<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i11e24460</article-id>
      <article-id pub-id-type="pmid">34779788</article-id>
      <article-id pub-id-type="doi">10.2196/24460</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kondylakis</surname>
            <given-names>Haridimos</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Friedrich</surname>
            <given-names>Christoph</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Fitte</surname>
            <given-names>Christian</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Teuteberg</surname>
            <given-names>Frank</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Abdullahi Yari</surname>
            <given-names>Imrana</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Artificial Intelligence in Biomedical Engineering, Machine Learning and Data Analytics Lab</institution>
            <institution>Friedrich-Alexander University Erlangen-Nuremberg</institution>
            <addr-line>Carl-Thiersch-Straße 2b</addr-line>
            <addr-line>Erlangen, 91052</addr-line>
            <country>Germany</country>
            <phone>49 9131 85 20288</phone>
            <email>imrana.yari.abdullahi@fau.de</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4386-9382</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Dehling</surname>
            <given-names>Tobias</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3445-3003</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Kluge</surname>
            <given-names>Felix</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4921-6104</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Geck</surname>
            <given-names>Juergen</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8198-1992</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Sunyaev</surname>
            <given-names>Ali</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4353-8519</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Eskofier</surname>
            <given-names>Bjoern</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0417-0336</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Artificial Intelligence in Biomedical Engineering, Machine Learning and Data Analytics Lab</institution>
        <institution>Friedrich-Alexander University Erlangen-Nuremberg</institution>
        <addr-line>Erlangen</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Institute of Applied Informatics and Formal Description Methods</institution>
        <institution>Karlsruhe Institute of Technology</institution>
        <addr-line>Karlsruhe</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>KASTEL Security Research Labs</institution>
        <addr-line>Karlsruhe</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>REFINIO GmbH</institution>
        <addr-line>Rohr</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Imrana Abdullahi Yari <email>imrana.yari.abdullahi@fau.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>15</day>
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>11</issue>
      <elocation-id>e24460</elocation-id>
      <history>
        <date date-type="received">
          <day>21</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>26</day>
          <month>11</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>20</day>
          <month>5</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>2</day>
          <month>8</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Imrana Abdullahi Yari, Tobias Dehling, Felix Kluge, Juergen Geck, Ali Sunyaev, Bjoern Eskofier. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 15.11.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/11/e24460" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients’ intention to use PHSs on P2P networks by making them safe to use.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>patient-centered</kwd>
        <kwd>health care</kwd>
        <kwd>information infrastructures</kwd>
        <kwd>decentralization</kwd>
        <kwd>mobile health</kwd>
        <kwd>peer-to-peer</kwd>
        <kwd>COVID-19 proximity trackers</kwd>
        <kwd>edge computing</kwd>
        <kwd>security</kwd>
        <kwd>vulnerabilities</kwd>
        <kwd>attacks</kwd>
        <kwd>threats</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Motivation</title>
        <p>Patients require access to their health information with the same ease as with other web-based activities such as banking or shopping; however, patients are often only one part of the current health care processes and not the focus of attention [<xref ref-type="bibr" rid="ref1">1</xref>]. Such limitations of traditional health care processes, widespread individual adoption of digital systems, and advancements in health care practice create a growing demand for patient-centered health care information systems (PHSs). PHSs are scalable information systems that leverage information technology to support patients in managing and taking an active role in their own health [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. PHSs are not designed to replace traditional health care information systems, such as electronic health records, but rather to complement them [<xref ref-type="bibr" rid="ref3">3</xref>] by offering additional functionalities, such as translation of clinical information into layman’s terms [<xref ref-type="bibr" rid="ref4">4</xref>], provision of information on medications a patient is taking [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref5">5</xref>], or provision of vetted information to support self-administered interventions (eg, reduce weight or quit smoking) [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        <p>The diversity and flexibility of PHSs enable them to provide any functionality that patients find helpful [<xref ref-type="bibr" rid="ref2">2</xref>], including maintaining personal health records (PHRs) [<xref ref-type="bibr" rid="ref6">6</xref>], tracking mental wellness [<xref ref-type="bibr" rid="ref7">7</xref>], subscribing to risk prediction services for chronic diseases [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref8">8</xref>], and calculating pregnancy due dates [<xref ref-type="bibr" rid="ref9">9</xref>]. Patients are willing to use PHSs, as revealed in a survey of 800 American patients in which 80% of the patients preferred a patient-centered approach as they felt excluded in the management of their data [<xref ref-type="bibr" rid="ref10">10</xref>]. With PHSs, patients can access their health information and share it with other stakeholders to co-ordinate their care [<xref ref-type="bibr" rid="ref1">1</xref>]. Practitioners can make better clinical decisions based on instantaneous access to data in PHSs [<xref ref-type="bibr" rid="ref11">11</xref>]. In patient-centered health care environments, the value for patients is increased, health care transaction costs are decreased, patients manage interactions through the appropriate release of their own data, and all health care stakeholders will be encouraged to collaborate with patients and other stakeholders to achieve their goals [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>Technically, PHSs can be deployed using centralized databases (eg, Health Bank [<xref ref-type="bibr" rid="ref12">12</xref>], Microsoft HealthVault [<xref ref-type="bibr" rid="ref3">3</xref>], and PittPHR [<xref ref-type="bibr" rid="ref13">13</xref>]), distributed ledger technology (DLT; eg, Mint Health [<xref ref-type="bibr" rid="ref14">14</xref>] and Medicalchain [<xref ref-type="bibr" rid="ref11">11</xref>]), and more flexible peer-to-peer (P2P) technology (eg, OnePatient [<xref ref-type="bibr" rid="ref15">15</xref>] and doc.ai [<xref ref-type="bibr" rid="ref7">7</xref>]).</p>
        <p>The detrimental effects of centralized health information technology solutions controlled by economic actors are well-known [<xref ref-type="bibr" rid="ref16">16</xref>], for example, reluctance to innovate or the creation of data silos [<xref ref-type="bibr" rid="ref16">16</xref>]. DLT-based PHSs, such as MedRec, which is under development at the Massachusetts Institute of Technology [<xref ref-type="bibr" rid="ref17">17</xref>], are currently spurring the P2P and decentralization push in the health care domain. However, DLT is a specialized P2P technology that does not align well with the needs of the health care sector and the sensitivity of health information. For instance, DLT systems consume excessive computation and communication resources by requiring redundant computations to ensure a consistent state of the ledger across the network, which makes the logged transactions available to all nodes participating in the network, and they have slow processing speeds because multiple parties have to independently verify transactions and arrive at an agreement [<xref ref-type="bibr" rid="ref18">18</xref>]. The mismatch between DLT and the needs of the health care sector has a simple cause: DLT was primarily designed as a backbone for cryptocurrencies that require one global consistent record of transactions and can thrive even in environments where trusted counterparties do not exist and might even be malicious [<xref ref-type="bibr" rid="ref19">19</xref>]. Accordingly, DLT is a P2P technology that is too rigid for the health care context, where it is sufficient for all parties involved in the care of a patient to have a consistent view of a patient’s health status and existing trust relationships between parties (eg, the patient-physician relationship) can be leveraged. In this study, we take an information security perspective and contribute to the emergence of PHSs that come with the benefits promised by DLT PHSs, such as decentralization, patient empowerment, and interoperable health systems [<xref ref-type="bibr" rid="ref18">18</xref>], but are implemented based on less rigid and more flexible P2P technology. We refer to such systems as P2P PHSs.</p>
        <p>P2P PHS architectures can be based on hybrid P2P networks (eg, P2HR [<xref ref-type="bibr" rid="ref20">20</xref>]), approaches that combine centralized and P2P architectures (eg, P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>] or the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>]), and highly decentralized networks (eg, P2P-integrating health care enterprise [P2P IHE; 22]). Other examples of P2P PHSs, which are disease-centric, are decentralized systems for Bluetooth-based SARS-CoV-2 (or COVID-19) contact tracing, for example, Pan-European Privacy-Preserving-Proximity-Tracing (PEPP-PT) in Europe [<xref ref-type="bibr" rid="ref22">22</xref>], Trace-Together in Singapore [<xref ref-type="bibr" rid="ref23">23</xref>], and Stoop in Austria [<xref ref-type="bibr" rid="ref24">24</xref>], which are used to notify people when they are near SARS-CoV-2 carriers.</p>
        <p>In P2P PHSs, the trust and identity of individual participants do not need to be assured through technology. P2P PHSs provide PHS functionalities locally (on any patient edge device such as mobile phones, tablets, etc) under the sovereignty of individual device owners. Patients can make their health information directly available to other participants they trust without the need for any centralized or distributed nodes to facilitate the transactions. However, P2P PHSs have unique security issues because patients must manage information security for their health information largely by themselves, and even qualified professional administrators are already challenged by the task [<xref ref-type="bibr" rid="ref25">25</xref>]. The absence of a central entity to act as a trusted computing base on P2P networks [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>] has profound adverse consequences in terms of security that need to be addressed to reap the benefits that P2P PHSs promise to offer.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>P2P PHSs raise challenging information security–related questions: How can reliable data backups be implemented? If credentials are lost or compromised, how can they be replaced or blocked? How well is the system protected against unauthorized access? P2P PHSs that are not DLT-based (eg, OnePatient [<xref ref-type="bibr" rid="ref15">15</xref>] and P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>]) are an emerging phenomenon that will become more relevant in the future as they are aligned well with large-scale efforts to re-decentralize the internet (eg, the Solid project by Tim Berners-Lee [<xref ref-type="bibr" rid="ref27">27</xref>]) and support patients in taking ownership of their health data [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Although P2P PHSs have been under development for over a decade [<xref ref-type="bibr" rid="ref21">21</xref>], the dedicated literature on P2P PHSs is sparse. To date, previous studies have focused on security, privacy, and end-user features on centralized and DLT-based PHSs [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref31">31</xref>] and did not address security engineering specifically for P2P PHSs, which comes with its own challenges due to a different underlying architecture. To address this gap, this study focuses on security engineering for P2P PHSs based on a systematic literature review. We aim to answer the following research question:</p>
        <p>Research question: What are the inherent security issues for PHS deployment on P2P networks and how can they be overcome?</p>
        <p>Security issues are defined as any action that could be used to disrupt the functionality of the P2P network or enable unauthorized users to access, modify, or delete user data [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>], specifically, due to threats or vulnerabilities, such as malware, bugs, access control failures, or patients' inadvertent exposure of their data. To answer the research question, we aim to review existing P2P and P2P PHS architectures and their design choices, study existing PHS features, and propose a suitable architecture for PHS deployment on P2P networks. Thereafter, we aim to highlight the causes and consequences of existing security issues in P2P PHSs and evaluate them based on the identified P2P PHSs in the literature. On the basis of these P2P PHS architectures, we propose security measures for secure provision. To overcome the challenges on the path to P2P PHSs, secure safeguards must be put in place to ensure that information is securely transmitted and protected against cyberattacks [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Information security is essential for P2P PHSs and will, if appropriately implemented and addressed, increase patients' intention to use P2P PHSs [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref30">30</xref>].</p>
      </sec>
      <sec>
        <title>Theoretical Background</title>
        <sec>
          <title>P2P PHSs and the Need for Information Security</title>
          <p>P2P technology for the provision of PHSs can be flexible and inexpensive for users because it uses available devices at the user’s end for deployment. The characteristics of P2P systems, such as fault tolerance, security and trust, scalability, availability, self-reconfiguration, and extensibility [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], facilitate and suit the provision of PHSs. With millions of users worldwide, P2P systems have shown strength in providing services for sharing resources without the need for a central server, for streaming multimedia content with distributed load balancing, for volunteering of computing resources, and for telephony applications. P2P PHSs, such as OnePatient [<xref ref-type="bibr" rid="ref15">15</xref>] and P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>], leverage the power of P2P networks and mobile technology to store health records locally under the control of device owners, thereby increasing patient empowerment and control and simplifying the implementation of data protection principles [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. P2P systems have better scalability because operations can be executed locally and customized for different purposes. Patients can easily manage access to their health records by using a single-hop connection (eg, Wi-Fi Direct) with other trusted parties (eg, a physician) without requiring a wireless access point or another intermediary communication network.</p>
