<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Method of patients&apos; data protection on the instance of chemotherapy dosing data for Ewing&apos;s sarcoma treatment ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Yurii</forename><surname>Baryshev</surname></persName>
							<email>yuriy.baryshev@vntu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytske shose</addrLine>
									<postCode>21021</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vladyslava</forename><surname>Lanova</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytske shose</addrLine>
									<postCode>21021</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Method of patients&apos; data protection on the instance of chemotherapy dosing data for Ewing&apos;s sarcoma treatment ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">92CA9D05595F66B1E511FA506EECEEC2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cyber security</term>
					<term>cryptography</term>
					<term>homomorphic encryption</term>
					<term>smart contract</term>
					<term>blockchain</term>
					<term>medical data protection</term>
					<term>critical infrastructure</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The method of patients' data protection on the instance of chemotherapy dosing data calculation process for Ewing's sarcoma treatment which improves the protection of personal data of cancer patients is proposed in this article. While performing this work, the types of homomorphic encryption, their features and examples of applications for this subject area were analyzed. After analyzing the known solutions, it was decided to develop method which combines homomorphic encryption with a distributed data storage such as blockchain. The instance of proposed method's implementation is presented. At the end of the work, we draw conclusions and set tasks for the future research in this area.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The need for personal data protection of patients is relevant everywhere. In Ukraine, the Law on Personal Data Protection <ref type="bibr" target="#b0">[1]</ref> establishes key principles for safeguarding personal information, including healthcare-related data. This law requires that healthcare organizations ensure the integrity, availability, and confidentiality of patient data.</p><p>Compliance with laws and regulations, such as the General Data Protection Regulation (GDPR) <ref type="bibr" target="#b1">[2]</ref> in the European Union and the Health Insurance Portability and Accountability Act (HIPAA) <ref type="bibr" target="#b2">[3]</ref> in the United States, is essential. These regulations establish high standards for the data protection, requiring healthcare organizations to implement measures to safeguard patient confidentiality.</p><p>Nowadays, the number of cancer patients is increasing, and each patient requires an individual approach to treatment. Nowadays, patients often move, which can lead to the risk of losing critical health data. For instance, the war in Ukraine has resulted in a significant number of internal refugees. These individuals may face challenges in maintaining consistent medical records, which can affect their treatment.</p><p>To solve these problems, it is important to implement data protection, including encryption of patients' personal data. Encrypting patient data ensures that even if records are transferred or accessed from different locations, the information remains secure and protected from unauthorized access. However the usage of encryption making it more difficult to process data, because it is needed to be decrypted before making an alterations and re-encrypted afterwards for the storing at the media.</p><p>Known approaches for data storing uses databases, clouds and blockchain. However each of these approaches has drawbacks in comparison to others: databases lacking availability and integrity protection of the stored data; clouds needs secure connection and complete trust to the cloud provider, thus creating problems for information security compliance; blockchains aren't designed for storing big data arrays and are open for all the peers for reading stored data, thus creating additional tasks for data privacy protection. The latter creates tasks of data protection improvement for the mediums.</p><p>The goal of this study is to improve the protection of patients' personal data by using homomorphic encryption.</p><p>To achieve the goal of this study, one should solve the following tasks:</p><p>1. Known approaches analysis. The main contribution of the research is method of homomorphic encryption utilization for the blockchain as a storage medium for patients' data, which allow to avoid additional read/write operations in case of data updating.