<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v22i12e20832</article-id>
      <article-id pub-id-type="pmid">33275111</article-id>
      <article-id pub-id-type="doi">10.2196/20832</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Blockchain-Based Consent Platform for Active Assisted Living: Modeling Study and Conceptual Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Istrat</surname>
            <given-names>Dan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Luo</surname>
            <given-names>Louis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Velmovitsky</surname>
            <given-names>Pedro Elkind</given-names>
          </name>
          <degrees>BSc, MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7539-3193</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Miranda</surname>
            <given-names>Pedro Augusto Da Silva E Souza</given-names>
          </name>
          <degrees>BSc, MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0172-8998</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Vaillancourt</surname>
            <given-names>Hélène</given-names>
          </name>
          <degrees>PEng, PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1091-4629</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Donovska</surname>
            <given-names>Tania</given-names>
          </name>
          <degrees>BSc, MEng, PMP</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7702-951X</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Teague</surname>
            <given-names>Jennifer</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4562-969X</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Morita</surname>
            <given-names>Plinio Pelegrini</given-names>
          </name>
          <degrees>PEng, MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Public Health and Health Systems</institution>
            <institution>University of Waterloo</institution>
            <addr-line>200 University Ave W</addr-line>
            <addr-line>Waterloo, ON, N2L 3G1</addr-line>
            <country>Canada</country>
            <phone>1 5198884567 ext 31372</phone>
            <email>plinio.morita@uwaterloo.ca</email>
          </address>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9515-6478</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Public Health and Health Systems</institution>
        <institution>University of Waterloo</institution>
        <addr-line>Waterloo, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>CSA Group</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Research Institute for Aging</institution>
        <institution>University of Waterloo</institution>
        <addr-line>Waterloo, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Systems Design Engineering</institution>
        <institution>University of Waterloo</institution>
        <addr-line>Waterloo, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>eHealth Innovation</institution>
        <institution>Techna Institute</institution>
        <institution>University Health Network</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Institute of Health Policy, Management, and Evaluation</institution>
        <institution>Dalla Lana School of Public Health</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Plinio Pelegrini Morita <email>plinio.morita@uwaterloo.ca</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>12</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>4</day>
        <month>12</month>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>12</issue>
      <elocation-id>e20832</elocation-id>
      <history>
        <date date-type="received">
          <day>31</day>
          <month>5</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>26</day>
          <month>6</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>14</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>30</day>
          <month>10</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Pedro Elkind Velmovitsky, Pedro Augusto Da Silva E Souza Miranda, Hélène Vaillancourt, Tania Donovska, Jennifer Teague, Plinio Pelegrini Morita. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 04.12.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2020/12/e20832" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Recent advancements in active assisted living (AAL) technologies allow older adults to age well in place. However, sensing technologies increase the complexity of data collection points, making it difficult for users to consent to data collection. One possible solution for improving transparency in the consent management process is the use of blockchain, an immutable and timestamped ledger.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to provide a conceptual framework based on technology aimed at mitigating trust issues in the consent management process.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The consent management process was modeled using established methodologies to obtain a mapping of trust issues. This mapping was then used to develop a conceptual framework based on previous monitoring and surveillance architectures for connected devices.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In this paper, we present a model that maps trust issues in the informed consent process; a conceptual framework capable of providing all the necessary underlining technologies, components, and functionalities required to develop applications capable of managing the process of informed consent for AAL, powered by blockchain technology to ensure transparency; and a diagram showing an instantiation of the framework with entities comprising the participants in the blockchain network, suggesting possible technologies that can be used.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our conceptual framework provides all the components and technologies that are required to enhance the informed consent process. Blockchain technology can help overcome several privacy challenges and mitigate trust issues that are currently present in the consent management process of data collection involving AAL technologies.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>health care</kwd>
        <kwd>blockchain</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>aging</kwd>
        <kwd>informed consent</kwd>
        <kwd>mobile phone</kwd>
        <kwd>computing methodologies</kwd>
        <kwd>computer security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Society is currently moving into an age of ubiquitous and smart technologies, including mobile and wearable products, portable sensors, and diverse internet of things (IoT) solutions [<xref ref-type="bibr" rid="ref1">1</xref>]. Examples of such smart technologies are smartphones, smartwatches, wireless blood pressure cuffs, wireless scales, smart thermostats, and smart homes, among others [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. These devices have had a substantial adoption rate; for example, in 2016, 76% of Canadians owned a smartphone [<xref ref-type="bibr" rid="ref5">5</xref>]. These devices have become a standard and are pervasive even in developing countries; for example, in Brazil, 57% of the population used a smartphone [<xref ref-type="bibr" rid="ref6">6</xref>], and in Argentina, a similar proportion of the population, that is, 52%, used a smartphone [<xref ref-type="bibr" rid="ref7">7</xref>]. According to a recent survey of 11 developing countries across 4 global regions, a median of 53% of the population of these nations have access to a smartphone with internet [<xref ref-type="bibr" rid="ref8">8</xref>]. The wearable market has also experienced rapid growth: the number of global smartwatch users increased from 5 million in 2014 to 75 million in 2017 [<xref ref-type="bibr" rid="ref9">9</xref>]. The fitness wearable market alone, comprising devices such as fitness bands, smart clothes, and eyewear (eg, smart glasses), has approximately 4 million users in Canada with a revenue of Can $ 290 (US $220) million [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>These technologies have embedded sensors that can continuously and effortlessly monitor the health of users [<xref ref-type="bibr" rid="ref11">11</xref>] by collecting data on vital signs [<xref ref-type="bibr" rid="ref12">12</xref>], environmental variables [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>], and behavioral metrics such as movement in the house [<xref ref-type="bibr" rid="ref1">1</xref>]. The collected data can be analyzed for new insights into the health of individuals and populations [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      </sec>
      <sec>
        <title>Active Assisted Living</title>
        <p>One of the fields that IoT technologies and connected devices can greatly improve and support is active assisted living (AAL) [<xref ref-type="bibr" rid="ref16">16</xref>], defined as “all technology, devices, and wearables connected to the Internet, that enable the collection and exchange of data, and are used for health monitoring or to enhance the daily life of individuals” [<xref ref-type="bibr" rid="ref17">17</xref>]. The major goal of AAL technology is to help people with activities of daily living, leading them to a better, safer, and more productive life while minimizing the risk of injury and avoidable death [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. Therefore, AAL technologies are usually designed to support vulnerable populations and older adults [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>AAL has become increasingly important because of a shift toward older populations in the global age distribution. It is expected that by 2050, all developing countries, in addition to Latin America, the Caribbean, and most of Asia, will have a median age of at least 40 years [<xref ref-type="bibr" rid="ref18">18</xref>]. In Canada, 10 years from now, for example, 1 out of 4 people will be aged over 65 years [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        <p>Aging well and in place requires the older adult population to be as independent, secure, and healthy as possible [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. However, older adults experience declining health as they age and are more likely to develop some sort of impairment, making remaining at home a difficult task [<xref ref-type="bibr" rid="ref20">20</xref>]. Although assistive technologies have long been used to help older adults with daily activities [<xref ref-type="bibr" rid="ref20">20</xref>], the benefits of innovative connected devices for monitoring wellness and supporting aging-in-place are being realized only recently. Their sensing capabilities allow for health support, real-time data collection, and detection or warning for emergencies. For example, 1 out of 4 seniors fall each year, resulting in the deaths of 27,000 seniors every year in the United States alone [<xref ref-type="bibr" rid="ref21">21</xref>]. Another example of how these technologies can support older adults is a smart thermometer that cools the house if the temperature increases to dangerous levels, preventing seniors from experiencing a heatstroke [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>Controlling access and consent to all these data is still a great challenge in the current technological landscape [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref26">26</xref>].</p>
      </sec>
      <sec>
        <title>Informed Consent</title>
        <p>Informed consent is defined as an “individual’s autonomous authorization of medical intervention or participation in research” [<xref ref-type="bibr" rid="ref18">18</xref>]. Valid informed consent in research and treatment is composed of the following minimum requirements [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]:</p>
        <list list-type="order">
          <list-item>
            <p>Competence: defined as the ability to perform a task</p>
          </list-item>
          <list-item>
            <p>Understanding: defined as the full disclosure of information pertaining to the situation</p>
          </list-item>
          <list-item>
            <p>Voluntariness: defined as participation in the event without any coercion and awareness of the possible outcomes.</p>
          </list-item>
        </list>
        <p>Additional complexities in the consent management process may arise depending on the case; for example, older adults use AAL systems tend to interact with caregivers, cohabitants, and legal guardians. AAL technologies, such as smart thermostats, will collect data from every person in the environment where they are located. Therefore, the caregivers, cohabitants, and legal guardians must also give consent for data collection and use [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <p>In addition, AAL technologies have significant benefits for people with cognitive impairments, including older adults and people with dementia [<xref ref-type="bibr" rid="ref18">18</xref>]. A delicate ethical consideration arises on whether these populations can provide valid informed consent based on the principles outlined above [<xref ref-type="bibr" rid="ref18">18</xref>]. One solution would be <italic>rolling informed consent</italic>, where the data collector repeatedly provides information on consent while assessing the mental capability of an individual [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Although rolling informed consent may work well in research environments, in practice, it may not be possible to achieve it in a real-world deployment of AAL systems because of the high complexity, rate, and volume of data collection from devices.</p>
        <p>In cases where the individuals whose data are being collected cannot give valid informed consent, substitute decision makers (SDMs) may be necessary to make health decisions on their behalf [<xref ref-type="bibr" rid="ref29">29</xref>]. SDMs may be family members, caregivers, legal guardians, or any person authorized to make health decisions for or with the individual.</p>
      </sec>
      <sec>
        <title>Privacy of AAL Data</title>
        <p>Despite the benefits to technology users, health care providers, and the health care system, one major challenge that needs to be addressed is the privacy of patient-generated health data. Although IoT devices allow continuous and zero-effort monitoring of health data, they also increase the complexity of data collection points and make it harder to determine exactly what, why, and how data are being collected. This is especially troublesome when we consider the context of AAL technologies: older adults are a vulnerable population that traditionally do not have advanced technological knowledge [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>].</p>
        <p>Older populations using AAL technology are at a high risk of being subjected to security and privacy violations because of the mishandling of their data, in which mishandling is characterized by any use of data that are different from what was consented to by the user. Older adults (and technology users in general) must know what they are consenting to and how to manage their consent at any time. In addition, many technologies only allow a <italic>binary</italic> consent in which users consent to all data or no data being collected. Users do not have any choice of which health variables they can give or revoke consent to.</p>