          <p>Factors that impact the security of centralized PHSs are the database size, the large number of potentially affected users, and the confidentiality of the stored data. The health care sector experiences more data breaches than any other sector [<xref ref-type="bibr" rid="ref39">39</xref>]. A breach barometer in the United States reported 503 breaches for health data in 2018, affecting over 15 million patients [<xref ref-type="bibr" rid="ref40">40</xref>]. Similarly, the almost immutable nature of data storage in blockchains makes it nearly impossible for users to erase their stored (metadata) information, which conflicts with the European General Data Protection Regulation (GDPR) [<xref ref-type="bibr" rid="ref41">41</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> outlines the main advantages and disadvantages of P2P PHSs.</p>
          <p>For patients to benefit from the advantages of P2P PHSs, the network needs to be robust and fault-tolerant. Information security is paramount because of the high sensitivity of medical data [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Therefore, a pertinent question is how to make P2P PHSs resilient to attacks. P2P systems communicate over the internet; therefore, they inherit the same security issues as any other networked application on the internet. The P2P architecture poses significant security issues such as index poisoning attacks [<xref ref-type="bibr" rid="ref43">43</xref>], Sybil attacks [<xref ref-type="bibr" rid="ref44">44</xref>], chatty peer attacks [<xref ref-type="bibr" rid="ref45">45</xref>], or distributed denial-of-service (DDoS) attacks [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Security advantages and disadvantages of peer-to-peer patient-centered health care information systems (P2P PHSs).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="180"/>
              <col width="400"/>
              <col width="420"/>
              <thead>
                <tr valign="top">
                  <td>Dimension</td>
                  <td>Advantages</td>
                  <td>Disadvantages</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Privacy management</td>
                  <td>Patients technically govern data. Patients can define access rights to their own PHSs.</td>
                  <td>Inconsistent views in the network allow attackers (and super users) to cheat and remain undetected.</td>
                </tr>
                <tr valign="top">
                  <td>Federated medical data</td>
                  <td>Patients keep their medical data and software on their own devices. Patients can determine the desired redundancy for their data by backing up at their end.</td>
                  <td>Patients may lose access when the device is lost, and no backup system is used by the patient.</td>
                </tr>
                <tr valign="top">
                  <td>Security</td>
                  <td>No central attack profiles.</td>
                  <td>Specific security issues other than general networked application attacks are introduced and slow deployment of security patches by users results in insecure P2P systems.</td>
                </tr>
                <tr valign="top">
                  <td>Offline capability</td>
                  <td>Data are available without a network connection, which improves infrastructure resilience. Disrupted internet connections will not stop data access.</td>
                  <td>Maintenance effort for storing large amounts of data offline can be high.</td>
                </tr>
                <tr valign="top">
                  <td>Stakeholder interaction management</td>
                  <td>All health care stakeholders requiring access to patient data have to interact with patients to achieve their goals.</td>
                  <td>Increased access control requirements for patients are hard to satisfy with current health care processes and systems due to bureaucracy and diverse levels of digitalization.</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p>Moreover, P2P systems increase the attack surface owing to 3 disadvantages [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref47">47</xref>]: (1) increased chances of exposing network traffic patterns to attackers; even with encryption, the metadata can still reveal information to external attackers; (2) an inconsistent view of the network (due to a lack of global information), which affects integrity by allowing attackers to cheat and remain undetected; and (3) increased vulnerability to internal attackers due to the absence of a central entity to detect malicious insiders and govern software and security updates.</p>
        </sec>
        <sec>
          <title>P2P and PHS Networks</title>
        </sec>
        <sec>
          <title>Origins</title>
          <p>The concept of P2P was introduced in 1969 in the first Request for Comments of the Internet Engineering Task Force; Request for Comments-1 denotes a <italic>host-to-host connection</italic> [<xref ref-type="bibr" rid="ref48">48</xref>]. UseNet [<xref ref-type="bibr" rid="ref49">49</xref>], a distributed messaging system, is often described as the first true implementation of a P2P network and was established in 1979. UseNet looks like a client server model from users' point of view. However, servers communicate with each other based on the concept of P2P and share content over the entire group of UseNet servers without a central entity. With the surge in popularity of P2P networks, the music and file-sharing P2P application Napster [<xref ref-type="bibr" rid="ref50">50</xref>] was introduced in 1999, which exhibited some approaches to P2P networks known today. Later, well-known and popular P2P systems emerged, such as Gnutella, eDonkey, and BitTorrent. Within the last 2 decades, the first health information systems were deployed on P2P networks—for example, the e-toile P2P PHS framework aimed at connecting all health care stakeholders in Geneva, Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]; P2HR [<xref ref-type="bibr" rid="ref20">20</xref>]; or the PEPP-PT COVID-19 contact tracing system in Europe [<xref ref-type="bibr" rid="ref22">22</xref>]. The features distinguishing P2P systems from centralized systems are peer and resource discovery [<xref ref-type="bibr" rid="ref35">35</xref>]. Since there are no servers, peers (eg, patients, practitioners, or PHS providers) must rely on techniques, such as indexing and routing tables [<xref ref-type="bibr" rid="ref52">52</xref>], to locate other peers in the network (<xref rid="figure1" ref-type="fig">Figure 1</xref>).</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Peer-to-peer (P2P) architectures. Some P2P systems are supported by centralized servers, other P2P systems attempt to decentralize as far as possible. Between these two extremes, hybrid systems benefit from the properties of both.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>A P2P network, or system, is a type of computer network that exhibits decentralized control, autonomy, virtualization, and sharing of computing resources [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. Peers participating in the network form a P2P network of nodes and are equally privileged. The network is self-organizing. Peers in the network make their resources directly available to other peers without the need for a central entity to facilitate or co-ordinate transactions [<xref ref-type="bibr" rid="ref35">35</xref>]—for example, patients can directly exchange information with practitioners over their P2P PHSs. Peers in a P2P network can share and download resources. This is in direct contrast to traditional client-server networks in which resource-sharing and downloading are performed by distinct actors (eg, in PHRs such as Google Health or Microsoft Health Vault).</p>
        </sec>
        <sec>
          <title>Centralized</title>
          <p>Centralized P2P PHS (eg, P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>] and e-toile framework [<xref ref-type="bibr" rid="ref21">21</xref>]), and other centralized P2P systems (Napster, SETI@Home, and BOINC [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]) combine the features from client-server and decentralized architectures. One or more central servers are used to manage administration, transaction, registration, or resource discovery. To abide by data protection regulations, such as the US Federal Health Insurance Portability and Accountability Act (HIPAA) [<xref ref-type="bibr" rid="ref6">6</xref>] or the GDPR [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref41">41</xref>], and related regulations, health or personal information should be stored separately from centrally managed operational data (eg, status and metadata of transactions as in P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>] or the list of interoperable PHS providers and health care professionals and their access rights in the e-toile framework [<xref ref-type="bibr" rid="ref21">21</xref>]). In the case of contact tracing systems such as PEPP-PT COVID-19 [<xref ref-type="bibr" rid="ref22">22</xref>], the central server may be operated by a government or trusted entity to generate identities and contact graphs. In centralized P2P PHSs, the resources are indexed by the central server (<xref rid="figure2" ref-type="fig">Figure 2</xref>). Although a client-server approach is used for resource discovery, the actual communication that facilitates resource transmission is decentralized [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>The centralized peer-to-peer (P2P) system. A peer E sends a message to the central server asking for the desired resource, the server runs a lookup and determines the peers that contain the queried resource and then sends back the result to the requesting peer E. Once peer E obtained the list (which consists of peer A and peer F), it establishes a direct connection to the peers.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>In centralized P2P PHSs, data protection and security measures based on regulations such as HIPAA [<xref ref-type="bibr" rid="ref6">6</xref>] or GDPR [<xref ref-type="bibr" rid="ref41">41</xref>] can be enforced and implemented but PHSs may inherit issues from centralized systems [<xref ref-type="bibr" rid="ref35">35</xref>], such as vulnerability to insider attacks and function creep by the entity running the server; reduced tolerance to avoid single points of failure; and issues with scalability and robustness. Central servers also become more likely to cause a bottleneck when the number of peers increases.</p>
        </sec>
        <sec>
          <title>Decentralized</title>
          <p>In decentralized P2P systems, peers have equal rights and responsibilities [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. This can be seen in agent-based co-ordination frameworks proposed for the exchange of electronic health records between different providers (eg, P2P IHE [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]) or other P2P systems (eg, BitTorrent, Gnutella, Freenet, Chord, and PAST [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]). Each peer shares data that may only be relevant to queries of other peers. A decentralized P2P design is a user-based infrastructure because it requires no specific additional infrastructure and depends solely on the participating users to share resources (bandwidth and storage) [<xref ref-type="bibr" rid="ref26">26</xref>]. In a decentralized P2P system architecture, 2 further dimensions are important [<xref ref-type="bibr" rid="ref35">35</xref>]: the <italic>network structure</italic> and <italic>logical network topology</italic> (overlay network).</p>
          <p>The <italic>network structure</italic> of a P2P network can be <italic>single-tier</italic> or <italic>multitier</italic>. In a <italic>single-tier</italic> network (eg, Gnutella, Freenet, and PAST [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]), loads and functionalities are equally distributed among the nodes participating in the network. In contrast, the <italic>multitier</italic> network has a routing structure with hierarchical layers. An example of a P2P protocol in this category includes the Super-peer Architecture and Crescendo System [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
          <p>The <italic>logical network topology</italic> can be <italic>structured</italic> or <italic>unstructured</italic>. In <italic>unstructured</italic> P2P networks (eg, FreeNet, Gnutella, and KaZaA [<xref ref-type="bibr" rid="ref50">50</xref>]), which exhibit a mesh topology [<xref ref-type="bibr" rid="ref26">26</xref>], each peer maintains the list of its neighbors to which it may forward queries. Hence, in most cases, a peer must search a large fraction of the network when looking for a desired resource in the network, as there is no precise mapping between the identifiers of resources and peers [<xref ref-type="bibr" rid="ref55">55</xref>]. Messages are continuously propagated by neighbors in the network [<xref ref-type="bibr" rid="ref26">26</xref>], which affects the reliability of message delivery when the network is congested. This type of P2P system can be unsuitable for PHS deployment, especially in emergency situations where a patient’s medical history (located with another remote peer) is urgently needed for medical care.</p>
          <p>To address these problems, <italic>structured</italic> P2P PHSs such as P2P IHE [<xref ref-type="bibr" rid="ref51">51</xref>] and other <italic>structured</italic> P2P systems (eg, Chord, Kademlia, Pastry, and CAN [<xref ref-type="bibr" rid="ref35">35</xref>]) have emerged. In <italic>structured</italic> P2P systems, a mapping between peers and data exists, data placement is under the control of Distributed Hash Tables (DHTs), and each peer has to maintain routing tables. A DHT is a hash table containing a key-value lookup function, and the entire index is equally distributed among participating peers [<xref ref-type="bibr" rid="ref55">55</xref>]. The key-value store represents only the metadata of the participating peers, for example, the mapping (id, ptr) indicates that a resource with identifier <italic>id</italic> is located at a peer pointed to by <italic>ptr</italic>. The general idea of structured P2P networks is to minimize the number of peer lookups (eg, by adopting a key-based routing strategy) to identify and locate a desired resource in the network [<xref ref-type="bibr" rid="ref35">35</xref>]. The cost of maintaining the structured topology is high when participants arbitrarily join and leave the network.</p>
