<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v21i5e13385</article-id>
      <article-id pub-id-type="pmid">31099337</article-id>
      <article-id pub-id-type="doi">10.2196/13385</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Secure and Scalable mHealth Data Management Using Blockchain Combined With Client Hashchain: System Design and Validation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Zhang</surname>
            <given-names>Peng</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Clauson</surname>
            <given-names>Kevin</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Lin</surname>
            <given-names>Yi-Chin</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Schulz</surname>
            <given-names>Wade</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Aslam</surname>
            <given-names>Muhammad Shahzad</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1">
          <name name-style="western">
            <surname>Motohashi</surname>
            <given-names>Tomomitsu</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-5197-4927</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2">
          <name name-style="western">
            <surname>Hirano</surname>
            <given-names>Tomonobu</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-6702-0925</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3">
          <name name-style="western">
            <surname>Okumura</surname>
            <given-names>Kosuke</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-9473-9257</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4">
          <name name-style="western">
            <surname>Kashiyama</surname>
            <given-names>Makiko</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-8795-6392</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib5">
          <name name-style="western">
            <surname>Ichikawa</surname>
            <given-names>Daisuke</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1467-5119</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib6" corresp="yes">
          <name name-style="western">
            <surname>Ueno</surname>
            <given-names>Taro</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>SUSMED, Inc</institution>
            <addr-line>Nihonbashi Life Science Bldg 2, 3-11-5, Honcho</addr-line>
            <addr-line>Nihonbashi, Chuo-ku</addr-line>
            <addr-line>Tokyo, 103-0023</addr-line>
            <country>Japan</country>
            <phone>81 335273593</phone>
            <email>t-ueno@umin.ac.jp</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3697-4301</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>SUSMED, Inc</institution>
        <addr-line>Tokyo</addr-line>
        <country>Japan</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Taro Ueno 
        <email>t-ueno@umin.ac.jp</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><month>05</month><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>05</month>
        <year>2019</year>
      </pub-date>
      <volume>21</volume>
      <issue>5</issue>
      <elocation-id>e13385</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>24</day>
          <month>1</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>25</day>
          <month>2</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>23</day>
          <month>3</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>27</day>
          <month>4</month>
          <year>2019</year>
        </date>
      </history>
      <copyright-statement>©Tomomitsu Motohashi, Tomonobu Hirano, Kosuke Okumura, Makiko Kashiyama, Daisuke Ichikawa, Taro Ueno. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 16.05.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2019/5/e13385/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Blockchain is emerging as an innovative technology for secure data management in many areas, including medical practice. A distributed blockchain network is tolerant against network fault, and the registered data are resistant to tampering and revision. The technology has a high affinity with digital medicine like mobile health (mHealth) and provides reliability to the medical data without labor-intensive third-party contributions. On the other hand, the reliability of the medical data is not insured before registration to the blockchain network. Furthermore, there are issues with regard to how the clients' mobile devices should be dealt with and authenticated in the blockchain network in order to avoid impersonation.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of the study was to design and validate an mHealth system that enables the compatibility of the security and scalability of the medical data using blockchain technology.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We designed an mHealth system that sends medical data to the blockchain network via relay servers. The architecture provides scalability and convenience of operation of the system. In order to ensure the reliability of the data from clients' mobile devices, hash values with chain structure (client hashchain) were calculated in the clients' devices and the results were registered on the blockchain network.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The system was applied and deployed in mHealth for insomnia treatment. Clinical trials for mHealth were conducted with insomnia patients. Medical data of the recruited patients were successfully registered with the blockchain network via relay servers along with the hashchain calculated on the clients' mobile devices. The correctness of the data was validated by identifying illegal data, which were made by simulating fraudulent access.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our proposed mHealth system, blockchain combined with client hashchain, ensures compatibility of security and scalability in the data management of mHealth medical practice.</p>
        </sec>
        <sec sec-type="Trial Registration">
          <title>Trial Registration</title>
          <p>UMIN Clinical Trials Registry UMIN000032951; https://upload.umin.ac.jp/cgi-open- bin/ctr_e/ctr_view.cgi?recptno=R000037564 (Archived by WebCite at http://www.webcitation.org/78HP5iFIw)</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>mobile health</kwd>
        <kwd>electronic health records</kwd>
        <kwd>blockchain</kwd>
        <kwd>client hashchain</kwd>
        <kwd>clinical trial</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Digital medicine, including the use of mHealth apps and internet of things (IoT) devices, has become popular in the everyday practice of medicine [<xref ref-type="bibr" rid="ref1">1</xref>]. It has the potential to promote improved patient health outcomes, support care coordination, and improve communication with lower costs. While digital medicine has the potential for better practices to patients, we need to consider the security issues. Data tampering and impersonation are important security risks for digital medicine and clinical trials. Decision making in medical practice should be based on precise patient information. Data reliability is compromised if data tampering and impersonation are used to attack the system. External cyberattacks, including ransomware attacks, which result in compromised medical records, are huge threats against the health care sector [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. Data breaches can lead to privacy violations, embarrassment, and social stigma, as well as to fraud and medical identity theft.</p>
      <p>In addition to cybersecurity, data governance and authenticity are also important issues in the health care sector, especially in data management in clinical trials [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. Recently, Web-based clinical trials have been conducted to streamline and improve the convenience of clinical trial participation [<xref ref-type="bibr" rid="ref6">6</xref>]. Since the results of the clinical trials are the basis of the approval of medicine or medical devices by regulatory agencies, the reliability and transparency of the data obtained by the clinical trial must be maintained [<xref ref-type="bibr" rid="ref7">7</xref>]. However, there are reports that 17% of clinical drug trials were fabricated [<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. The ability to easily trace data back to the original source is indispensable.</p>
      <p>Blockchain technology has recently garnered attention as a means for transferring data between participating parties based on a “distributed ledger” model that affords a fully transparent and immutable record of data transactions [<xref ref-type="bibr" rid="ref11">11</xref>]. A blockchain consists of a continuously growing list of transactional records organized into blocks that are replicated on the nodes of a peer-to-peer network. Valid transactions stored in a blockchain are digitally signed and timestamped by their sender, providing cryptographically irrefutable evidence of both provenance and existence of a record at a given point in time. The technology provides a verifiable and tamper-proof history of the data in the blockchain network. Bitcoin is the first implementation of blockchain as a digital asset in widespread use [<xref ref-type="bibr" rid="ref12">12</xref>]. It eliminates the need for trusted third parties in financial transactions by providing a secure and verifiable history for every transaction in the system.</p>
