A famework for data sharing between healthcare providers using blockchain
Journal article
Authors | Alzahrani, Ahmed G., Alenezi, Ahmed, Atlam, Hany F. and Wills, Gary |
---|---|
Abstract | The healthcare data are considered as a highly valuable source of information that can improve healthcare systems to be more intelligent and improve the quality of the provided services. However, due to security and privacy issues, sharing data between healthcare organisations is challenging. This has led to data shortage in the healthcare sector which is considered as a significant issue not only in the Kingdom of Saudi Arabia (KSA) but also worldwide. The primary objective of conducting this paper is to investigate the various factors that enable secure sharing and exchange of healthcare information between different healthcare providers in the KSA. It starts by discussing the current literature and frameworks for managing healthcare data information and the challenges that health providers encounter, particularly when it comes to issues such as data security, patient privacy, and healthcare information exchange. These challenges in managing healthcare data have necessitated the nee d for implementing a solution that can allow medical providers to have access to updated healthcare information. Attention in the healthcare sector has been drawn to blockchain technology as a part of the solution, especially after the technology was successfully applied in the financial sector to improve the security of financial transactions, particularly involving digital currencies such as Bitcoin. Therefore, a framework based on the blockchain technology has been proposed to achieve the goals of the present research. |
Keywords | Blockchain; Healthcare Systems; Data Sharing |
Year | 2020 |
Journal | Proceedings of the 5th International Conference on Internet of Things, Big Data and Security |
Publisher | SCITEPRESS - Science and Technology Publications |
Digital Object Identifier (DOI) | https://doi.org/10.5220/0009413403490358 |
Web address (URL) | http://hdl.handle.net/10545/624922 |
http://creativecommons.org/licenses/by-sa/4.0/ | |
hdl:10545/624922 | |
Publication dates | May 2020 |
Publication process dates | |
Deposited | 19 Jun 2020, 10:36 |
Accepted | 13 Feb 2020 |
ISBN | 9789897584268 |
Rights | Attribution-ShareAlike 4.0 International |
Contributors | University of Southampton |
File | File Access Level Open |
File | File Access Level Open |
https://repository.derby.ac.uk/item/928q2/a-famework-for-data-sharing-between-healthcare-providers-using-blockchain
Download files
48
total views0
total downloads3
views this month0
downloads this month
Export as
Related outputs
Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review
Atlam, H. and Olayonu Oluwatimilehin 2022. Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review. Electronics. 12 (1), pp. 1-28. https://doi.org/10.3390/electronics12010042ANFIS for risk estimation in risk-based access control model for smart homes
Atlam, H. and Gary B. Wills 2022. ANFIS for risk estimation in risk-based access control model for smart homes. Multimedia Tools and Applications. pp. 1-30. https://doi.org/10.1007/s11042-022-14010-8DEEPSEL: A novel feature selection for early identification of malware in mobile applications
Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Jah Rizvi, Junaid Arshad, Hany F. Atlam and Atlam, H. 2021. DEEPSEL: A novel feature selection for early identification of malware in mobile applications. Future Generation Computer Systems. 129, pp. 54-63. https://doi.org/10.1016/j.future.2021.10.029
IoT forensics: A state-of-the-art review, callenges and future directions
Alenezi, Ahmed, Atlam, Hany, Alsagri, Reem, Alassafi, Madini and Wills, Gary 2019. IoT forensics: A state-of-the-art review, callenges and future directions. SCITEPRESS - Science and Technology Publications. https://doi.org/10.5220/0007905401060115
Experts reviews of a cloud forensic readiness framework for organizations
Alenezi, Ahmed, Atlam, Hany F. and Wills, Gary B. 2019. Experts reviews of a cloud forensic readiness framework for organizations. Journal of Cloud Computing. 8 (1). https://doi.org/10.1186/s13677-019-0133-z
Security, cybercrime and digital forensics for IoT
Atlam, Hany F., Alenezi, Ahmed, Alassafi, Madini O., Alshdadi, Abdulrahman A. and Wills, Gary B. 2019. Security, cybercrime and digital forensics for IoT. in: Intelligent Systems Reference Library Springer International Publishing.
Intersections between IoT and distributed ledger
Atlam, Hany F. and Wills, Gary B. 2019. Intersections between IoT and distributed ledger. in: Advances in Computers Elsevier.
IoT security, privacy, safety and ethics
Atlam, Hany F. and Wills, Gary B. 2019. IoT security, privacy, safety and ethics. in: Internet of Things Springer International Publishing.
Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT
Atlam, Hany F., Walters, Robert J., Wills, Gary B. and Daniel, Joshua 2019. Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT. Mobile Networks and Applications. https://doi.org/10.1007/s11036-019-01214-w
A validation of security determinants model for cloud adoption in Saudi organisations’ context
Alassafi, Madini O., Atlam, Hany F., Alshdadi, Abdulrahman A., Alzahrani, Abdullah I., AlGhamdi, Rayed A. and Buhari, Seyed M. 2019. A validation of security determinants model for cloud adoption in Saudi organisations’ context. International Journal of Information Technology. https://doi.org/10.1007/s41870-019-00360-4