<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Blockchain as an Enabler for Cybersecurity Use Case: Electronic Health Records in Switzerland</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pascal Moriggl</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petra Maria Asprion</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabienne Kramer</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>FHNW, University of Applied Sciences and Arts Northwestern Switzerland</institution>
          ,
          <addr-line>CH-4002 Basel</addr-line>
        </aff>
      </contrib-group>
      <fpage>80</fpage>
      <lpage>91</lpage>
      <abstract>
        <p>In the application of Electronic Health Records (EHR), cybersecurity is an essential control and needs to be strongly considered to fulfil data protection requirements. Regarding cybersecurity needs in Healthcare, blockchain-based technologies seem promising due to the inherent security features. Therefore, this study investigates in cybersecurity requirements for EHR and whether a blockchain-based solution can cover these. There are already approaches which apply Blockchain for EHR, but these do not explicitly consider cybersecurity, which forms the research gap. As a unit of analysis, 'Hyperledger Sawtooth' as an enterprise blockchain platform was used. The results showed that Hyperledger Sawtooth performs quite well regarding the coverage of cybersecurity-relevant requirements for EHR. However, there are 'natural' divergences concerning specific cybersecurity attributes between blockchain-based and non-blockchainbased systems. The outcome of this study is a generic assessment tool which can be used to assess the coverage of cybersecurity requirements for both blockchainbased and non-blockchain-based EHR systems.</p>
      </abstract>
      <kwd-group>
        <kwd>Hyperledger Sawtooth</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Cybersecurity</kwd>
        <kwd>Healthcare</kwd>
        <kwd>Electronic Health Records</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The rise of the Blockchain technology (in this study referred to as Blockchain) started
back in the year 2008 with the publication of the whitepaper' Bitcoin: A Peer-to-Peer
Electronic Cash System', that was published with the alias Satoshi Nakamoto [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Blockchain is, therefore, more than a decade around. Since the publication of the
whitepaper, many other possible applications for Blockchain outside of cryptocurrencies
emerged [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Gartner [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] lists in their 2018 hype cycle for emerging technologies'
Blockchain for data security' - which is part of this study's focus area - in the innovation
trigger phase and that it will reach the plateau in five to ten years. Blockchain itself is
already descending on the cycle. However, Blockchain is still within the peak of the
inflated expectations phase, which means that early publicity produces success stories
but also failures [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. While still in the early stages, there exist already some promising
use cases regarding blockchain focused on cybersecurity applications [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Hölbl, Kompara, Kamišalić, &amp; Zlatolas [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] argue that the Blockchain offers
excellent potential for its use in Healthcare because this sector processes masses of sensitive
data for which data security must be guaranteed. Rabah [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] complement that
Blockchain in Healthcare offers lower costs by, e.g., reducing waiting times, paperwork or
avoiding multiple registration processes. Furthermore, Blockchain has unique
characteristics that enable innovations in cybersecurity [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Cybersecurity is an essential need
when establishing EHR because of the necessary adherence to regulations, mainly
digital data protection. For this reason, this study addresses Blockchain as innovation and
an enabler for cybersecurity in the context of Healthcare.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Research Rationales</title>
      <p>
        This study evaluates the characteristics of Blockchain in the context of Healthcare
in short 'health' and notably in the Swiss landscape, as a cybersecurity risk mitigation
technology. Cyber threats are increasing and becoming steadily more targeted, complex
and sophisticated. Especially the Healthcare sector is vulnerable to cyber threats.
Healthcare organizations have with 6.45 million US Dollars the highest cost associated
with data breaches for the ninth consecutive year. That is over 60% above the global
average for all industries and therefore, more than the costs of a data breach in the
financial sector [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Blockchain is extremely interesting for this sector because it offers
promising opportunities to enhance cybersecurity [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5,6,7</xref>
        ]. According to Gartner [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
Blockchain 'has the potential to increase resilience, reliability, transparency and trust in
centralized systems. This study aims at exploring whether a Blockchain can be used to
enable cybersecurity for EHR in the first place. The following research questions were
derived:
      </p>
      <p>
        RQ1: What are the relevant cybersecurity-requirements for EHR?
RQ2: Hyperledger Sawtooth covers which requirements (RQ1)?
RQ3: How does Hyperledger Sawtooth compare to a 'traditional' data-based
solution in terms of meeting the requirements (RQ2)?