      </sec>
      <sec>
        <title>Blockchain</title>
        <p>Data ownership, security, anonymity, and privacy are complex topics, and, as exemplified above, the challenges of obtaining consent for increasingly advanced methods of data collection, use, and disclosure call for new solutions to imperfect consent procedures to protect the safety of individuals. One possible solution is using blockchain.</p>
        <p>This technology can be seen as a distributed ledger formed of data structures known as blocks, equipped with cryptography techniques to enable trust among parties while being operated by a peer-to-peer network of computers [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Each computer forms an independent node on the network and maintains a copy of the ledger, which is regularly updated to ensure that it remains consistent with the other copies.</p>
        <p>A blockchain can be private or public, depending on its intended application. A public blockchain is open to anyone who wishes to browse its contents or participate in the network [<xref ref-type="bibr" rid="ref33">33</xref>]. Public blockchains are the most well-known blockchain applications because most cryptocurrencies take advantage of their features to enable trusted monetary transactions without the need of a trusted third party. In contrast, a permissioned or private blockchain allows only authorized users to browse its contents or participate in the network [<xref ref-type="bibr" rid="ref34">34</xref>]. This type of blockchain solution is appropriate for sensitive or highly regulated information management environments, such as health care data.</p>
        <p>A blockchain network receives transactions when two or more users want to transact information between them. Transactions from users are broadcasted to the network, validated, and grouped into a block by network nodes known as <italic>miners</italic> [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. The transactions of a blockchain are data structures modeled to represent real-world processes and objects. For example, a transaction can be modeled to represent monetary transactions [<xref ref-type="bibr" rid="ref37">37</xref>]; transfer of the ownership of a car [<xref ref-type="bibr" rid="ref38">38</xref>]; the current state of a business object [<xref ref-type="bibr" rid="ref39">39</xref>]; or, in our framework, the current state of informed consent of a patient.</p>
        <p>Transactions sent to the ledger are secure and private without the necessity of a trusted third party because users of a blockchain do not use personally identifiable information as credentials when sending transactions to the ledger [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. They use techniques such as cryptographic proof of ownership, in which every user has a private and public key pair for each transaction they submit to the ledger [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        <p>The sender signs the transaction with the private key, and a unique signature is generated and sent, along with the information of the transaction, to the public key of the receiver in the network. Every new blockchain transaction is broadcasted to all miners of the network who concurrently verify the transaction for proof of the private key ownership of the sender and verify whether the contents of the transaction are valid. For example, in the blockchain of Bitcoin [<xref ref-type="bibr" rid="ref35">35</xref>], all transactions are checked for the private key ownership of the sender to ensure that the sender has enough funds (bitcoins) to send the transaction.</p>
        <p>Miners utilize the public key of the sender to verify whether the signature of a transaction is valid. If the signature is not valid, it indicates that the original signature of the sender is wrong or tampered with, resulting in the network rejecting the transaction. The proof-of-ownership method prevents transactions from being corrupted or tampered before being added to the blockchain [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>After transactions are validated, miners group them in a block; however, before adding it to the blockchain, they must complete a task known as mining [<xref ref-type="bibr" rid="ref37">37</xref>]. Mining is a process in which miners compete to create a unique hash string for a new block.</p>
        <p>A newly generated block hash contains in its composition the unique hash of the most recently added blockchain. The linkage of blocks’ hash creates a cryptographical heritage that enables blockchain to tamper-proof its information history. For example, if an attacker wants to change the transaction information contained in block number 50, and miners from the network are currently working on block number 100, the attacker must generate the unique hash of all blocks that come after block number 50 until they reach the end of the chain and generate the unique hash of block number 100 before all the other miners of the network finish working on it. For this type of attack to be successful, a significant amount of processing power from a single miner is required. More precisely, a single miner would have to produce more processing power than the entire network to achieve success. Hence, these types of attacks are improbable [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>].</p>
        <p>In typical cryptocurrency blockchain solutions, such as Bitcoin, miners compete to finish mining a block because the winner gets rewarded for completing the task. This process is known as proof-of-work [<xref ref-type="bibr" rid="ref35">35</xref>], and one of its major disadvantages is the vast amount of electrical power needed to keep networks running. Newer blockchain solutions, such as Ethereum, take advantage of modern validation processes such as proof-of-authority. In this process, instead of wasting computational power to validate and hash a block, credentials or any other relevant fact about the miner is used to accept a new block as valid or not.</p>
        <p>Proof-of-work and proof-of-authority are used by blockchain technologies to help the network achieve consensus. In all consensus methods, a consensus is achieved by the ledger when the majority of nodes in the network agree that the block is valid and add it to their local copies. The consensus process starts when the first miner in the network finishes mining a block. It first adds the new block to its copy of the ledger, then follows to broadcast the new block to its neighboring nodes. Each node that received this new block verifies the unique block hash for validity, and if it is valid, it adds the block to its copy of the ledger. The node then follows to broadcast the new block in the same manner as the miner. This process is repeated until part or all of the network agrees with the current block. Some blockchain solutions define that when more than 50% of the network agrees with a block, consensus is achieved. There is a plethora of blockchain solutions that offer different types of consensus mechanisms. As for our framework detailed in the next sections, we used hyperledger fabric (HF) [<xref ref-type="bibr" rid="ref38">38</xref>] to take advantage of the pluggable consensus feature, which allows for future changes in the consensus model. This feature is essential to our framework because we cannot instantiate an application that is not capable of adapting to comply with future regulations. More details on the consensus mechanism of HF are presented in the <italic>Results</italic> section.</p>
        <p>This paper explores the creation of a blockchain platform for consent management in health care, specifically in the context of AAL. We discuss a general methodology for identifying blockchain use cases developed by Gorenflo et al [<xref ref-type="bibr" rid="ref43">43</xref>], and we apply this methodology to consent management for AAL technologies. With the identification of consent management as a prime use case for blockchain, we expand upon previous work done by Bublitz et al [<xref ref-type="bibr" rid="ref1">1</xref>], deriving from their general software architecture for surveillance activities, a conceptual framework for blockchain in AAL consent management. To develop this proposed conceptual framework, we researched which blockchain technology was the best fit. In the following sections, we discuss the methodology for identifying trust issues and software architecture, which served as a basis for our work. Next, we present our framework and explain how it differs from related work.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Mapping of Trust Issues</title>
        <p>Gorenflo et al [<xref ref-type="bibr" rid="ref43">43</xref>] defined a general methodology for identifying use cases of blockchain based on the identification of trust relations. This robust approach involves the following sequential steps relevant to this paper:</p>
        <list list-type="order">
          <list-item>
            <p>Identify the parties and trust relations between them. If a relationship does not have the required level of trust necessary to achieve the goal of the relationship, it should be marked as a trust issue.</p>
          </list-item>
          <list-item>
            <p>Design a minimal blockchain system that resolves the trust issues.</p>
          </list-item>
          <list-item>
            <p>Migrate the rest of the existing system to the new blockchain system if such a system exists.</p>
          </list-item>
        </list>
        <p>In this study, we followed this methodology to model the consent management process for data collection in the AAL technology space, in consultation with AAL experts, resulting in the diagram presented in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Consent management process and trust issues in active assisted living. AAL: active assisted living.</p>
          </caption>
          <graphic xlink:href="jmir_v22i12e20832_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Framework Development</title>
        <p>Once the trust issues were identified, we began work on a conceptual framework that focused on blockchain to mitigate these issues. This framework is based on a general framework architecture for monitoring and surveillance activities created by Bublitz et al [<xref ref-type="bibr" rid="ref1">1</xref>] to address most of the requirements for the creation and use of IoT systems. The main layers of the architecture, as exemplified in <xref rid="figure2" ref-type="fig">Figure 2</xref> [<xref ref-type="bibr" rid="ref1">1</xref>], are device, network, data, applications and privacy, security, and integrity.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>General architecture for the pan-Canadian surveillance system. API: application programming interface; IoT: internet of things; SQL: structured query language.</p>
          </caption>
          <graphic xlink:href="jmir_v22i12e20832_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Trust Diagram for Consent Management</title>
        <p>The trust diagram in <xref rid="figure1" ref-type="fig">Figure 1</xref> follows the nomenclature from the International Electrotechnical Commission or Systems Committees Active Assisted Living [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. The identified trust issues are highlighted in red on the arrows included in the trust diagram.</p>
        <p>An AAL Care Recipient (or an Informal Care Assistant, a nonprofessional caregiver) uses AAL technology. These users need to manage their consent to data collection and use by the manufacturers or owners of the technology, the AAL Service Providers, and any third-party application that collects the data gathered from the technology, represented as Research or Personal Applications. Trust issues arise between the AAL Care Recipient and entities consisted of Research or Personal Applications and AAL Service Providers because these entities may use the collected data in different ways than what was consented to. Another trust issue between these entities and regulatory acts, such as the Personal Information Protection and Electronic Documents Act (PIPEDA; in Canada), Health Insurance Portability and Accountability Act (HIPAA; in the United States), and General Data Protection Regulation (GDPR; in the European Union), which regulate the collection of personal data, is that the entities may be illegally using the data regarding the current legislation, thus violating the rights of the users.</p>
        <p>The diagram clearly demonstrates relations without the necessary level of trust in the consent management process. Blockchain technology can provide an immutable and timestamped log of consent, making the process more transparent for everyone involved. This is extremely important as consent management, traditionally, is subject to many shortcomings and misconducts [<xref ref-type="bibr" rid="ref45">45</xref>], and not following correct consent procedures can have tragic consequences. For example, in 2016, the trial testing of the drug BIA 10-2474 in France caused the death of a participant and hospitalization of 5 others, an event classified as that of “exceptional gravity, unprecedented in our country” by the Minister of Solidarity and Health [<xref ref-type="bibr" rid="ref46">46</xref>]. Preliminary investigations showed that after major neurological effects were discovered in 1 patient, the researchers did not obtain reconsent from other participants, allowing them to continue in the trial despite clear dangers to their safety [<xref ref-type="bibr" rid="ref46">46</xref>]. If the researchers used a platform such as the one proposed here, all their interaction with the participants regarding consent management would be recorded with a timestamp, making it extremely difficult for the researchers to not obtain reconsent as this misconduct would be easily auditable.</p>
        <p>With a blockchain platform for consent management, users are able to monitor and manage their consent in real time and with granular variable control, for example, by giving informed consent for certain types of data to be collected but not others or revoking their consent at any time. This is in alignment with privacy regulations, such as the data protection by design of GDPR and right to data deletion by users at any time [<xref ref-type="bibr" rid="ref47">47</xref>]. This information will be immutably stored in the blockchain and may be accessed by all entities with permission to do so. Users will also be able to ensure that the forms were approved and cryptographically signed by the review ethics boards, ensuring that the researchers are not withholding any information.</p>
        <p>Data collectors will also benefit as measures taken to ensure ethical and legal requirements throughout the data collection process will be clearly documented and auditable.</p>