      <p>Beyond digital currency, researchers have started to focus on using blockchain technology for building cryptographic proof in many areas including medical sectors [<xref ref-type="bibr" rid="ref13">13</xref>]. Blockchain has already been proposed for use in various health care settings, with potential applications in health supply chain management [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>], insurance claims processing [<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref19">19</xref>], medical record management [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>], and data management in clinical trials [<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]. Drug counterfeiting is a global problem with significant risks to consumers and the general public. Blockchain has the potential for tracking and tracing drug products and reagents, and counterfeit detection through information verification of supply chain participants. Blockchain technology can also be applied to managing insurance claim policies by the insurance providers and the patients. It can provide authorized access of data to researchers to analyze diseases. Blockchain-based models for electronic medical records have been proposed to enhance ownership of their medical data and data sharing between platforms [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Since the blockchain can be used to establish a permanent record agreed on by all participating parties, it has the potential to mitigate some of the threats to data validity, so that some researchers have proposed to support or even replace the traditional data infrastructure used in clinical trials with blockchain systems [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Our previous study also demonstrated an mHealth system for insomnia using a mobile phone app together with a blockchain storage platform and evaluated resistance against tampering of the data collected with mobile phones [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
      <p>Although medical data registered in a blockchain network have proved tamper-resistant, the vulnerability of the medical data lies before registration to the blockchain network. Impersonation of client devices or fabrication of data outside of the blockchain network can impair the reliability of the medical data. In addition, if the blockchain network is open to the Internet, the network is vulnerable to attack and to the theft of medical records. Client devices, such as mobile phones used by patients, should not be dealt with as nodes of the blockchain network in order to preserve the confidentiality of the personal medical data and to reduce the operational cost for the management of the private key. The trade-off must be recognized and overcome by technological improvements.</p>
      <p>This study aims to describe and validate an mHealth system using a client management architecture along with a blockchain network. To overcome the remaining problems described above, we designed the whole system with relay servers, which connect client devices to the blockchain network. In order to ensure reliability and to prevent impersonation or fabrication, a hashchain was calculated in client devices and sent to the blockchain network along with the medical data. We further verified the proposed system in the actual clinical trial of mHealth for insomnia patients and evaluated the resistance to various fraud attacks.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Clinical Trial and mHealth Records</title>
        <p>The proposed system was applied and deployed into the mHealth app, which treats chronic insomnia based on cognitive behavioral therapy for insomnia (CBTi) [<xref ref-type="bibr" rid="ref31">31</xref>]. After a favorable formal review by the Japanese Pharmaceuticals and Medical Devices Agency, research on the mHealth app was conducted by the digital therapeutics company, SUSMED, Inc. (Tokyo, Japan). Informed consent was obtained from the patients for publication of this study. The study has received ethical approval from the Ethics Committee and registered to clinical trial registry (UMIN000032951). All the methods were performed in accordance with the relevant guidelines and regulations.</p>
        <p>The mHealth records collected from patients were divided into subjective and objective data. The subjective data, which include clinical indicators, sleep status, and the review of daytime activities, were collected through a self-administered questionnaire. The objective data, which include the results of the Psychomotor Vigilance Test [<xref ref-type="bibr" rid="ref32">32</xref>], were evaluated by measuring the touch response using the function of mobile phones. For clinical indicators, Athens Insomnia Scale [<xref ref-type="bibr" rid="ref33">33</xref>], Epworth Sleepiness Scale [<xref ref-type="bibr" rid="ref34">34</xref>], and Quick Inventory of Depressive Symptomatology [<xref ref-type="bibr" rid="ref35">35</xref>] were collected. For sleep status, time to go to bed, time to fall asleep, time to wake up, and time to get out of bed were recorded. Along with the medical information, timestamps of the app operation were collected. These clinical indicators were collected using a mobile phone app. All data were stored in the JavaScript Object Notation (JSON) format in the database.</p>
      </sec>
      <sec>
        <title>mHealth Data Transfer Via Relay Servers to Blockchain Network</title>
        <p>The collected data from the patients’ devices were sent to the blockchain network via relay servers. We used three relay servers, and the app randomly selected two relay servers to send the data after the authentication of the client device. By deploying the relay proxy and setting the blockchain software development kits (SDKs) to write-only mode, the relay server sent the received data to the blockchain network. The authentication of the relay server was conducted with a single common authentication server. By configuring the Internet Protocol (IP) address restriction to the listed relay servers, the blockchain network, which contains the medical data, was protected against external attack. The blockchain network was made up of three organizations that contain two validating peers. Each account for nodes of the blockchain network and the relay servers were managed by independent departments in SUSMED, Inc. The strictness of the governance of the data management can be adjusted by individually managing the accounts of different stakeholders, such as pharmaceutical companies, contract research organizations, and regulatory agencies.</p>
      </sec>
      <sec>
        <title>mHealth Data Registration in the Blockchain Network</title>
        <p>We used Hyperledger Fabric v1.0 to operate the blockchain network because Hyperledger is an open-source blockchain platform and has become widely used [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        <p>The blockchain network was administered by a collection of organizations. Each organization had multiple nodes. In this study, the network had three organizations and each organization had two nodes. As the state database, CouchDB was used to store the JSON document [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>The nodes executed an installed chaincode and returned hash values generated from the execution result. The secure hash algorithm SHA-256 was used to compute the hash values encoded into the blocks of the blockchain [<xref ref-type="bibr" rid="ref39">39</xref>]. To execute the transaction, each node followed the consensus algorithm, which was called endorsement policy [<xref ref-type="bibr" rid="ref11">11</xref>], although the previous version of Hyperledger Fabric used Practical Byzantine Fault Tolerance as a consensus algorithm [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>The endorsement policy was set in units of organizations, and the flexible set was available according to the needs of the app. Each organization issued one signature. The node that validated the transactions in each organization was called the endorser. In this study, the validation of each transaction required more than two signatures from three organizations.</p>
        <p>Under the endorsement policy, transactions were validated and accepted in the following processes:</p>
        <list list-type="order">
          <list-item>
            <p>Proposal: The transaction was sent from the client app to the endorsers in each organization.</p>
          </list-item>
          <list-item>
            <p>Endorse: Each endorser verified that (1) the transaction proposal was well formed, (2) it had not been already submitted in the past, (3) the signature was valid, and (4) the client was properly authorized to perform the proposed operation, which was described in the chaincode. If the transaction was validated, chaincode was executed and the result with the signature was returned to the client.</p>
          </list-item>
          <list-item>
            <p>Submit: The client verified that the number of signatures from the organizations satisfied the endorsement policy. If it was satisfied, the transaction was sent to the ordering service, which ordered the series of transactions in chronological order and created the block of the transactions.</p>
          </list-item>
          <list-item>
            <p>Broadcast: The block was delivered to all nodes.</p>
          </list-item>
          <list-item>
            <p>Commit: If each block was validated to fulfill the endorsement policy and was to be well formed, the block was appended to the chain in each node.</p>
          </list-item>
        </list>
        <p>All data, including the client hashchain, were registered in the blockchain network via relay servers to secure the tamper-resistance of the data. In contrast, the secure string for the calculation of the hash value was preserved in the client device. At the end of the study, the secure string was sent to the blockchain network to verify the hashchain. The client hash values were calculated on the mobile phone based on medical data, the secure string, and the previous hash value using the SHA-256 algorithm [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
      </sec>
      <sec>
        <title>Test Scenarios</title>
        <p>There are issues regarding cybersecurity (ie, concerning external actors) and governance/authenticity (eg, internal actors like researchers) in medical data management. The tamper-resistance of the data registered in the blockchain network against external attack has been proven in previous studies. The reliability of the data against internal actors in the blockchain network can also be guaranteed by managing the accounts for each node by different stakeholders, such as pharmaceutical companies, contract research organizations, and regulatory agencies. Here, we evaluated how the data manipulation before registration to the blockchain network can be detected and distinguished by simulating the following malicious access. The artificial data were created for each scenario and tested if the fraudulent access were detected and the original data can be distinguished from the illegal data. Since the results of the manipulation of the data are deterministic due to collision-resistant hash functions of SHA-256 [<xref ref-type="bibr" rid="ref42">42</xref>], we verified the result of a single manipulation in each scenario. Since the accounts for nodes of the blockchain network and the relay servers were managed by independent departments, both internal and external actors can be simulated by hacking each server.</p>