</p><p>The structure of the paper is the following: section 2 contains preliminaries in order to cover the background of the research, section 3 is devoted to the state of the art analysis followed be task formalization presented in the section 4, the main results are presented at section 5, where proposed method is presented, and section 6, where its software implementation and use-case are shown, section 7 contains further discussion and conclusions of the research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Homomorphic encryption</head><p>Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without need to decrypting it beforehand. This is particularly valuable when sensitive data needs to remain confidential but still requires processing. In homomorphic encryption, an encrypted input produces an encrypted output that, when decrypted, matches the result of the operation as if it had been performed on the plaintext data <ref type="bibr" target="#b3">[4]</ref>.</p><p>There are two primary types of homomorphic encryption systems: 1. Partially homomorphic encryption <ref type="bibr" target="#b3">[4]</ref>: these schemes allow only specific operations (either addition or multiplication) to be performed on the encrypted data. For example, Paillier encryption <ref type="bibr" target="#b4">[5]</ref> supports additive homomorphism, meaning that we can perform additions on ciphertexts that correspond to the addition of plaintext values once decrypted, but for the multiplication one of the operands should be in the open form.</p><p>2. Fully homomorphic encryption <ref type="bibr" target="#b3">[4]</ref>: extends the capabilities of partially homomorphic encryption by supporting arbitrary operations, including both addition and multiplication in encrypted form. Fully homomorphic encryption schemes can perform any kind of computations on encrypted data, making them extremely powerful but also computationally expensive and less practical for large-scale or time-sensitive tasks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Paillier cryptosystem</head><p>The example of partially homomorphic encryption is Paillier cryptosystem <ref type="bibr" target="#b5">[6]</ref>. One of the advantages of the Paillier cryptosystem is its homomorphic property in combination with non-deterministic encryption due to the random number usage.</p><p>The basic public key encryption scheme has three steps:</p><p>Step 1. Generate a public key pair (n , g). To achieve this one needs to generate large prime numbers p and q of equal bit length.</p><p>Then compute:</p><formula xml:id="formula_0">n= p ⋅ q (1)</formula><p>Then one need to randomly generate g such as g ∈ Z n 2 ¿ .</p><p>Step 2. The private decryption key is (λ, μ). To achieve this one needs to compute λ as:</p><formula xml:id="formula_1">λ=lcm ( p−1 , q−1), (2)</formula><p>where lcm (.) means least common multiple.</p><p>Then is used to calculate the modular multiplicative inverse:</p><formula xml:id="formula_2">μ=( L( g λ mod n 2 )) −1 mod n , (<label>3</label></formula><formula xml:id="formula_3">)</formula><p>where the function</p><formula xml:id="formula_4">L ( x )= ( x−1) n (quotient of integer division).</formula><p>Pick a random number r in the range 0&lt;r &lt;n ∧ gcd (r , n)=1.</p><p>Step 3. To encrypt the message (m), where 0 ≤ m&lt;n , should need to compute c as:</p><formula xml:id="formula_5">c=g m • r n ,<label>(4)</label></formula><p>where c -ciphertext.</p><p>Step 4. To decrypt the m should need to do the next computation:</p><formula xml:id="formula_6">m=L (c λ mod n 2 ) * μ mod n ,<label>(5)</label></formula><p>where c -ciphertext to decrypt and c ∈ Z n 2 ¿ .</p><p>Among the operations supported by Paillier's scheme are homomorphic addition (6) and multiplication <ref type="bibr" target="#b6">(7)</ref>, but it should be noted that without knowledge of the private key there is no way to calculate the product of encrypted messages.</p><p>When two ciphertexts are multiplied, the result decrypts to the sum of their plaintexts:</p><formula xml:id="formula_7">D ( E pub ( m 1 ) * E pub ( m 2 ) mod n 2 ) =m 1 +m 2 mod n , (<label>6</label></formula><formula xml:id="formula_8">)</formula><p>where D is the multiplication need to decrypt. When a ciphertext is raised to the power of a plaintext, the result decrypts to the product of the two plaintexts:</p><formula xml:id="formula_9">D mod n 2 = m 1 * m 2 mod n (7)</formula><p>Paillier is computationally less expensive than fully homomorphic encryption schemes like BFV <ref type="bibr" target="#b6">[7]</ref>, CKKS <ref type="bibr" target="#b7">[8]</ref> or more recently proposed method <ref type="bibr" target="#b8">[9]</ref>. Therefore it is more preferable for the implementation at the research due to lesser computational difficulty resulting in quicker and computationally less demanding data updating.