        <p>A feature of blockchain called smart contracts [<xref ref-type="bibr" rid="ref1">1</xref>] can also be leveraged to improve the consent management process. Smart contracts can be seen as codified contract agreements, and because blockchain is an immutable ledger, terms of a contract written into software and embedded in the blockchain will always guarantee the fulfillment of these terms [<xref ref-type="bibr" rid="ref1">1</xref>]. Smart contracts can be used, for example, to bind SDMs to an individual or to check whether the consent process is compliant with different privacy regulations across territories. Ultimately, with blockchain technology, it will be easier to obtain, track, and update informed consent.</p>
      </sec>
      <sec>
        <title>The Blockchain: HF</title>
        <p>The HF [<xref ref-type="bibr" rid="ref48">48</xref>] platform was selected for use as the underlying blockchain technology as it provides the tools to achieve the goals of our proposed conceptual framework (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>). HF is an open source, permissioned, distributed ledger technology (DLT) platform [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref49">49</xref>] developed to be used in the contexts of enterprise. All enterprise interactions are performed in a private network environment called hyperledger fabric network (HFN). An HFN provides blockchain services so that client applications and network administrators can interact with the HFN, proposing new transactions and querying the blockchain. In an HFN context, a consortium [<xref ref-type="bibr" rid="ref50">50</xref>] comprises 2 or more organizations on the HFN that need to transact business with each other.</p>
        <p>In HF, an organization [<xref ref-type="bibr" rid="ref51">51</xref>] is a logical driven group of members that can represent big or small corporations. Each HFN organization is composed of members called peers [<xref ref-type="bibr" rid="ref52">52</xref>]. Peers are responsible for hosting ledgers, smart contracts, handling changes to the ledger, communications between different organizations (channels), and managing external requests from applications. An endorsing peer is responsible for executing smart contracts over a transaction proposal from a client to verify its validity before it can be added to the ledger. A committing peer is a member who keeps a copy of the ledger without any smart contracts, meaning that this is done to keep multiple copies of the ledger to avoid single-point failures. Ordering peers and organizations [<xref ref-type="bibr" rid="ref53">53</xref>] are responsible for keeping the communication sound between the participants of a channel; however, those components are beyond the scope of this paper.</p>
        <p>Organizations can communicate with each other on an HFN by creating and using communication channels. Communication channels are private communication environments for all or a subset of the organization’s members of a consortium. New organizations are enrolled in the HFN through a trusted membership service provider (MSP) [<xref ref-type="bibr" rid="ref54">54</xref>], which is responsible for issuing and validating certificates and user authentication.</p>
        <p>The conduct of business transactions between organizations of an HFN consortium is stored in a ledger. A ledger stores both the current state and the history of states from a business object. To keep a business object, the current state HF uses a database called the world state [<xref ref-type="bibr" rid="ref55">55</xref>], which is explained later in this paper. To store the history of the transactions of a business object, HF utilizes a blockchain data structure [<xref ref-type="bibr" rid="ref38">38</xref>]. Together, the blockchain structure and world state are what allow the ledger to hold an immutable history of states of business objects (blockchain) and provide fast access to the most recent state of a single business object.</p>
        <p>Participants of the HFN achieve consensus by following a transaction flow that takes into account the endorsement policy assigned to smart contracts [<xref ref-type="bibr" rid="ref56">56</xref>]. This means that transactions can only be accepted into the ledger if all, or a subset of, the endorsing peers of a consortium approve the transaction. Smart contracts in HFN are a software representation of a contract that governs the processes that alter the state of a business object. In HF, smart contracts are packaged into a structure called chaincode, which consists of multiple smart contracts. Each chaincode is deployed into an HFN channel with an endorsement policy assigned to it. The endorsement represents which organizations must sign a transaction so that it is accepted and added to the ledger.</p>
        <p>This transaction flow from HF relies on identity validation for members of the network. All transactions are first sent to the network as a proposal that needs to be endorsed by all HFN organizations included in the policy of the smart contract. The proposal is signed using the cryptographic credentials of the user that generate a unique signature.</p>
        <p>Endorsement organizations from HFN verify transactions for several factors: (1) a well-formed transaction proposal, (2) whether the proposal is not repeated, (3) checks with the MSP [<xref ref-type="bibr" rid="ref54">54</xref>] to verify whether the proposal signature is correct, and (4) then the MSP verifies whether the identity of the proposal submitter has the authorization to perform operations in that channel.</p>
        <p>Input parameters are fed to the chaincode that is going to be executed in the current world state. The result is returned after chaincode execution alongside the peer signature to the client as a proposal response. Finally, the client inspects the response from peers, and if all the necessary signatures are valid, the transaction is created.</p>
        <p>The client application broadcasts transactions to the ordering service. The service, in turn, creates orderly blocks of transactions and sends them to the channel’s peers. Each peer verifies the block transactions and signatures before adding the block to the ledger. HF is not the only appropriate platform that can provide the necessary infrastructure to instantiate our conceptual framework. For example, Ethereum [<xref ref-type="bibr" rid="ref57">57</xref>] is a blockchain solution that provides full support for distributed applications over a blockchain network. Even if the main network of Ethereum is public, which is not ideal for the health care domain, it can be instantiated into a private network environment, thus becoming compliant with the privacy and access control requirements of the present conceptual framework. We refer to Modum [<xref ref-type="bibr" rid="ref58">58</xref>] as an example of an implementation of a supply chain management system applied to Ethereum. Modum enables pharmaceutical companies to monitor the temperature and humidity of medical products by using smart contracts to verify sensor data during their life cycle.</p>
        <p>Other honorable mentions of blockchain platforms that are appropriate to this framework instantiation are the IBM blockchain platform [<xref ref-type="bibr" rid="ref59">59</xref>], the Multichain Private blockchain [<xref ref-type="bibr" rid="ref60">60</xref>], the Hydra chain [<xref ref-type="bibr" rid="ref61">61</xref>], and the BigchainDB [<xref ref-type="bibr" rid="ref62">62</xref>]. It is also worth mentioning that using these technologies will require some changes in the HFN [<xref ref-type="bibr" rid="ref63">63</xref>] component of the framework.</p>
        <p><xref ref-type="boxed-text" rid="box1">Textbox 1</xref> contains the minimum requirements of the solution mapped over the attributes of HF, providing a checklist for other blockchain platforms to instantiate the framework.</p>
        <boxed-text id="box1" position="float">
          <title>Active assisted living conceptual framework requirements and features of hyperledger fabric that support them.</title>
          <p>
            <bold>Privacy of patients’ information</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Hyperledger fabric (HF) uses cryptographic material to control access to the ledger. Applications from authorized organizations keep information from patients in their infrastructure. HF only stores anonymized consent information from unique keys created for each patient.</p>
            </list-item>
          </list>
          <p>
            <bold>Private communications between stakeholders of the informed consent process</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>HF maps stakeholders from a network into organizations. Each organization can be a part of a channel composed of some other organizations that constitute the consortium. Communications inside a channel are private to their members.</p>
            </list-item>
          </list>
          <p>
            <bold>Scalable and fast querying of the ledger</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>HF stores the most recent state of a business object in a state database called world state. Every time an informed consent state changes or a new informed consent is created, a new transaction is inserted into the ledger. However, the world state only updates the business object if it already exists, otherwise it is created. These characteristics also make HF more scalable as querying the complete history of the ledger is not required for determining the most recent informed consent status.</p>
            </list-item>
          </list>
          <p>
            <bold>No cryptocurrency</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>HF has no cryptocurrency, which complies with our solution’s intention to provide the simplest solution possible to our end users, people using active assisted living.</p>
            </list-item>
          </list>
          <p>
            <bold>Security of information</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>As HF is a private and permissioned blockchain platform, the security of information is much less susceptible to a privacy breach.</p>
            </list-item>
          </list>
          <p>
            <bold>Immutability of ledger history</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>HF provides an immutable ledger natively.</p>
            </list-item>
          </list>
          <p>
            <bold>Accountability of informed consent transactions</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>With HF, smart contracts can be created enforcing standards. These smart contracts can be configured to explicitly require the endorsement of an organization that represents an auditing authority.</p>
            </list-item>
          </list>
          <p>
            <bold>Software development kit (SDK) for development of end user applications capable of interacting with the ledger</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>For our conceptual framework to be instantiated, the creation of web applications capable of interacting with the blockchain network to create and retrieve consent transactions is necessary. HF provides such SDKs in NodeJS, Java, and Go languages.</p>
            </list-item>
          </list>
          <p>
            <bold>Smart contracts capabilities</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Smart contracts are needed to ensure the enforcement of standards and endorsements that must be respected so that a new informed consent transaction is accepted and stored in the ledger.</p>
            </list-item>
          </list>
          <p>
            <bold>Custom network policies</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Such policies are needed to control network interactions between organizations. The informed consent process has its own unique policing needs, such as endorsement policies, hence the need for customization.</p>
            </list-item>
          </list>
          <p>
            <bold>Extensibility of the network</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>For our solution’s relevancy, the capability of adding new organizations, policies, channels, and smart contracts without having to start a new network is imperative. HF provides the plug-and-play capability for adding new entities into an existing network.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Conceptual Framework for a Blockchain Consent Platform in AAL</title>
        <p>As previously mentioned, the main objective of the conceptual framework is to allow a plethora of smart <italic>devices</italic> data to be used by different health care stakeholders while providing trust, security, and privacy. <xref rid="figure3" ref-type="fig">Figure 3</xref> illustrates the conceptual framework components, one for each domain of services and health care data. All stakeholders are either mapped into an HF organization or are end users that interact with the framework through the web application of the consent management platform. Each square in <xref rid="figure3" ref-type="fig">Figure 3</xref> represents a different framework component, and each component maps services, applications, participants, and infrastructures that need to interact with the platform to complete the instantiation of the framework.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Consent management platform conceptual framework. SDM: substitute decision maker.</p>
          </caption>
          <graphic xlink:href="jmir_v22i12e20832_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>For example, the data consumer component interacts with the consent management platform component to create requests for informed consent from AAL patients. The data producer component must interact with the consent management platform component to grant informed consent to data consumers and to register the consent into the ledger. The consent management platform component interacts with the RESTful (representational state transfer) services component to send transactions to the ledger. The RESTful services component acts as the middleware between the platform front-end applications and the HFN component.</p>
        <p>Finally, the data custodian component interacts with the consent management platform to ensure that a data consumer has the proper informed consent registered in the blockchain before sharing patient data.</p>
        <p>The <italic>Security</italic> <italic>Model</italic> section discusses and explains the platform security aspects in details (<xref rid="figure3" ref-type="fig">Figure 3</xref>), along with what features from HF were utilized to support the goals of the framework.</p>
      </sec>
      <sec>
        <title>Security Model</title>
        <p>As seen in <xref rid="figure3" ref-type="fig">Figure 3</xref>, the conceptual framework is built on top of an HFN; hence, all communications between organizations and their clients are secure by state-of-the-art authentication methods such as x509 certificates and asymmetric key pairs [<xref ref-type="bibr" rid="ref38">38</xref>]. We derived our security model from the architecture of HF because it offers cryptographic certificates and keys necessary to access the ledger.</p>