        <list list-type="order">
          <list-item>
            <p>Attack on the relay server: To simulate an artificial attack on the relay server (ie, outside actors) or misconduct by the owner of the relay server (ie, inside actors) during the clinical trial, one of the relay servers was hacked. The data sent from a client device can be modified before registration to the blockchain network by the malicious access. In this case, the secure string for the calculation of a hash value in the client device was not stolen. Hence, the client hash value was calculated with the previous hash value, modified medical data, and the incorrect string.</p>
          </list-item>
          <list-item>
            <p>Attack on the authentication server: To simulate an artificial attack on the authentication server (ie, outside actors) or misconduct by the owner of the authentication server (ie, inside actors) during the clinical trial, the authentication key of an existing account on the authentication server was stolen and the data of the hacked account was uploaded by multiple devices. In this case, the secure string for the calculation of a hash value in the client device was not stolen. Hence, the client hash value was calculated with the previous hash value, modified medical data, and the incorrect string.</p>
          </list-item>
          <list-item>
            <p>Attack on the client device: The secure string preserved in the client device was stolen by an attacker using a mobile malware root exploit. The authentication information to the relay servers was also stolen by the malicious infection. Hence, the client hash value was calculated by different devices with the previous hash value, modified medical data, and the correct secure string.</p>
          </list-item>
        </list>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Design of the Client for Blockchain Network in mHealth</title>
        <p>In our previous study, the mHealth data obtained by a mobile phone were uploaded to the blockchain network. We then evaluated the robustness of the network and the tamper-resistance of the data in the blockchain network [<xref ref-type="bibr" rid="ref24">24</xref>]. To advance further into the practical usage of blockchain in mHealth, it is necessary to design how the client devices, such as mobile phones, send medical data to the blockchain network. Client devices can send data to the blockchain network directly, but with this architecture, the mHealth app that patients installed to their mobile phone needs to have SDKs for blockchain. The blockchain network will also receive access from unspecified clients due to a lack of IP address restriction. In that situation, there are risks that unspecified clients can store medical information in the blockchain network using SDKs to read the data. The system is resistant against data tampering, but the operational costs increase since they must manage private keys for each client device (<xref ref-type="fig" rid="figure1">Figure 1</xref>). In order to overcome these obstacles, the usage of relay servers is one possible option. With the architecture using relay servers, the blockchain network can restrict the access by IP address selection and it is not necessary for the mHealth app to include SDKs for blockchain. With this architecture, blockchain networks were protected against unspecified access from the internet and the functions of SDKs in the relay server can be predetermined as write-only, resulting in the protection of the medical data stored in the blockchain network. On the other hand, there are risks that the hacking of the relay server will result in impersonation (<xref ref-type="fig" rid="figure1">Figure 1</xref>). To balance these trade-offs, we propose the following architecture of the client for the blockchain network in mHealth. The client devices, such as mobile phones, send their data to multiple relay servers and the data are compared between relay servers and verified. After verification, the relay server, which has permission to access by IP address restriction, sends the data to the blockchain network using write-only functions of SDKs. With this system, medical data stored in the blockchain network are protected against access from the internet and are resistant against the risks of server hacking (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>mHealth system architecture, which sends the medical data to the blockchain network. Data sent to (a) the blockchain network without relay servers; client devices are dealt with as nodes of the blockchain network so that mHealth app needs to contain software development kits for blockchain; (b) the blockchain via a single relay server; public keys for each relay server should be managed; (c) the blockchain via multiple relay servers; public keys for each relay server should be managed. Data reliability can be verified by comparing the data to be registered (red line).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Authentication Between Clients and Relay Servers</title>
        <p>For the usage of relay servers described above, it is indispensable to carefully design the authentication of client devices to send data to relay servers. It is possible that a single common server gives an authentication to client devices, but with this architecture, the system is vulnerable to server hacking. Malicious access to the single authentication server can result in impersonation (<xref ref-type="fig" rid="figure2">Figure 2</xref>). The alternative is to set an authentication server for each relay server. Although the risks of impersonation by server hacking can be reduced, the operational costs for authentication increase. In addition, it is not possible to verify the reliability of the original data if multiple authentication servers were maliciously accessed (<xref ref-type="fig" rid="figure2">Figure 2</xref>). In order to solve these problems, we implemented a single common authentication server with another method, using a hash value calculated on the client devices. As an initial setting, the client device generates and preserves a secure string. The client device calculates a hash value based on the medical data and the secure string, as well as the previous hash value using the SHA-256 hash algorithm. Thus, the hash value comprises the chain structure. The hash value was also registered in the blockchain network along with the medical data in order to guarantee tamper-resistance of the value, although the secure string was preserved in the client device. It is possible to verify the reliability of data using the secure string preserved in the client devices and to retrospectively reject impersonation after finishing the clinical trials. Even when a relay server was hacked by malicious access, we can verify the correct data based on the client hashchain and the secure string preserved in the client device. Since the hash value calculated in the client device makes up the chain structure, we called the technique “client hashchain” in contrast to blockchain (<xref ref-type="fig" rid="figure2">Figure 2</xref>). In the case of the device having been destroyed or disabled prior to the conclusion of the study, the secure string could be sent beforehand to the user’s personal storage, such as their email box.</p>
      </sec>
      <sec>
        <title>Application of the Proposed System to mHealth and Data Management in a Clinical Trial</title>
        <p>In order to validate the system proposed above, we have implemented the architecture into the mHealth app. The app was designed to treat insomnia patients based on CBTi and collects medical data using mobile phones. The app generates a secure string at login and stores it on the client device. The app also calculates a hash value based on the medical data, the previous hash value, and the secure string so that the hash values make up the chain structure. The medical data collected with the app, as well as the hash value, were sent to the blockchain network via relay servers. We used three relay servers and the app selected two relay servers at random to send the data to the blockchain network. The blockchain network comprised three organizations, which contain two validating peers.</p>
        <p>With these systems, we conducted the clinical trial on the mHealth app for insomnia patients. Informed consent was obtained from the patients and the app account was provided by the medical doctor. mHealth data were collected with the mobile app and sent to the blockchain network via relay servers along with the client hash value (<xref ref-type="fig" rid="figure3">Figure 3</xref>). In the client devices, client hash values were calculated based on mHealth data, the previous client hash value, and the secure string stored on the client device. The client hash value constitutes the chain structure and proves the origin of the sequential data.</p>
        <p>Both mHealth data and the client hash value were sent to the blockchain network to be registered in the ledger. The ledger is made up of the blockchain, sequenced records in blocks, and a state database. Each node of the blockchain maintains a copy of the ledger. If the transaction was validated under the endorsement policy, the chaincode was executed and the block of the transaction was appended in each node. The mHealth data and the client hash value were stored in CouchDB and the blockchain. The block includes a hash of the block’s transactions, as well as a hash of the prior block. In this way, it is not possible to tamper with the ledger data without breaking the hash links.</p>