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Chemotherapy dosing calculation methodology</head><p>For the chemotherapy calculations the main factor is body surface area (BSA) <ref type="bibr" target="#b9">[10]</ref>. BSA based dosing is used to calculate prescribed dose of drug meeting the balance between cancer treatment efficiency and drug toxicity <ref type="bibr" target="#b10">[11]</ref>. The main uses of BSA is -it determines the dose of chemotherapy for a patient. Formula for BSA calculation:</p><formula xml:id="formula_10">BSA= √ h * w 3600 (8)</formula><p>Mosteller formula for BSA dosing <ref type="bibr" target="#b11">[12]</ref>:</p><formula xml:id="formula_11">Dose=BSA * ct , (<label>9</label></formula><formula xml:id="formula_12">)</formula><p>where ct is the doseCoefficient, h -height of the patient, w -weight of the patient.</p><p>The above preliminaries became the basis for known approaches analysis for this field.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Known approaches analysis</head><p>Homomorphic encryption is used in the medical field to enhance data privacy while enabling computations on encrypted datasets. One notable example is the Swiss project MedCo <ref type="bibr" target="#b12">[13]</ref>, which is a part of the Data Protection and Personalized Health initiative. MedCo leverages homomorphic encryption to facilitate secure and privacy-preserving data discovery across multiple hospitals, allowing for analytics on both genetic and non-genetic patient data without revealing raw data.</p><p>HE facilitates secure analysis of cardiovascular data, enabling encrypted computations to pinpoint high-risk individuals and forecast disease progression without compromising patient privacy <ref type="bibr" target="#b13">[14]</ref>.</p><p>On the other hand, homomorphic encryption usage in this case possess some disadvantages: high computational overhead, which can reduce performance and scalability, especially when processing large datasets.</p><p>Another important usage of homomorphic encryption is collaborative cancer research, where encrypted data from multiple hospitals is examined to identify the most efficient chemotherapy protocols based on different cancer types and patient characteristics <ref type="bibr" target="#b14">[15]</ref>. The need for more computational resources, bandwidth, and storage for encrypted data across multiple hospitals can significantly increase operational costs.</p><p>There is known an innovative system for lung cancer diagnosis which is based on homomorphic encryption <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>. This system firstly performs textual extraction from computer tomography scans and then applies deep learning techniques for the classification <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>. Applying homomorphic encryption on computer tomography scan textual extraction and then running deep learning models introduces additional latency, which may delay diagnoses.</p><p>In the work <ref type="bibr" target="#b17">[18]</ref>, the author proposes a method for predicting the likelihood of a heart attack based on a few body measurements. This approach employs a client application that gathers health data and transmits it in the encrypted format using Microsoft Azure cloud services <ref type="bibr" target="#b16">[17]</ref>. Relying on cloud-based homomorphic encryption (via Microsoft Azure) introduces security concerns around trust in thirdparty providers and may not comply with stringent healthcare regulations.</p><p>Another work proposed a fully homomorphic encryption algorithm for encrypting and decrypting images in healthcare is the research <ref type="bibr" target="#b18">[19]</ref>. As the size of medical images increases (e.g., higher resolution scans), the encryption and decryption processes become less scalable requiring more memory and processing power.</p><p>These methods suffer from significant computational overhead, especially when processing large datasets or high-resolution medical images, leading to delays and increased operational costs. We address these issues by using the homomorphic encryption scheme that focuses on practical use cases, such as calculating personalized drug doses based on encrypted patient data, without exposing sensitive information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Task formalization</head><p>Let's denote by D the patients' data, which is operated by the doctors and is needed for proper calculations of chemotherapy dosage for Ewing's sarcoma treatment. Let M to be the set of data storage mediums those are used to store D and S to be a set of data already stored using mediums M. Therefore it is possible that due to inaccessibility or a destruction of the mediums certain data is missing. The process of storing given amount of data d ∈ D on the medium m ∈ M is formalized as the following: store : D × M → S or s m =store (d , m). <ref type="bibr" target="#b9">(10)</ref> In the formula <ref type="bibr" target="#b9">(10)</ref> we used subscript in order to mark the fact, that sm is stored at the medium m. The reverse process of stored data retrieving is the following: retrieve : S × M → D or d=retrieve ( s m , m ). <ref type="bibr" target="#b10">(11)</ref> Due to the criticality of correct dosage and number of sessions the stored data should be updated over time. Consequently there should be updating process: update : S → S or śm =update ( s m ). <ref type="bibr" target="#b11">(12)</ref> The mathematical description of the research field is the following: MathematicalDescription= { D , S , M , { store (d , m) , update ( s m ) , retrieve ( s m , m )} } . (13)   Thus the task of the research is to develop such method of data protection with the following conditions:</p><p>1. M should be robust to the denial of service attacks.