EHR integrates an individual's medical health records generated by a health service
provider (e.g. a physician, a medical assistant, a pharmacist) and private health records
generated by the individual. EHR allows the sharing of data between authorized
providers. However, an individual should be able to decide and provide its authorization
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This also applies to the situation in Switzerland where collections of personal
documents with information about an individual's health will be stored in a nationwide
system called 'Elektronisches Patientendossier'1, or 'Swiss Electronic Patient File'
(EPF). It is aimed that this information can be accessed by the individual and authorized
Healthcare providers at any time; the individual decides on who can view which
information during which time frame [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The Swiss office of the national coordinator for
'Health Information Technology' [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] distinguishes between 'Electronic Medical
Records' (EMR), 'Electronic Health Records' (EHR) and 'Personal Health Records' (PHR).
EMR holds information that is created and located within a single Healthcare institution
1 https://www.patientendossier.ch/de/bevoelkerung/kurz-erklaert (in German only)
(e.g. a medical centre or hospital). EHR, on the other hand, include information that
can be managed, supplemented and accessed across several Healthcare institutions.
Finally, PHRs are digital applications that enable an individual to access, manage and
share the individual health information and that of others for whom he or she is
authorized, in a private, safe and confidential environment. The Swiss EPF system will be
such a digital PHR application that handles EHR. Health records are particularly
sensitive data and underlie laws and regulations.
      </p>
      <sec id="sec-2-1">
        <title>Allergies and adverse reactions</title>
      </sec>
      <sec id="sec-2-2">
        <title>Patient statistics and clinical data</title>
      </sec>
      <sec id="sec-2-3">
        <title>Attached files (photos, scanned documents)</title>
      </sec>
      <sec id="sec-2-4">
        <title>Progress and clinic notes, care plan</title>
      </sec>
      <sec id="sec-2-5">
        <title>Family medical history</title>
      </sec>
      <sec id="sec-2-6">
        <title>Patient registration information, emergency contact</title>
      </sec>
      <sec id="sec-2-7">
        <title>Genetic information</title>
      </sec>
      <sec id="sec-2-8">
        <title>Home-monitored data</title>
      </sec>
      <sec id="sec-2-9">
        <title>Immunization records (vaccine), tracking immunizations</title>
      </sec>
      <sec id="sec-2-10">
        <title>Insurance plan information, coding for billing</title>
      </sec>
      <sec id="sec-2-11">
        <title>List of major diseases</title>
      </sec>
      <sec id="sec-2-12">
        <title>Medication list prescribed, past medicines taken</title>
      </sec>
      <sec id="sec-2-13">
        <title>Medical prescription refills (renewing)</title>
      </sec>
      <sec id="sec-2-14">
        <title>Preventive health recommendations</title>
      </sec>
      <sec id="sec-2-15">
        <title>Previous Healthcare provider list</title>
      </sec>
      <sec id="sec-2-16">
        <title>Appointments, past procedures, hospitalizations</title>
      </sec>
      <sec id="sec-2-17">
        <title>Social history, lifestyle (health habits)</title>
      </sec>
      <sec id="sec-2-18">
        <title>Admissions, permanency, and discharges</title>
      </sec>
      <sec id="sec-2-19">
        <title>Status of bodily functions</title>
        <p>Laboratory results</p>
      </sec>
      <sec id="sec-2-20">
        <title>Laboratory and imaging test results (laboratory tests)</title>
        <p>
          According to the Swiss Federal Act on Data Protection (DSG) Art. 3 para. c dig. 2
health, intimacy or racial origin are particularly sensitive personal data. These data may
only be processed with the explicit permission of the person concerned (DSG Art. 4
para. 5). As a total revision of the Swiss DSG is being planned [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], the current legal
situation in the European Union (EU) with its relatively new 'General Data Protection
Regulation' (GDPR) is sketched out below. GDPR came into effect in 2018 and affected
subjects (citizens or residents of the EU) as well as controllers (persons who determine
how and why personal data is processed) and processors (third parties who process
personal data for a data controller). GDPR is one of the world's strictest data protection
and security law. Violating fines are at a maximum of 20 million Euro or 4% of the
global revenue [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Based on GDPR, it is forbidden to process health data unless
exceptions apply. One of the exceptions is when the subject gives explicit consent to the
processing (GDPR Art. 9). In practice, several different EHR data types on an
individual's level (PHR) can occur in a digital application and are subject to the law, such as
stated in the GDPR description. Roehrs, Da Costa, Da Rosa Righi, &amp; De Oliveira [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]
derived from 48 articles a list of datatypes used in PHR applications such as the Swiss
EPF is. It can be anticipated that EHR may include all or particular data types listed in
Table 1. In contrast to the data types in Table 1, EHRs also contain additional
information outside of the medical field, such as access logs, access, change rights or service
provider information.