        <p>Although the block size is limited in blockchain, it is enough for our medical data since the clinical indicators are stored as JSON data. In addition, the transaction throughput in the Hyperledger Fabric platform that we used is 2250 transactions per second [<xref ref-type="bibr" rid="ref27">27</xref>]. In contrast, in a permissionless network or public network, such as Bitcoin and Ethereum, it takes 600 seconds and 10 seconds respectively to write a transaction on the ledger [<xref ref-type="bibr" rid="ref28">28</xref>]. Since the number of transactions in our mHealth system occur several times per day for every patient, the transaction performance of the blockchain will not be a bottleneck.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Authentication of client devices and relay servers. Client devices authenticated by (a) a single common authentication server; the system is vulnerable against server hacking; (b) multiple authentication servers for each relay servers; (c) a single common authentication server. In addition to authentication, client devices calculate a hash value based on data, secure string, and previous hash value, so the hash value consists of the chain structure (client hashchain).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>User data along with client hashchain registered to blockchain network.</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Validation of the Resistance Against Attack on the Relay Server</title>
        <p>To investigate the resistance of our proposed system, we first simulated an artificial attack on the relay server (ie, outside actors) or misconduct by the owner of the relay server (ie, inside actors) and evaluated if the malicious access was detected and if the original data are distinguishable from the illegal data. As described above, the client device sends the data to the blockchain network via multiple relay servers. We used three relay servers and the app selected two relay servers at random to send the data to the blockchain network. If one of the relay servers is hacked, the attacker can modify the data sent from the client device prior to blockchain submission and steal the authorization token. In this case, the secure string used in the calculation of the client hashchain was not stolen by the attacker.</p>
        <p>As shown in <xref ref-type="fig" rid="figure4">Figure 4</xref>, an attacker hacked relay server #2 and modified some medical data as well as the client hash value. In this case, the client hash value was calculated with the previous hash value, modified medical data, and the incorrect string. The access fraud can be detected by the mismatch between the data sent from other relay servers. It is also possible to distinguish and reject illegal data from original data automatically using the client hashchain. At the end of the clinical trial, the device sent the secure string to the blockchain to make it possible to validate the uploaded data retrospectively. Since all the medical data and the client hash values were stored in the blockchain network, it is not possible to rewrite the hash value based on the secure string, which was sent via the relay servers. Legal data can be guaranteed by combining the client hashchain, which rejects impersonation, with the blockchain, which provides tamper-proof history.</p>
      </sec>
      <sec>
        <title>Validation of the Resistance Against Attack on the Authentication Server</title>
        <p>We next simulated an artificial attack on the authentication server (ie, outside actors) or misconduct by the owner of the authentication server (ie, inside actors) during the clinical trial and evaluated whether the malicious access was detected if the original data are distinguishable from the illegal data. The authentication server possesses the authentication keys of every account. If the authentication key was stolen, the attacker can send illegal data from different devices. In this case, the secure string used in the calculation of the client hashchain was not stolen by the attacker.</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Relay server hacked and data modified by access fraud (client hash value in red).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>As shown in <xref ref-type="fig" rid="figure5">Figure 5</xref>, using the stolen authentication key, multiple data with the same log ID were generated and sent to the blockchain network via relay servers by the attacker. Fraud detection can be achieved by identifying branched data. Furthermore, it is also possible to distinguish and reject illegal data from original data automatically using the client hashchain. At the end of the clinical trial, the device sent the secure string to the blockchain to enable the validation of the uploaded data retrospectively. Since all medical data and the client hash values were stored in the blockchain network, it is not possible to rewrite the hash value based on the secure string that was sent via relay servers.</p>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Authentication server hacked and data generated from multiple devices using the authentication key (authentication key was stolen and the attacker created illegal data from different devices in red).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Validation of the Resistance Against Attack on the Client Device</title>
        <p>To further investigate the resistance of our proposed system, we next simulated an artificial attack on the client device and evaluated if the malicious access was detected and if the original data are distinguishable from the illegal data. One of the most dangerous attacks is the malware root exploit, which enables the attacker to obtain the victim’s private key. In this case, the authentication key as well as the secure string were stolen by the attacker, resulting in a more serious situation.</p>
        <p>As shown in <xref ref-type="fig" rid="figure6">Figure 6</xref>, using the stolen authentication key, multiple data with the same log ID were generated and sent to the blockchain network. Fraud detection can be achieved by identifying the branched data. However, it is not possible to distinguish illegal data from original data automatically using the client hashchain because the attacker has stolen the secure string to calculate the client hash value. In this case, however, it is possible to judge which are the original data by checking the data in the patient’s device offline, based on the fraud detection.</p>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Client device washacked by malware root exploit and data generated from multiple devices using the authentication key (authentication key as well as the secure string for the client hash value were stolen by root exploit and the attacker created illegal data from different device in red).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13385_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In this study, we have developed a secure and scalable mHealth system using relay servers and blockchain combined with a client hashchain. Although blockchain technology provides tamper-resistance to medical data [<xref ref-type="bibr" rid="ref24">24</xref>], the security was limited to the registered data and it cannot distinguish between original data and impersonated data. In addition, scalability will be compromised if the client devices were dealt with as a node of blockchain network. With our proposed system, we have shown that these problems can be resolved.</p>
        <p>Bitcoin was the first implementation of blockchain as a digital asset in widespread use. Although bitcoin can be used as a platform for preventing data tampering, it is not appropriate since it is an open network and massive computing power is necessary for proof of work (PoW) to obtain consensus [<xref ref-type="bibr" rid="ref43">43</xref>]. Private blockchain networks, such as Hyperledger Fabric, are more appropriate for the management of medical data since the node of stakeholders can be controlled. In addition, it is possible to process more transactions in a private blockchain without PoW. Using a private blockchain network, we used relay servers to send the data from authorized clients. With this architecture, it is not necessary to incorporate SDKs on client devices. To make the system robust against hacking of the relay server, the app sent data to the blockchain network via multiple relay servers. Even when one of the relay servers was hacked, we could detect access fraud and distinguish the original data from modified data. In our study, we used three relay servers and two were randomly selected to send the data. The robustness of the system against server attack can be increased if we use more relay servers, for instance, if three out of five relay servers are randomly selected to send the data.</p>
        <p>To further clarify the origin of the data, we combined the client hashchain with the private blockchain. Hash values combined with the blockchain have been used as the metadata in a previous study for the management of rights for digital contents [<xref ref-type="bibr" rid="ref44">44</xref>]. In contrast, we used hash values calculated on the client device to protect against impersonation and verify the origin of the data by chaining them. Hash values with chain structure (client hashchain) enable the identification of the original data sent from a specific client, which stores the secure string. In addition, in combination with the blockchain, the system also ensured tamper-resistance and the reliability of the hash values to prevent impersonation. We have shown that fraudulent data by compromised relay servers can be detected and distinguished from original data using the client hashchain. Even when the secure string used in calculating the client hash value was stolen by the attacker with root exploit [<xref ref-type="bibr" rid="ref45">45</xref>], it is possible to detect the malformation in the branching of the chaincode. Based on the detection of the malformation, the researchers can ask the patients and check which are the original data. Therefore, the system is highly resistant against impersonation and tampering.</p>