</p><p>2. Destruction of given medium m ∈ M shouldn't lead to losses of S.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Only authorized persons (the respective patient and doctors, whom the patient granted access)</head><p>can yield D from S, i.e. there should be limitations to the persons, who is able to perform data retrieving process retrieve(). 4. S must be updated without a disclosure of D, update() can be performed arbitrary from store() and retrieve() processes.</p><p>These conditions are to be met by the patient's data protection method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Data protection method</head><p>In order to meet above-mentioned conditions sets, stated at the mathematical description <ref type="bibr" target="#b12">(13)</ref> are to be identified for the case of data, which is used for chemotherapy dosing calculations in case of Ewing's sarcoma treatment. According to the methodology of the dosage calculations <ref type="bibr" target="#b7">[8]</ref> the set D is a set of vectors, where each vector is associated with a given patient, and the chemotherapy methodologyrelated constant. Thus D is defined in the following form:</p><p>D={{height , weight , chemotherapySessions }, ct }, <ref type="bibr" target="#b13">(14)</ref> where height -a given patient's height, which is used for the BSA computation;</p><p>weight -a given patient's weight, which is used for the BSA computation; chemotherapySessions -a number of already passed chemotherapy sessions; ct -the scalability coefficient used by the methodology <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b10">11]</ref>. The chemotherapySessions parameter is needed in order to allow doctors to assign proper number of sessions. This parameter is essential for the considered case of warfare refugees, whom shouldn't be expected to maintain proper medical records or correctly remembering the exect number, because of experienced extreme stress. Moreover the parameter is to be updated after each session, while height and weight might change as well between sessions. Therefore used mediums are to be open for data updates.</p><p>In order to meet conditions 1 and 2 defined in the previous section we choose Ethereum-like blockchain <ref type="bibr" target="#b18">[19]</ref> as a medium. Usage of multiple nodes at the blockchain any of each can be used for stored data accessing provides robustness to the denial of service attacks thus meeting the condition 1. The very property allows to meet the condition 2, because any node's destruction doesn't lead to data losses. Moreover, the data loss in case of blockchain utilizing as a medium is possible only in case of all nodes destruction, which can be omitted by organizational means such as running several nodes outside warfare territory (abroad in partner countries, for instance) or minimizing the risk by placing nodes in different missile/drone protected areas.</p><p>The choice of this type of blockchain is motivated by the scalability of these types of blockchains due to smart contracts as a data structure. Consequently, in case of either chemotherapy dosage calculations methodology alterations, or proposed method usage in similar areas programmability of smart contracts allows to adapt this medium's data structure as well.</p><p>Therefore, the set of mediums is:</p><formula xml:id="formula_13">M =BlockchainNodes,<label>(15)</label></formula><p>where BlockchainNodes is a set of all blockchain's nodes. Due to data openness caused by chosen medium and the need of meeting condition 3 stored data S should be presented in the encrypted form. Therefore, S is defined in the following form:</p><formula xml:id="formula_14">S={{height e , weight e , chemotherapySessions e },ct e } ,<label>(16)</label></formula><p>where height e -an encrypted value of given patient's height; weight e -an encrypted value of weight; chemotherapySessions e -an encrypted value of number of already passed chemotherapy sessions by given patient; ct e -an encrypted value of ct. The latter parameter is to be encrypted, because its value can help determine what kind of treatment is performed. This will be helpful for scalability reasons as well in case the proposed method and tool would be used for other cases of chemotherapy treatment. After all data had been defined, the implementation of the processes should be performed. We propose to conduct store() process by the following steps:</p><p>1. Gather patients identification data patientID (such as number of medical record, eHealth account etc) and relevant parameters such as height and weight.