<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Covid-19 Data Sharing and Organization through Blockchain and Decentralized Models</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mario</forename><surname>Casillo</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIIn</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Arcangelo</forename><surname>Castiglione</surname></persName>
							<email>arcastiglione@unisa.it</email>
							<affiliation key="aff1">
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Colace</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIIn</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Massimo</forename><surname>De Santo</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIIn</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Marongiu</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIIn</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Domenico</forename><surname>Santaniello</surname></persName>
							<email>dsantaniello@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">DIIn</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<settlement>Fisciano (SA)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Covid-19 Data Sharing and Organization through Blockchain and Decentralized Models</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">BACE1ED84720F9B516A108FD275FD61F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T14:35+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Big Data</term>
					<term>Blockchain</term>
					<term>Digital Storage</term>
					<term>Network Security</term>
					<term>Smart Contract</term>
					<term>Trusted Data Sharing</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The pandemic due to Covid-19 has highlighted and sometimes amplified some critical issues affecting the global health system. From the beginning, it was clear that having an overview of the pandemic situation was one of the main objectives to be achieved to fight the Virus. In this sense, technologies based on decentralized systems, such as Blockchain, can be effective in collecting data since they can store information in a secure and scalable way while respecting people's privacy.</p><p>This work aims to propose a framework based entirely on decentralized systems that can solve management and collaborative analysis of sensitive data, such as those related to the Coronavirus pandemic. In particular, the model is proposed as a tool to improve the efficiency of all those organizations that have found themselves on the front line to deal with the spread of the Virus in the world, such as hospitals and research institutes. In addition, it aims to improve communications between organizations at the global level to facilitate a fair and profitable exchange of knowledge to fight the pandemic.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Data nowadays represent one of the significant sources of knowledge, as their correlations can highlight some information that would otherwise be hidden <ref type="bibr" target="#b0">[1]</ref>. This aspect is especially evident in managing a global pandemic: the number of infections, geographic location, patient information, etc., are crucial data in the fight against the pandemic <ref type="bibr" target="#b1">[2]</ref>  <ref type="bibr" target="#b2">[3]</ref>.</p><p>Knowing precisely the movement of the Virus allows preventing its spread by acting in the most opportune areas and moments <ref type="bibr" target="#b3">[4]</ref>. However, the processing of all this information poses many problems, both from the point of view of collection and access and, above all, to protect the privacy of individuals <ref type="bibr" target="#b4">[5]</ref>.</p><p>Another critical aspect to consider is undoubtedly exchanging this information globally, securely, and in real-time, because a situation like the Covid-19 pandemic can only be solved through appropriate collaborations both locally and internationally <ref type="bibr" target="#b5">[6]</ref>.</p><p>Using a decentralized approach, it is possible to develop secure and scalable software that can accommodate the vast amount of information globally while maintaining a high degree of reliability <ref type="bibr" target="#b6">[7]</ref>. Data are therefore distributed within a global network that can maintain unaltered properties and guarantee the security of the information. This result can be achieved by using systems based on Peer-2-Peer networks, in which the exchange of information and documents takes place in a decentralized and autonomous way among the different nodes of the network <ref type="bibr" target="#b7">[8]</ref>.</p><p>Blockchain and <ref type="bibr" target="#b7">[8]</ref> decentralized file system technologies (i.e. InterPlanetary FileSystem -IPFS), are well suited to develop architectures that meet the requirements in analysis <ref type="bibr" target="#b8">[9]</ref>  <ref type="bibr" target="#b9">[10]</ref>. The aim of the paper is, therefore, to develop a framework able to guarantee:</p><p>• Security against any accidental and non-accidental disaster: Blockchain along with decentralized storage (such as IPFS) can ensure the integrity and immutability of data permanently and offer quick access to information worldwide. • Privacy: Using modern cryptographic techniques, it is possible to guarantee a system of data ownership, with the possibility of obscuring sensitive information from the Public through selective access. This aspect represents a significant advantage for people and public and private organizations collecting and working on those data. • Real-time sharing of information. This goal is achieved by encouraging collaboration across multiple organizations and maintaining control over data ownership and viewing.