        <p>In this study, we designed the architecture for mHealth and verified the performance in a clinical study. Although mHealth is suitable for collecting medical data, such as patient reported outcomes [<xref ref-type="bibr" rid="ref46">46</xref>], by changing the client device from patients’ mobile phone to computers in medical institutions, the system can also be applied to clinical trials that use electronic data capture [<xref ref-type="bibr" rid="ref47">47</xref>]. In addition, we could deploy smart contract, which is called chaincode in Hyperledger Fabric, to each node of the blockchain network to execute transactions. Since the smart contract may have the function to transform medical data into the determined format, it is possible to automatically complete the case report form of each patient if the app has access to additional medical data by deploying the smart contract for the clinical trial [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>The system enables the verification of the accuracy of the medical data without confirmation by the third party, such as a contracted research organization, so that it is possible to reduce the cost of clinical trials as well as the possibility of human error. Thus, our system based on the blockchain technology combined with a client hashchain may enhance the development of drugs and medical devices.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Further studies are needed to verify the scalability of the system for conducting multiple clinical trials simultaneously. In Hyperledger Fabric v1.0, it is possible to partition the network and define a communication channel using an ordering service, which enables multiple clinical trials to be conducted in the same system [<xref ref-type="bibr" rid="ref49">49</xref>]. Although the transaction throughput in the Hyperledger Fabric platform that we used is much higher than public blockchain, one drawback of the private network described here is preventing 51% of attacks in networks that are composed of a limited number of nodes without public validation.</p>
        <p>Although our system is resistant against impersonation and tampering, hacking of the client device is a great threat. Root exploit is a type of malware attackers use to modify the Android operating system kernel such that attackers are able to gain super-user privileges. When attackers gain root of the operating system kernel, they also gain access to full administrator privileges. Through this, attackers are able to install other malware types, such as botnets, worms, or Trojans into the system. Further studies like root exploit detection [<xref ref-type="bibr" rid="ref45">45</xref>] may be beneficial for the improved security of the system.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>In this study, we designed a secure and scalable mHealth system using blockchain. A client hashchain was combined with the blockchain network to protect against impersonation, enabling the usage of relay servers and reducing the complexity of authentication of client devices for mHealth. The system was validated in the clinical trial, and the resistance against various fraud attacks was evaluated.</p>
      </sec>
    </sec>
  </body>
  <back>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CBTi</term>
          <def>
            <p>cognitive behavioral therapy for insomnia</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IoT</term>
          <def>
            <p>internet of things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IP</term>
          <def>
            <p>Internet Protocol</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">JSON</term>
          <def>
            <p>JavaScript Object Notation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PoW</term>
          <def>
            <p>proof of work</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SDK</term>
          <def>
            <p>software development kit</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">SHA</term>
          <def>
            <p>secure hash algorithm</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported in part by the New Energy and Industrial Technology Development Organization and the Cabinet Office of Japan.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>TU designed the research; TH, KO, MK performed the research; TM, DI analyzed the data; and TM, TH, DI, and TU wrote the paper.</p>
      </fn>
      <fn fn-type="conflict">
        <p>The authors are members of SUSMED, Inc.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Marzano</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Bardill</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Fields</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Herd</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Veale</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Grey</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Moran</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>The application of mHealth to mental health: opportunities and challenges</article-title>
        <source>Lancet Psychiatry</source>  
        <year>2015</year>  
        <month>10</month>  
        <volume>2</volume>  
        <issue>10</issue>  
        <fpage>942</fpage>  
        <lpage>948</lpage>  
        <pub-id pub-id-type="doi">10.1016/S2215-0366(15)00268-0</pub-id>
        <pub-id pub-id-type="medline">26462228</pub-id>
        <pub-id pub-id-type="pii">S2215-0366(15)00268-0</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kierkegaard</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Electronic health record: Wiring Europe’s healthcare</article-title>
        <source>Computer Law &amp; Security Review</source>  
        <year>2011</year>  
        <month>9</month>  
        <volume>27</volume>  
        <issue>5</issue>  
        <fpage>503</fpage>  
        <lpage>515</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.clsr.2011.07.013</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Clarke</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Youngstein</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Cyberattack on Britain's National Health Service - A Wake-up Call for Modern Medicine</article-title>
        <source>N Engl J Med</source>  
        <year>2017</year>  
        <month>08</month>  
        <day>03</day>  
        <volume>377</volume>  
        <issue>5</issue>  
        <fpage>409</fpage>  
        <lpage>411</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp1706754</pub-id>
        <pub-id pub-id-type="medline">28591519</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hao</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Patrick</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Thomas</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Guannan</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Mingming</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Harlan</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Wade</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Lixin</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies</article-title>
        <source>arXiv</source>  
        <year>2018</year>  
        <month>7</month>  
        <day>10</day>  
        <fpage>03662</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/1807.03662"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bekelman</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Gross</surname>
            <given-names>CP</given-names>
          </name>
        </person-group>
        <article-title>Scope and impact of financial conflicts of interest in biomedical research: a systematic review</article-title>
        <source>JAMA</source>  
        <year>2003</year>  
        <volume>289</volume>  
        <issue>4</issue>  
        <fpage>454</fpage>  
        <lpage>465</lpage>  
        <pub-id pub-id-type="medline">12533125</pub-id>
        <pub-id pub-id-type="pii">jrv20091</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Orri</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lipset</surname>
            <given-names>CH</given-names>
          </name>
          <name name-style="western">
            <surname>Jacobs</surname>
            <given-names>BP</given-names>
          </name>
          <name name-style="western">
            <surname>Costello</surname>
            <given-names>AJ</given-names>
          </name>
          <name name-style="western">
            <surname>Cummings</surname>
            <given-names>SR</given-names>
          </name>
        </person-group>
        <article-title>Web-based trial to evaluate the efficacy and safety of tolterodine ER 4 mg in participants with overactive bladder: REMOTE trial</article-title>
        <source>Contemp Clin Trials</source>  
        <year>2014</year>  
        <month>12</month>  
        <volume>38</volume>  
        <issue>2</issue>  
        <fpage>190</fpage>  
        <lpage>197</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.cct.2014.04.009</pub-id>
        <pub-id pub-id-type="medline">24792229</pub-id>
        <pub-id pub-id-type="pii">S1551-7144(14)00057-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pease</surname>
            <given-names>AM</given-names>
          </name>
          <name name-style="western">
            <surname>Krumholz</surname>
            <given-names>HM</given-names>
          </name>
          <name name-style="western">
            <surname>Downing</surname>
            <given-names>NS</given-names>
          </name>
          <name name-style="western">
            <surname>Aminawung</surname>
            <given-names>JA</given-names>
          </name>
          <name name-style="western">
            <surname>Shah</surname>
            <given-names>ND</given-names>
          </name>
          <name name-style="western">
            <surname>Ross</surname>
            <given-names>JS</given-names>
          </name>
        </person-group>
        <article-title>Postapproval studies of drugs initially approved by the FDA on the basis of limited evidence: systematic review</article-title>
        <source>BMJ</source>  
        <year>2017</year>  
        <month>05</month>  
        <day>03</day>  
        <volume>357</volume>  
        <fpage>j1680</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bmj.com/cgi/pmidlookup?view=long&amp;pmid=28468750"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/bmj.j1680</pub-id>
        <pub-id pub-id-type="medline">28468750</pub-id>
        <pub-id pub-id-type="pmcid">PMC5421452</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bhatt</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Quality of clinical trials: A moving target</article-title>
        <source>Perspect Clin Res</source>  
        <year>2011</year>  
        <month>10</month>  
        <volume>2</volume>  
        <issue>4</issue>  
        <fpage>124</fpage>  
        <lpage>128</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.picronline.org/article.asp?issn=2229-3485;year=2011;volume=2;issue=4;spage=124;epage=128;aulast=Bhatt"/>