          <p>The overall issue of decentralized P2P systems is the slow search for peers offering the desired resources in the network [<xref ref-type="bibr" rid="ref35">35</xref>], and freedom to join or leave the network affects availability [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. However, these systems do not have single points of failure and benefit from other features, such as scalability and robustness to operational errors. The lack of centralized control is a major factor contributing to routing difficulties: routing becomes more complicated with more diverse participating nodes [<xref ref-type="bibr" rid="ref57">57</xref>], when massive peer churn is present [<xref ref-type="bibr" rid="ref58">58</xref>] and when there is a dependence on nodes that could be malicious [<xref ref-type="bibr" rid="ref59">59</xref>]. To remedy this, a shared memory in a distributed tuple space architecture [<xref ref-type="bibr" rid="ref60">60</xref>], as used in the P2P PHS agent-based co-ordination framework P2P IHE [<xref ref-type="bibr" rid="ref51">51</xref>], can be leveraged. In such an architecture, a distributed network of tuple centers is used as a co-ordination framework to facilitate interactions between various PHS providers and other health care stakeholders [<xref ref-type="bibr" rid="ref51">51</xref>].</p>
        </sec>
        <sec>
          <title>Hybrid</title>
          <p>P2HR [<xref ref-type="bibr" rid="ref20">20</xref>] is an example of a hybrid P2P PHS. Other P2P systems (eg, BestPeer [<xref ref-type="bibr" rid="ref35">35</xref>], <italic>BestPeer++</italic> [<xref ref-type="bibr" rid="ref61">61</xref>], or BitTorrent [<xref ref-type="bibr" rid="ref62">62</xref>]) eventually relied on this topology. Hybrid P2P architectures were introduced to address the challenges of centralized servers in P2P networks and the time required for resource discovery in decentralized P2P networks [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. They combine the advantages of both architectures [<xref ref-type="bibr" rid="ref50">50</xref>], such as reliable resource discovery and scalability. Although there are no servers in hybrid P2P systems, peer nodes that have more resources in terms of storage, computation power, network connectivity, stability, and uptime can fulfill the role of servers and assist <italic>common peers</italic> with resource discovery. These nodes are referred to as <italic>super peers</italic>. In hybrid P2P systems, resource discovery can be performed by querying the <italic>super peer</italic> (in a centralized manner) or using decentralized search techniques [<xref ref-type="bibr" rid="ref63">63</xref>]. <italic>Common peers</italic> form the lower layer, while <italic>super peers</italic> form the upper layer.</p>
          <p>Although <italic>super peers</italic> share some similar properties with servers in a centralized P2P network, they are different [<xref ref-type="bibr" rid="ref35">35</xref>]: (1) a <italic>super peer</italic> only acts as a manager for its subset of peers in the network—it is not as powerful as a server in centralized P2P networks that oversees the entire network. For PHSs, dividing patients into groups (eg, per hospital) ensures that patients’ data are only shared with users that require them [<xref ref-type="bibr" rid="ref64">64</xref>]; (2) a <italic>super peer</italic> also participates and acts as a <italic>common peer</italic> and facilitates the same operations, such as resource-sharing and downloading. As an analogy, the relationship of <italic>super peers</italic> with <italic>common peers</italic> is similar to interactions between entities in human society: for instance, in a hospital, physicians keep more knowledge and connections with their patients than other personnel. As such, patients with health issues are expected to ask for help from physicians, as there is a higher probability that they are able to handle the problem.</p>
          <p><italic>Super peers</italic> can act as <italic>federated</italic> authorities whereby participating users can affiliate themselves with provider nodes based on extant trust relationships (eg, friendship or treatment relationships). Provider nodes are largely independent of each other; hence, there is a federation of provider nodes. Each provider is responsible for its common peers; however, individual provider nodes can collaborate to provide services. The placement of <italic>super peers</italic> in a privileged position enhances the availability of resources, operations, computations, and performance; however, this also raises issues regarding trust, privacy, and integrity as <italic>super peers</italic> regulate services. The absence of a <italic>super peer</italic> in the network may affect operations in the network, thereby reducing the fault tolerance of the P2P network. In terms of security, nodes operated by providers are central points of attack (at least for the common peers served by a particular super peer). As super peer<italic>s</italic> manage subsets of peers in the network, they are more attractive targets for attacks. “The main vulnerability of federated systems are such assumptions that federated service providers (e.g., super-peers) will largely act honestly” [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
        </sec>
        <sec>
          <title>P2P PHS Architecture</title>
          <p>On the basis of the discussion of the different forms of P2P PHS architectures in the previous section, the combination of multitier structure and hybrid P2P architecture appears to be most appropriate for P2P PHSs; therefore, we propose an architecture with the following abilities (<xref rid="figure3" ref-type="fig">Figure 3</xref>): (1) enforcement of data protection requirements similar to that of HIPAA and semantic compliance through <italic>super peers</italic> as central index servers; (2) registration and identity verification; (3) higher scalability and availability of resources and lack of single points of failure; (4) association of patients (tier 5, <xref rid="figure3" ref-type="fig">Figure 3</xref>) with their respective PHS providers (tier 3, <xref rid="figure3" ref-type="fig">Figure 3</xref>) and practitioners (tier 4, <xref rid="figure3" ref-type="fig">Figure 3</xref>); and (5) faster PHS updates with security patches through the <italic>super peer</italic> networks. The P2P PHS network is an overlay of the modeled hierarchical relationships between the tuple center and PHS providers, PHS providers and practitioners, and practitioners and patients.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>Proposed peer-to-peer (P2P) high-level architecture for patient-centered health care information system (PHS). An aggregate relationship exists between the practitioners and the patients. The patients control the access to their health data, and other entities require patient permission to access a patient’s medical data, for example, by using tokens as currently being implemented in the MedicalChain PHS project [<xref ref-type="bibr" rid="ref11">11</xref>].</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>Large health care IT organizations (eg, the German Healthcare Technology Infrastructure; HTI [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]) are represented at the top of the hierarchy in the architecture to facilitate certification of various PHS providers (tier 1, <xref rid="figure3" ref-type="fig">Figure 3</xref>). They define and enforce the implementation of various data regulations, representation standards, and ontologies (eg, Health Level Seven and Fast Health care Interoperability Resources [<xref ref-type="bibr" rid="ref6">6</xref>]) to share heterogeneous medical records across PHS networks. In the second tier, a distributed public network of tuple centers (eg, certified through a national health agency) is provided by trusted third parties (tier 2, <xref rid="figure3" ref-type="fig">Figure 3</xref>). Agent-based systems (as in centralized P2P PHSs [<xref ref-type="bibr" rid="ref51">51</xref>]) can be used across P2P networks with the tuple centers' action-reaction rules for communication events [<xref ref-type="bibr" rid="ref51">51</xref>]. Agent co-ordination models can handle services for data semantics and peer lookup services while serving as mediums for data sharing between P2P PHS providers, but the actual inter-PHS communications are performed in a P2P manner. P2P PHS providers can subscribe to any certified tuple center. Communication of a PHS provider is limited to communication with other subscribers to the PHS provider’s tuple center subscriptions.</p>
          <p>PHSs can be provided by any party. In our scenario, we exemplify hospitals (<italic>hyper peers—</italic>managers of super peers and other peers in the network) as PHS providers. The <italic>hyper peers</italic> relay requests and responses among all subpeers across multihop networks. Each <italic>hyper peer</italic> has its own separate private cloud server, which stores a digital and secure copy of patient health records (<xref rid="figure3" ref-type="fig">Figure 3</xref>). These records are a replica of the data available on the patient’s local storage but are only made available in the <italic>hyper peer’s</italic> private cloud if a patient subscribed to the corresponding additional PHS features (eg, for data backup, ease of remote data sharing, or emergency access). Accessibility and availability traits of the stored <italic>common peers’</italic> data on the private cloud are in the control of patients through their local PHS client software. This topology can have 2 issues: (1) similar records of patients are stored locally on their mobile devices and the cloud, which appears redundant, but this redundancy curtails connectivity pitfalls while preserving P2P PHS features in terms of offline capability, and (2) the cloud storage can become inaccessible when the local patient PHS device is lost when the device is used as the source of patient identity verification and access authorization for cloud storage.</p>
          <p>Each <italic>hyper peer</italic> has multiple health practitioners in the network, which maintain patients’ public identities (under the control of DHT [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]) for lookup functionality and ease of data access; therefore, a patient (<italic>common peer</italic>) can be associated with multiple practitioners from various <italic>hyper peers</italic> (practitioner A, B, C, etc). In such cases, these <italic>hyper peers</italic> can communicate via tuple centers. This way patient data stored on a cloud of hospital B can be accessed by practitioners in hospitals A or C for diagnosis or treatment, given that the patient grants access rights. Each <italic>common peer</italic> on the network (corresponding to a patient) is modeled on the local PHS and on the <italic>hyper peer’s</italic> private cloud server. <italic>Common peer</italic>s can grant access to their health records to any party through single-hop radio communication (without involving a third party in the communication, eg, Wi-Fi direct) or multihop network communications via the cloud storage of the <italic>hyper peers</italic> [<xref ref-type="bibr" rid="ref65">65</xref>]. Other parties, such as researchers looking for data for research purposes, can obtain read-permissions for patient records by interacting with the practitioner via the hospitals' private network, which forwards permission requests to patients. However, only aggregated results (anonymized) are returned to the researcher. Moreover, wearable mobile devices and biotechnologies that provide biometric or psychometric data can also be directly connected to a patient’s P2P PHS.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Literature Search</title>
        <p>We conducted a systematic literature review (<xref rid="figure4" ref-type="fig">Figure 4</xref>) following the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines [<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref68">68</xref>] and used thematic analysis to guide the data analysis process [<xref ref-type="bibr" rid="ref69">69</xref>]. The systematic literature search in this study was conducted using specialized academic search engines (IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar; see <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> for further details). The search was conducted on articles published between 2008 and 2020. The study selection was organized into the following phases.</p>
        <list list-type="order">
          <list-item>
            <p>The search string was derived by breaking down the research question into different facets, where their alternative definitions and acronyms are included and combined using the logical operators “OR” or “AND” [<xref ref-type="bibr" rid="ref68">68</xref>]. The search string “(<italic>P2P</italic> OR <italic>Peer-to-Peer</italic>) AND (<italic>vulnerabilities</italic> OR <italic>vulnerability</italic> OR <italic>threats</italic> OR <italic>threat</italic>)” was applied to the title and abstract and adapted to the specific syntax of the used search engines.</p>
          </list-item>
          <list-item>
            <p>Eligibility criteria: we included all articles that could be accessed, were written in English, were published in academic outlets, and identified inherent security issues for PHS deployment on P2P networks, as suggested for thematic analysis [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
          </list-item>
          <list-item>
            <p>Abstracts of the filtered articles were further analyzed by the authors to remove irrelevant articles based on eligibility criteria and other false-positive results.</p>
          </list-item>
          <list-item>
            <p>Articles were grouped and duplicates were removed.</p>
          </list-item>
          <list-item>
            <p>The remaining articles were read in full text and analyzed by the authors (assisted by Atlas.ti software [<xref ref-type="bibr" rid="ref70">70</xref>] to manage codes and themes for thematic analysis [<xref ref-type="bibr" rid="ref69">69</xref>]) to include only relevant studies based on the eligibility criteria defined in step 2.</p>
          </list-item>
        </list>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow diagram. P2P: peer-to-peer.</p>
          </caption>
          <graphic xlink:href="jmir_v23i11e24460_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Identified Articles</title>
        <p>Initially, 102,851 articles were identified using the search string. The filtered articles were screened based on their titles using the same search strings. A total of 99.29% (102,121/102,851) false-positive results were removed. Further examination of the abstracts of the remaining 0.71% (730/102,121) articles resulted in the exclusion of 0.67% (685/102,121) articles. The main reason for exclusion in this step was a lack of thematic fit with our study (eg, a focus on P2P currency exchange or lending platforms or security issues for largely unrelated technologies such as robotics). We analyzed the full text of the remaining 0.04% (45/102,121) articles, and 0.01% (7/102,121) further articles were excluded. We complemented the result set with 0.01% (11/102,121) additional articles that met the eligibility criteria but not the inclusion criteria (eg, published before 2008). Ultimately, 0.05% (49/102,121) articles remained.</p>
      </sec>
      <sec>
        <title>Thematic Analysis</title>