        <p>The consent management platform application utilizes HF ordering service [<xref ref-type="bibr" rid="ref53">53</xref>] to access the HFN. HF applications are bound to an organization, and each time a new transaction is sent from an application, the network verifies the credentials of the organization and users before accepting transactions. If the credentials of the HF application are valid, then the transaction can be submitted to the ledger.</p>
        <p>All transactions sent to the ledger are previously checked by cryptographic access control guards, which ensures that only authorized users can access the HFN. Chaincode is used to ensure that all transactions are signed and verified by the necessary endorsing organizations. For each organization endorsement, digital signatures are used to provide data authenticity before adding the transaction into the ledger. If an endorser organization rejects the authenticity of an application’s user, then the transaction will not be inserted into the ledger.</p>
        <p>Cryptographic authentication mechanisms are simplified by a feature from HF called MSP [<xref ref-type="bibr" rid="ref54">54</xref>]. An MSP abstracts complexity involved in issuing, validating, and certificating users’ and organizations’ identities. An MSP is configured to have unique identities and rules that govern these identities. The HFN utilizes the identities of users to control access to the ledger. For example, a user with a <italic>client</italic> type of identity can only transact on the network, but an identity of type <italic>peer</italic> is allowed to endorse or commit transactions to the ledger.</p>
      </sec>
      <sec>
        <title>Data Consumer Component</title>
        <p>The data consumer component represents stakeholders that are interested in consuming data for a variety of different reasons, such as remote patient monitoring (RPM) [<xref ref-type="bibr" rid="ref64">64</xref>-<xref ref-type="bibr" rid="ref67">67</xref>]. To access health care data, obtaining informed consent from participants is essential to protect all participants, and ensuring safe and ethical procedures are in place is also essential [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. The framework provides such interactions through data consumers interacting with the HFN component. It is also essential to explain that data collected for a data consumer can be real time or historical. This means that levels of security and awareness requirements from participants can differ, thus forcing the utilization of stricter network policies and smart contracts based on the characteristics of the data.</p>
      </sec>
      <sec>
        <title>Data Producer Component</title>
        <p>The data producer component is constituted by stakeholders that provide health care data in the realm of the conceptual framework [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. Collected data can be from passive or active monitoring [<xref ref-type="bibr" rid="ref69">69</xref>]. The former relates to data that are continuously or periodically sent to the cloud (eg, smart thermostats), and the latter is the type of data that requires actions to be taken on the part of data producers (eg, clinical exam) [<xref ref-type="bibr" rid="ref69">69</xref>]. Any request for active data use from a data consumer must be consented to by a data producer for a data consumer to gain access to it. Consent is given when a data producer interacts with the consent management platform and explicitly gives consent to the data consumer. The consent management platform is responsible for creating the transaction and sending it to the HFN. If the transaction is valid and endorsed by all the appropriate peers, then the transaction is stored into the ledger and the world state is updated.</p>
      </sec>
      <sec>
        <title>Data Custodians Component</title>
        <p>The data custodian component contains stakeholders that are responsible for stored health care data [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. Aside from the PIPEDA and HIPAA considerations with regard to security and privacy standards that all data custodians must adhere to, they must only provide access to data by another stakeholder from the informed consent process if the informed consent exists and if it has not expired. It is worth mentioning that a data consumer may also be a data custodian in some cases, but informed consent must be obtained in the same manner as previously noted. If a stakeholder is a data custodian, in the holistic view of the framework, this does not mean they are entitled to use health care data freely [<xref ref-type="bibr" rid="ref69">69</xref>]. Data custodians are represented as HFN organizations in our framework, so that they can be part of the channels responsible for storing consent information. Therefore, by querying the world state, they can verify whether the consent given to a data consumer is valid.</p>
      </sec>
      <sec>
        <title>HFN Component</title>
        <p>The HFN component represents the mapping of all the stakeholders of the conceptual framework into HFN organizations. By creating this mapping, it is possible to create consortiums capable of having private communication channels with their ledgers and smart contracts. These channels are used by the organizations to query, create, and update informed consent state transactions that are stored within the ledger. New organizations can be added to the HFN at any point; thus, the organizations in the framework architecture are generalized. The ledger contains historical data from all the transactions between the organizations, which allows for data auditing from any of the network participants, consequently ensuring that trust evolves as a result of design.</p>
        <p>Another feature that comes by design, thanks to the use of HF, is the world state. The world state possesses the current values of a business object (in our case, informed consent data). This is necessary for our conceptual framework, as it would be expensive and time-consuming to go through all transactions stored in the ledger to find the most recent state of a consent document. In HF, the world state is a NoSQL (No Structured Query Language) database that stores key-value pairs as identifiers of each state. The key-value pairs can be, for example, the pair patientID-researchID. Every time a new transaction from this key is stored into the ledger, the key-value or pair state stored in the CouchDB will also be updated.</p>
        <p>Finally, as per the current version of HF, we utilize the consensus mechanism from the Raft protocol. The Raft protocol is based on a leader and follower model in which a node is elected as leader and the rest as followers. The Raft protocol is also a crash fault tolerance service that complies with our requirements of ensuring access to patients’ consent information at all times [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
      </sec>
      <sec>
        <title>Data Auditor Component</title>
        <p>A data auditor can be any organization that represents regulatory authorities such as the PIPEDA and HIPAA. Having data auditors present on the network is important because they ensure that law and regulations are enforced in the HFN by using smart contracts and endorsement policies. By being a participant of the HFN and possessing the endorsement of peers included in the proper channels of interest, for example, channels that store information of the data auditor’s jurisdiction, a data auditor can audit the information of multiple ledgers if needed. This HF capability allows the process of informed consent management to be auditable by different authorities, granting the conceptual framework the capability to adapt to new rules and policies that new data auditor added to the HFN might bring to the consortium.</p>
        <p>Another possibility is that a data auditor, through the creation of policies, can force transactions to satisfy a set of requirements through smart contracts and network policies. Smart contracts enable the enforcement of standards for data privacy and security that prevent breaches of privacy and misuse of information. Through the proactiveness of a data auditor, it is possible to enhance the informed consent process as it can continuously verify the validity of consent. A data auditor can act upon expired or invalid consent information by being a member or founder of the channels in which the organizations under its jurisdiction are present.</p>
      </sec>
      <sec>
        <title>Consent Management Platform Component</title>
        <p>The consent management platform is a web-based platform that groups all the functionalities necessary for the processing of granting, revoking, and managing consent. First, to prevent a lack of access from stakeholders because of technology limitations, the framework proposes the use of responsive web applications that can be accessed by any device. The platform uses HF’s NodeJS software development kit (SDK) [<xref ref-type="bibr" rid="ref73">73</xref>] to interact with the HFN from the front end. Different endpoints can be used to control actions allowed only by certain types of users and organizations, for example, a patient (data producer) can elect an SDM to make decisions for him but cannot create requests for consent like a data consumer.</p>
        <p>Patients can log into the platform to browse available data consumer requests and choose which to enroll in. For example, if an AAL patient wants to be monitored by an RPM center, the RPM center, as a data consumer, logs into the platform and creates the request for consent to be accepted by its patients. The AAL patient can grant consent to the RPM center through the platform’s web application. In doing so, a transaction is created and proposed to the HFN and, if accepted, is stored in the ledger. This ensures that all the stakeholders from the transaction now possess a copy from the current state of consent, and the data consumer can start collecting the patient data from data custodians.</p>
        <p>The consent management platform also provides web interfaces that allow patients to revoke consent and update consent. Another feature offered is that data producers can choose to share specific types of data for each request for consent. For example, an RPM center may request 5 types of data to be shared by a patient. However, the patient may choose only to share 2 types if they desire; although this makes the expected data received by the data consumer less predictive, it empowers data producers at the same time. This process ensures accountability, security, and transparency for the informed consent process, helping to improve traditional methods of obtaining consent.</p>
        <p>The consent management platform can also be used to enhance the process of electing SDMs for patients. A patient can request that a user becomes their SDM. If the appointed SDM accepts the request, the information about the SDM elected is stored into the ledger and becomes available to stakeholders. Just like an informed consent state stored into the ledger, the SDM state can also be revoked or updated based on the circumstances. Such features can help to empower people under AAL conditions to quickly elect trustworthy SDMs without having to go through current bureaucracies that govern the substitute decision-making process [<xref ref-type="bibr" rid="ref74">74</xref>].</p>
        <p>Finally, the representational state transfer services layer is responsible for managing appropriate access to the consent management platform and for keeping meta-information about the users’ identities in the ledger. If any other functionalities are needed, the conceptual framework can be extended to encompass new functionalities and components.</p>
      </sec>
      <sec>
        <title>Chaincode</title>
        <p>The utilization of chaincode (smart contracts) by the framework ensures that only registered applications can send a transaction to the ledger and that the network’s required organizations endorse only valid transactions. A set of endorsement policies is defined for each new chaincode deployed into the network. As we are proposing a conceptual framework, at this stage of our research, we still do not have abstract contracts that can be extended by other developers. However, in the <italic>Framework Instantiation</italic> section, we explain the development of our prototype’s chaincode.</p>
        <p>Our first implementation of the chaincode will serve as a subject to further enhancements for the framework. In future work, we will study all contracts and their commonalities to create abstract contracts that can be instantiated by developers who want to adapt the framework for other domains.</p>
      </sec>
      <sec>
        <title>Framework Instantiation</title>
        <p>To exemplify the instantiation of the framework using HF, <xref rid="figure4" ref-type="fig">Figure 4</xref> shows an abstraction of the developed HFN. The consortium is composed of 4 organizations that represent minimum requirements to allow all stakeholders in the system to perform the required tasks.</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Organizations instantiated in the framework. DA: data auditors.</p>
          </caption>
          <graphic xlink:href="jmir_v22i12e20832_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>In our network, the 4 organizations that compose the consortium are data producer, data auditor, data consumer, and one data custodian. The members of the channel, channel user consent, have access to the ledger containing informed consent information. Before any new consent is given and stored into the blockchain, the data auditor member of the channel must agree and endorse the transaction containing the informed consent (as stated by the network policy in <xref rid="figure4" ref-type="fig">Figure 4</xref>). The data custodian, as a member of this channel, knows that the data auditor agreed to that consent if the transaction is valid and stored into the ledger. With the transaction validated, the data custodian is authorized to give access to its health care data to the data consumer as long as the data custodian respects the restrictions defined by a patient or SDM.</p>
        <p>The data auditor organization is also a member of a different channel of communication called channel data security. This channel will hold the members of the network responsible for ensuring that the data custodian has the proper consent from users to store their information on their servers. Finally, the communication broker represents an organization responsible for routing the communication between the end user and the communication channels.</p>
        <p>We used NodeJS SDK of HF to implement the chaincode responsible for verifying, adding, and querying informed consent of the patients and SDM states for members of the channel <italic>User Consent</italic>. The chaincode of the channel is defined by 2 contracts: contract one (C1) and contract two (C2). C1 is used to manage the informed consent state and to manage substitute decision maker states. C1 ensures that all fields of the informed consent transaction are present and valid. C1 checks for patient and research identification fields; the number of sensors; and, if for each type of sensor shared, the periods of consent are valid. C2 is responsible for managing SDM states from members of the <italic>User Consent</italic> channel. C2 checks for SDM and patient identification, start and end dates of the SDM validity, and the current status of the SDM-patient relationship. A code snippet implementation using NodeJS SDK of HF for C2 is presented below (<xref ref-type="boxed-text" rid="box2">Textbox 2</xref>).</p>