</p><p>From the earliest stages of the pandemic, Hospitals and Research Institutes found themselves working with data that was peculiar in quantity and nature. Traditional systems had to be reorganized to try to meet the main requirements of privacy and data size. However, some necessary properties are challenging to achieve with traditional tools. An example is the collection and certification of infections, where sensitive information must somehow be shared worldwide while preserving user privacy <ref type="bibr" target="#b10">[11]</ref>.</p><p>2</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Related Works</head><p>Several approaches have been proposed in the literature for real-time health monitoring of patients. Azaria et al. <ref type="bibr" target="#b11">[12]</ref> propose MedRec, a decentralized record management system to handle electronic medical records using blockchain technology. MedRec provides capabilities for managing authentication, confidentiality, accountability, and data sharing. The system allows users to control their medical information through a blockchain network consisting of several medical stakeholders securing the network utilizing a Proof-of-Work consensus scheme.</p><p>Christodoulou et al. <ref type="bibr" target="#b12">[13]</ref> focused on people, giving them exclusive ownership of the data. Using cryptographic techniques and Smart Contracts, they proposed a decentralized system for direct information exchange between doctors and patients by placing the User at the information exchange center.</p><p>Such approaches, however, do not apply to a real-world case like a global pandemic. Indeed, to prevent contagions and disease spread, certified and competent Institutions must have complete control over the data to provide the best possible instructions, this is not possible in <ref type="bibr" target="#b11">[12]</ref> and <ref type="bibr" target="#b12">[13]</ref>.</p><p>Hasan et al. <ref type="bibr" target="#b13">[14]</ref> proposed an interesting approach in which IPFS and Blockchain events are used. In this model, data is selectively encrypted and shared using an asymmetric key encryption mechanism. However, the use of the Blockchain is marginal as only events are utilized while storing any data is given over to IPFS. The letter does not include itself to spread data across the network to decentralize and secure; this can only be done using FileCoin , thus additional costs. Finally, their 1 proposed sharing system requires the use of a module dedicated to exchanging keys and references to files; the presence of this module partially reduces the effectiveness of Blockchain advantages.</p><p>Instead, the proposed solution aims to combine Blockchain and decentralized storage, trying to benefit from the best features of both.</p><p>• The Blockchain is used to store metadata of information in a secure, immutable, and sequential way. • Decentralized storage is used to store appropriately encrypted information in a scalable way without impacting Blockchain performance. • In addition, the Blockchain takes care of the access and sharing of metadata among the different users of the system without the intervention of other external modules.</p><p>3</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposed Methodology</head><p>The framework is proposed as a general solution for the problem of storing a large amount of data in a secure, traceable, and immutable way, which at the same time respects the confidentiality of the information and facilitates collaboration in the study and analysis of data. For this reason, the system is based on three main concepts: Blockchain; Decentralized Storage; Symmetric and Asymmetric Key Encryption <ref type="bibr" target="#b14">[15]</ref>. The first module involves organizing data into a common and well-defined structure; the second uses blockchain technology for storing file meta-data, the third and final module stores data on the decentralized file system.</p><p>For experimental purposes, the model has been implemented using the Ethereum Blockchain and EVM (Ethereum Virtual Machine) <ref type="bibr" target="#b15">[16]</ref> for the part concerning the Smart Contract. The decentralized file system module was instead implemented using IPFS.</p><p>The different modules of which the architecture is composed will be specified in detail below.</p><p>For convention, the generic term User will be referred to the main actor of the system. In this particular use case, a User will be a single organization which have to store and organize massive amount of data collected by its infrastructure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Data Structure</head><p>Before any information can be saved, a data collection standard is first defined. This step is crucial, as bringing the data back into one standard structure facilitates all subsequent operations <ref type="bibr" target="#b16">[17]</ref>. Especially when it comes to health data, it is not always possible to have a fixed information structure. Due to the very nature of the data, there can be indefinite variations of a common problem or disease. Therefore, a tree structure was created, in which each node represents the smallest information unit, which is desired to be saved immutably.