        </p>
        <p>An assessment tool could provide a point of reference for digital EHR systems to
comply with legal (e.g. GDPR) and technical (e.g. cybersecurity) requirements in
Healthcare. Therefore, the next section is dedicated to the compilation of cybersecurity
requirements/criteria that such systems ideally should fulfil.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Cybersecurity Requirements for EHR</title>
      <p>
        Hoerbst &amp; Ammenwerth [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] published a highly regarded study in which they
compiled an extensive list of qualitative requirements for EHR systems. They collected
criteria that relate to cybersecurity attributes such as 'confidentiality', 'integrity',
'availability', 'authenticity' or 'data security' [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        The (cyber) security-related attributes are explained in the following:
'confidentiality' is given if the data in a system is only accessible to authorized persons. Measures
must be taken to ensure access rights and access protection [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] and to guarantee
confidentiality. 'Integrity' may include authenticity and non-repudiation and involves the
completeness and correctness of data and the correct functioning of the system in which
it is processed [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. 'Availability' covers systems, applications and services as well as
the data processed within it means that the systems, applications and services are
operational at the defined times and that the data can be accessed as intended [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. For
'availability', Hoerbst &amp; Ammenwerth [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] indicated four requirements that EHR
systems should provide; these are (1) availability of data/information should be ensured,
(2) the system should support archiving of data, (3) the readability of archived data
should be preserved, (4) deleted data should not be available in the system (e.g. display,
export, …). For all attributes together, the adapted list contains 59 qualitative
requirements that an EHR system should cover [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and provides an answer to RQ1.
      </p>
      <p>
        Supporting structures, we call them 'frameworks' are essential for providing
guidelines or assessment tools for a specific use case solution. There are already frameworks
that guide the development of EHR systems using Blockchain. A systematic literature
review using keywords such as 'EHR', 'EMR', 'PHR', 'Blockchain', 'Cybersecurity' and
'Framework' or 'Assessment Tool' was conducted. An overview of the found
frameworks differentiated according to 'theoretical' and 'operative' solutions is presented in
Table 2 and Table 3.
Xia et al. (2017)
[
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]
Vora et al. (2019)
[
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]
Liu et al. (2018)
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
Al-Karaki et al.
(2019) [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]
Rajput et al. (2019)
[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]
Xiao et al. (2019)
[
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]
Xia et al.
      </p>
      <p>
        (2017) [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]
Framework
MedBlock
MedChain
Medicalchain
Med-Rec
DASS-CARE
EACMS
EMR-Share
MeDShare
(Medblock, 2017b)
[
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]
Shen et al. (2019)
[
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]
(Medicalchain,
2019) [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]
Azaria et al. (2016)
MedRec (n.d.) [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]
Al-Karaki et al.
(2019) [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]
Rajput et al. (2019)
[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]
Xiao et al. (2019)
[
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]
Xia et al.