        <p>If all requirements are successful, then the organizations, after executing the chaincode, endorse the transaction and return the proposal result to the sender. After finishing the proposal process, the new informed consent status is added to the ledger.</p>
        <boxed-text id="box2" position="float">
          <title>Code snippet from the chaincode to add a new substitute decision maker.</title>
          <list list-type="order">
            <list-item>
              <p>/**</p>
            </list-item>
            <list-item>
              <p>@function addSDMState</p>
            </list-item>
            <list-item>
              <p>@param {*} ctx</p>
            </list-item>
            <list-item>
              <p>@param {*} patientID</p>
            </list-item>
            <list-item>
              <p>@param {*} SDMID</p>
            </list-item>
            <list-item>
              <p>@param {*} rlStatus</p>
            </list-item>
            <list-item>
              <p>@param {*} startDate</p>
            </list-item>
            <list-item>
              <p>@param {*} endDate</p>
            </list-item>
            <list-item>
              <p>*/</p>
            </list-item>
            <list-item>
              <p>async addSDMState(ctx, patientID, SDMID, rlStatus, startDate, endDate) {</p>
            </list-item>
            <list-item>
              <p>try {</p>
            </list-item>
            <list-item>
              <p>// Instantiate a new SDM state to be added to the ledger</p>
            </list-item>
            <list-item>
              <p>let substituteDecisionMakerState = SubstituteDecisionMakerState.createInstance(patientID, SDMID, rlStatus, startDate, endDate);</p>
            </list-item>
            <list-item>
              <p>if (substituteDecisionMakerState) {</p>
            </list-item>
            <list-item>
              <p>// add to the ledger</p>
            </list-item>
            <list-item>
              <p>const response = await ctx.substituteDecisionMakerStateList.addSDM(substituteDecisionMakerState);</p>
            </list-item>
            <list-item>
              <p>// return ledger response</p>
            </list-item>
            <list-item>
              <p>return response;</p>
            </list-item>
            <list-item>
              <p>} else {</p>
            </list-item>
            <list-item>
              <p>console.log(“Error at addSDMState”);</p>
            </list-item>
            <list-item>
              <p>return null;</p>
            </list-item>
            <list-item>
              <p>}</p>
            </list-item>
            <list-item>
              <p>}catch (error) {</p>
              <p>console.log(“Error at addSDMState”);</p>
            </list-item>
            <list-item>
              <p>}</p>
            </list-item>
            <list-item>
              <p>}</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Enhancing Consent Management</title>
        <p>Ensuring proper informed consent is a major concern for data collection and use [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. Our proposed solution facilitates health data sharing by different stakeholders while increasing transparency and trust. The biggest advantage of our solution is that it was developed based on a systematic process of identifying and mitigating the trust issues in the consent management process [<xref ref-type="bibr" rid="ref43">43</xref>]. The framework minimizes all trust issues indicated in <xref rid="figure1" ref-type="fig">Figure 1</xref> by providing a virtual space to manage consent, powered by blockchain to provide an immutable and timestamped log of user consent for data owners and collectors. Consequently, AAL care recipients and informal care assistants will have a much better understanding and control over what data they are sharing, with whom, for what purpose, in what manner, and for what time period. Furthermore, it will be easier for regulatory agencies to audit if AAL service providers or research or personal applications are using data for purposes other than what was originally consented to, as they will be able to access the log of consent of the blockchain.</p>
        <p>The US Food and Drug Administration (FDA) reported in an overview of clinical trial inspections from 1977 to 2009 that 28% of trials had deficiencies related to inadequate consent forms [<xref ref-type="bibr" rid="ref45">45</xref>]. In 2012, the FDA cited the main deficiencies related to consent, among others: the failure to obtain informed consent; use of expired, incomplete, or nonvalidated forms; failure to provide copies of the forms to study subjects; missing documents; and changes made to documents by hand and without the approval of ethics review boards [<xref ref-type="bibr" rid="ref22">22</xref>]. Our platform will provide a secure and immutable virtual space where all stakeholders—data owners, consumers, and regulators—will have complete transparency and surety of the entire process, making the process safer for all involved and ensuring that cases such as the trial of BIA 10-2474 will not happen again.</p>
        <p>In short, the proposed conceptual framework tries to generalize the process of consent management for all stakeholders in the health care domain, allowing a clearer understanding of possible interactions and functionalities of the consent management process and, ultimately, providing more transparency. As presented by Novitsky et al [<xref ref-type="bibr" rid="ref18">18</xref>], this was an important characteristic to help address inefficiencies in the process of consent management, especially for vulnerable populations.</p>
        <p>The framework also aims to take full advantage of the features of HF to allow for robust and complex control over the process of obtaining informed consent. Data auditors are an example of such goals, in which they can remove bad actor organizations from the network if they do not comply with the rules.</p>
      </sec>
      <sec>
        <title>Related Work</title>
        <p>Several companies explore consent management and blockchain. However, they differ significantly from our solution.</p>
        <p>Hu-manity.co, for example, developed a mobile app with IBM blockchain to help individuals manage consent for the use of their personal and health information. This app gives users a title for their digital data, declaring them as the user’s property [<xref ref-type="bibr" rid="ref75">75</xref>]. Unlike our proposed platform, this solution does not store the user consent information on the blockchain.</p>
        <p>Another company, Bitfury, is producing a blockchain-based consent management system for research and medical data. This solution is closer to what we are envisioning as a blockchain platform [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. The same is true for solutions in academia, such as the work of Benchoufi and Ravaud [<xref ref-type="bibr" rid="ref26">26</xref>] that use blockchain to provide a timestamped log of consent for clinical trials. We differentiate from these works not only by focusing on IoT and AAL, and outside clinical and research contexts, but also by providing a granular variable control for users, allowing them to manage consent for different data types and periods (eg, user 1 gives consent for the temperature to be collected but not their movement, between June and July).</p>
        <p>An interesting related solution is MedRec, developed by researchers at the Massachusetts Institute of Technology. Unlike previous works, this solution was not created to improve the consent management process but to minimize interoperability issues between electronic health records (EHRs) while providing a transparent view of a patient’s full medical history. MedRec uses smart contracts to encode metadata with references to medical data from multiple medical data sources, which includes information regarding ownership of the data. Patients permit data to be accessed and shared [<xref ref-type="bibr" rid="ref25">25</xref>]. In MedRec, consent management is not an explicit concern, but it appears as a form of access control for medical data. Although our solution considers access to data, as described in the sections below, we focus on consent management and improvement of trust relations in this process. In addition, MedRec deals with medical data stored in clinical systems and already collected, whereas our platform deals with real-time, patient-generated health data from sensors and AAL technologies deployed in the real world. Although our solution is distinct from solutions that deal with EHR interoperability, having proper informed consent is always a concern when dealing with personal data. Our proposed solution is a possible facilitator such that future health data sharing solutions do not need to develop tools to manage informed consent.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>The limitations of this work include the lack of implementation and real-world deployment of our proposed conceptual framework. Therefore, future work will focus on the development of a blockchain-enabled platform for consent management. Additional limitations include the fact that, for our architecture to be implemented at scale, the participation of federal and regional agencies is required to make up the participating nodes in the blockchain. In addition, data collectors will need to enroll in our platform and allow integration with the framework for the users to be able to give proper consent. Given that the platform will increase transparency and compliance with regulations for data collectors and owners alike, the stakeholders will benefit from engaging with such a platform, ensuring their participation. This means that the success of this platform depends upon the collaboration of several governments and industry partners interested in improving the current security and privacy issues.</p>
        <p>Another limitation of our work is that the current version of the framework is not prepared to share health care data between data custodians and consumers. The platform serves as a tool for obtaining, managing, and consulting informed consent and SDM information. Custodians can use the platform to ensure that a data consumer has collected proper informed consent from the owners of the health care data they are requesting. For future work, we intend to extend our conceptual framework to be capable of offering data brokerage between custodians and consumers.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>AAL technologies have the potential to completely revolutionize how older adults age, minimize risks, and increase independence [<xref ref-type="bibr" rid="ref17">17</xref>]. However, this must be considered alongside the privacy implications of monitoring technologies [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. Unfortunately, it is currently challenging for individuals to successfully manage their consent for data collection [<xref ref-type="bibr" rid="ref1">1</xref>]. Blockchain is a novel technology that provides immutability and decentralization, allowing increased transparency across processes [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. In this work, we modeled the trust issues existing in the consent management process of AAL technologies and proposed a conceptual framework based on blockchain to mitigate the identified trust issues. The proposed framework can be applied in different domains that deal with sensor data, such as drug supply chain [<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref80">80</xref>] and environmental surveillance [<xref ref-type="bibr" rid="ref1">1</xref>]. The instantiation of the platform is still in the early stages of development, but the first implementation of a fully functional application prototype has already been developed. The prototype allows researchers to request informed consent from AAL patients, and each new informed consent is wrapped into a transaction and sent into the HFN. Organizations validate and endorse the new transaction by using chaincode before it is added to the ledger. After the new block is added, participants of the network can query the ledger to check for informed consent validity before sharing patients’ AAL data. Finally, although our prototype is currently not open source, we hope that researchers will use our framework to create their own blockchain applications.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AAL</term>
          <def>
            <p>active assisted living</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">C1</term>
          <def>
            <p>contract one</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">C2</term>
          <def>
            <p>contract two</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DLT</term>
          <def>
            <p>distributed ledger technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">FDA</term>
          <def>
            <p>Food and Drug Administration</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">HF</term>
          <def>
            <p>hyperledger fabric</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">HFN</term>
          <def>
            <p>hyperledger fabric network</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">IoT</term>
          <def>
            <p>internet of things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">MSP</term>
          <def>
            <p>membership service provider</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">PIPEDA</term>
          <def>
            <p>Personal Information Protection and Electronic Documents Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">RESTful</term>
          <def>
            <p>representation state transfer</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">RPM</term>
          <def>
            <p>remote patient monitoring</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">SDK</term>
          <def>
            <p>software development kit</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb17">SDM</term>
          <def>
            <p>substitute decision maker</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This research was supported by the Canadian Standards Association Group and The Mathematics of Information Technology and Complex Systems.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>PV and PA wrote the manuscript and developed the framework. PM contributed to the conceptualization, design, and approach for the manuscript as well as to the interpretation of the argument made in the manuscript. All authors contributed to writing and revising the manuscript. All authors provided final approval of the manuscript. All authors agree to be accountable for the manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bublitz</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Oetomo</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sahu</surname>