</p><p>Each piece of data is uniquely identified by a URI (ContentURI) that each User arbitrarily assigns to their personal storage space. Using this structure, it is possible to describe information without a predefined data schema dynamically. In addition, the ContentURI field allows information to be structured semantically as well.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Blockchain</head><p>The Blockchain contains all the information regarding the file's metadata. In particular: the date of insertion; the owner (the User who uploads the file); whether the data can change over time; and finally, the reference to the real location of the information on the decentralized file system. Only the meta-data of the information was chosen to be saved on Blockchain because, due to their structure, these systems are not scalable for storing large files <ref type="bibr" target="#b17">[18]</ref>; moreover, operations on Blockchain are expensive both in economic and computational terms. This module was implemented by using the concept of Smart Contract <ref type="bibr" target="#b18">[19]</ref>, which allowed the secure storage of information, but the Smart Contract itself acts as a point of information interchange between the various users. In this way, no other module is needed for communication, but the parties involved interact independently. The memory of the Smart Contract has therefore been divided into two parts. Using Hash Tables, each User (represented by a public key) has space where he can uniquely associate a ContentURI to a particular meta-data. Like the previous one, the second part is a separate storage space dedicated exclusively to the sharing of meta-data between different users and the exchange of information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Data Storage and Management</head><p>Store Data. Once the data has been organized into the IPFS-Data structure previously described, the information is sent to the different systems in the following way, assuming that the User is already registered into the system and has its own Public (&lt;PubK&gt;) and Private Key (&lt;PrivK&gt;):</p><p>1. Before storing a data item, a User must first encrypt it with a uniformly randomly generated symmetric key &lt;SPrivK&gt;. The generation operation must be repeated for each entry. The binary data (encrypted according to a standard block cipher) is uploaded to IPFS, which returns the Content Identifier (CID) for addressing. At this point, the data is associated with a unique URI (ContentURI) generated by the User so that it is meaningful to describe the content of the data. 2. The symmetric key &lt;SPrivK&gt; is encapsulated with further encryption using its public key &lt;PubK&gt; and finally destroyed to prevent it from being recovered by an unauthorized party. The resulting cipher takes the name CipherKey. Some data types may be subject to change over time (such as, for example, contact information), so the ability has been given to updating the CID reference when necessary. IPFS does not allow deletion of a file; obsolete versions of the data will remain present in the network as history.</p><p>No particular cipher has been specified in the framework; instead, the User can choose the best encryption algorithm for the type of data he intends to store. As is the case with hash functions on IPFS, it was deemed appropriate to adopt a design that </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">At this point the symmetric key must be extracted from the CypherKey value,</head><p>decryption is then performed using &lt;PrivK&gt; to trace back to the symmetric key &lt;SPrivK&gt;. 3. The encrypted data is downloaded from IPFS using its addressing CID, decrypted using &lt;SPrivK&gt;, which for security reasons is immediately destroyed. Share Data. Sharing can only be done after the data has been uploaded to Smart Contract. Therefore, it is assumed that the User who wants to share a piece of information is already in possession of &lt;SPrivK&gt;, IpfsCID, and ContentURI, as well as the User's public key to whom he wants to view his data. Information exchange is made through the transfer of the &lt;SPrivK&gt; information between Users.</p><p>No other private information are exchanged during sharing process, in particular User's private keys.</p><p>The following information is sent to the Smart Contract:</p><p>1. SharedAddress: Public key of the User with whom the data is to be shared. 2. ContentURI: URI that uniquely describes the data.</p><p>3. CipherKey: &lt;SPrivK&gt; used to encrypt the data, encapsulated using SharedAddress as the encryption key. 4. CipherAlgorithm: Algorithm used for data encryption. 5. IpfsCID: CID returned by IPFS when uploading the file.</p><p>The User to whom the files are shared will use the same steps described in the previous paragraph to access the data. • The timestamp fields are always populated with the time of the block in which the transaction is made. This field allows for certification of data entry over time. • When sharing data, the origin field is automatically set as the User's public key making the transaction. This allows certifying the tracking of the data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Implementation into Ethereum Virtual Machine</head><p>The system has been implemented on Ethereum Blockchain via Smart Contract in Solidity language. event DataShared(bytes32 contentUri, address from, address to); Each operation (Insert, Edit, Share) is associated with an event, i.e., a signal propagated throughout the peer-2-peer network, which is essential for the