(2017)[
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]
      </p>
      <p>Main Feature
Framework focusing on secure
storage of EHRs concerning granular
access management
Data Sharing framework focusing on
access control for data in the cloud
Framework focusing on efficient
storage and maintenance of EHRs
Preservation of privacy in EMR
sharing
Framework focusing on healthcare
including the management of EMRs
Access control management of PHRs
in case of emergencies
Framework focusing on
cross-organizational medical data sharing and
access management
Sharing of medical data between
cloud service providers
Main Feature
Solution focusing on
business-to-business Blockchain protocol
implementations, facilitating data analytics
User-driven framework for Healthcare
data sharing
Solution focusing on maintaining a
single true version of patient data and
issuing tokens
System to handle EMRs with mining
rewards to medical stakeholders
Framework focusing on healthcare
including the management of EMRs
Access control management of PHRs in
case of emergencies
Framework focusing on
cross-organizational medical data sharing and access
Sharing of medical data between cloud
service providers</p>
      <p>Architecture
Ethereum, three-layer
architecture
Permissioned,
threelayer architecture
Ethereum, four
components
Consortium, three-layer
architecture
Blockchain in general
Permissioned
(Hyperledger Fabric)
Permissioned,
threelayer architecture +
Blockchain network
Four-layer architecture
Architecture
Hyperledger Fabric
Dual-network architecture
Hyperledger Fabric and
Ethereum
Ethereum
Blockchain in general
Permissioned
(Hyperledger Fabric)
Permissioned, three-layer
architecture + Blockchain
Four-layer architecture</p>
      <p>
        The findings showed that there is no framework for building Blockchain-based EHR
systems in consideration of strong cybersecurity requirements nor specifically for use
in Switzerland (regulatory perspective). No found framework did specifically consider
(cyber) security. The lack of a means to check whether Blockchain covers the relevant
EHR requirements for cybersecurity constitutes the research gap. Therefore, a
cybersecurity requirement assessment tool for its use in the EHR context is sketched, which
aims at facilitating the cybersecurity requirements comparison and coverage
assessment of Blockchain and other - traditional - (database-based) systems (section 4.2 and
resulting artefact in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]). In the next step, the assessment tool is applied for the use
case of EHR in Switzerland. In order to compare and contrast the open-source
Blockchain platform 'Hyperledger Sawtooth' as an alternative to the database solution 'Swiss
Electronic Patient File' (EPF).
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Use Case: Hyperledger Sawtooth for EHR</title>
      <p>
        Hyperledger Sawtooth, in the following referred to as Sawtooth, is an open-source
project under the umbrella of the Hyperledger family hosted by the Linux Foundation
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Sawtooth is a modular platform that comes - by default - with robust security
functionalities and offers various customizing options, and hence was chosen to
represent a relevant Blockchain [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Sawtooth is focusing on modularity which allows
enterprises so select the suited transaction rules, permissioning and consensus algorithms.
While Sawtooth provides its consensus algorithm 'Proof-of-Elapsed-Time' (PoET), it
supports the use of other types of consensus algorithms [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. PoET is based on a random
lottery function. A random period is given for each participating node in the network,
to which the node must adhere to. The node whose time is the shortest wins the block
and can add the block to the Blockchain [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Sawtooth differentiates between
PoET‘SGX' (Intel® Software Guard Extensions), which requires special hardware to ensure
a trusted execution environment, and PoET simulator which can be executed on any
type of hardware [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Concerning cryptography, Sawtooth uses the secure hash
algorithms SHA-256 and SHA-512 as cryptographic safeguards in the transaction process
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. With the Sawtooth-Ethereum integration project (Seth), it is possible to integrate
Ethereum smart contracts to Sawtooth [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        For our use case, we decided to use EPF - a Swiss, non-blockchain solution for the
collection of personal documents with treatment-relevant information from patients.
These include, for example, the discharge report of a hospital, the medication list,
xrays or the vaccination card. The EPF does not contain all electronically collected health
information, but only those that are relevant for other professionals and further
treatment. In addition to the EPF, the health service provider (e.g. the general practitioner)
continues to keep a personal medical history, which contains more information than the
EPF. The EPF does not contain documents from authorities or health insurance
companies. Authorities and health insurers do not have access to the EPF [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. All persons
in Switzerland can request having their data in the EPF. With the EPF, patients can
divide their documents into confidentiality levels and can grant and withdraw access to
health service providers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The EPF is decentral established; it is an association of
regional implementations from various providers. However, the legal requirements and
rules are the same throughout Switzerland ('Technical and Organizational Certification
Requirements for Communities and Core Communities' [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). The decentralized
approach offers basic security since not all EHR data is stored in a single place. The
Federal Act on EPF stipulates how EPF must be organized and technically secured.
Every provider of the EPF is examined, certified, and regularly inspected [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
4.1
      </p>
      <sec id="sec-4-1">
        <title>Assessment Tool Development</title>
        <p>
          Following the research questions RQ2 and RQ3, the assessment tool is tested by filling
in Sawtooth capabilities matching the requirements (resulting artefact in [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]).