        </comment>  
        <pub-id pub-id-type="doi">10.4103/2229-3485.86880</pub-id>
        <pub-id pub-id-type="medline">22145122</pub-id>
        <pub-id pub-id-type="pii">PCR-2-124</pub-id>
        <pub-id pub-id-type="pmcid">PMC3227329</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sheehan</surname>
            <given-names>JG</given-names>
          </name>
        </person-group>
        <article-title>Fraud, conflict of interest, and other enforcement issues in clinical research</article-title>
        <source>Cleve Clin J Med</source>  
        <year>2007</year>  
        <month>03</month>  
        <volume>74 Suppl 2</volume>  
        <fpage>S63</fpage>  
        <lpage>67; discussion S68</lpage>  
        <pub-id pub-id-type="medline">17471620</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gupta</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Fraud and misconduct in clinical research: A concern</article-title>
        <source>Perspect Clin Res</source>  
        <year>2013</year>  
        <month>04</month>  
        <volume>4</volume>  
        <issue>2</issue>  
        <fpage>144</fpage>  
        <lpage>147</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.picronline.org/article.asp?issn=2229-3485;year=2013;volume=4;issue=2;spage=144;epage=147;aulast=Gupta"/>
        </comment>  
        <pub-id pub-id-type="doi">10.4103/2229-3485.111800</pub-id>
        <pub-id pub-id-type="medline">23833741</pub-id>
        <pub-id pub-id-type="pii">PCR-4-144</pub-id>
        <pub-id pub-id-type="pmcid">PMC3700330</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cai</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Ernst</surname>
            <given-names>JB</given-names>
          </name>
          <name name-style="western">
            <surname>Hong</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Feng</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Leung</surname>
            <given-names>VCM</given-names>
          </name>
        </person-group>
        <article-title>Decentralized Applications: The Blockchain-Empowered Software System</article-title>
        <source>IEEE Access</source>  
        <year>2018</year>  
        <volume>6</volume>  
        <fpage>53019</fpage>  
        <lpage>53033</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/1Cd2iA/q1xBT"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/ACCESS.2018.2870644</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nakamoto</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Bitcoin: A Peer-to-Peer Electronic Cash System</source>  
        <year>2008</year>  
        <access-date>2019-05-05</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="78A7OLdwe"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuo</surname>
            <given-names>T-T</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>H-E</given-names>
          </name>
          <name name-style="western">
            <surname>Ohno-Machado</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Blockchain distributed ledger technologies for biomedical and health care applications</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2017</year>  
        <month>11</month>  
        <day>01</day>  
        <volume>24</volume>  
        <issue>6</issue>  
        <fpage>1211</fpage>  
        <lpage>1220</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29016974"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1093/jamia/ocx068</pub-id>
        <pub-id pub-id-type="medline">29016974</pub-id>
        <pub-id pub-id-type="pii">4108087</pub-id>
        <pub-id pub-id-type="pmcid">PMC6080687</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sylim</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Marcelo</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Fontelo</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Blockchain Technology for Detecting Falsified and Substandard Drugs in Distribution: Pharmaceutical Supply Chain Intervention</article-title>
        <source>JMIR Res Protoc</source>  
        <year>2018</year>  
        <month>09</month>  
        <day>13</day>  
        <volume>7</volume>  
        <issue>9</issue>  
        <fpage>e10163</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.researchprotocols.org/2018/9/e10163/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/10163</pub-id>
        <pub-id pub-id-type="medline">30213780</pub-id>
        <pub-id pub-id-type="pii">v7i9e10163</pub-id>
        <pub-id pub-id-type="pmcid">PMC6231844</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mackey</surname>
            <given-names>TK</given-names>
          </name>
          <name name-style="western">
            <surname>Nayyar</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>A review of existing and emerging digital technologies to combat the global trade in fake medicines</article-title>
        <source>Expert Opin Drug Saf</source>  
        <year>2017</year>  
        <month>05</month>  
        <volume>16</volume>  
        <issue>5</issue>  
        <fpage>587</fpage>  
        <lpage>602</lpage>  
        <pub-id pub-id-type="doi">10.1080/14740338.2017.1313227</pub-id>
        <pub-id pub-id-type="medline">28349715</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tseng</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Liao</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Chong</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Liao</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Governance on the Drug Supply Chain via Gcoin Blockchain</article-title>
        <source>Int J Environ Res Public Health</source>  
        <year>2018</year>  
        <month>12</month>  
        <day>23</day>  
        <volume>15</volume>  
        <issue>6</issue>  
        <fpage>E1055</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.mdpi.com/resolver?pii=ijerph15061055"/>
        </comment>  
        <pub-id pub-id-type="doi">10.3390/ijerph15061055</pub-id>
        <pub-id pub-id-type="medline">29882861</pub-id>
        <pub-id pub-id-type="pii">ijerph15061055</pub-id>
        <pub-id pub-id-type="pmcid">PMC6025275</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mertz</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>(Block) Chain Reaction: A Blockchain Revolution Sweeps into Health Care, Offering the Possibility for a Much-Needed Data Solution</article-title>
        <source>IEEE Pulse</source>  
        <year>2018</year>  
        <volume>9</volume>  
        <issue>3</issue>  
        <fpage>4</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1109/MPUL.2018.2814879</pub-id>
        <pub-id pub-id-type="medline">29757744</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>MIStore: a Blockchain-Based Medical Insurance Storage System</article-title>
        <source>J Med Syst</source>  
        <year>2018</year>  
        <month>07</month>  
        <day>02</day>  
        <volume>42</volume>  
        <issue>8</issue>  
        <fpage>149</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29968202"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s10916-018-0996-4</pub-id>
        <pub-id pub-id-type="medline">29968202</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-018-0996-4</pub-id>
        <pub-id pub-id-type="pmcid">PMC6028902</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaur</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Alam</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Jameel</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Mourya</surname>
            <given-names>AK</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>A Proposed Solution and Future Direction for Blockchain-Based Heterogeneous Medicare Data in Cloud Environment</article-title>
        <source>J Med Syst</source>  
        <year>2018</year>  
        <month>07</month>  
        <day>10</day>  
        <volume>42</volume>  
        <issue>8</issue>  
        <fpage>156</fpage>  
        <pub-id pub-id-type="doi">10.1007/s10916-018-1007-5</pub-id>
        <pub-id pub-id-type="medline">29987560</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-018-1007-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mense</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Athanasiadis</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Concept for Sharing Distributed Personal Health Records with Blockchains</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2018</year>  
        <volume>251</volume>  
        <fpage>7</fpage>  
        <lpage>10</lpage>  
        <pub-id pub-id-type="medline">29968588</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Song</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain</article-title>
        <source>J Med Syst</source>  
        <year>2018</year>  
        <month>07</month>  
        <day>05</day>  
        <volume>42</volume>  
        <issue>8</issue>  
        <fpage>152</fpage>  
        <pub-id pub-id-type="doi">10.1007/s10916-018-0994-6</pub-id>
        <pub-id pub-id-type="medline">29974270</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-018-0994-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Benchoufi</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ravaud</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Blockchain technology for improving clinical research quality</article-title>
        <source>Trials</source>  
        <year>2017</year>  
        <month>12</month>  
        <day>19</day>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>335</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-017-2035-z"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s13063-017-2035-z</pub-id>
        <pub-id pub-id-type="medline">28724395</pub-id>
        <pub-id pub-id-type="pii">10.1186/s13063-017-2035-z</pub-id>
        <pub-id pub-id-type="pmcid">PMC5517794</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Maslove</surname>
            <given-names>DM</given-names>
          </name>
          <name name-style="western">
            <surname>Klein</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Brohman</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Martin</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Using Blockchain Technology to Manage Clinical Trials Data: A Proof-of-Concept Study</article-title>
        <source>JMIR Med Inform</source>  
        <year>2018</year>  