development of decentralized applications and communication between the various stages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>In conclusion, in this paper, we tried to investigate one of the possible applications of Blockchain and decentralized systems for data management and sharing. The results obtained agree with what was researched. Indeed, we succeeded in realizing a scalable structure for the secure collection of data to be easily shared within a well-defined network and protected from the privacy point of view. The system thus obtained is therefore independent of a central organization, collaborative and safe suitable for extraordinary situations such as, for example, a global pandemic. The encryption techniques used are safe because they follow the current standards without making changes to the algorithms. Moreover, they have been used so as not to create dependencies in the use of keys. Each cryptographic primitive uses its private key.</p><p>This work opens the possibility of multiple future developments. The first one is undoubtedly the research of new technologies on which to implement the framework.</p><p>One of the critical aspects of this system is the non-negligible cost to maintain security and decentralization of data. The information saved on IPFS must be spread on the network using FileCoin , while the operations on the Blockchain have a 3 variable and often unpredictable price. The use of these public technologies may not be feasible in practice, as they are not sustainable in terms of costs. It would therefore be interesting to study alternative implementations of currently experimental technologies, such as, for example, Blockchain with integrated decentralized storage . A second aspect that could be expanded would be to build a Public Key Infrastructure (PKI) to manage the public keys of all users, also using decentralized models and approaches <ref type="bibr" target="#b19">[20]</ref>  <ref type="bibr" target="#b20">[21]</ref>. Finally, Smart Contract events can be utilized to build applications that operate on the data in real-time, such as building indexing services, notification services etc.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Modules of the proposed methodology.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Abstract Data Structure definition</figDesc><graphic coords="4,217.76,437.65,159.75,213.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Blockchain Storage Model</figDesc><graphic coords="5,167.14,427.15,261.00,207.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>3 .</head><label>3</label><figDesc>The information is sent to Smart Contract, which takes care of storing it: a. Address: User's public key. b. ContentURI: URI that uniquely describes the data. c. CipherKey: Symmetric key, used to encrypt the data, encapsulated. d. CipherAlgorithm: Algorithm used for symmetric data encryption. e. IpfsCID: CID returned by IPFS when the file is uploaded. f. Editable: Boolean value indicating whether the CID field can be updated in the future or not.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Store data sequence diagram</figDesc><graphic coords="7,126.20,160.90,345.75,309.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Retrieve Data sequence diagram</figDesc><graphic coords="8,126.20,152.90,345.75,216.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Share data sequence diagram Some fields are automatically managed by Smart Contract to ensure data security and certification:</figDesc><graphic coords="9,126.20,160.90,345.75,276.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>4</head><label>4</label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>The main structures of the Smart Contract are represented by the hash tables that contain the data. A public key is uniquely associated with a second hash table to which a ContentURI can be associated with metadata.The functions within the Smart Contract have been realized, trying to perform as few operations as possible to increase efficiency and reduce costs.</figDesc><table><row><cell></cell><cell>string ipfscid; dataStorage[msg.sender][contentUri].editable =</cell></row><row><cell cols="2">bool editable; editable;</cell></row><row><cell></cell><cell>bool isValue; dataStorage[msg.sender][contentUri].isValue =</cell></row><row><cell>} true;</cell><cell></cell></row><row><cell cols="2">struct SharedData { //Emit Blockchain event when new data is</cell></row><row><cell cols="2">address origin; inserted</cell></row><row><cell></cell><cell>string cypherkey; emit DataInsert(msg.sender, contentUri);</cell></row><row><cell></cell><cell>string cypheralgorithm;</cell></row><row><cell></cell><cell>uint256 timestamp; return true;</cell></row><row><cell>}</cell><cell>string ipfscid;</cell></row><row><cell></cell><cell>bool isValue;</cell></row><row><cell>}</cell><cell></cell></row><row><cell cols="2">mapping(address =&gt; mapping(bytes32 =&gt; Data))</cell></row><row><cell cols="2">dataStorage;</cell></row><row><cell cols="2">mapping(address =&gt; mapping(bytes32 =&gt; SharedData)) Blockchain Events list</cell></row><row><cell cols="2">sharedDataStorage; event DataInsert(address authority, bytes32</cell></row><row><cell cols="2">contentUri);</cell></row><row><cell cols="2">event DataModified(address authority, bytes32</cell></row><row><cell cols="2">contentUri);</cell></row><row><cell cols="2">Store Function</cell></row><row><cell cols="2">function storeData(bytes32 contentUri, string memory</cell></row><row><cell cols="2">cypherkey, string memory