        <p>Data analysis was guided by thematic analysis [<xref ref-type="bibr" rid="ref69">69</xref>] to identify the relevant themes in the identified articles. The initial coding was performed by the first author and refined and finalized in group discussions with the other authors. The themes (codes) were identified using the key security goals (theory-driven) from the CIA (ie, confidentiality, integrity, and availability) triad as organizing codes for data analysis (assisted by Atlas.ti software [<xref ref-type="bibr" rid="ref70">70</xref>] to manage codes and themes for the thematic analysis). <italic>Confidentiality</italic> entails that unauthorized actors cannot access information during transmission, processing, or in storage. <italic>Integrity</italic> requires that the information not be modified unintentionally or without authorization. <italic>Availability</italic> means that the system is accessible to the user when needed. For each of the codes identified, we looked at the impact of the security issues associated with the codes to examine their impact on P2P PHS (eg, potential for unauthorized access). We then investigated and rated the consequences of potential exploits of P2P-PHS security issues based on the Common Vulnerability Scoring System (CVSS; see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> for further details).</p>
        <p>The systematic literature review revealed 8 main P2P security issues (list of themes) extracted through data analysis and 7 factors promoting them. <xref ref-type="table" rid="table2">Table 2</xref> shows the summary—generated codebook—of the security themes identified along with their sources and exemplary codes used to derive the themes during the thematic analysis process.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Overview of peer-to-peer security themes identified<sup>a</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="180"/>
            <col width="370"/>
            <col width="0"/>
            <col width="420"/>
            <thead>
              <tr valign="top">
                <td colspan="4">Combined themes, second-order themes, and first-order themes</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Pollution</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref81">81</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Metadata pollution</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Changing original file name or extension</p>
                    </list-item>
                    <list-item>
                      <p>Replacing the file with a misleading one</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Index pollution</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Claims ownership of wanted but bogus content</p>
                    </list-item>
                    <list-item>
                      <p>Sharing of the content record via the index</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Content pollution</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Modifying the file content</p>
                    </list-item>
                    <list-item>
                      <p>Replacing the file with an incorrect one</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Malware</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref81">81</xref>-<xref ref-type="bibr" rid="ref91">91</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Virus</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Infection of the system</p>
                    </list-item>
                    <list-item>
                      <p>Appears to be part of legitimate programs</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Spyware or ransomware</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Spying or stealing user data</p>
                    </list-item>
                    <list-item>
                      <p>Encrypts any kinds of files and data</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Worm</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Infection of P2P<sup>b</sup> routing table</p>
                    </list-item>
                    <list-item>
                      <p>Appears independent of existing programs</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Social engineering</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref82">82</xref>,<xref ref-type="bibr" rid="ref92">92</xref>-<xref ref-type="bibr" rid="ref95">95</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Baiting</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Tricks user to divulge sensitive information</p>
                    </list-item>
                    <list-item>
                      <p>Relies on human error or mistakes</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Phishing</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Scam via email or SMS text messages</p>
                    </list-item>
                    <list-item>
                      <p>Trick into divulging sensitive information</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Poisoning the network</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref89">89</xref>,<xref ref-type="bibr" rid="ref95">95</xref>-<xref ref-type="bibr" rid="ref102">102</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Index poisoning</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Sharing of bogus contents via indexing table</p>
                    </list-item>
                    <list-item>
                      <p>Affects network quality of service</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Routing table poisoning</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Sharing of bogus contents via routing table</p>
                    </list-item>
                    <list-item>
                      <p>Prevents from finding correct resources</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Sybil</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref103">103</xref>-<xref ref-type="bibr" rid="ref112">112</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Faking identity</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Faking multiple identities for a single user</p>
                    </list-item>
                    <list-item>
                      <p>Affects the redundancy property of P2P systems</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>51% attack</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Outvoting of honest nodes in the network</p>
                    </list-item>
                    <list-item>
                      <p>Cheating without being detected</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Eclipse</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref79">79</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref105">105</xref>-<xref ref-type="bibr" rid="ref108">108</xref>,<xref ref-type="bibr" rid="ref113">113</xref>-<xref ref-type="bibr" rid="ref116">116</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Large man-in-the-middle</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Separating the network into several portions</p>
                    </list-item>
                    <list-item>
                      <p>Acts as gateway and disrupts message flow</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>DDoS<sup>c</sup></bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref88">88</xref>,<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref94">94</xref>,<xref ref-type="bibr" rid="ref95">95</xref>,<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>,<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref102">102</xref>,<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref110">110</xref>,<xref ref-type="bibr" rid="ref117">117</xref>-<xref ref-type="bibr" rid="ref119">119</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Flooding</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Invalid packets flood the network</p>
                    </list-item>
                    <list-item>
                      <p>Impedes delivery of normal packets</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>TCP-DDoS<sup>d</sup></td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Connection overload with full TCP-requests</p>
                    </list-item>
                    <list-item>
                      <p>Denies connections from legitimate requests</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>P2P traffic blockade</bold>
                </td>
                <td>[<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref120">120</xref>-<xref ref-type="bibr" rid="ref122">122</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Port number blockade</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Blocking of P2P network traffic</p>
                    </list-item>
                    <list-item>
                      <p>Imposes bandwidth limits with P2P networks</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>The first- and second-order themes are only examples and not exhaustively listed.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>P2P: peer-to-peer.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>DDoS: distributed denial-of-service.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>TCP-DDoS: transmission control protocol–distributed denial-of-service.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Factors Promoting Security Issues in P2P Networks</title>
        <p>To use a P2P network for resource-sharing, multimedia-streaming, distributed-computing, or telephony applications, users install a P2P application on their device and permit the application to access and use device resources such as cameras, microphones, or device storage. In P2P operation, the P2P client application reads files from the user’s disc during the uploads and writes to the user’s disc during download. During this operation, personal or sensitive information can be transmitted to the network.</p>
        <sec>
          <title>Inadvertent Sensitive Information Disclosure</title>
          <p>It is often not necessary that users’ confidential or personal documents be exposed by worms or viruses, as many users inadvertently expose these documents [<xref ref-type="bibr" rid="ref123">123</xref>]. For example, a node may request data X from the user, and the user sends back the entire folder where data X is located. The user may end up exposing all of their sensitive information for the following reasons: (1) a user does not appropriately select or share the requested data, (2) the interface design of the P2P application confuses the user, and (3) the requester offers a huge incentive to share. In 2012, an automated personal health information tool was used to crawl different P2P networks (FastTrack, Gnutella, and eD2K) to analyze Canadians’ personal health information and personally identifiable information in the exchanged text files [<xref ref-type="bibr" rid="ref83">83</xref>]. Out of the 3924 P2P files with unknown content, 1.45% (57/3924) of files were flagged as personally identifiable information. Manual analysis of the 57 files revealed that 19% (11/57) contained health information about an identifiable individual, that is, inadvertently disclosed health information.</p>
          <p>In 2019, a survey identified human errors, such as sending personal information to unintended email recipients or releasing personal information by accident, as the largest source of data breaches in the health sector [<xref ref-type="bibr" rid="ref39">39</xref>]. Similarly, several peers were found to be inadvertently sharing their financial, email, and web cache data in a study on the KaZaA P2P network [<xref ref-type="bibr" rid="ref124">124</xref>]. In addition, some P2P users share their personal information intentionally to increase the number of files shared on the network to meet the participation requirements of some P2P systems [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
        </sec>
        <sec>
          <title>Set-and-Forget</title>
          <p>P2P clients tend to be set-and-forget applications that run in the background [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref123">123</xref>,<xref ref-type="bibr" rid="ref125">125</xref>]. This means that the user is not cautiously tracking the activities of the P2P client, which increases the opportunity for abuse.</p>
        </sec>
        <sec>
          <title>No Borders</title>
          <p>Geography is largely irrelevant in P2P networks [<xref ref-type="bibr" rid="ref85">85</xref>], and no region is safer than the other. A computer in Australia or Argentina becomes part of the same network as a computer in Nigeria (<xref rid="figure5" ref-type="fig">Figure 5</xref>). In open P2P networks, files can undoubtedly migrate globally, and threats can come from any region of the globe. Hence, the heterogeneity and geographically dispersed nature of P2P networks can be a problematic factor affecting security, quality of service guarantees, and scalability. However, studies have shown that P2P networks converge to a certain degree of geographical clustering [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref126">126</xref>]. Users may choose to download and share content from their region to have lower network use and latency than when downloading or sharing content outside their region.</p>
          <fig id="figure5" position="float">
            <label>Figure 5</label>
            <caption>
              <p>Geography example of a peer-to-peer (P2P) network.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Growing Use and Network Heterogeneity</title>
          <p>As a P2P network grows, an increasing number of leaks of confidential files will occur in the network. In 2017, nearly 27 million P2P users downloaded and shared files on P2P networks daily, which is 17 million more users than in 2006 [<xref ref-type="bibr" rid="ref127">127</xref>,<xref ref-type="bibr" rid="ref128">128</xref>]. Moreover, P2P networks are heterogeneous and fast-moving; hence, users may not be able to keep track of security issues and developers may neglect them [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
        </sec>
        <sec>
          <title>No Content Verification</title>
          <p>Conventional P2P networks have no trust mechanism to assist users in deciding whether to share or download content in the network. Similarly, they have no central authority responsible for verifying the authenticity of the resources shared by users [<xref ref-type="bibr" rid="ref80">80</xref>]. Hence, there is no guarantee that users are sharing the content they promise. This makes it easier for an attacker to spread malware across a P2P network, for instance, to conduct fraudulent activities or pollution attacks [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
        </sec>
        <sec>
          <title>Digital Winds Spreading Files</title>
          <p>Typically, P2P networks create file indexes using the names of the files and the associated metadata [<xref ref-type="bibr" rid="ref123">123</xref>]. This constitutes a security issue, as it allows anybody to easily discover files in P2P networks. For example, an opportunistic search with key terms related to the top 10 publicly traded health care firms in the United States revealed 20,000 patient records, 4 patients with acquired immune deficiency syndrome (AIDS), 201 patients with a mental diagnosis, and 326 patients with cancer [<xref ref-type="bibr" rid="ref125">125</xref>]. The approaches that some P2P clients use to create and manage file names have serious implications in exposing users’ private and confidential information. This can be a problematic factor regarding security because users’ sensitive files can be easily discovered owing to poor P2P client design.</p>
        </sec>
        <sec>
          <title>Snooping Nodes</title>