        <month>12</month>  
        <day>21</day>  
        <volume>6</volume>  
        <issue>4</issue>  
        <fpage>e11949</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://medinform.jmir.org/2018/4/e11949/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/11949</pub-id>
        <pub-id pub-id-type="medline">30578196</pub-id>
        <pub-id pub-id-type="pii">v6i4e11949</pub-id>
        <pub-id pub-id-type="pmcid">PMC6320404</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ichikawa</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Kashiyama</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ueno</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Tamper-Resistant Mobile Health Using Blockchain Technology</article-title>
        <source>JMIR Mhealth Uhealth</source>  
        <year>2017</year>  
        <month>07</month>  
        <day>26</day>  
        <volume>5</volume>  
        <issue>7</issue>  
        <fpage>e111</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2017/7/e111/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/mhealth.7938</pub-id>
        <pub-id pub-id-type="medline">28747296</pub-id>
        <pub-id pub-id-type="pii">v5i7e111</pub-id>
        <pub-id pub-id-type="pmcid">PMC5550736</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wong</surname>
            <given-names>DR</given-names>
          </name>
          <name name-style="western">
            <surname>Bhattacharya</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Butte</surname>
            <given-names>AJ</given-names>
          </name>
        </person-group>
        <article-title>Prototype of running clinical trials in an untrustworthy environment using blockchain</article-title>
        <source>Nat Commun</source>  
        <year>2019</year>  
        <month>12</month>  
        <day>22</day>  
        <volume>10</volume>  
        <issue>1</issue>  
        <fpage>917</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30796226"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1038/s41467-019-08874-y</pub-id>
        <pub-id pub-id-type="medline">30796226</pub-id>
        <pub-id pub-id-type="pii">10.1038/s41467-019-08874-y</pub-id>
        <pub-id pub-id-type="pmcid">PMC6384889</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhuang</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Sheets</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Shae</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Tsai</surname>
            <given-names>JJP</given-names>
          </name>
          <name name-style="western">
            <surname>Shyu</surname>
            <given-names>C-R</given-names>
          </name>
        </person-group>
        <article-title>Applying Blockchain Technology for Health Information Exchange and Persistent Monitoring for Clinical Trials</article-title>
        <source>AMIA Annu Symp Proc</source>  
        <year>2018</year>  
        <volume>2018</volume>  
        <fpage>1167</fpage>  
        <lpage>1175</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30815159"/>
        </comment>  
        <pub-id pub-id-type="medline">30815159</pub-id>
        <pub-id pub-id-type="pmcid">PMC6371378</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Angraal</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Krumholz</surname>
            <given-names>HM</given-names>
          </name>
          <name name-style="western">
            <surname>Schulz</surname>
            <given-names>WL</given-names>
          </name>
        </person-group>
        <article-title>Blockchain Technology: Applications in Health Care</article-title>
        <source>Circ Cardiovasc Qual Outcomes</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>10</volume>  
        <issue>9</issue>  
        <fpage>E003800</fpage>  
        <pub-id pub-id-type="doi">10.1161/CIRCOUTCOMES.117.003800</pub-id>
        <pub-id pub-id-type="medline">28912202</pub-id>
        <pub-id pub-id-type="pii">CIRCOUTCOMES.117.003800</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Roehrs</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>da Costa</surname>
            <given-names>CA</given-names>
          </name>
          <name name-style="western">
            <surname>da Rosa Righi</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>OmniPHR: A distributed architecture model to integrate personal health records</article-title>
        <source>J Biomed Inform</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>71</volume>  
        <fpage>70</fpage>  
        <lpage>81</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30108-9"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2017.05.012</pub-id>
        <pub-id pub-id-type="medline">28545835</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(17)30108-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>White</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Schmidt</surname>
            <given-names>DC</given-names>
          </name>
          <name name-style="western">
            <surname>Lenz</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Rosenbloom</surname>
            <given-names>ST</given-names>
          </name>
        </person-group>
        <article-title>FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data</article-title>
        <source>Comput Struct Biotechnol J</source>  
        <year>2018</year>  
        <volume>16</volume>  
        <fpage>267</fpage>  
        <lpage>278</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2001-0370(18)30037-0"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.csbj.2018.07.004</pub-id>
        <pub-id pub-id-type="medline">30108685</pub-id>
        <pub-id pub-id-type="pii">S2001-0370(18)30037-0</pub-id>
        <pub-id pub-id-type="pmcid">PMC6082774</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>X</given-names>
          </name>
        </person-group>
        <article-title>Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain</article-title>
        <source>J Med Syst</source>  
        <year>2018</year>  
        <month>06</month>  
        <day>28</day>  
        <volume>42</volume>  
        <issue>8</issue>  
        <fpage>140</fpage>  
        <pub-id pub-id-type="doi">10.1007/s10916-018-0995-5</pub-id>
        <pub-id pub-id-type="medline">29956061</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-018-0995-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jacobs</surname>
            <given-names>GD</given-names>
          </name>
          <name name-style="western">
            <surname>Pace-Schott</surname>
            <given-names>EF</given-names>
          </name>
          <name name-style="western">
            <surname>Stickgold</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Otto</surname>
            <given-names>MW</given-names>
          </name>
        </person-group>
        <article-title>Cognitive behavior therapy and pharmacotherapy for insomnia: a randomized controlled trial and direct comparison</article-title>
        <source>Arch Intern Med</source>  
        <year>2004</year>  
        <month>09</month>  
        <day>27</day>  
        <volume>164</volume>  
        <issue>17</issue>  
        <fpage>1888</fpage>  
        <lpage>1896</lpage>  
        <pub-id pub-id-type="doi">10.1001/archinte.164.17.1888</pub-id>
        <pub-id pub-id-type="medline">15451764</pub-id>
        <pub-id pub-id-type="pii">164/17/1888</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Basner</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Dinges</surname>
            <given-names>DF</given-names>
          </name>
        </person-group>
        <article-title>Maximizing sensitivity of the psychomotor vigilance test (PVT) to sleep loss</article-title>
        <source>Sleep</source>  
        <year>2011</year>  
        <month>05</month>  
        <day>01</day>  
        <volume>34</volume>  
        <issue>5</issue>  
        <fpage>581</fpage>  
        <lpage>591</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21532951"/>
        </comment>  
        <pub-id pub-id-type="medline">21532951</pub-id>
        <pub-id pub-id-type="pmcid">PMC3079937</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Soldatos</surname>
            <given-names>CR</given-names>
          </name>
          <name name-style="western">
            <surname>Dikeos</surname>
            <given-names>DG</given-names>
          </name>
          <name name-style="western">
            <surname>Paparrigopoulos</surname>
            <given-names>TJ</given-names>
          </name>
        </person-group>
        <article-title>Athens Insomnia Scale: validation of an instrument based on ICD-10 criteria</article-title>
        <source>J Psychosom Res</source>  
        <year>2000</year>  
        <month>06</month>  
        <volume>48</volume>  
        <issue>6</issue>  
        <fpage>555</fpage>  
        <lpage>560</lpage>  
        <pub-id pub-id-type="medline">11033374</pub-id>
        <pub-id pub-id-type="pii">S0022399900000957</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>MW</given-names>
          </name>
        </person-group>
        <article-title>A new method for measuring daytime sleepiness: the Epworth sleepiness scale</article-title>
        <source>Sleep</source>  
        <year>1991</year>  
        <month>12</month>  
        <volume>14</volume>  
        <issue>6</issue>  
        <fpage>540</fpage>  
        <lpage>545</lpage>  
        <pub-id pub-id-type="medline">1798888</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Biggs</surname>
            <given-names>MM</given-names>
          </name>
          <name name-style="western">
            <surname>Shores-Wilson</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Rush</surname>
            <given-names>AJ</given-names>
          </name>
          <name name-style="western">
            <surname>Carmody</surname>
            <given-names>TJ</given-names>
          </name>
          <name name-style="western">
            <surname>Trivedi</surname>
            <given-names>MH</given-names>
          </name>
          <name name-style="western">
            <surname>Crismon</surname>
            <given-names>ML</given-names>
          </name>
          <name name-style="western">
            <surname>Toprac</surname>
            <given-names>MG</given-names>
          </name>
          <name name-style="western">