              <given-names>KS</given-names>
            </name>
            <name name-style="western">
              <surname>Kuang</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fadrique</surname>
              <given-names>LX</given-names>
            </name>
            <name name-style="western">
              <surname>Velmovitsky</surname>
              <given-names>PE</given-names>
            </name>
            <name name-style="western">
              <surname>Nobrega</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>PP</given-names>
            </name>
          </person-group>
          <article-title>Disruptive technologies for environment and health research: an overview of artificial intelligence, blockchain, and internet of things</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2019</year>
          <month>10</month>
          <day>11</day>
          <volume>16</volume>
          <issue>20</issue>
          <fpage>3847</fpage>
          <pub-id pub-id-type="doi">10.3390/ijerph16203847</pub-id>
          <pub-id pub-id-type="medline">31614632</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Piwek</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ellis</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Andrews</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Joinson</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The rise of consumer health wearables: promises and barriers</article-title>
          <source>PLoS Med</source>
          <year>2016</year>
          <month>02</month>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>e1001953</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pmed.1001953"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pmed.1001953</pub-id>
          <pub-id pub-id-type="medline">26836780</pub-id>
          <pub-id pub-id-type="pii">PMEDICINE-D-15-00616</pub-id>
          <pub-id pub-id-type="pmcid">PMC4737495</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>How wearables intersect with the cloud and the internet of things : considerations for the developers of wearables</article-title>
          <source>IEEE Consumer Electron Mag</source>
          <year>2014</year>
          <month>7</month>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>53</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/mce.2014.2317895</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mohun</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Design for health</article-title>
          <source>Nurs Times</source>
          <year>1989</year>
          <month>05</month>
          <day>24</day>
          <volume>85</volume>
          <issue>21</issue>
          <fpage>16</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="medline">2734171</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <article-title>Life in the Fast Lane: How are Canadians managing?</article-title>
          <source>Satistics Canada</source>
          <year>2016</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www150.statcan.gc.ca/n1/daily-quotidien/171114/dq171114a-eng.htm">https://www150.statcan.gc.ca/n1/daily-quotidien/171114/dq171114a-eng.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Medeiros</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>[ 57% of the Brazilian population uses smartphones, says study]</article-title>
          <source>Exame</source>
          <year>2016</year>
          <access-date>2018-10-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://exame.com/tecnologia/57-da-populacao-brasileira-usa-smartphone-diz-estudo/">https://exame.com/tecnologia/57-da-populacao-brasileira-usa-smartphone-diz-estudo/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Smartphone penetration in Argentina</article-title>
          <source>Statista</source>
          <year>2020</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statista.com/statistics/621034/smartphone-user-penetration-in-argentina/">https://www.statista.com/statistics/621034/smartphone-user-penetration-in-argentina/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Silver</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jonhson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rainie</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Mobile Connectivity in Emerging Economies</article-title>
          <source>Pew Research Center</source>
          <year>2019</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/internet/2019/03/07/mobile-connectivity-in-emerging-economies/">https://www.pewresearch.org/internet/2019/03/07/mobile-connectivity-in-emerging-economies/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <article-title>Global smartwatch unit sales 2014-2018</article-title>
          <source>Statista</source>
          <year>2018</year>
          <access-date>2018-10-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statista.com/statistics/538237/global-smartwatch-unit-sales">https://www.statista.com/statistics/538237/global-smartwatch-unit-sales</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <article-title>Wearables - Canada</article-title>
          <source>Statista</source>
          <year>2020</year>
          <access-date>2018-12-13</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statista.com/outlook/319/108/wearables/canada">https://www.statista.com/outlook/319/108/wearables/canada</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Arriba-Pérez</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Caeiro-Rodríguez</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Santos-Gago</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Collection and processing of data from wrist wearable devices in heterogeneous and multiple-user scenarios</article-title>
          <source>Sensors (Basel)</source>
          <year>2016</year>
          <month>09</month>
          <day>21</day>
          <volume>16</volume>
          <issue>9</issue>
          <fpage>1538</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s16091538"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s16091538</pub-id>
          <pub-id pub-id-type="medline">27657081</pub-id>
          <pub-id pub-id-type="pii">s16091538</pub-id>
          <pub-id pub-id-type="pmcid">PMC5038811</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hovsepian</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>al'Absi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ertin</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kamarck</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Nakajima</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>cStress: towards a gold standard for continuous stress assessment in the mobile environment</article-title>
          <source>Proc ACM Int Conf Ubiquitous Comput</source>
          <year>2015</year>
          <month>09</month>
          <volume>2015</volume>
          <fpage>493</fpage>
          <lpage>504</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26543926"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2750858.2807526</pub-id>
          <pub-id pub-id-type="medline">26543926</pub-id>
          <pub-id pub-id-type="pmcid">PMC4631393</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>ecobee Launches ‘Donate Your Data,’ Connects Customers to Leading Energy Researchers to Address Climate Change</article-title>
          <source>Ecobee</source>
          <year>2016</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ecobee.com/en-ca/newsroom/press-releases/ecobee-launches-donate-your-data/">https://www.ecobee.com/en-ca/newsroom/press-releases/ecobee-launches-donate-your-data/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <source>Ecobee</source>
          <year>2020</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ecobee.com/smarthome/">https://www.ecobee.com/smarthome/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barrett</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Humblet</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Hiatt</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Adler</surname>
              <given-names>NE</given-names>
            </name>
          </person-group>
          <article-title>Big data and disease prevention: from quantified self to quantified communities</article-title>
          <source>Big Data</source>
          <year>2013</year>
          <month>09</month>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>168</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1089/big.2013.0027</pub-id>
          <pub-id pub-id-type="medline">27442198</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vijayalakshmi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jose</surname>
              <given-names>DV</given-names>
            </name>
          </person-group>
          <article-title>Internet of Things for Ambient-Assisted Living—An Overview</article-title>
          <source>Internet of Things Use Cases for the Healthcare Industry</source>
          <year>2020</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer International Publishing</publisher-name>
          <fpage>221</fpage>
          <lpage>39</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fadrique</surname>
              <given-names>LX</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>PP</given-names>
            </name>
          </person-group>
          <article-title>The Active Assisted Living Landscape in Canada</article-title>
          <source>CSA Group</source>
          <year>2018</year>
          <access-date>2020-05-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.csagroup.org/wp-content/uploads/CSA-Group-Research-AAL.pdf">https://www.csagroup.org/wp-content/uploads/CSA-Group-Research-AAL.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Novitzky</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Smeaton</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Irving</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jacquemard</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>O’Brolcháin</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>O’Mathúna</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gordijn</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A review of contemporary work on the ethics of ambient assisted living technologies for people with dementia</article-title>
          <source>Sci Eng Ethics</source>
          <year>2014</year>
          <month>6</month>
          <day>19</day>
          <volume>21</volume>
          <issue>3</issue>
          <fpage>707</fpage>
          <lpage>65</lpage>
          <pub-id pub-id-type="doi">10.1007/s11948-014-9552-x</pub-id>
          <pub-id pub-id-type="medline">24942810</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <article-title>Government of Canada — Action for Seniors report</article-title>
          <source>Government of Canada</source>
          <year>2014</year>
          <access-date>2019-02-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.canada.ca/en/employment-social-development/programs/seniors-action-report.html">https://www.canada.ca/en/employment-social-development/programs/seniors-action-report.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faiola</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Papautsky</surname>
              <given-names>EL</given-names>
            </name>
            <name name-style="western">
              <surname>Isola</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Empowering the aging with mobile health: a mHealth framework for supporting sustainable healthy lifestyle behavior</article-title>
          <source>Curr Probl Cardiol</source>
          <year>2019</year>
          <month>08</month>
          <volume>44</volume>
          <issue>8</issue>
          <fpage>232</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cpcardiol.2018.06.003</pub-id>
          <pub-id pub-id-type="medline">30185374</pub-id>
          <pub-id pub-id-type="pii">S0146-2806(18)30082-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
          <article-title>Important Facts about Falls &#124; Home and Recreational Safety</article-title>
          <source>CDC Injury Center</source>
          <year>2017</year>
          <access-date>2020-05-15</access-date>
          <publisher-name>CDC Injury Center</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cdc.gov/homeandrecreationalsafety/falls/adultfalls.html">https://www.cdc.gov/homeandrecreationalsafety/falls/adultfalls.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barney</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Antisdel</surname>
              <given-names>M.</given-names>
            </name>
          </person-group>
          <article-title>Common Problems in Informed Consent</article-title>
          <source>Yale University</source>
          <year>2013</year>
          <access-date>2020-05-31</access-date>
          <publisher-name>Yale</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://your.yale.edu/policies-procedures/other/common-problems-informed-consent">https://your.yale.edu/policies-procedures/other/common-problems-informed-consent</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O’Connor</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Rowan</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Lynch</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Heavin</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Privacy by design: informed consent and internet of things for smart health</article-title>
          <source>Procedia Comput Sci</source>
          <year>2017</year>
          <volume>113</volume>
          <fpage>653</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2017.08.329</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Informed consent in clinical research: revisiting few concepts and areas</article-title>
          <source>Perspect Clin Res</source>
          <year>2013</year>
          <month>01</month>
          <volume>4</volume>
          <issue>1</issue>
          <fpage>26</fpage>
          <lpage>32</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.picronline.org/article.asp?issn=2229-3485;year=2013;volume=4;issue=1;spage=26;epage=32;aulast=Gupta"/>
          </comment>
          <pub-id pub-id-type="doi">10.4103/2229-3485.106373</pub-id>
          <pub-id pub-id-type="medline">23533976</pub-id>
          <pub-id pub-id-type="pii">PCR-4-26</pub-id>
          <pub-id pub-id-type="pmcid">PMC3601699</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ekblaw</surname>
              <given-names>MC</given-names>
            </name>
          </person-group>
          <article-title>Medrec: Blockchain for Medical Data Access, Permission Management and Trend Analysis Signature redacted Signature</article-title>
          <source>Massachusetts Institute of Technology</source>
          <year>2017</year>
          <access-date>2020-05-31</access-date>
          <publisher-name>MIT</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.media.mit.edu/publications/medrec-blockchain-for-medical-data-access-permission-management-and-trend-analysis/">https://www.media.mit.edu/publications/medrec-blockchain-for-medical-data-access-permission-management-and-trend-analysis/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benchoufi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ravaud</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology for improving clinical research quality</article-title>
