Skip to main content

Imposing Security and Privacy in the Healthcare Industry Using Blockchain Technology

  • Chapter
  • First Online:
  • 494 Accesses

Abstract

Blockchain is a leading central concept, and it is gaining more attention in various businesses and various scenarios. It has been one of the superior technology that helps in decentralizing different areas of applications. Despite numerous uses of Blockchain, it is suffering from a severe concern generally resultant from security. Blockchain has a high potential developing trend, requiring more focus on privacy and security concerns for people. Data of the healthcare industry is both sensitive and also needs protection from theft or illegal modifications. Security, privacy, data integrity, and non-repudiation are essential features to be associated with healthcare data. Data stored in the distributed ledger of transactions with Blockchain technology is highly reliable and the data, once stored, is immutable. As healthcare data is sensitive, it is indispensable to have highly evolved systems for protecting data. At the same time, it is also essential to ensure that evidence-based research documents are not illegally modified and non-repudiation is guaranteed. In this work, the summary discusses the Blockchain security structure, and also the particular security threats and vulnerabilities are analyzed. Besides, the Blockchain-based security system and its issues are presenting in this work. Furthermore, in the Blockchain, the key technologies on privacy, trust, and security are presented. Moreover, this work provides open research challenges. It helps different stakeholders such as general users of medical data, academia, healthcare professionals, and healthcare units across the globe, given to the researchers on the privacy, trust, and security issues in Blockchain Technologies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hurlburt, G.F. (2016). Might the blockchain outlive bitcoin?. IT Professional, 18, 12–16. https://doi.org/10.1109/MITP.2016.21.

    Article  Google Scholar 

  2. de la Rosa, J. L., Torres-Pedrosa, V., & el Fakdi, A., et al. (2017). A survey of blockchain technologies for open Innovation. In WOIC, pp. 14–15.

    Google Scholar 

  3. Smith, T. D. (2017). The blockchain litmus test. In Big data (pp. 2299–2308).

    Google Scholar 

  4. Antonopoulos, A. M. (2014). Mastering Bitcoin: Unlocking digital Crypto-currencies. O’Reily Media Inc.

    Google Scholar 

  5. Kraft, D. (2016). Difficulty control for blockchain-based consensus systems. Peer-to-Peer Network. Appl., 9(2), 397–413.

    Article  Google Scholar 

  6. Ma, Y., Sun, Y., Lei, Y., Qin, N., & Lu, J. (2020). A survey of blockchain technology on security, privacy, and trust in crowdsourcing services. World Wide Web, 23(1), 393–419.

    Article  Google Scholar 

  7. Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media

    Google Scholar 

  8. Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084–2123.

    Article  Google Scholar 

  9. Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosiba, A., & Song, D. (2016, February). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106–125). Springer.

    Google Scholar 

  10. He, D., Habermeier, K. F., Leckow, R. B., Haksar, V., Almeida, Y., Kashima, M., & Epes, C. V. (2016). Virtual currencies and beyond: Initial considerations (No. 16/3). IMF Staff Discussion Note. International Monetary Fund.

    Google Scholar 

  11. Gordon, L. A., Loeb, M. P., & Zhou, L. (2016). Investing in cybersecurity: Insights from the Gordon-Loeb model. Journal of Information Security, 7(2), 49–59.

    Article  Google Scholar 

  12. Hoch, J. J., & Shamir, A. (2008). On the strength of the concatenated hash combiner when all the hash functions are weak. In L. Aceto, I. Damgård, L. A. Goldberg, M. M Halldórsson, A. Ingólfsdóttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 616–630). Springer Berlin Heidelberg.

    Google Scholar 

  13. Alkhalifah, A., Ng, A., Kayes, A. S. M., Chowdhury, J., Plaza, M., & Watters, P. (2019). A taxonomy of blockchain threats and vulnerabilities. Preprints.

    Google Scholar 

  14. Loi, L., Yaron, V., Jason, T., & Prateek, S. (2017). SMARTPOOL: Practical decentralized pooled mining. SEC’17 proceedings of the 26th USENIX conference on security symposium (pp. 1409–1426).

    Google Scholar 

  15. Manoj, K. S., & Aithal, P. S. Blockchain cyber security vulnerabilities and potential countermeasures.

    Google Scholar 

  16. Krishnan, K. N., Jenu, R., Joseph, T., & Silpa, M. L. (2018, July). Blockchain-based security framework for IoT implementations. In 2018 international CET conference on control, communication, and computing (IC4) (pp. 425–429). IEEE.

    Google Scholar 

  17. Shala, B., Wacht, P., Trick, U., Lehmann, A., Ghita, B., & Shiaeles, S. (2017, September). Ensuring trustworthiness for p2p-based m2m applications. In 2017 internet technologies and applications (ITA) (pp. 58–63). IEEE.

    Google Scholar 

  18. Javed, M. U., Rehman, M., Javaid, N., Aldegheishem, A., Alrajeh, N., & Tahir, M. (2020). Blockchain-based secure data storage for distributed vehicular networks. Applied Sciences, 10(6), 2011.

    Article  Google Scholar 

  19. García-Magariño, I., Lacuesta, R., Rajarajan, M., & Lloret, J. (2019). Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of Blockchain. Ad Hoc Networks, 86, 72–82.

    Article  Google Scholar 

  20. Alharby, M., & Van Moorsel, A. (2017). Blockchain-based smart contracts: A systematic mapping study. arXiv preprint arXiv:1710.06372

  21. Shi, S., He, D., Li, L., Kumar, N., Khan, M. K., & Choo, K. K. R. (2020). Applications of Blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & security (p. 101966).

    Google Scholar 

  22. Soltanisehat, L., Alizadeh, R., Hao, H., & Choo, K. K. R. (2020). Technical, temporal, and spatial research challenges and opportunities in Blockchain-based healthcare: A systematic literature review. IEEE Transactions on Engineering Management.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Bheemeswara Sastry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bheemeswara Sastry, J., Banik, B.G. (2022). Imposing Security and Privacy in the Healthcare Industry Using Blockchain Technology. In: Tyagi, A.K., Abraham, A., Kaklauskas, A. (eds) Intelligent Interactive Multimedia Systems for e-Healthcare Applications. Springer, Singapore. https://doi.org/10.1007/978-981-16-6542-4_13

Download citation

Publish with us

Policies and ethics