</p><p>2. Perform hashing of the patientID in order to protect them from the exposure. In case of Ethereum-like blockchain usage it would be natural to use Keccak-256 hash function:</p><p>path=keccak ( patientID ).</p><p>(17)</p><p>3. Using homomorphic encryption, Paillier scheme in particular, encrypt with a patient's public key height and weight parameters in order to obtain height e and weight e respectively. 4. Access patient's profile or create one at the smart contract ran in blockchain by using mapping of the following kind path → { height e , weight e , chemotherapySessions e }. In case of profile creation encrypt 0 using patient's public key in order to get chemotherapySessions e . 5. Set obtained at step 3 values of height e , weight e parameters.</p><p>Stored encrypted parameters can be read directly from blockchain in case of correct path parameter computation. Therefore retrieve() process is easy to implement for this case. However it doesn't have sense in the research, because the main goal of the retrieve() process is to provide respective chemotherapy dose value. Therefore we propose to perform retrieve() by the following steps:</p><p>1. Gather patients identification data patientID. 2. Obtain path value using <ref type="bibr" target="#b16">(17)</ref>. 3. Call smart-contract's method, which computes in encrypted form value of a respective chemotherapy dose using homomorphic transformations and receive dose e . 4. Using patient's private key decrypt dose e and obtain proper dose value.</p><p>After administrating chemotherapy the stored value of chemotherapySessions e is to be updated. To do so we propose the following update() process implementation:</p><p>1. Gather patients identification data patientID. 2. Obtain path value using (17). 3. Encrypt 1 using patient's public key: encryptedOne=g ⋅ r n mod n 2 .  It should be noted, that we used Paillier's method for the homomorhpic encryption, but the method with a small adjustment can be adapted for other homomorphic encryption method usage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Developed Software Tool</head><p>Whether during the visiting doctor occurs the situation when the patient does not remember the necessary data for calculating the dose of chemotherapy drug and the number of received chemotherapy sessions, the doctor performs receive() process and gains the necessary data for treatment prescribing.</p><p>The smart contract was developed that allows to structure the information needed during the process of prescribing further treatment.</p><p>PatientChemotherapy smart contract, is designed to manage patient data related to chemotherapy treatments, including tracking a patient's height, weight, and number of chemotherapy sessions. Patients mapping -this is a mapping that associates a hashed patientID (using keccak256) to a patient's details stored in the Patient struct. The hashedID ensures that the actual patientID is not stored in a plain form, providing confidentiality.</p><p>An Ethereum-like blockchain [20] and Ganache <ref type="bibr" target="#b19">[21]</ref> test environment, which is free and convenient for testing, were chosen to interact with the smart contract. The results of the successful recording by calling PatientUpdated() function of the some arbitrary patient's personal data and the dose of chemotherapy drug encrypted using the Paillier scheme are shown in the Figure <ref type="figure" target="#fig_2">1</ref>. As it can be seen from the Figure <ref type="figure" target="#fig_2">1</ref> the initial data (height, weight, chemotherapy sessions number) for the patient was successfully recorded by the smart contract stored in blockchain. The next step is to calculate the dose of the chemotherapy, using the data retrieved from the smart contract according to the respective methodology (see subsection 2.3). The result of the successful calculating the dose of the chemotherapy drug is shown in the Figure <ref type="figure" target="#fig_3">2</ref>. After the chemotherapy session the chemotherapy sessions number must be updated, i. e. incremented. In order to perform so due to utilization of homomorphic encryption scheme there is no need in decrypting the current number of sessions. Instead the software encrypt the value "1" and adds it to the encrypted value of currently stored number of sessions (3 for the instance). Thus without decryption and even without disclosing to the nurse or IT department staff the current value of chemotherapy sessions their value had been updated. The other parameters can be updated in the similar way.</p><p>Thus the method is implemented. The feature of programmable smart contract of the Ethereumlike blockchains allowed to develop along side of the data structures algorithms of processing the data on the side of blockchain such as data updating in the homomorphically encrypted form.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>4 .