Subsequently, the results are compared to the Swiss EPF. Categories and unstructured
reasonings will be assigned to compare whether Sawtooth or the Swiss EPF cover the EHR
system requirements (based on systems documentation). The following listing explains
the defined assessment categories:
        </p>
        <p>Reasoning
Evidence has been found that the system meets the given
requirement.</p>
        <p>The system does not support the requirement by default. However,
the requirement can be met with additional tools that enhance the
system. For Sawtooth, this means an enhancement of the Blockchain
network.</p>
        <p>The system does not support the requirement by default. However,
the requirement can be met when the system is extended by
additional soft- or hardware outside of the system.</p>
        <p>The requirement is unrelated to technology and can be met on an
organizational level by following suited frameworks or standards.</p>
        <p>Framework focusing on healthcare including the management of
EMRs
No indication was found that the requirement could be covered by
the system, by the configuration of the system, by extension outside
of the system or by organizational measurements.</p>
        <p>
          The assignment of the categories in Table 4 to each requirement was carried out in three
iterations. For each EHR requirement, a compare and coverage assessment for
Sawtooth and EPF was conducted, peer-reviewed and validated by qualitative expert
interviews. The experts were selected in the Swiss Blockchain research and the EHR
development communities. Unclear requirements were specified by consulting the
documentation' Technical and Organizational Certification Requirements for Communities and
Core Communities' [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]; this document was used as a basis for assessing the
requirements coverage by the Swiss EPF. It is essential to state that, since it is a requirements
documentation, a final EPF solution must cover those requirements for certification but
can additionally cover more features, e.g., towards cybersecurity. The final and full
assessment tool is visible in [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Comparison and Coverage</title>
        <p>The results of the assessment of the coverage of EHR system requirements by
Sawtooth and by the Swiss EPF are visualized in Fig. 1. If only those requirements are
considered that have been categorized as 'Yes', many EHR system requirements that
are not covered by default (category 'yes') would be missed.</p>
        <p>Thus, it can be argued that Sawtooth with 55 (93%) covered EHR system
requirements more thoroughly than the Swiss EPF with 43 (73%) covered EHR system
requirements, when considering the assigned categories 'Yes', 'By Configuration', and 'By
Extension'. The individual perspective shows that Sawtooth allows freedom to meet the
requirements, either by choosing the right configuration or by relying on an extension
(Fig. 2) and only meets a bit more than half of the requirements by default. Although
Sawtooth covers the requirements well, it has disadvantages. Sawtooth poorly covers
EHR system requirements pointing to the deletion of data. This is also due to the fact
of inherent persistency of a Blockchain.</p>
        <p>
          There are various approaches to handling the issue. One of them is storing data
offchain. It is generally not necessary to store all transaction data on-chain. Data can as
well be stored in another database and be linked by hashes to the Blockchain. Storing
data off-chain would enable deletion following the EU GDPR [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. This would also
make sense for big files such as imaging. While Sawtooth covers many EHR system
requirements, organizational factors should not be left out. An example is key
management, with their critical tasks assigning, storing, and retrieving in case the keys were
lost.
        </p>
        <p>
          The individual perspective on the EPF shows that the system covers more
requirements by default, but has a significantly high number of cybersecurity requirements
that are not met at all (Fig. 3). Because it is a system that has to fit into the existing
health systems landscape, it allows for less flexibility in its design when comparing to
Sawtooth. In conclusion, it can be said that a qualitative and quantitative comparison
between the systems is possible. However, the two differ significantly in their
architecture primarily since the compare and coverage assessment is based on a document for
the Technical and Organizational Certification Requirements for Communities and
Core Communities [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] and not on a concrete instance.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Further Research</title>
      <p>
        The main contribution of this study is the assessment tool proposition as the
possibility to assess the coverage of cybersecurity relevant EHR system requirements by
Sawtooth and the Swiss EPF both as an exemplary use case. This study first outlined
the relevance of EHR in combination cybersecurity requirements and Blockchain as a
potential enabling technology. For the foundation, the intersection cybersecurity,
Blockchain, and EHR were discussed. Based on that, we developed an assessment tool
which considered cybersecurity-related EHR requirements. The assessment tool was
subsequently developed and applied to Sawtooth and the Swiss EPF. The comparison
showed that Blockchain, and in particular Sawtooth could be used to enable
cybersecurity for EHR. However, Sawtooth does not perform well on those requirements where
permanent deletion of data is required. Thus, the critical characteristic 'persistency' - a
strength of Blockchain in general - is a weakness in the context of EHR or for sensitive
data in general. In section 4.2, it was mentioned that there are approaches to solving
this problem. Besides, it should be noted that the Swiss EPF also covers many of the
EHR requirements. This means that while Blockchain can be used to enable
cybersecurity for EHRs, this can also be achieved with a non-Blockchain based system. In
addition to contributing to research, the final assessment tool in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] could serve EHR
custodians for their analysis of system variants.