          <p>This factor enables attackers to leverage the open nature of P2P networks [<xref ref-type="bibr" rid="ref100">100</xref>]. The long routing paths across several nodes create a loophole for malicious activity [<xref ref-type="bibr" rid="ref94">94</xref>]. Peers in a privileged position in the network (eg, <italic>super peers</italic>) are able to see the communication of other <italic>common peers</italic> in the network. For example, decentralized P2P systems such as Gnutella [<xref ref-type="bibr" rid="ref35">35</xref>] have no central servers or auxiliary mechanisms to co-ordinate communication among users, but when a new user connects to the Gnutella network, it chooses a node as its permanent entry point [<xref ref-type="bibr" rid="ref115">115</xref>]. Thus, high-speed nodes are inadvertently placed in the central part of the topology and can observe the communication of nodes in their local subgraph. Moreover, communication in P2P networks stops being anonymous as soon as the source node establishes a direct connection to a destination node to download files [<xref ref-type="bibr" rid="ref35">35</xref>]. The IP addresses of both nodes are exposed to each other, which creates another opportunity for abuse. Once the identity of the peer is revealed, further attacks can be carried out [<xref ref-type="bibr" rid="ref96">96</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Identified Security Issues and Their Impact on P2P PHSs</title>
        <sec>
          <title>Pollution</title>
          <p>Pollution is a form of attack in which an attacker modifies the original content (through mixing or substituting) so that it has no use or is of low quality [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref79">79</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. The polluted content appears to be legitimate content (eg, by having a similar size, format, and title) to trick users to download it. However, the altered content may be malicious, fake, or corrupt. This affects the network’s quality of service (especially in file, voice, and video-based P2P streaming systems [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref79">79</xref>,<xref ref-type="bibr" rid="ref80">80</xref>]), overall system energy consumption [<xref ref-type="bibr" rid="ref74">74</xref>], content availability [<xref ref-type="bibr" rid="ref78">78</xref>], and data integrity [<xref ref-type="bibr" rid="ref72">72</xref>]. Pollution is an easy and fast way to disseminate worms or viruses from one to many peers in the network. Therefore, pollution can have an exponential impact on the security of the entire network [<xref ref-type="bibr" rid="ref72">72</xref>]. The pollution attack was first discovered in 2005, where a crawler was used to retrieve super peers in the KaZaA P2P network [<xref ref-type="bibr" rid="ref73">73</xref>]. Analysis of the contents collected by the crawler revealed that over 50% of welcome copies (ie, introductory files for a collection of files) for musical files in the KaZaA network were polluted [<xref ref-type="bibr" rid="ref73">73</xref>]. Pollution is a serious attack on P2P networks, even in a scenario with only one polluter [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref75">75</xref>]. The impact grows when the number of polluters or peers attempting a request increases [<xref ref-type="bibr" rid="ref75">75</xref>]. As a result, peers often require multiple times the network bandwidth they need in a network free from pollution [<xref ref-type="bibr" rid="ref75">75</xref>]. Furthermore, the attack is persistent. Even if the polluted contents are identified and blocked by the network, the polluters may remain alive in the network by disguising their identities and can keep polluting the network.</p>
          <p>Pollution is categorized based on the attackers’ strategy: (1) metadata pollution, where a file extension or name is modified and replaced with a misleading one; (2) content pollution, where the file content is changed; and (3) index pollution, where an attacker claims ownership of an unindexed bogus file and uploads its record (IP address, port number, etc) to the entities (eg, super peers on hybrid P2P) that maintain such records for distribution [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. In most cases, the polluters also attack legitimate peers’ reputations or boost their own reputation through whitewashing attacks [<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>]. Content pollution is the most popular and common attack in P2P streaming systems [<xref ref-type="bibr" rid="ref74">74</xref>]; it was detected in 50%-80% of files in KaZaA and about 50% of popular files in eDonkey [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. Pollution is not necessarily caused by malicious users; P2P systems are notorious for illegally sharing and disseminating copyrighted content, and content is often polluted by copyright owners as a countermeasure to protect their rights when legal actions fail [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref72">72</xref>]. To facilitate the protection of copyright claims, some P2P system providers even weaken protection from pollution attacks in their network [<xref ref-type="bibr" rid="ref73">73</xref>], although this affects the confidence of users in such systems [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>].</p>
        </sec>
        <sec>
          <title>Impact of Pollution Attacks on P2P PHSs</title>
          <p>Successful pollution attacks on P2P PHSs can be devastating because of the higher integrity and availability requirements of medical data than data shared in other P2P systems. The consequences of its exploitation could be between low and high, depending on the level of access gained; pollution attacks often serve as a gateway to identify vulnerabilities (eg, unverified inputs that can be used for SQL injection attacks [<xref ref-type="bibr" rid="ref129">129</xref>]) and mount further attacks (eg, ransomware attacks). For example, in 2020, a patient in need of emergency care due to an aneurysm died in Germany during a ransomware attack in a hospital. The ransomware attack caused a network outage that disrupted emergency services, and the patient was sent to a health care facility approximately 20 miles away [<xref ref-type="bibr" rid="ref130">130</xref>]. This diversion delayed the treatment of the patient by an hour and she died [<xref ref-type="bibr" rid="ref130">130</xref>]. The openness of P2P systems allows polluters to easily join and leave the network [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]; however, identity verification (eg, via insurance, job contract, token, etc) and multifactor authentication concepts for P2P PHSs could create an additional layer to reduce the vulnerability of the network. Patients or practitioners polluting a P2P PHS through their legitimate accounts can easily be traced; however, in some situations, a double-faced user (legitimate but malicious) could leverage open-source hacking tools such as Burp Suite [<xref ref-type="bibr" rid="ref78">78</xref>] to, for instance, alter an http request payload with an anonymous ID, add polluted content, and forward it to the content distribution network of a hospital to harm the network.</p>
        </sec>
        <sec>
          <title>Malware</title>
          <p>Malware refers to a wide range of attacks that compromise a system without the knowledge of the system owner [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref90">90</xref>]. P2P networks present a greater risk for receiving malware; for example, only 3 strains of malware infected over 68% of compressed and archived files on the Gnutella network [<xref ref-type="bibr" rid="ref84">84</xref>]. In the first 3 quarters of 2019, 7.2 billion malware attacks were reported globally [<xref ref-type="bibr" rid="ref91">91</xref>]. In P2P networks, malware is predominantly used to create botnets by leveraging worms [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref89">89</xref>,<xref ref-type="bibr" rid="ref90">90</xref>].</p>
          <p>A botnet is a network of infected nodes that are usually compromised by worms or viruses. Individual bots in the botnet only use a small portion of the infected resource to remain concealed and create only barely noticeable traffic to share data from the compromised computers with the target [<xref ref-type="bibr" rid="ref88">88</xref>,<xref ref-type="bibr" rid="ref89">89</xref>]. The bots are controlled by an attacker (botmaster) through command-and-control servers [<xref ref-type="bibr" rid="ref89">89</xref>].</p>
          <p>A worm is independent and neither requires a host application [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref92">92</xref>] nor human intervention [<xref ref-type="bibr" rid="ref82">82</xref>] to propagate and replicate itself over a network. Worms can result in a high fallout in combination with other vulnerabilities and propagate themselves over email attachments, web server infections, file downloads (counterfeit worms), or other legitimate network activities (silent worms) [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref82">82</xref>,<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref87">87</xref>]. Passive (counterfeit and silent worms) and active worms are 2 broader categories of P2P worms; they both propagate like a biological virus, but the former waits for victims to infect, while the latter actively searches for new targets [<xref ref-type="bibr" rid="ref84">84</xref>]. The threats to the amplification of worm-based attacks in a P2P network are high, and the impact grows based on network size, topology degree, or host vulnerability [<xref ref-type="bibr" rid="ref78">78</xref>]. In contrast to the internet, where worms need to randomly search to identify vulnerable hosts, P2P worms spread rapidly and infect all nodes in the network almost instantaneously [<xref ref-type="bibr" rid="ref84">84</xref>]. For example, the Antinny (passive and counterfeit) worm that appeared on the Japan-based Winny P2P network led to the disclosure of a large amount of private data: thousands of patient health records, customers’ identifiable information, top-secret military information, and documents of a county police investigator, yielding information on major investigations on 1500 individuals [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref86">86</xref>]. Furthermore, in 2001, in less than 14 hours, the Code-Red worm (active) infected over 350,000 systems and caused more than US $1.2 billion in damages in the first 10 days of its circulation [<xref ref-type="bibr" rid="ref78">78</xref>].</p>
          <p>P2P worms are some of the best facilitators of botnet-based attacks and internet worms. P2P networks are, for instance, known for sharing <italic>gray</italic> content, such as pornography and pirated streaming media. This can lead users to incautiously monitor unusual behaviors in the network [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref85">85</xref>]. Active P2P worms have different attack strategies: pure random scan (PRS), offline hit-list scan, and web-based scan [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>,<xref ref-type="bibr" rid="ref84">84</xref>]. The PRS is a starting point, information gathering stage, and is the most commonly used strategy [<xref ref-type="bibr" rid="ref78">78</xref>]. PRS is useful when the infected host (bot) possesses no prior vulnerability information of potential targets and randomly selects and mounts attacks on targets to propagate the infection, for instance, using random IP addresses searched from the global internet address space [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>,<xref ref-type="bibr" rid="ref84">84</xref>]. The offline hit-list scan is a more powerful strategy: the attacker collects and continuously attacks targets using DNS, network topology, and routing information of P2P systems (eg, using crawler tools [<xref ref-type="bibr" rid="ref83">83</xref>]) until all the hosts in the hit-list are scanned, and the newly compromised bots attack using the PRS strategy [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>]. Instead of an offline hit-list, the web-based scan strategy primarily launches attacks on its web-based P2P neighbors, and then the worm disseminates further using PRS through the infected worm hosts [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>].</p>
        </sec>
        <sec>
          <title>Impact of Malware on P2P PHSs</title>
          <p>Ransomware constitutes the biggest threat with 151.9 million attacks globally in the first 3 quarters of 2019 [<xref ref-type="bibr" rid="ref91">91</xref>]. Moreover, ransomware attackers are shifting tactics to target higher-value institutions, such as hospitals [<xref ref-type="bibr" rid="ref91">91</xref>]. In 2017, a malware was used in the WannaCry ransomware attack, which infected more than 230,000 computers worldwide [<xref ref-type="bibr" rid="ref131">131</xref>]. In the British National Health Service, WannaCry disrupted scheduled treatments in many hospitals, resulting in total damages of around £92 (US $12.6) million in the United Kingdom [<xref ref-type="bibr" rid="ref132">132</xref>]. The malware hijacked users’ data, encrypted the data, and blackmailed users before decrypting their data [<xref ref-type="bibr" rid="ref133">133</xref>]. For health data on P2P networks, which have a less controlled infrastructure, ransomware attacks can become easier.</p>
          <p>The effect of malware on P2P PHS could be high, although the severity of malware attacks is context-dependent. The effect of malware, such as Antinny [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref86">86</xref>], Anatova [<xref ref-type="bibr" rid="ref134">134</xref>], or Code-Red [<xref ref-type="bibr" rid="ref78">78</xref>], on P2P PHSs will be detrimental if it denies patients and physicians access to the PHS, steals patient data, or hijacks and encrypts data for ransom. Structured P2P PHSs, similar to our proposed architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>) or the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>], could be less vulnerable to malware in comparison with unstructured P2P PHSs. This is due to the possibility of using control measures on the index and DHT networks [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. The factors that increase the attack surface include that P2P client applications tend to be <italic>set and forget</italic> [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref123">123</xref>,<xref ref-type="bibr" rid="ref125">125</xref>] so that they run in the background while the user is not monitoring its activities and that there is no centralized control to detect and prevent attacks in P2P networks. The impact of malware could also escalate beyond the boundary of the P2P network and impede usability features such as emergency access or guardian support. In P2P PHSs, these disruptions can occur on a greater scale than in the example in the previous section, where a single patient could not be treated in a hospital because of a ransomware attack [<xref ref-type="bibr" rid="ref130">130</xref>].</p>
        </sec>
        <sec>
          <title>Social Engineering Attack</title>
          <p>Some P2P clients are being used by users with limited knowledge of computers and information security [<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref94">94</xref>,<xref ref-type="bibr" rid="ref95">95</xref>]. Depending on the nature of the target network, the effect of social engineering attacks—an attack on the users involved in a system [<xref ref-type="bibr" rid="ref93">93</xref>]—can facilitate exploits of other vulnerabilities. P2P worms such as silent worms (eg, VBS.Gnutella worms [<xref ref-type="bibr" rid="ref82">82</xref>]) are based on social engineering, disguise themselves, attach to a known file, and wait to compromise victims [<xref ref-type="bibr" rid="ref93">93</xref>]. Moreover, some P2P systems (eg, Napster and BitTorrent [<xref ref-type="bibr" rid="ref92">92</xref>]) implement mechanisms in which the users are incentivized to share resources or content to gain greater performance and access to content; therefore, experienced users or attackers can exploit the eagerness and likely incautiousness of new users to deceive them and obtain confidential information, which could be used to conduct malicious attacks. Owing to the <italic>set-and-forget</italic> nature of P2P file-sharing applications [<xref ref-type="bibr" rid="ref35">35</xref>], users may not realize the breach of confidentiality risks when using them, which increases the chances of abuse.</p>