</head><label>4</label><figDesc>Retrieve stored value of chemotherapySessions e . 5. Using homomorphic transformation add encrypted 1 to the value of chemotherapySessions e . chemotherapySessions e =chemotherapySessions e ⋅ encryptedOne mod n 2 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>6 .</head><label>6</label><figDesc>Store new value of chemotherapySessions e .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The example of the successful recording of the patient's personal data.As it can be seen from the Figure1the initial data (height, weight, chemotherapy sessions number) for the patient was successfully recorded by the smart contract stored in blockchain. The next step is to calculate the dose of the chemotherapy, using the data retrieved from the smart contract according to the respective methodology (see subsection 2.3). The result of the successful calculating the dose of the chemotherapy drug is shown in the Figure2.</figDesc><graphic coords="8,124.95,238.75,345.45,181.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The example of the successful calculating the dose of chemotherapy drug.After the chemotherapy session the chemotherapy sessions number must be updated, i. e. incremented. In order to perform so due to utilization of homomorphic encryption scheme there is no need in decrypting the current number of sessions. Instead the software encrypt the value "1" and adds it to the encrypted value of currently stored number of sessions (3 for the instance). Thus without decryption and even without disclosing to the nurse or IT department staff the current value of chemotherapy sessions their value had been updated. The other parameters can be updated in the similar way.Thus the method is implemented. The feature of programmable smart contract of the Ethereumlike blockchains allowed to develop along side of the data structures algorithms of processing the data on the side of blockchain such as data updating in the homomorphically encrypted form.</figDesc></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Patients' data protection has the strict regulation from the governments and increased attention from the society <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref>. This is explained by both criticality of the medical infrastructure and huge amount of personal data being processed at this area. While the need of data privacy protection in this area is obvious, needs of its integrity, availability and traceability are important as well. The latter parameters are important due to lethal consequences of improper data processing and the data can be used at the legal area such as court proceedings. The research is performed for the instance of cancer patients' data who are internal refugees in Ukraine at the warfare circumstances, when documents along with a server running database containing patients' data might be destroyed causing data loss, which is crucial for the treatment process. The latter proves the need of patients' data protection improvement.</p><p>Known works on the topic of the homomorphic encryption usage for the medical data protection utilize it for the large data arrays <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b16">17]</ref>, that impact productivity due to computationally demanding transformations used by the encryption process. This negatively impact data availability and capacity of servers used for the data storing to handle simultaneously several user requests. Moreover data presented in encrypted form for such algorithms are several times larger than the original before the encryption one.</p><p>These homomorphic encryption properties create constrains for its application at the healthcare field, which are not properly addressed. Firstly, only data that is supposed to be used at computations should be protected by this type of encryption. Secondly, designated storage medium should possess enhanced availability properties in order to compensate the above-mentioned drawback. To meet the former constraint the implementation area is to be analyzed and the data is to be determined. The latter constraint leads to the utilization of the distributed storage such as clouds and blockchains. Due to security compliance considerations clouds seem to be less desirable due to the cloud provider trust legal regulations. Therefore a blockchain was chosen as a data storage medium that allowed to meet the requirement and additionally provide increased integrity and traceability protection comparatively with known approaches based on the server file storages, databases or clouds <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b18">19]</ref>.</p><p>Performed analysis of the Ewing's sarcoma treatment methodology allowed us to determine, that partially homomorphic encryption, which is computationally less demanding and have less impact on data size increasing after the encryption, is enough for the case, because data updating needs can be satisfied only be the additive operations. That's why Paillier scheme, which provides fully homomorphic addition, but partially homomorphic multiplication, was chosen for the research.