          <source>Trials</source>
          <year>2017</year>
          <month>7</month>
          <day>19</day>
          <access-date>2020-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-017-2035-z">https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-017-2035-z</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Knifed</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lipsman</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mason</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Bernstein</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Patients' perception of the informed consent process for neurooncology clinical trials</article-title>
          <source>Neuro Oncol</source>
          <year>2008</year>
          <month>06</month>
          <volume>10</volume>
          <issue>3</issue>
          <fpage>348</fpage>
          <lpage>54</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/18388256"/>
          </comment>
          <pub-id pub-id-type="doi">10.1215/15228517-2008-007</pub-id>
          <pub-id pub-id-type="medline">18388256</pub-id>
          <pub-id pub-id-type="pii">15228517-2008-007</pub-id>
          <pub-id pub-id-type="pmcid">PMC2563057</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Informed consent in evaluation: informed of what, exactly?</article-title>
          <source>LCJ</source>
          <year>2014</year>
          <month>09</month>
          <day>01</day>
          <volume>14</volume>
          <fpage>180</fpage>
          <lpage>203</lpage>
          <pub-id pub-id-type="doi">10.18793/lcj2014.14.13</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heyland</surname>
              <given-names>DK</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Rocker</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Dodek</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Kutsogiannis</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tranmer</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>O'Callaghan</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>Decision-making in the ICU: perspectives of the substitute decision-maker</article-title>
          <source>Intensive Care Med</source>
          <year>2003</year>
          <month>01</month>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>82</lpage>
          <pub-id pub-id-type="doi">10.1007/s00134-002-1569-y</pub-id>
          <pub-id pub-id-type="medline">12528026</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mainetti</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Patrono</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Secco</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sergi</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>An IoT-aware AAL system for elderly people</article-title>
          <year>2016</year>
          <conf-name>International Multidisciplinary Conference on Computer and Energy Science (SpliTech)</conf-name>
          <conf-date>2016</conf-date>
          <conf-loc>Split, Croatia</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/splitech.2016.7555929</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Almeida</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Mulero</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rametta</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Urošević</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Andrić</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Patrono</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A critical analysis of an IoT—aware AAL system for elderly monitoring</article-title>
          <source>Future Gener Comput Syst</source>
          <year>2019</year>
          <month>08</month>
          <volume>97</volume>
          <fpage>598</fpage>
          <lpage>619</lpage>
          <pub-id pub-id-type="doi">10.1016/j.future.2019.03.019</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pineda</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Urban</surname>
              <given-names>MC</given-names>
            </name>
          </person-group>
          <article-title>Inside the Black Blocks</article-title>
          <source>Mowat Centre</source>
          <year>2018</year>
          <access-date>2020-05-20</access-date>
          <publisher-name>Mowat Centre</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://munkschool.utoronto.ca/mowatcentre/inside-the-black-blocks/">https://munkschool.utoronto.ca/mowatcentre/inside-the-black-blocks/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Mukkamala</surname>
              <given-names>RR</given-names>
            </name>
            <name name-style="western">
              <surname>Vatrapu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ordieres-Mere</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based personal health data sharing system using cloud storage</article-title>
          <source>IEEE</source>
          <year>2018</year>
          <conf-name>2018 IEEE 20th International Conference on e-Health Networking, Applications and Services, Healthcom</conf-name>
          <conf-date>2018</conf-date>
          <conf-loc>Czech Republic</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <pub-id pub-id-type="doi">10.1109/healthcom.2018.8531125</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guegan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Public Blockchain versus Private blockhain</article-title>
          <source>HAL archives</source>
          <year>2017</year>
          <access-date>2020-05-31</access-date>
          <publisher-loc>France</publisher-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://halshs.archives-ouvertes.fr/halshs-01524440/document">https://halshs.archives-ouvertes.fr/halshs-01524440/document</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>CS</given-names>
            </name>
          </person-group>
          <article-title>Bitcoin: a peer-to-peer electronic cash system</article-title>
          <source>SSRN J</source>
          <year>2008</year>
          <fpage>9</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3440802"/>
          </comment>
          <pub-id pub-id-type="doi">10.2139/ssrn.3440802</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agbo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mahmoud</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Eklund</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology in healthcare: a systematic review</article-title>
          <source>Healthcare (Basel)</source>
          <year>2019</year>
          <month>04</month>
          <day>04</day>
          <volume>7</volume>
          <issue>2</issue>
          <fpage>56</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=healthcare7020056"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/healthcare7020056</pub-id>
          <pub-id pub-id-type="medline">30987333</pub-id>
          <pub-id pub-id-type="pii">healthcare7020056</pub-id>
          <pub-id pub-id-type="pmcid">PMC6627742</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dai</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends</article-title>
          <year>2017</year>
          <conf-name>Proceedings of the 2017 IEEE 6th International Congress on Big Data</conf-name>
          <conf-date>2017</conf-date>
          <conf-loc>Honolulu</conf-loc>
          <fpage>557</fpage>
          <lpage>564</lpage>
          <pub-id pub-id-type="doi">10.1109/bigdatacongress.2017.85</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Androulaki</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Barger</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bortnikov</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Cachin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Christidis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>de Caro</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Enyeart</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ferris</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Laventman</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Manevich</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Muralidharan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Murthy</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sethi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sorniotti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stathakopoulou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vukolić</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cocco</surname>
              <given-names>S.W.</given-names>
            </name>
            <name name-style="western">
              <surname>Yellick</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Hyperledger fabric: a distributed operating system for permissioned blockchains</article-title>
          <source>Proceedings of the Thirteenth EuroSys Conference</source>
          <year>2018</year>
          <conf-name>EuroSys '18</conf-name>
          <conf-date>2018</conf-date>
          <conf-loc>Portugal</conf-loc>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1145/3190508.3190538</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bahga</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Madisetti</surname>
              <given-names>VK</given-names>
            </name>
          </person-group>
          <article-title>Blockchain platform for industrial internet of things</article-title>
          <source>J Softw Eng Appl</source>
          <year>2016</year>
          <volume>09</volume>
          <issue>10</issue>
          <fpage>533</fpage>
          <lpage>46</lpage>
          <pub-id pub-id-type="doi">10.4236/jsea.2016.910036</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Underwood</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain beyond bitcoin</article-title>
          <source>Commun ACM</source>
          <year>2016</year>
          <month>10</month>
          <day>28</day>
          <volume>59</volume>
          <issue>11</issue>
          <fpage>15</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1145/2994581</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nakamoto</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System</article-title>
          <source>Bitcoin</source>
          <year>2008</year>
          <access-date>2020-05-31</access-date>
          <publisher-name>Bitcoin</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>An overview of blockchain security analysis</article-title>
          <source>Cyber Security</source>
          <year>2019</year>
          <fpage>55</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1007/978-981-13-6621-5_5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gorenflo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Golab</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Keshav</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Mitigating trust issues in electric vehicle charging using a blockchain</article-title>
          <source>Proceedings of the Tenth ACM International Conference on Future Energy Systems</source>
          <year>2019</year>
          <conf-name>e-Energy '19</conf-name>
          <conf-date>2019</conf-date>
          <conf-loc>USA</conf-loc>
          <fpage>160</fpage>
          <lpage>164</lpage>
          <pub-id pub-id-type="doi">10.1145/3307772.3328283</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <article-title>IEC - SyC AAL: Active Assisted Living</article-title>
          <source>International Electrotechnical Comission</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iec.ch/dyn/www/f?p=103:214:0::::FSP_ORG_ID,FSP_LANG_ID:11827,25">https://www.iec.ch/dyn/www/f?p=103:214:0::::FSP_ORG_ID,FSP_LANG_ID:11827,25</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morgan-Linnell</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kurzrock</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>US Food and Drug Administration inspections of clinical investigators: overview of results from 1977 to 2009</article-title>
          <source>Clin Cancer Res</source>
          <year>2014</year>
          <month>07</month>
          <day>01</day>
          <volume>20</volume>
          <issue>13</issue>
          <fpage>3364</fpage>
          <lpage>70</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://clincancerres.aacrjournals.org/cgi/pmidlookup?view=long&#38;pmid=24737548"/>
          </comment>
          <pub-id pub-id-type="doi">10.1158/1078-0432.CCR-13-3206</pub-id>
          <pub-id pub-id-type="medline">24737548</pub-id>
          <pub-id pub-id-type="pii">1078-0432.CCR-13-3206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <article-title>Statement by Marisol Touraine-Press conference-Clinical trial accident-progress report</article-title>
          <source>Ministry of Solidarity and Health</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://solidarites-sante.gouv.fr/archives/archives-presse/archives-discours/article/intervention-de-marisol-touraine-conference-de-presse-accident-d-essai-clinique">https://solidarites-sante.gouv.fr/archives/archives-presse/archives-discours/article/intervention-de-marisol-touraine-conference-de-presse-accident-d-essai-clinique</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <article-title>Blockchain and GDPR: How blockchain could address five areas associated with GDPR compliance</article-title>
          <source>IBM</source>
          <year>2018</year>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iapp.org/resources/article/blockchain-and-gdpr/">https://iapp.org/resources/article/blockchain-and-gdpr/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <article-title>Hyperledger Fabric</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-23</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hyperledger.org/use/fabric">https://www.hyperledger.org/use/fabric</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <article-title>Introduction</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-23</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/release-1.2/whatis.html">https://hyperledger-fabric.readthedocs.io/en/release-1.2/whatis.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <article-title>Hyperledger Fabric Network</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/release-1.2/network/network.html#defining-a-consortium">https://hyperledger-fabric.readthedocs.io/en/release-1.2/network/network.html#defining-a-consortium</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <article-title>Glossary</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/glossary.html?highlight=organization#organization">https://hyperledger-fabric.readthedocs.io/en/latest/glossary.html?highlight=organization#organization</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <article-title>Peers</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/peers/peers.html">https://hyperledger-fabric.readthedocs.io/en/latest/peers/peers.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="web">