6
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System, (</article-title>
          <year>2008</year>
          ). Consulted,
          <volume>1</volume>
          -
          <fpage>9</fpage>
          . Journal for General Philosophy of Science, (
          <volume>1</volume>
          ). https://doi.org/10.1007/s10838-008- 9062-0.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Overview of business innovations and research opportunities in blockchain and introduction to the special issue</article-title>
          .
          <source>Financial Innovation</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . https://doi.org/10.1186/s40854-016-0049-2.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Gartner</surname>
          </string-name>
          . (
          <year>2018</year>
          ).
          <article-title>5 Trends Emerge in the Gartner Hype Cycle for Emerging Technologies</article-title>
          ,
          <year>2018</year>
          . Retrieved from https://www.gartner.com/smarterwithgartner/5
          <article-title>-trends-emerge-ingartner-hype-cycle-for-emerging-technologies-</article-title>
          <year>2018</year>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Gartner</surname>
          </string-name>
          . (
          <year>2019</year>
          ).
          <article-title>Interpreting technology hype</article-title>
          . Retrieved from https://www.gartner.com/en/research/methodologies/gartner- hype-cycle
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kshetri</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Blockchain's roles in strengthening cybersecurity and protecting privacy</article-title>
          .
          <source>Telecommunications Policy</source>
          ,
          <volume>41</volume>
          (
          <issue>10</issue>
          ),
          <fpage>1027</fpage>
          -
          <lpage>1038</lpage>
          . https://doi.org/10.1016/j.telpol.
          <year>2017</year>
          .
          <volume>09</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <source>Research on information security technology based on blockchain. 2018 3rd IEEE International Conference on Cloud Computing and Big Data Analysis, ICCCBDA</source>
          <year>2018</year>
          ,
          <volume>380</volume>
          -
          <fpage>384</fpage>
          . https://doi.org/10.1109/ICCCBDA.
          <year>2018</year>
          .
          <volume>8386546</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          , P. J.,
          <string-name>
            <surname>Dargahi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dehghantanha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parizi</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Choo</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>A Systematic Literature Review of Blockchain Cyber Security</article-title>
          .
          <article-title>Digital Communications and Networks</article-title>
          . https://doi.org/10.1016/j.dcan.
          <year>2019</year>
          .
          <volume>01</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hölbl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kompara</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamišalić</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Zlatolas</surname>
            ,
            <given-names>L. N.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A systematic review of the use of blockchain in healthcare</article-title>
          .
          <source>Symmetry</source>
          ,
          <volume>10</volume>
          (
          <issue>10</issue>
          ). https://doi.org/ 10.3390/sym10100470.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Rabah</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Challenges &amp; Opportunities for Blockchain Powered Healthcare Systems: A Review</article-title>
          .
          <source>Mara Research Journal of Medicine &amp; Health Sciences</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <fpage>45</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. IBM Security and Ponemon Institute. (
          <year>2019</year>
          ).
          <article-title>Cost of a Data Breach Report</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ambinder</surname>
            ,
            <given-names>E. P.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Electronic Health Records</article-title>
          .
          <source>Journal of Oncology Practice</source>
          ,
          <fpage>57</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. ehealthsuisse. (
          <year>2017</year>
          ).
          <article-title>Meine Gesundheitsinfos. Zur richtigen Zeit am richtigen Ort. Meine Gesundheitsinfos. Zur richtigen Zeit am richtigen Ort</article-title>
          . Retrieved from https://www.e-healthsuisse.ch/fileadmin/user_upload/Dokumente/2017/D/171219_EPD-Broschuere_
          <article-title>Bevoelker ung_d</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>The Office of the National Coordinator for Health Information Technology</article-title>
          . (
          <year>2019</year>
          ).