cypheralgorithm,string memory</cell></row><row><cell cols="2">ipfscid, bool editable) public returns(bool success) {</cell></row><row><cell></cell><cell>//Deny storage if contentUri is already used</cell></row><row><cell cols="2">require(!dataStorage[msg.sender][contentUri].isValue);</cell></row><row><cell></cell><cell>//Store values in data structure</cell></row><row><cell></cell><cell>dataStorage[msg.sender][contentUri].cypherkey =</cell></row><row><cell cols="2">cypherkey;</cell></row><row><cell cols="2">dataStorage[msg.sender][contentUri].cypheralgorithm =</cell></row><row><cell cols="2">cypheralgorithm;</cell></row><row><cell cols="2">Main Data Structures in the Smart Contract dataStorage[msg.sender][contentUri].ipfscid =</cell></row><row><cell cols="2">ipfscid; struct Data { dataStorage[msg.sender][contentUri].timestamp = string cypherkey; string cypheralgorithm; now;</cell></row><row><cell></cell><cell>uint256 timestamp;</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://docs.filecoin.io/about-filecoin/ipfs-and-filecoin/#data-storage-incentives</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">can be easy to evolve. 2 https://multiformats.io/multihash/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Business Intelligence and Analytics: From Big Data to Big Impact</title>
		<author>
			<persName><forename type="first">Chiang</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><surname>Storey</surname></persName>
		</author>
		<idno type="DOI">10.2307/41703503</idno>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Response to COVID-19 in Taiwan</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">Y</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Brook</surname></persName>
		</author>
		<idno type="DOI">10.1001/jama.2020.3151</idno>
	</analytic>
	<monogr>
		<title level="j">JAMA</title>
		<imprint>
			<biblScope unit="volume">323</biblScope>
			<biblScope unit="issue">14</biblScope>
			<date type="published" when="2020-04">Apr. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Artificial Intelligence (AI) and Big Data for Coronavirus (COVID-19) Pandemic: A Survey on the State-of-the-Arts</title>
		<author>
			<persName><forename type="first">Q.-V</forename><surname>Pham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Huynh-The</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-J</forename><surname>Hwang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Pathirana</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3009328</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Review of Big Data Analytics, Artificial Intelligence and Nature-Inspired Computing Models towards Accurate Detection of COVID-19 Pandemic Cases and Contact Tracing</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">E</forename><surname>Agbehadji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">O</forename><surname>Awuzie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Ngowi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Millham</surname></persName>
		</author>
		<idno type="DOI">10.3390/ijerph17155330</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Environmental Research and Public Health</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">15</biblScope>
			<date type="published" when="2020-07">Jul. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">On the responsible use of digital data to tackle the COVID-19 pandemic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ienca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Vayena</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41591-020-0832-5</idno>
	</analytic>
	<monogr>
		<title level="j">Nature Medicine</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2020-04">Apr. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The European Bioinformatics Institute: empowering cooperation in response to a global health crisis</title>
		<author>
			<persName><forename type="first">G</forename><surname>Cantelli</surname></persName>
		</author>
		<idno type="DOI">10.1093/nar/gkaa1077</idno>
	</analytic>
	<monogr>
		<title level="j">Nucleic Acids Research</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">D1</biblScope>
			<date type="published" when="2021-01">Jan. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Tamper-Resistant Mobile Health Using Blockchain Technology</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ichikawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kashiyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ueno</surname></persName>
		</author>
		<idno type="DOI">10.2196/mhealth.7938</idno>
	</analytic>
	<monogr>
		<title level="j">JMIR mHealth and uHealth</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">7</biblScope>
			<date type="published" when="2017-07">Jul. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An analysis of Internet content delivery systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Saroiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>Gummadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Dunn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Gribble</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Levy</surname></persName>
		</author>
		<idno type="DOI">10.1145/844128.844158</idno>
	</analytic>
	<monogr>