        </sec>
        <sec>
          <title>Impact of Social Engineering on P2P PHSs</title>
          <p>Social engineering can affect all types of P2P PHSs, where an attacker can easily leverage the user layer to deceive patients (older adult patients are more vulnerable to this attack than others [<xref ref-type="bibr" rid="ref135">135</xref>]). In the case of P2P PHSs, the threat impact could be one user at a time, with the probability of escalating and affecting others in the network. Social engineering can be observed as an intelligent information gathering stage for attackers to mount other attacks [<xref ref-type="bibr" rid="ref129">129</xref>], such as scamming patients to obtain, for instance, access credentials to their P2P PHS accounts. Depending on the attackers’ goals, they may modify patients’ health records or upload malware to the P2P network to affect patients’ lives, health, location, privacy, behaviors, or activities [<xref ref-type="bibr" rid="ref93">93</xref>] and sabotage the PHS and its providers.</p>
        </sec>
        <sec>
          <title>Poisoning the Network</title>
          <p>Poisoning can be performed either by <italic>index poisoning</italic> or <italic>by routing table poisoning</italic> [<xref ref-type="bibr" rid="ref102">102</xref>]. Many P2P systems have a lookup service using indexing or routing table techniques [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref95">95</xref>]. A poison attacker can use this to inject invalid information such as bogus resource identifiers or fake IP addresses into the lookup service. An index poisoning attack affects the index of P2P systems [<xref ref-type="bibr" rid="ref43">43</xref>]. Injecting invalid information in the index or routing table can slow down the query, prevent others from finding the correct resources, or result in a peer wasting time connecting to invalid peers [<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref102">102</xref>], which eventually affects the P2P network’s quality of service [<xref ref-type="bibr" rid="ref101">101</xref>]. Some anticopyright infringement organizations use poisoning attacks to prevent the sharing of pirated content on P2P networks [<xref ref-type="bibr" rid="ref89">89</xref>,<xref ref-type="bibr" rid="ref99">99</xref>,<xref ref-type="bibr" rid="ref100">100</xref>]. These attacks are performed by identifying and poisoning the IP addresses of the servers for pirated content or using their IP addresses as evidence to sue the content server or P2P system providers [<xref ref-type="bibr" rid="ref71">71</xref>].</p>
          <p>An index maintains records in a centralized manner (eg, Napster [<xref ref-type="bibr" rid="ref50">50</xref>], P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>], or e-toile framework [<xref ref-type="bibr" rid="ref21">21</xref>]) and enables users to locate resource owners’ IP addresses and port numbers. In <italic>index poisoning attacks</italic>, the attacker aims to compromise indexing peers (peers that participate in the indexing) by adding invalid information into their local indexes by simply sharing the bogus information with the indexing peer [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref81">81</xref>].</p>
          <p>A poison attacker can also attack a specific host; for example, if the attacker wants to conduct a DDoS attack on the application server at host 129.13.152.6, the invalid information may include 129.13.152.6 for the IP address and 80 for the port number. Once the indexing peer has been poisoned, another peer can search for a resource and eventually receive invalid information from the poisoned peer and try to download the resource from the victim host. Before downloading the resource, the transmission control protocol (TCP) connection is established with the victim host using invalid information. To download the resource, the requesting peer sends a message to the desired resource. When many peers try to download the resource from the victim host, a TCP-connection DDoS comes into effect [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>].</p>
          <p>Structured P2P systems (eg, P2P IHE [<xref ref-type="bibr" rid="ref51">51</xref>], our proposed PHS architecture [<xref rid="figure3" ref-type="fig">Figure 3</xref>], Chord, and Kademlia [<xref ref-type="bibr" rid="ref35">35</xref>]) are vulnerable to poison attacks [<xref ref-type="bibr" rid="ref95">95</xref>], although resource discovery is under the control of data structures (eg, DHT). In <italic>routing table poisoning</italic>, the poison attacker exploits the fact that each peer in a DHT-based P2P system maintains the routing tables of its neighbors [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref95">95</xref>,<xref ref-type="bibr" rid="ref96">96</xref>]. Each entry in the table includes the neighbor’s identifier, IP address, and port number. The attacker can deceive participating peers by injecting invalid neighbors into their routing tables. The poisoned peer may choose an invalid neighbor in its routing table and forward its messages. If the routing tables of many peers are poisoned with invalid information and each entry points to the IP address of the victim host, the target receives a flood of messages from the DHT [<xref ref-type="bibr" rid="ref95">95</xref>]. A further type of content pollution attack is a <italic>combination attack</italic> that combines <italic>index poisoning</italic> and <italic>fake-block</italic> attacks to have a higher impact [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. In this case, poison attackers use an index poisoning attack to include their IDs in the invalid information to be advertised. If the victims establish the connection through the invalid information, they may connect to a poison attacker, so that the attacker can feed the victims with fake fragments and impose more harm on them.</p>
        </sec>
        <sec>
          <title>Impact of Poisoning Attacks on P2P PHSs</title>
          <p>Centralized P2P PHSs, such as P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>] and the e-toile framework [<xref ref-type="bibr" rid="ref21">21</xref>], could suffer the worst effects of poison attacks because they can cause DDoS or entire network failure and disrupt the services offered by PHSs. For example, in the e-toile framework [<xref ref-type="bibr" rid="ref21">21</xref>], a list of health care stakeholders and their access rights, data exchange, and authentication is managed by a central index server; poisoning such an index could mean that the data of a patient registered with PHS<sup>X</sup> in need of emergency care at a remote hospital that uses PHS<sup>Y</sup> could be inaccessible to practitioners. Even if the networks of PHS<sup>X</sup> and PHS<sup>Y</sup> are not affected, the single point connecting the PHS providers is disrupted. Depending on the urgency of a patient’s need for treatment, the need for access to health data, and the longevity of the attack, the patient’s health and life could be adversely affected. In some P2P PHSs (eg, P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>] or P2HR [<xref ref-type="bibr" rid="ref20">20</xref>]), peers’ IP addresses are exposed to facilitate health information exchange between different health entities; this makes the attack even easier. For our proposed P2P PHS architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>), there is a federation of PHSs and tuple center providers. Within the context of the previous scenario, access and data exchange will not be impacted if PHS<sup>Y</sup> is in the same tuple group as PHS<sup>X</sup>.</p>
        </sec>
        <sec>
          <title>Sybil Attack</title>
          <p>The name Sybil attack was coined by Microsoft Research in 2002 based on the book Sybil about a patient, named Sybil, diagnosed with dissociative identity disorder [<xref ref-type="bibr" rid="ref111">111</xref>]. In computer security, Sybils refer to multiple identities of a single user on the same machine; this user can become powerful and control a significant part of the network or use the identities to influence the system behavior [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref109">109</xref>,<xref ref-type="bibr" rid="ref110">110</xref>,<xref ref-type="bibr" rid="ref112">112</xref>]. In DHT-based P2P systems, a user can locally generate multiple <italic>node IDs</italic> for many node instances on the same machine [<xref ref-type="bibr" rid="ref108">108</xref>]—on the Kad network, a single node can select multiple IDs concurrently [<xref ref-type="bibr" rid="ref107">107</xref>]. The creation of Sybils is considered the most harmful behavior on a P2P system [<xref ref-type="bibr" rid="ref54">54</xref>], as it offsets the network’s redundancy property [<xref ref-type="bibr" rid="ref81">81</xref>]. Sybil attacks occur in a P2P network, when the reputation mechanisms are compromised [<xref ref-type="bibr" rid="ref72">72</xref>], secure authentication mechanisms are not implemented (eg, no proof of identification is required for registration in the P2P session initiation protocol network [<xref ref-type="bibr" rid="ref106">106</xref>]), or verification of a client’s IP address and its maximum number of connections per ID is not implemented (eg, Kad network [<xref ref-type="bibr" rid="ref98">98</xref>]). Limiting the number of connections per IP address (eg, in eDonkey [<xref ref-type="bibr" rid="ref84">84</xref>]) does not prevent Sybil attacks because attackers can bypass this by having many virtual IP addresses. It seems that there is no clear and definite solution to prevent Sybil attacks [<xref ref-type="bibr" rid="ref26">26</xref>]; this is due to the openness and lack of admission control mechanisms in P2P networks.</p>
          <p>Sybils are used by attackers to conduct massive and organized attacks on P2P networks [<xref ref-type="bibr" rid="ref92">92</xref>]. For example, eclipse attacks [<xref ref-type="bibr" rid="ref54">54</xref>] amplify Sybil attacks through the combination of Sybil and ID assignment or mapping attacks [<xref ref-type="bibr" rid="ref105">105</xref>], which assigns identifiers near the same portion of the ID space to sufficient Sybil nodes (<xref rid="figure6" ref-type="fig">Figure 6</xref>). This enables the attacker to own a deciding power of where in the ID space the new nodes are placed. When the attacker owns more nodes than the benign nodes in the segment, the attacker can control messages in the segment, bias reputation score, create DDoS situations, or force servers to exceed their CPU capacity [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref84">84</xref>], which is also known as a gateway attack [<xref ref-type="bibr" rid="ref92">92</xref>]. In blockchain P2P networks, Sybil attacks are, for instance, used by attackers to outvote the honest nodes in the network [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref104">104</xref>], which enables the attacker to cheat without being detected. After a successful Sybil attack, attackers can transmit or discard blocks, effectively block other users from the network, carry out <italic>51% of attacks</italic> to change the order of transactions, prevent transactions from being confirmed, or even reverse transactions that they made, which can lead to double spending [<xref ref-type="bibr" rid="ref103">103</xref>].</p>
          <fig id="figure6" position="float">
            <label>Figure 6</label>
            <caption>
              <p>Example of Sybil attack [<xref ref-type="bibr" rid="ref92">92</xref>]. The attacker placed his malicious nodes on one side of the network segment. Placing many malicious nodes in the network enables the attacker to gain control of the activities of one-half of the network.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Impact of Sybil Attacks on P2P PHSs</title>
          <p>Sybil attacks are helpful for attackers to disguise their identities, access vital information managed in the PHS index service, monitor communications between users, steal patient data, or pollute the entire network to disrupt the entire PHS service operation, which would affect patients’ health and life and sabotage the PHS provider's reputation. In our proposed PHS architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>) or the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>], the national health IT agencies are tasked with effectively handling health care stakeholders’ registration, authentication, and verification; therefore, freedom to create multiple concurrent IDs on the same system by any malicious user is reduced by design. P2P PHSs, such as P2P IHE [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref51">51</xref>], could be more vulnerable to Sybil attacks due to the difficulty in establishing control mechanisms in a decentralized network. In any case, attackers can leverage Sybil attacks to steal patients’ identities (eg, for insurance coverage or blackmail).</p>
        </sec>
        <sec>
          <title>Eclipse Attack</title>
          <p>An eclipse attack is a large-scale man-in-the-middle (MitM) attack that is commonly executed at the P2P network level [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref92">92</xref>]; routing, sniffing, and traffic analysis attacks are variants [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref79">79</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref115">115</xref>,<xref ref-type="bibr" rid="ref116">116</xref>]. An eclipse attack aims to separate the entire network into 2 or more partitions (<xref rid="figure7" ref-type="fig">Figure 7</xref>) by placing malicious nodes in a strategic routing path of the P2P network [<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref108">108</xref>] to surround benign nodes with malicious neighbors [<xref ref-type="bibr" rid="ref77">77</xref>]. In most cases, the routing mechanisms are attacked [<xref ref-type="bibr" rid="ref47">47</xref>]. This is accomplished by adding the attackers’ addresses to the neighbor list of the benign nodes [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref81">81</xref>] or through fake routing updates and incorrect routing [<xref ref-type="bibr" rid="ref105">105</xref>]. Once the network is fully segmented with malicious nodes in between the partitions, the attacker can act as a gateway and disrupt the information flow between the network partitions, exclude groups of nodes from the network, or steal peer identities [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. This affects the reliability, autonomy, and connectivity between peers and the CIA properties of P2P networks [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref114">114</xref>]. In addition to mounting an eclipse attack by manipulating the overlay network, an attacker that has collected a significant number of peer IDs and acts as a neighbor of benign nodes can easily mount eclipse attacks [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref107">107</xref>].</p>
          <fig id="figure7" position="float">
            <label>Figure 7</label>
            <caption>