</p><p>Presented task formalization allowed us to identify the task parameters and restrictions, in particular the data set, that is to be protected by the homomorphic encryption. The latter allowed to develop a method on the basis of them. Mathematical description of the task can be used in the further research in the area of medical data protection.</p><p>We proposed a method for data protection on the basis of homomorphic encryption and distributed storage, namely Ethereum-like blockchain. Due to homomorphism property of the encryption the data can be processed and updated in the encrypted form, which allowed to negate the drawback of blockchain's openness and a lack of mechanisms for data privacy protection. The very blockchain's openness and data distribution via multiple nodes provides increased protection of integrity, availability and traceability to the method. Proposed method and its processed were formalized. In order to reach proof-of-concept we presented results of software, which implements the method, those allowed to prove its efficiency. However due to the utilization of partially homomorphic encryption scheme proposed method have limitations for the possible data processing operations, those can be performed in encrypted form without compromising patients' personal data.</p><p>That's why in order to scale the method for other patients data protection instances it should be prior adapted to new case's data processing requirements. The latter may lead to the necessity of encryption method substitution by other partially homomorphic or by fully homomorphic ones.</p><p>However, several tasks are yet to be solved before the method could be integrated to the medical practice. In particular the task of key sharing, their certification and distribution. We anticipate utilizing of electronic systems of healthcare such as eHealth system in Ukraine <ref type="bibr">[22]</ref> and integration of key sharing protocols to the system. The task is to be addressed in our future research. Nevertheless, proposed method reaches its goals and meets restrictions of the task.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>The authors have not employed any Generative AI tools.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Law on the protection of personal data</title>
		<ptr target="https://zakon.rada.gov.ua/laws/show/2297-17#Text" />
		<imprint>
			<date type="published" when="2010-04-27">2010. 27 April 2024</date>
			<biblScope unit="volume">01</biblScope>
			<biblScope unit="page">2297</biblScope>
		</imprint>
	</monogr>
	<note>Law of Ukraine</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The General Data Protection Regulation: Requirements, architectures, and constraints</title>
		<author>
			<persName><forename type="first">K</forename><surname>Hjerppe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Leppanen</surname></persName>
		</author>
		<idno type="DOI">10.1109/re.2019.00036</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 IEEE 27th International Requirements Engineering Conference</title>
				<meeting>the 2019 IEEE 27th International Requirements Engineering Conference</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://www.hhs.gov/hipaa/index.html" />
		<title level="m">Health Insurance Portability and Accountability Act (HIPAA</title>
				<imprint>
			<date type="published" when="1996">1996</date>
		</imprint>
		<respStmt>
			<orgName>U.S. Department of Health and Human Services</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Homomorphic Encryption</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ogburn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Turner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dahal</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2013.09.310</idno>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="502" to="509" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Paillier Algorithm. Partially Homomorphic Encryption</title>
		<author>
			<persName><forename type="first">Ç</forename><forename type="middle">K</forename><surname>Koç</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Özdemir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Özger</surname></persName>
		</author>
		<author>
			<persName><surname>Ödemiş</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-87629-6_9</idno>
	</analytic>
	<monogr>
		<title level="j">Cham</title>
		<imprint>
			<biblScope unit="page" from="95" to="105" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Public-Key Cryptosystems Based on Composite Degree Residuosity Classes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Paillier</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-48910-x_16</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology -EUROCRYPT &apos;99</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<biblScope unit="page" from="223" to="238" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models</title>
