Page 38 - AIH-1-2
P. 38

Artificial Intelligence in Health                                        Blockchain for health-care security




            Table 1. Summary of related works on blockchain for securing medical data
            Study            Blockchain   Blockchain  Algorithms   Taxonomy  Remarks
                             in COVID‑19  strength  in health
                             pandemic            care
            Mettler (2016) 14  No      No        No        No       Describing the history of blockchain development from bitcoin
                                                                    and intelligent health-care management for patient guidance.
            Krishnamurthi and   No     No        Yes       No       Presenting a comparative analysis of the algorithm, a brief
            Shree (2019) 15                                         overview of blockchain and challenges using algorithms.
            Dwivedi et al. (2019) 16  No  Yes    Yes       No       Demonstrating a blockchain-based IoT model for the security
                                                                    and privacy of any IoT-based remote monitoring system to
                                                                    protect business security.
            Yazdinejad et al. (2020) 17  No  No  Yes       No       Presenting a designed model for the safe data recording
                                                                    in a geographically diverse hospital network based on a
                                                                    blockchain-based approach.
            Sharma et al. (2021) 18  No  No      Yes       No       Proposing a cryptographic framework to create a
                                                                    blockchain-based secure community.
            Saranya and Murugan    No  No        Yes       No       Explaining the blockchain types and uses of different algorithms
            et al. (2021) 19                                        in the health-care sector.
            Nguyen et al. (2021) 20  Yes  No     Yes       No       Combining blockchain and artificial intelligence for emergency
                                                                    health-care services used in the COVID-19 pandemic.
            Abbreviation: IOT: Internet of things.

            storage without the need for a third party.  Recent research   The POW algorithm is used in the health-care
                                            31
            has focused on real-time health-care systems’ diagnosis   transaction. The work has traversed different consensus
            and treatment of patient conditions.               approaches in blockchain technology and is principally
                                                               recommended for health care.  The sensors connect with
                                                                                       34
            4. Blockchain based on consensus                   intelligent devices and distribute the data for all possible
            algorithms in health-care sector                   events. Since automatic intelligent contracts are executed,
            Several  lists  of  algorithms  are  used  in  blockchain   the data are reliable. For instance, a sensor is connected to
            networks such as proof of work (POW), proof of stake   the human body so that the master device gathers data from
            (POS), practical byzantine fault tolerance (PBFT),   the sensor to telecast it to the blockchain. Once medical
            recovery algorithm for fast tracking (RAFT), and   data are stored on the blockchain, the POW technology
            delegated POS (DPOS). These algorithms are discussed   guarantees that it is safe and unalterable. Since the POW is
            in the following.                                  known to be decentralized. The network is more resistant
                                                               to attacks because of its decentralization which offers fail-
            4.1. POW                                           safe mechanism to protect itself against a single point of
            POW technique required mining nodes for solving    failure. 29,35  This can improve the system’s overall security
            complex mathematical puzzles. After solving puzzles and   and dependability in the health-care industry by guarding
            node validation, the block is added to the blockchain   against unauthorized access and guaranteeing the ongoing
            network. The rest of the mining nodes approve the   availability of vital patient data.
            authenticity of the blocks.  When the miners confirm   4.2. POS
                                  32
            that the block is authorized, the block is attached to the
            blockchain  by  recompensing  submitter  mining  nodes.   With POS consensus mechanisms, miners are selected based
            There is lesser chance to get a false reward unless the   on the quantity of cryptocurrency they own and are prepared
            attackers accommodate more than 50% of the mining   to stake as collateral, thereby replacing the conventional
            nodes. The consensus processes-based POW provides data   POW mining method’s intricate computational puzzle
            integrity, immutability, and reliability on the blockchain,   approach. In health-care applications, the medical chain is
            improving the  security of  health-care applications.    a systematic scheme of data sharing that can be executed
                                                         33
                                                                                                            34
            Consensus techniques ensure that all participants have   for health-care systems using blockchain technology.
            an accurate representation of the data by assisting in   The incidence of attack against POS-based blockchain is
            reaching an agreement on the current state of distributed   lesser  than  that  against  POW-based  blockchain.  In  POS,
            database.                                          it is very difficult for an attacker to obtain the majority of


            Volume 1 Issue 2 (2024)                         32                               doi: 10.36922/aih.2580
   33   34   35   36   37   38   39   40   41   42   43