          <article-title>The Ordering Service</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/orderer/ordering_service.html?highlight=orderer">https://hyperledger-fabric.readthedocs.io/en/latest/orderer/ordering_service.html?highlight=orderer</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <article-title>Membership Service Provider (MSP)</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/membership/membership.html">https://hyperledger-fabric.readthedocs.io/en/latest/membership/membership.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <article-title>Ledger</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/ledger/ledger.html?highlight=world">https://hyperledger-fabric.readthedocs.io/en/latest/ledger/ledger.html?highlight=world</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="web">
          <article-title>Chaincode for Developers</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/release-1.4/chaincode4ade.html">https://hyperledger-fabric.readthedocs.io/en/release-1.4/chaincode4ade.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <article-title>Ethereum Whitepaper</article-title>
          <source>Ethereum</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ethereum.org/whitepaper/">https://ethereum.org/whitepaper/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bocek</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Rodrigues</surname>
              <given-names>BB</given-names>
            </name>
            <name name-style="western">
              <surname>Strasser</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Stiller</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Blockchains everywhere - A use-case of blockchains in the pharma supply-chain</article-title>
          <source>Proceedings of the IM 2017 - 2017 IFIP</source>
          <year>2017</year>
          <conf-name>IEEE International Symposium on Integrated Network and Service Management</conf-name>
          <conf-date>2017</conf-date>
          <conf-loc>Portugal</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dl.ifip.org/db/conf/im/im2017exp/119.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.23919/inm.2017.7987376</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>IBM Blockchain Platform</article-title>
          <source>IBM</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ibm.com/blockchain/platform">https://www.ibm.com/blockchain/platform</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Greenspan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>MultiChain Private Blockchain-White Paper</article-title>
          <source>MultiChain</source>
          <year>2015</year>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.multichain.com/download/MultiChain-White-Paper.pdf">https://www.multichain.com/download/MultiChain-White-Paper.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="web">
          <article-title>HydraChain</article-title>
          <source>GitHub</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/HydraChain/hydrachain/blob/develop/hc_consensus_explained.md">https://github.com/HydraChain/hydrachain/blob/develop/hc_consensus_explained.md</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mcconaghy</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Marques</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Muller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>De Jonghe</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>McConaghy</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>McMullen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Henderson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bellemare</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Granzotto</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>BigchainDB: A Scalable Blockchain Database - White Paper</article-title>
          <source>MyCourses</source>
          <year>2016</year>
          <access-date>2020-05-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mycourses.aalto.fi/pluginfile.php/378362/mod_resource/content/1/bigchaindb-whitepaper.pdf">https://mycourses.aalto.fi/pluginfile.php/378362/mod_resource/content/1/bigchaindb-whitepaper.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="web">
          <article-title>Blockchain network</article-title>
          <source>Hyperledger</source>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hyperledger-fabric.readthedocs.io/en/latest/network/network.html">https://hyperledger-fabric.readthedocs.io/en/latest/network/network.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>PP</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Sethumadhavan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sasangohar</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Chapter 5 - Design of mobile health technology</article-title>
          <source>Design for Health</source>
          <year>2020</year>
          <publisher-loc>United States</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
          <fpage>87</fpage>
          <lpage>102</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goyal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>GF</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Seto</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>The systematic design of a behavioural mobile health application for the self-management of type 2 diabetes</article-title>
          <source>Can J Diabetes</source>
          <year>2016</year>
          <month>02</month>
          <volume>40</volume>
          <issue>1</issue>
          <fpage>95</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jcjd.2015.06.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>PP</given-names>
            </name>
            <name name-style="western">
              <surname>Yeung</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrone</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Taite</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Madeley</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens Lavigne</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>To</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lougheed</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Day</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Licskai</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A patient-centered mobile health system that supports asthma self-management (breathe): design, development, and utilization</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>01</month>
          <day>28</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>e10956</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/1/e10956/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10956</pub-id>
          <pub-id pub-id-type="medline">30688654</pub-id>
          <pub-id pub-id-type="pii">v7i1e10956</pub-id>
          <pub-id pub-id-type="pmcid">PMC6369424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sultan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kuluski</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>McIsaac</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Seto</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Turning challenges into design principles: telemonitoring systems for patients with multiple chronic conditions</article-title>
          <source>Health Informatics J</source>
          <year>2019</year>
          <month>12</month>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>1188</fpage>
          <lpage>1200</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1460458217749882?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458217749882</pub-id>
          <pub-id pub-id-type="medline">29320911</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omran</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Henke</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Heines</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hofmann</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-driven supply chain finance: towards a conceptual framework from a buyer perspective</article-title>
          <source>International Purchasing and Supply Education and Research Association 2017</source>
          <year>2017</year>
          <conf-name>IPSERA 2017</conf-name>
          <conf-date>2017</conf-date>
          <conf-loc>Budapest</conf-loc>
          <fpage>15</fpage>
          <lpage>15</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carney</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Çetintemel</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Cherniack</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Convey</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Seidman</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Stonebraker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Tatbul</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Zdonik</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Monitoring streams: a new class of data management applications</article-title>
          <source>Proceedings of the 28th international conference on Very Large Data Bases</source>
          <year>2002</year>
          <conf-name>VLDB '02</conf-name>
          <conf-date>2002</conf-date>
          <conf-loc>China</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fingberg</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Krasemann</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Iacono</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Probst</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Integrating data custodians in ehealth grids - A digest of security and privacy aspects Digest of Security and Privacy Aspects</article-title>
          <source>Informatik 2006</source>
          <year>2006</year>
          <conf-name>Informatik 2006</conf-name>
          <conf-date>2006</conf-date>
          <conf-loc>Germany</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.gi.de/handle/20.500.12116/23643;jsessionid=3A72C9E5E5E1AE8B8538EB526381958D"/>
          </comment>
          <pub-id pub-id-type="doi">10.1201/9780203486061.ch23</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xia</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Sifah</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>Asamoah</surname>
              <given-names>KO</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Du</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Guizani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>MeDShare: trust-less medical data sharing among cloud service providers via blockchain</article-title>
          <source>IEEE Access</source>
          <year>2017</year>
          <volume>5</volume>
          <fpage>14757</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2017.2730843</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ongaro</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ousterhout</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>In search of an understandable consensus algorithm</article-title>
          <source>Proceedings of USENIX ATC ’14</source>
          <year>2014</year>
          <conf-name>2014 USENIX Annual Technical Conference</conf-name>
          <conf-date>2014</conf-date>
          <conf-loc>USA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="web">
          <article-title>Fabric SDK for node.js</article-title>
          <source>Hyperledger</source>
          <year>2018</year>
          <access-date>2020-05-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://fabric-sdk-node.github.io/index.html">https://fabric-sdk-node.github.io/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="web">
          <article-title>Substitute Decision Makers and Naming a Power of Attorney for Personal Care</article-title>
          <source>University Health Network</source>
          <year>2018</year>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.uhn.ca/PatientsFamilies/Health_Information/Health_Topics/Documents/Substitute_Decision_Maker_and_Naming_an_Attorney_for_Personal_Care.pdf">https://www.uhn.ca/PatientsFamilies/Health_Information/Health_Topics/Documents/Substitute_Decision_Maker_and_Naming_an_Attorney_for_Personal_Care.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Takahashi</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Hu-manity.co uses IBM blockchain to give you the right to control your personal data</article-title>
          <source>VentureBeat</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://venturebeat.com/2018/09/06/hu-manity-co-uses-ibm-blockchain-to-give-you-the-right-to-control-your-personal-data/">https://venturebeat.com/2018/09/06/hu-manity-co-uses-ibm-blockchain-to-give-you-the-right-to-control-your-personal-data/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alexandre</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>New Bitfury Joint Project to Manage Medical Data Permissions With Blockchain Tech</article-title>
          <source>Cointelegraph</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cointelegraph.com/news/new-bitfury-joint-project-to-manage-medical-data-permissions-with-blockchain-tech">https://cointelegraph.com/news/new-bitfury-joint-project-to-manage-medical-data-permissions-with-blockchain-tech</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
          <article-title>Bitfury announces blockchain-based consent management system; partners with Hancom to distribute Crystal platform</article-title>
          <source>Tokenpost</source>
          <access-date>2020-05-31</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tokenpost.com/Bitfury-announces-blockchain-based-consent-management-system-partners-with-Hancom-to-distribute-Crystal-platform-1603">https://tokenpost.com/Bitfury-announces-blockchain-based-consent-management-system-partners-with-Hancom-to-distribute-Crystal-platform-1603</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zanghi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Do Coutto Filho</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Stacchini de Souza</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>Conceptual framework for blockchain-based metering systems</article-title>
          <source>Multiagent Grit Syst</source>
          <year>2019</year>
          <month>03</month>
          <day>25</day>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>77</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.3233/mgs-190303</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="web">
          <article-title>Building blockchains for a better planet</article-title>
          <source>PwC</source>
          <year>2018</year>
          <access-date>2020-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pwc.com/gx/en/services/sustainability/building-blockchains-for-the-earth.html">https://www.pwc.com/gx/en/services/sustainability/building-blockchains-for-the-earth.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Siwicki</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The next big thing in pharmacy supply chain: Blockchain</article-title>
          <source>Healthcare IT News</source>
          <access-date>2018-10-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthcareitnews.com/news/next-big-thing-pharmacy-supply-chain-blockchain">https://www.healthcareitnews.com/news/next-big-thing-pharmacy-supply-chain-blockchain</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