		<title level="j">ACM SIGOPS Operating Systems Review</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<date type="published" when="2002-12">Dec. 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Blockchain-oriented dynamic modelling of smart contract design and execution in the supply chain</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dolgui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Potryasaev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ivanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Werner</surname></persName>
		</author>
		<idno type="DOI">10.1080/00207543.2019.1627439</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Production Research</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">7</biblScope>
			<date type="published" when="2020-04">Apr. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">N</forename><surname>Griggs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Ossipova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">P</forename><surname>Kohlios</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Baccarini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Howson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hayajneh</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10916-018-0982-x</idno>
		<ptr target="https://fs.neo.org/3https://docs.filecoin.io/about-filecoin/ipfs-and-filecoin/#data-storage-incentivesRemotePatientMonitoring" />
	</analytic>
	<monogr>
		<title level="m">Healthcare Blockchain System Using Smart Contracts for Secure Automated 4 NeoFS: public distributed decentralized object storage</title>
				<imprint>
			<date type="published" when="2018-07">Jul. 2018</date>
			<biblScope unit="volume">42</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Information Technology-Based Tracing Strategy in Response to COVID-19 in South Korea-Privacy Controversies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ko</surname></persName>
		</author>
		<idno type="DOI">10.1001/jama.2020.6602</idno>
	</analytic>
	<monogr>
		<title level="j">JAMA</title>
		<imprint>
			<biblScope unit="volume">323</biblScope>
			<biblScope unit="issue">21</biblScope>
			<date type="published" when="2020-06">Jun. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">MedRec: Using Blockchain for Medical Data Access and Permission Management</title>
		<author>
			<persName><forename type="first">A</forename><surname>Azaria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ekblaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Vieira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lippman</surname></persName>
		</author>
		<idno type="DOI">10.1109/OBD.2016.11</idno>
		<imprint>
			<date type="published" when="2016-08">Aug. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Health Information Exchange with Blockchain amid Covid-19-like Pandemics</title>
		<author>
			<persName><forename type="first">K</forename><surname>Christodoulou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Christodoulou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zinonos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Carayannis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Chatzichristofis</surname></persName>
		</author>
		<idno type="DOI">10.1109/DCOSS49796.2020.00071</idno>
		<imprint>
			<date type="published" when="2020-05">May 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Blockchain-Based Solution for COVID-19 Digital Medical Passports and Immunity Certificates</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">R</forename><surname>Hasan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3043350</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Information-theoretic Key Encapsulation and its Applications</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sharifian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Safavi-Naini</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Formal Verification of Smart Contracts</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bhargavan</surname></persName>
		</author>
		<idno type="DOI">10.1145/2993600.2993611</idno>
		<imprint>
			<date type="published" when="2016-10">Oct. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Alternatives to relational database: Comparison of NoSQL and XML approaches for clinical data storage</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>-Y. Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-C</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-S</forename><surname>Choi</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cmpb.2012.10.018</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Methods and Programs in Biomedicine</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2013-04">Apr. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Vukolić</surname></persName>
		</author>
		<title level="m">The Quest for Scalable Blockchain Fabric: Proof-of-Work vs</title>
				<imprint>
			<publisher>BFT Replication</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Smart Contract Development: Challenges and Opportunities</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zou</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSE.2019.2942301</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Blockstack: A global naming and storage system secured by blockchains</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nelson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Shea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Freedman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Bassam</surname></persName>
		</author>
		<idno type="DOI">10.1145/3055518.3055530</idno>
	</analytic>
	<monogr>
		<title level="j">SCPKI</title>
		<imprint>
			<date type="published" when="2017-04">Apr. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