          <article-title>What are the differences between electronic medical records, electronic health records, and personal health records? Retrieved from https://www.healthit.gov/faq/what-are-differences-between-electronic-medical-records-electronic-health-records-and- personal.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Schweizerische</surname>
            <given-names>Eidgenossenschaft.</given-names>
          </string-name>
          (
          <year>2017a</year>
          ).
          <article-title>Botschaft zum Bundesgesetz über die Totalrevision des Bundesgesetzes über den Datenschutz und die Änderung weiterer Erlasse zum Datenschutz</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. GDPR.eu. (n.d.).
          <article-title>What is GDPR, the EU's new data protection law?</article-title>
          <source>Retrieved November 28</source>
          ,
          <year>2019</year>
          , from https://gdpr.eu/what-is- gdpr/.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Eidgenössischer</surname>
          </string-name>
          Datenschutz- und
          <string-name>
            <surname>Öffentlichkeitsbeauftragter</surname>
          </string-name>
          (EDÖB).
          <source>(n.d.)</source>
          . Schweigepflicht. Retrieved from https://www.edoeb.admin.ch/edoeb/de/home/datenschutz/gesundheit/schweigepflicht.html.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Roehrs</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Da Costa</surname>
            ,
            <given-names>C. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Da Rosa</surname>
            <given-names>Righi</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            , &amp;
            <surname>Kleinner</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Personal health records: A systematic literature review</article-title>
          .
          <source>Journal of Medical Internet Research</source>
          ,
          <volume>19</volume>
          (
          <issue>1</issue>
          ). https://doi.org/10.2196/jmir.5876.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Hoerbst</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ammenwerth</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Electronic health records: A systematic review on quality requirements</article-title>
          .
          <source>Methods of Information in Medicine</source>
          ,
          <volume>49</volume>
          (
          <issue>4</issue>
          ),
          <fpage>320</fpage>
          -
          <lpage>336</lpage>
          . https://doi.org/10.3414/ME10-01-0038.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Moriggl</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asprion</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kramer</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Appendix. Assessment Tool Application Comparison between a blockchain and a traditional database solution for electronic health records</article-title>
          .
          <source>BES2020. 10.13140/RG.2.2.24736.81924</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Bedner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ackermann</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Schutzziele der IT-Sicherheit</article-title>
          .
          <source>Datenschutz Und Datensicherheit - DuD</source>
          ,
          <volume>34</volume>
          (
          <issue>5</issue>
          ),
          <fpage>323</fpage>
          -
          <lpage>328</lpage>
          . https://doi.org/10.1007/s11623-010-0096-1.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Eidgenössisches</surname>
          </string-name>
          <article-title>Departement des Innern EDI</article-title>
          . (
          <year>2019</year>
          ).
          <article-title>Technische und organisatorische Zertifizierungsvoraussetzungen für Gemeinschaften und Stammgemeinschaften</article-title>
          . Retrieved from https://www.bag.admin.ch/dam/bag/de/dokumente/nat- gesundheitsstrategien/strategie-ehealth/anhoerung-ausfuehrungsrecht/verordnungen/epdv-edi- anhang2.pdf.download.pdf/08-2_de_epdv
          <article-title>-edi_anhang_2</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. The Linux Foundation. (
          <year>2018</year>
          ). Hyperledger Sawtooth. Retrieved from https://www.hyperledger.org/projects/sawtooth.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Moriggl</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asprion</surname>
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schneider</surname>
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2021</year>
          )
          <article-title>Blockchain Technologies Towards Data Privacy-Hyperledger Sawtooth as Unit of Analysis</article-title>
          .
          <source>In: Dornberger R. (eds) New Trends in Business Information Systems and Technology. Studies in Systems, Decision and Control</source>
          , vol
          <volume>294</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -48332-6_
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>Intel</given-names>
            <surname>Corporation</surname>
          </string-name>
          . (n.d.-e). Sawtooth - Introduction. Retrieved from https://sawtooth.hyperledger.org/docs/core/nightly/1- 1/introduction.html?highlight=immutable.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Intel</given-names>
            <surname>Corporation</surname>
          </string-name>
          . (n.d.-f).
          <source>Sawtooth - PoET 1</source>
          .0 Specification. Retrieved from https://sawtooth.hyperledger.org/docs/core/nightly/1-1/architecture/poet.html?highlight=poet.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>Intel</given-names>
            <surname>Corporation</surname>
          </string-name>
          . (n.d.-b).