            <surname>Mason</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>A comparison of alternative assessments of depressive symptom severity: a pilot study</article-title>
        <source>Psychiatry Res</source>  
        <year>2000</year>  
        <month>11</month>  
        <day>20</day>  
        <volume>96</volume>  
        <issue>3</issue>  
        <fpage>269</fpage>  
        <lpage>279</lpage>  
        <pub-id pub-id-type="medline">11084222</pub-id>
        <pub-id pub-id-type="pii">S0165-1781(00)00235-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Christian</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>IBM research</source>  
        <access-date>2019-05-06</access-date>
        <comment>Architecture of the Hyperledger Blockchain Fabric 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf">https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78A8lYPTB"/></comment> </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hossein</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>Lexology</source>  
        <access-date>2019-05-05</access-date>
        <comment>The Blockchain Revolution: An Analysis of Regulation and Technology Related to Distributed Ledger Technologies 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.lexology.com/library/detail.aspx?g=5adaf528-b9ad-4575-8933-4cb033a2536d">https://www.lexology.com/library/detail.aspx?g=5adaf528-b9ad-4575-8933-4cb033a2536d</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78A91hLdN"/></comment> </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Abiteboul</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Web Data Management</source>  
        <year>2012</year>  
        <publisher-loc>London, UK</publisher-loc>
        <publisher-name>Cambridge University Press</publisher-name></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shay</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors</article-title>
        <source>Ninth International Conference on Information Technology - New Generations</source>  
        <year>2012</year>  
        <conf-name>International Conference on Information Technology - New Generations</conf-name>
        <conf-date>April 16-18, 2012</conf-date>
        <conf-loc>Las Vegas, NV</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/6209073"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/ITNG.2012.62</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Castro</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Liskov</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Practical byzantine fault tolerance and proactive recovery</article-title>
        <source>ACM Trans. Comput. Syst</source>  
        <year>2002</year>  
        <volume>20</volume>  
        <issue>4</issue>  
        <fpage>398</fpage>  
        <lpage>461</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/1Cd2iA/xk6wV"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1145/571637.571640</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Castro</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Liskov</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <source>3rd Symposium on Operating Systems Design and Implementation (OSDI) Proceedings</source>  
        <year>1999</year>  
        <publisher-loc>Berkeley, CA</publisher-loc>
        <publisher-name>USENIX Association</publisher-name></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gilbert</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Handschuh</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Security Analysis of SHA-256 and Sisters</article-title>
        <source>International Workshop on Selected Areas in Cryptography</source>  
        <year>2003</year>  
        <conf-name>International Workshop on Selected Areas in Cryptography</conf-name>
        <conf-date>Aug. 14-15, 2003</conf-date>
        <conf-loc>Ottawa, ON, Canada</conf-loc>
        <publisher-name>Springer</publisher-name>
        <fpage>175</fpage>  
        <lpage>193</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/chapter/10.1007/978-3-540-24654-1_13"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Michael</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>Applied Innovation Review</source>  
        <year>2016</year>  
        <access-date>2019-05-06</access-date>
        <comment>BlockChain Technology: Beyond Bitcoin 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf">http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78AAoBhUS"/></comment> </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shigeru</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Hiroki</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Atsushi</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Tomokazu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Akihito</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Junichi</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>BRIGHT: A concept for a decentralized rights management system based on blockchain</article-title>
        <source>IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)</source>  
        <year>2015</year>  
        <conf-name>IEEE 5th International Conference on Consumer Electronics</conf-name>
        <conf-date>Sept. 6-9, 2015</conf-date>
        <conf-loc>Berlin, Germany</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/7391275"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/ICCE-Berlin.2015.7391275</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Firdaus</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Anuar</surname>
            <given-names>NB</given-names>
          </name>
          <name name-style="western">
            <surname>Razak</surname>
            <given-names>MFA</given-names>
          </name>
          <name name-style="western">
            <surname>Hashem</surname>
            <given-names>IAT</given-names>
          </name>
          <name name-style="western">
            <surname>Bachok</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Sangaiah</surname>
            <given-names>AK</given-names>
          </name>
        </person-group>
        <article-title>Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management</article-title>
        <source>J Med Syst</source>  
        <year>2018</year>  
        <month>05</month>  
        <day>04</day>  
        <volume>42</volume>  
        <issue>6</issue>  
        <fpage>112</fpage>  
        <pub-id pub-id-type="doi">10.1007/s10916-018-0966-x</pub-id>
        <pub-id pub-id-type="medline">29728780</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-018-0966-x</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Basch</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>The missing voice of patients in drug-safety reporting</article-title>
        <source>N Engl J Med</source>  
        <year>2010</year>  
        <month>03</month>  
        <day>11</day>  
        <volume>362</volume>  
        <issue>10</issue>  
        <fpage>865</fpage>  
        <lpage>869</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20220181"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1056/NEJMp0911494</pub-id>
        <pub-id pub-id-type="medline">20220181</pub-id>
        <pub-id pub-id-type="pii">362/10/865</pub-id>
        <pub-id pub-id-type="pmcid">PMC3031980</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rorie</surname>
            <given-names>DA</given-names>
          </name>
          <name name-style="western">
            <surname>Flynn</surname>
            <given-names>RWV</given-names>
          </name>
          <name name-style="western">
            <surname>Grieve</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Doney</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Mackenzie</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>MacDonald</surname>
            <given-names>TM</given-names>
          </name>
          <name name-style="western">
            <surname>Rogers</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Electronic case report forms and electronic data capture within clinical trials and pharmacoepidemiology</article-title>
        <source>Br J Clin Pharmacol</source>  
        <year>2017</year>  
        <month>09</month>  
        <volume>83</volume>  
        <issue>9</issue>  
        <fpage>1880</fpage>  
        <lpage>1895</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/bcp.13285"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1111/bcp.13285</pub-id>
        <pub-id pub-id-type="medline">28276585</pub-id>
        <pub-id pub-id-type="pmcid">PMC5555865</pub-id></nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ene-Iordache</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Carminati</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Antiga</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Rubis</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Ruggenenti</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Remuzzi</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Remuzzi</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Developing regulatory-compliant electronic case report forms for clinical trials: experience with the demand trial</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2009</year>  
        <volume>16</volume>  
        <issue>3</issue>  
        <fpage>404</fpage>  
        <lpage>408</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/19261946"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1197/jamia.M2787</pub-id>
        <pub-id pub-id-type="medline">19261946</pub-id>
        <pub-id pub-id-type="pii">M2787</pub-id>
        <pub-id pub-id-type="pmcid">PMC2732224</pub-id></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fabrice</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Shai</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Tzipora</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation</article-title>
        <source>2018 IEEE International Conference on Cloud Engineering (IC2E)</source>  
        <year>2018</year>  
        <conf-name>2018 IEEE International Conference on Cloud Engineering (IC2E)</conf-name>
        <conf-date>April 17-20, 2018</conf-date>
        <conf-loc>Orlando, FL</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/1Cd2iA/77nZK"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/IC2E.2018.00069</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
