.
Figure 17EHR creation and storage sequence diagram.
Figure 18MAB data structure.
Figure 19EHR IPFS directory.
Figure 20IPFS redundancy for EHRChain.
Figure 21IPFS storage process.
Figure 22Hyperledger Sawtooth PBFT algorithm phases.
Figure 23Hyperledger Sawtooth PBFT consensus mechanism process.