		<author>
			<persName><forename type="first">F</forename><surname>Wibawa</surname></persName>
		</author>
		<idno type="DOI">10.3390/cryptography6030034</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptography</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Homomorphic Encryption for Arithmetic of Approximate Numbers</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Cheon</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-70694-8_15</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology -ASIACRYPT 2017</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="409" to="437" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Fully Homomorphic Encryption for Cyclotomic Prime Moduli</title>
		<author>
			<persName><forename type="first">R</forename><surname>Geelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Vercauteren</surname></persName>
		</author>
		<ptr target="https://eprint.iacr.org/2024/1587" />
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page">32</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="https://www.ncbi.nlm.nih.gov/books/NBK559005/" />
		<title level="m">Body Surface Area</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Standardization of the Body Surface Area (BSA) Formula to Calculate the Dose of Anticancer Agents in Japan</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kouno</surname></persName>
		</author>
		<idno type="DOI">10.1093/jjco/hyg062</idno>
	</analytic>
	<monogr>
		<title level="j">Japanese Journal of Clinical Oncology</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="309" to="313" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Simplified Calculation of Body-Surface Area</title>
		<author>
			<persName><forename type="first">R</forename><surname>Mosteller</surname></persName>
		</author>
		<idno type="DOI">10.1056/NEJM198710223171717</idno>
	</analytic>
	<monogr>
		<title level="j">N Engl J Med</title>
		<imprint>
			<biblScope unit="volume">317</biblScope>
			<biblScope unit="issue">17</biblScope>
			<biblScope unit="page">1098</biblScope>
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="https://medco-ch.github.io/index.html" />
		<title level="m">MedCo | Collective protection of medical data</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<ptr target="https://www.inno-boost.com/blog/homomorphic-encryption-in-healthcare/" />
		<title level="m">Homomorphic encryption in healthcare</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Secret Learning for Lung Cancer Diagnosis -A Study with Homomorphic Encryption, Texture Analysis and Deep Learning</title>
		<author>
			<persName><forename type="first">S</forename><surname>Adhikary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dutta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">D</forename><surname>Dwivedi</surname></persName>
		</author>
		<idno type="DOI">10.1088/2057-1976/ad0b4b</idno>
	</analytic>
	<monogr>
		<title level="j">Biomedical Physics &amp; Engineering Express</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Confidential and Protected Disease Classifier using Fully Homomorphic Encryption</title>
		<author>
			<persName><forename type="first">A</forename><surname>Malik</surname></persName>
		</author>
		<idno type="DOI">10.1109/cai59869.2024.00074</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Conference on Artificial Intelligence (CAI)</title>
				<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024-06-27">2024. 25-27 June 2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A systematic review of homomorphic encryption and its contributions in healthcare industry</title>
		<author>
			<persName><forename type="first">K</forename><surname>Munjal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhatia</surname></persName>
		</author>
		<idno type="DOI">10.1007/s40747-022-00756-z</idno>
	</analytic>
	<monogr>
		<title level="j">Complex &amp; Intelligent Systems</title>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Private predictive analysis on encrypted medical data</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Bos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lauter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Naehrig</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jbi.2014.04.003</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Biomedical Informatics</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="234" to="243" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Vengadapurvaja</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2017.09.150</idno>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="page" from="643" to="650" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title/>
		<author>
			<persName><surname>Ganache</surname></persName>
		</author>
		<ptr target="https://archive.trufflesuite.com/ganache/" />
		<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