          <source>Sawtooth - Building and Submitting Transactions</source>
          . Retrieved from https://sawtooth.hyperledger.org/docs/core/nightly/1-1/_autogen/txn_submit_tutorial.html?highlight=sha.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Finck</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Blockchain and the General Data Protection Regulation - Can distributed ledgers be squared with European data protection law? Retrieved from https://www</article-title>
          .europarl.europa.eu/RegData/etudes/STUD/
          <year>2019</year>
          /634445/EPRS_STU(
          <year>2019</year>
          )
          <article-title>634445_EN</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Shahnaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qamar</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Khalid</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Using Blockchain for Electronic Health Records</article-title>
          . IEEE Access, PP,
          <volume>1</volume>
          . https://doi.org/10.1109/ACCESS.
          <year>2019</year>
          .
          <volume>2946373</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Xia</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sifah</surname>
            ,
            <given-names>E. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smahi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amofa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>BBDS: Blockchain-based data sharing for electronic medical records in cloud environments</article-title>
          .
          <source>Information (Switzerland)</source>
          ,
          <volume>8</volume>
          (
          <issue>2</issue>
          ). https://doi.org/10.3390/info8020044.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Vora</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nayyar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tanwar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyagi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Obaidat</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Rodrigues</surname>
            ,
            <given-names>J. J. P. C.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records. 2018 IEEE Globecom Workshops</article-title>
          ,
          <source>GC Wkshps 2018 - Proceedings</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . https://doi.org/10.1109/GLOCOMW.
          <year>2018</year>
          .
          <volume>8644088</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Guizani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records</article-title>
          .
          <source>2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . https://doi.org/10.1109/ GLOCOM.
          <year>2018</year>
          .
          <volume>8647713</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Al-Karaki</surname>
            ,
            <given-names>J. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gawanmeh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ayache</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mashaleh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain</article-title>
          .
          <source>15th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)</source>
          ,
          <fpage>330</fpage>
          -
          <lpage>335</lpage>
          . https://doi.org/10.1109/iwcmc.
          <year>2019</year>
          .
          <volume>8766714</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Rajput</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahvanooey</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Masood</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          ,
          <fpage>84304</fpage>
          -
          <lpage>84317</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2019</year>
          .
          <volume>2917976</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Xiao</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lertwuthikarn</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Goh</surname>
            ,
            <given-names>R. S. M.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>EMRShare: A Cross-Organizational Medical Data Sharing and Management Framework Using Permissioned Blockchain</article-title>
          .
          <source>Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS</source>
          ,
          <fpage>2018</fpage>
          -Decem,
          <fpage>998</fpage>
          -
          <lpage>1003</lpage>
          . https://doi.org/10.1109/ PADSW.
          <year>2018</year>
          .
          <volume>8645049</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Xia</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sifah</surname>
            ,
            <given-names>E. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asamoah</surname>
            ,
            <given-names>K. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gao</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Guizani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>5</volume>
          ,
          <fpage>14757</fpage>
          -
          <lpage>14767</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2017</year>
          .
          <volume>2730843</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Medblock</surname>
          </string-name>
          . (
          <year>2017b</year>
          ).
          <source>MedBlock</source>
          . Retrieved from https://www.medblock.co.uk/.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>MedChain: Efficient healthcare data sharing via blockchain</article-title>
          .
          <source>Applied Sciences (Switzerland)</source>
          ,
          <volume>9</volume>
          (
          <issue>6</issue>
          ). https://doi.org/10.3390/app9061207.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Medicalchain</surname>
          </string-name>
          . (
          <year>2019</year>
          ).
          <article-title>Medicalchain - Blockchain for electronic health records</article-title>
          .
          <source>Retrieved</source>
          from https://medicalchain.com/en/#mobile-site-navigation.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Azaria</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ekblaw</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vieira</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lippman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>MedRec: Using blockchain for medical data access and permission management</article-title>
          .
          <source>Proceedings - 2016 2nd International Conference on Open and Big Data</source>
          ,
          <string-name>
            <surname>OBD</surname>
          </string-name>
          <year>2016</year>
          ,
          <volume>25</volume>
          -
          <fpage>30</fpage>
          . https://doi.org/10.1109/OBD.
          <year>2016</year>
          .1
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>