              <p>Example of an eclipse attack [<xref ref-type="bibr" rid="ref92">92</xref>]. The attacker successfully segmented the network into 2 ID spaces. The communications between the nodes in the network must be forwarded by the malicious nodes.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>Successful eclipse attacks require attackers to possess a high proportion of fake nodes in the network and a higher number of direct routes coming to their nodes than to the average benign nodes in the network [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>], especially in networks with relaxed rules for maintaining the routing table [<xref ref-type="bibr" rid="ref92">92</xref>]. P2P systems that have no control over node placement in the ID space (eg, Gnutella [<xref ref-type="bibr" rid="ref54">54</xref>]) or freedom of choice for identifiers (eg, Kad [<xref ref-type="bibr" rid="ref107">107</xref>]) are highly vulnerable to eclipse attacks. P2P networks are more susceptible to eclipse attacks when they are new [<xref ref-type="bibr" rid="ref54">54</xref>].</p>
          <p>As seen in the Bitcoin network, a botmaster with as few as 24 IP address blocks can eclipse any node with a minimum probability of 85%, irrespective of the number of nodes in the network [<xref ref-type="bibr" rid="ref114">114</xref>]. Despite new security patches that address eclipse attacks on the Bitcoin network, a novel form of eclipse attack, EREBUS, was found [<xref ref-type="bibr" rid="ref113">113</xref>], which partitions the network and affects Bitcoin nodes' peering decisions. This shows the likelihood of exploiting eclipses in P2P networks.</p>
        </sec>
        <sec>
          <title>Impact of Eclipse Attacks on P2P PHSs</title>
          <p>The lack of freedom to select and place identities and the presence of a control infrastructure in centralized and hybrid P2P PHS (eg, our proposed architecture [<xref rid="figure3" ref-type="fig">Figure 3</xref>] or the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>]) reduces the impact of any form of eclipse attack on P2P PHSs. This could be higher for decentralized P2P PHSs such as P2P IHE [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref51">51</xref>] because of the absence of centralized trust and control infrastructures and the presence of eclipse attack vectors such as resource routing mechanisms in the network [<xref ref-type="bibr" rid="ref47">47</xref>]. In addition, a successful attack could allow an attacker to eavesdrop on the conversation between users in the network without potentially compromising the patient's system. P2P PHSs on a patient device can be configured with wearable smart sensors to allow health practitioners or an embedded machine learning model to monitor vital parameters (eg, heart rate variability). In the case of a successful MitM attack on such P2P PHSs, the practitioners or machine learning models may receive unreliable data, which could lead to poor therapeutic or diagnostic decisions and even loss of life [<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref135">135</xref>]. An attacker can also share fake messages that an older adult has fallen in order to summon the next-of-kin or emergency services or use the patient's location or personal data for blackmail [<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref135">135</xref>].</p>
        </sec>
        <sec>
          <title>DDoS Attack</title>
          <p>A traditional denial-of-service (DoS) attack stops a service [<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref94">94</xref>]. Query flooding is the most common resource and key to mounting DoS on P2P networks [<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref117">117</xref>]. Invalid or corrupted packets flood the network [<xref ref-type="bibr" rid="ref95">95</xref>] and impede the delivery of valid requests or messages in the network—byzantine attacks [<xref ref-type="bibr" rid="ref119">119</xref>]—and therefore stop all communications passing through the affected routes. A DDoS is said to occur when constant streams of invalid packets flood the network in such a way that a single node has to deal with massive traffic and runs out of bandwidth [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref92">92</xref>]—bandwidth attacks (<xref rid="figure8" ref-type="fig">Figure 8</xref>). A lack of central authority can be the root cause for DDoS [<xref ref-type="bibr" rid="ref97">97</xref>], but the root cause can also be due to the absence of mechanisms that verify response messages from other nodes (eg, in Kad [<xref ref-type="bibr" rid="ref98">98</xref>]). Many nodes (or zombies controlled by attackers, where each zombie may control other attacking zombies) participate in DDoS attacks [<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref88">88</xref>], while the source of the attack is hidden behind a separate layer or through spoofed IP addresses [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref105">105</xref>]. This disguise of the attackers makes it difficult to detect them because they are often only indirectly involved [<xref ref-type="bibr" rid="ref81">81</xref>].</p>
          <fig id="figure8" position="float">
            <label>Figure 8</label>
            <caption>
              <p>Example of a distributed denial-of-service (DDoS) attack [<xref ref-type="bibr" rid="ref92">92</xref>]. The attacker successfully executed the DDoS attack and compromised many nodes in the network. The normal nodes cannot establish connections to other normal nodes.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e24460_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>The previously discussed index and DHT routing table poisoning attacks and file request redirection (or topology change) attacks are other methods of mounting DDoS [<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref98">98</xref>,<xref ref-type="bibr" rid="ref102">102</xref>,<xref ref-type="bibr" rid="ref110">110</xref>,<xref ref-type="bibr" rid="ref118">118</xref>]. A file request redirection attacker (chatty peer) advertises the possession of many false resources that are rare in the P2P network and then establishes several TCP connections with the victims (requesting peers) [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref102">102</xref>]. However, if the requesting peers ask for the blocks of the requesting resource, the attacker only resends handshake messages to the victims and never uploads any blocks. This makes the requesting peers spend much time waiting in vain for the attacker's response and blocking other legitimate users from making connections to them. As such, TCP-connection DDoS comes into effect and affects the availability of entire P2P networks [<xref ref-type="bibr" rid="ref72">72</xref>]. A request-redirection DDoS attack on internet equipment was used to shut down tech giants’ websites (eg, Yahoo and Amazon) in February 2000 [<xref ref-type="bibr" rid="ref84">84</xref>], which shows the impact severity of DDoS on any network.</p>
          <p>DDoS is an active attack that makes it more aggressive. An attacker often attacks the network to prevent certain users from performing their tasks or put the system out of service in one or many segments of the underlying infrastructure [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref84">84</xref>]. The probability of a DDoS attack is high in large P2P networks because nodes have to be reachable (usually outside of firewalls restrictions, etc) by the network [<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref117">117</xref>]. Depending on the number of zombies, DDoS on decentralized P2P networks may barely affect the entire network, except for a certain number of affected peers. On the contrary, the impact could be higher on centralized and hybrid systems because communication relies on a single entity that is reachable throughout the network or subnetwork. The higher the number and diversity of nodes involved in the DDoS, the more difficult it is to be blocked [<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref97">97</xref>].</p>
        </sec>
        <sec>
          <title>Impact of DDoS on P2P PHSs</title>
          <p>When P2P PHS providers are hospitals, as in our proposed architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>), and store all patients’ medical records, a successful DDoS attack on the network (index or super peers) will have severe consequences. The effect could disrupt the network and data access and cause a delay in treatment and even loss of life (eg, the case of a patient who died after a malware hit a hospital in Germany [<xref ref-type="bibr" rid="ref130">130</xref>]). In some centralized and hybrid COVID-19 contact tracing systems (eg, PEPP-PT [<xref ref-type="bibr" rid="ref22">22</xref>] and Trace-Together [<xref ref-type="bibr" rid="ref23">23</xref>]), the identifiers (ephemeral IDs) that are used to share exposure notifications during smartphone encounters are generated through a central authority (eg, a hospital) and enough of them are generated in batches, for future use and for constructing contact graphs of users when they are infected [<xref ref-type="bibr" rid="ref136">136</xref>]. A DoS on this server could prevent the IDs and relevant estimations to reach the targets, and the affected persons would have a false sense of safety since they are no longer notified about encountered contacts. In any case, the effect of DDoS is likely higher in centralized and hybrid P2P PHS than in decentralized P2P PHSs such as P2P IHE [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. This is because of the presence of single points that manage other users in the network. However, centralized control mechanisms also ease the tracing of attackers and reduce the probability of DDoS attacks.</p>
        </sec>
        <sec>
          <title>P2P Traffic Blockade</title>
          <p>In 2008, P2P networks accounted for almost 53% of internet traffic in Germany, followed by web browsing (26%) and streaming (7%) [<xref ref-type="bibr" rid="ref122">122</xref>]. With respect to P2P network traffic, BitTorrent accounted for 37%, web browsing for 15%, and eDonkey for 13% of P2P internet traffic [<xref ref-type="bibr" rid="ref122">122</xref>]. Given the high proportion of P2P traffic in most regions, it is not surprising that a number of internet service providers (ISPs) are using advanced filtering techniques to impose bandwidth limits and throttle or block traffic associated with P2P systems, for instance, by using port numbers, flow features, and deep packet inspections [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref121">121</xref>]. In 2012, the United Kingdom High Court ordered, for example, some ISPs (eg, O2, Virgin Media, and TalkTalk) to block BitTorrent P2P traffic owing to its potential for copyright infringements [<xref ref-type="bibr" rid="ref120">120</xref>].</p>
        </sec>
        <sec>
          <title>Impact of P2P Traffic Blockade on P2P PHSs</title>
          <p>The consequence of a P2P traffic blockade on any type of P2P PHS could be high because the effect could render the system unavailable over the network, for instance, in a situation where ISPs realize a high proportion of internet traffic caused by P2P networks and impose bandwidth limits or block the traffic. If any P2P PHS user is affected by the blockage, P2P PHSs, for instance, for remote sharing of medical records or COVID-19 exposure notifications will be disrupted. This can potentially affect patient health and contribute to virus spread. As a workaround, users can move to a different region that does not block traffic because P2P systems are not bound by borders. The chances of being affected by a P2P traffic blockade when using a PHS is higher in regions that often use network traffic blockades as a public policy instrument (eg, in authoritarian regimes).</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Our findings support the idea that P2P system security is a process rather than a product [<xref ref-type="bibr" rid="ref33">33</xref>]. Moreover, security encompasses not only technical issues but also human and management problems. Therefore, it is highly relevant for the development and use of P2P PHSs to consider the security issues in P2P networks and the techniques used to exploit them, the security requirements to prevent attacks, peculiarities of attacks, and potential attacker profiles. Our findings are presented in <xref ref-type="table" rid="table3">Tables 3</xref> and <xref ref-type="table" rid="table4">4</xref>. Security issues such as malware, social engineering attacks, eclipse attacks, DDoS attacks, pollution attacks, and P2P traffic blockades pose high threats (in case of a successful attack) and have a high probability of being exploited in P2P PHSs owing to the high number of factors contributing to their chances of successful exploitation (<xref ref-type="table" rid="table3">Table 3</xref>); moreover, they can put any P2P PHS out of service, which can potentially affect patients’ state of health. For illustrative purposes, we discuss the factors and scores for malware and eclipse attacks in detail below (refer to the section <italic>Identified Security Issues and Their Impact on P2P PHSs</italic> for a detailed discussion of the security issues).</p>
        <p>The effect of any malware type depends on its propagation speed and power. Malware that compromised a PHS can be inadvertently spread by the patient (eg, when it is hidden in a patient’s health records). Other factors promoting security issues in P2P networks (set-and-forget, no borders, digital winds spreading files, growing use, and network heterogeneity) and no content verification (<xref ref-type="table" rid="table3">Table 3</xref>) can fuel malware propagation in the network. If attackers compromise super nodes (eg, practitioners or hospital nodes), they can spread malware even more easily. A successful malware attack (eg, Antinny [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref86">86</xref>] or Code-Red [<xref ref-type="bibr" rid="ref78">78</xref>]) on any P2P PHS can affect the CIA properties of the network and may cause a delay in treatment or even loss of life (eg, the case of a patient who died after a malware hit a hospital in Germany [<xref ref-type="bibr" rid="ref130">130</xref>]). Malware can attack various network layers (user, network, or transport layers) to mount DoS attacks, poison the network, block P2P traffic, or compromise users’ identities or health data.</p>
        <p>The severity of malware is low in centralized P2P PHSs (eg, the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>] or P2P PHR [<xref ref-type="bibr" rid="ref6">6</xref>]; <xref ref-type="table" rid="table4">Table 4</xref>) because the central index server can simply be used as a trusted computing base [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>] or a point to deploy control measures to mitigate the propagation of malware in the network. The severity of malware is medium in hybrid P2P PHSs (eg, P2HR [<xref ref-type="bibr" rid="ref20">20</xref>]), our proposed P2P PHS architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>; <xref ref-type="table" rid="table4">Table 4</xref>), because there are no central attack profiles, and a federated data ecosystem multiplies the effort required for malware attacks by the number of federated subnetworks. The severity of malware is high in decentralized P2P PHSs (eg, P2P IHE [<xref ref-type="bibr" rid="ref51">51</xref>]; <xref ref-type="table" rid="table4">Table 4</xref>) because of the lack of a trusted computing base and high responsibility for individual users to maintain routing information (DHT networks) and security measures [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Once the neighbor lists of users are infected by malware, the malware can spread further (eg, using a PRS strategy) through the nodes’ subnetworks, which contributes to the malware's high propagation speed [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>].</p>
        <p>Factors such as use and network heterogeneity, no borders, and snooping nodes promote the impact of eclipse attacks on P2P networks (<xref ref-type="table" rid="table3">Table 3</xref>). In most cases, a successful eclipse attack allows an attacker to eavesdrop on the conversation between peers in the network without potentially compromising the victim's system. This impacts the reliability, autonomy, connectivity, and CIA properties of P2P networks [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref114">114</xref>].</p>
        <p>The severity of eclipse attacks is low in centralized P2P PHS (eg, the e-toile framework in Switzerland [<xref ref-type="bibr" rid="ref21">21</xref>]; <xref ref-type="table" rid="table4">Table 4</xref>) because of the difficulty for users to create multiple fake identities (as required to mount an eclipse attack [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]) and the likely presence of trusted computing infrastructure in centralized P2P PHSs. Nevertheless, attacks on central index servers (or super peers in hybrid P2P PHSs) are likely to be able to snoop network communications. The severity of eclipse attacks is medium in hybrid and decentralized P2P PHSs (eg, P2P IHE [<xref ref-type="bibr" rid="ref51">51</xref>]) or our proposed P2P PHS architecture [<xref rid="figure3" ref-type="fig">Figure 3</xref>; <xref ref-type="table" rid="table4">Table 4</xref>]), as eclipse attacks require a high number of compromised nodes and are usually achieved through attacks on routing mechanisms [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. Decentralized and hybrid P2P PHSs require routing mechanisms (eg, DHT) to facilitate health information exchange and communication between patients and practitioners.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Factors promoting the security issues.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="180"/>
            <col width="160"/>
            <col width="110"/>
            <col width="90"/>
            <col width="130"/>
            <col width="140"/>
            <col width="110"/>
            <col width="80"/>
            <thead>
              <tr valign="top">
                <td>Security issues</td>
                <td colspan="7">Factors promoting the security issues</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Inadvertent sensitive information disclosure</td>
                <td>Set-and-forget</td>
                <td>No borders</td>
                <td>Digital winds Spreading Files</td>
                <td>Use and network heterogeneity</td>
                <td>No content verification</td>
                <td>Snooping nodes</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Malware</td>
                <td>✓<sup>a</sup></td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>Social engineering attack</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>Poisoning the network</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>Sybil attack</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>Eclipse attack</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>DDoS attack</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>Pollution</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>P2P<sup>b</sup> traffic blockade</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Factor present.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>P2P: peer-to-peer.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Severity ratings for peer-to-peer patient-centered health care information system security.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="170"/>
            <col width="170"/>
            <col width="180"/>
            <col width="280"/>
            <thead>
              <tr valign="top">
                <td>Security issues</td>
                <td colspan="3">Severity score on P2P PHS<sup>a</sup></td>
                <td>Exemplary security measures</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Centralized</td>
                <td>Hybrid</td>
                <td>Decentralized</td>
                <td>
                  <break/>
                </td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Malware</td>
                <td>Low</td>
                <td>Medium</td>
                <td>High</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Firewall</p>
                    </list-item>
                    <list-item>
                      <p>Antivirus and antispyware</p>
                    </list-item>
                    <list-item>
                      <p>Mobile agent–based intrusion detection system</p>
                    </list-item>
                    <list-item>
                      <p>Access policies</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Social engineering attack</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Education and awareness training</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Poisoning the network</td>
                <td>Low</td>
                <td>Medium</td>
                <td>High</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Authentication protocol</p>
                    </list-item>
                    <list-item>
                      <p>Trust and reputation system</p>
                    </list-item>
                    <list-item>
                      <p>Access policies</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Sybil attack</td>
                <td>Low</td>
                <td>Low</td>
                <td>Medium</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Authentication protocol</p>
                    </list-item>
                    <list-item>
                      <p>Trust and reputation system</p>
                    </list-item>
                    <list-item>
                      <p>End-to-end encryption</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Eclipse attack</td>
                <td>Low</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Authentication protocol</p>
                    </list-item>
                    <list-item>
                      <p>Trust and reputation system</p>
                    </list-item>
                    <list-item>
                      <p>End-to-end encryption</p>
                    </list-item>
                    <list-item>
                      <p>Access policies</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>DDoS<sup>b</sup> attack</td>
                <td>High</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Firewall</p>
                    </list-item>
                    <list-item>
                      <p>Mobile agent–based intrusion detection system</p>
                    </list-item>
                    <list-item>
                      <p>Bandwidth limitation per node</p>
                    </list-item>
                    <list-item>
                      <p>Access policies</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Pollution</td>
                <td>Low</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>File and content verification</p>
                    </list-item>
                    <list-item>
                      <p>Trust and reputation system</p>
                    </list-item>
                    <list-item>
                      <p>End-to-end encryption</p>
                    </list-item>
                    <list-item>
                      <p>Removal of polluted content</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>P2P traffic blockade</td>
                <td>High</td>
                <td>Medium</td>
                <td>Low</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>End-to-end encryption</p>
                    </list-item>
                    <list-item>
                      <p>Encryption of P2P traffic</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>P2P PHS: peer-to-peer patient-centered health care information system.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>DDoS: distributed denial-of-service.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Protecting P2P PHSs Against Security Issues</title>
        <p>Under normal circumstances, patient-physician relationships are based on trust, and P2P systems generally require trust between their participants [<xref ref-type="bibr" rid="ref46">46</xref>]. However, uncertainties regarding the protection of user data, single points of failure, and the integrity of the super peers remain. Under our proposed PHS architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>), a trusted registration authority (eg, the German HTI or a hospital) is introduced to the network to handle administrative tasks such as authentication and verification and can also issue or revoke credentials to users based on their behavior [<xref ref-type="bibr" rid="ref30">30</xref>]. End-to-end encryption [<xref ref-type="bibr" rid="ref137">137</xref>] can be used to maintain confidentiality in health care information systems [<xref ref-type="bibr" rid="ref30">30</xref>] and to reduce the trust required for other network participants. For instance, the state-of-the-art cryptographic protocol Signal for end-to-end encryption, which is used by popular instant messaging apps [<xref ref-type="bibr" rid="ref138">138</xref>], including WhatsApp, Wire, and Facebook Messenger, can be used. Security analyses of the Signal protocol show that it can resist most known attacks [<xref ref-type="bibr" rid="ref139">139</xref>]. Furthermore, transparency mechanisms can be used to make it easier to hold a provider accountable for violating users’ trust [<xref ref-type="bibr" rid="ref26">26</xref>], for example, certificate transparency can be managed by a set of services and neutral auditors to keep track of X.509 certificates of providers and quickly observe rogue or hacked certificate authorities. Such security techniques reduce the impact of eclipse attacks, DDoS attacks, pollution attacks, poisoning attacks, and P2P traffic blockade on P2P networks [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. For example, an intercepted message can be rendered useless for eclipse attackers by encrypting it.</p>
        <p>A discussion of all possible security measures (see <xref ref-type="table" rid="table4">Table 4</xref> for examples) for each identified security issue is beyond the scope of this study. In line with the identified security issues, we focus on trust and reputation models (TRM), identity authentication schemes (IAS), and agent-based intrusion detection systems (IDSs). As an overarching guideline, we extended an extant guideline for secure provision of PHSs [<xref ref-type="bibr" rid="ref2">2</xref>] (<xref rid="figure9" ref-type="fig">Figure 9</xref>) with 2 additional steps (<italic>selection and modeling of security measures</italic> [step 3] and <italic>risk assessment</italic> [step 6]). The guideline is useful for supporting individual PHS providers to deal with the complexity of securing P2P PHSs.</p>
        <p>An effective IAS addresses security issues such as Sybil attacks, poisoning attacks, pollution attacks, and MitM attacks [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref140">140</xref>] and is essential for health care information systems [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. By authenticating users and resources shared, the origin of pollution or poisoning attacks can be traced, and the attackers can be held accountable. Individual PHS providers leveraging an effective IAS can strengthen security, which has the potential to increase patients’ intention to use P2P PHSs. In Germany, the German HTI planned to provide user authentication through smart cards as a security measure for PHS providers [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref141">141</xref>]. However, the introduction of national HTIs often leads to ambiguous, expensive, and protracted projects [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref141">141</xref>]. Until such solutions are widely available, developers of P2P PHSs should consider the use of other IASs for the secure provision of PHSs in public networks [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        <p>Reputation systems are used to determine the trustworthiness of nodes and to mitigate Sybil, poisoning, pollution, and MitM attacks [<xref ref-type="bibr" rid="ref142">142</xref>]. Reputation management for resources being shared and peers [<xref ref-type="bibr" rid="ref143">143</xref>] reduces vulnerabilities such as ID stealth or pseudospoofing [<xref ref-type="bibr" rid="ref144">144</xref>,<xref ref-type="bibr" rid="ref145">145</xref>]. TRM techniques can be leveraged in P2P PHS in any situation where a party misbehaves (eg, by supplying inappropriate data to a PHS). Patients can report misbehavior to reputation systems so that it can be reflected in the reputation of the misbehaving party. Polluted resources can also be reported and removed if their reputation is too low [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref81">81</xref>].</p>
        <p>To address the issues of malicious peers, worms, and DDoS attacks in the network, an intelligent mobile agent–based IDS can be deployed in strategic locations (eg, at a hospital node in our proposed P2P PHS architecture, <xref rid="figure3" ref-type="fig">Figure 3</xref>; in the DHT network in decentralized P2P PHSs such as P2P IHE [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]; or at central index servers of centralized PHSs such as the e-toile PHS [<xref ref-type="bibr" rid="ref21">21</xref>]) to protect the corresponding subnetworks in P2P networks. There are prototypes of scalable and decentralized agent-based IDS that use 3 types of algorithms (heavy, medium, and light scan algorithms) to detect malicious activities as early as possible [<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref146">146</xref>,<xref ref-type="bibr" rid="ref147">147</xref>]. Backpropagation neural network techniques can be used in IDS to reduce the response times and false alarm rates [<xref ref-type="bibr" rid="ref148">148</xref>,<xref ref-type="bibr" rid="ref149">149</xref>]. To improve detection latency and load balancing, a collaborative IDS uses publish and subscribe techniques to selectively route evidence of malicious activities between peers in the network using distributed lookup mechanisms [<xref ref-type="bibr" rid="ref150">150</xref>,<xref ref-type="bibr" rid="ref151">151</xref>]. Worms scan and infect certain ports in a network. A firewall can be used to monitor, filter, block, and blacklist them; antivirus and antispyware tools can be leveraged to remove or quarantine any suspicious file [<xref ref-type="bibr" rid="ref81">81</xref>]. The DDoS can be mitigated by limiting the download bandwidth for each node. Other policies, such as restricting P2P access to verified directories and scanning each file before opening, can mitigate the impact of DDoS, malware, and poisoning attacks [<xref ref-type="bibr" rid="ref97">97</xref>].</p>
        <p>We added risk management (step 6) to the guideline for secure provision of PHSs (<xref rid="figure9" ref-type="fig">Figure 9</xref>) to allow for prioritization of security issues with higher impact and for the efficient use of available resources [<xref ref-type="bibr" rid="ref152">152</xref>]. Risk assessment (step 6a) focuses on the identification and assessment of security issues based on the likelihood of occurrence and the severity of exploits. The cost-benefit analysis involves an analysis of the costs associated with recovering from security breaches. In a situation where the costs for mitigation are higher than the potential impact of a security issue, P2P PHS providers may choose to accept some level of risk.</p>
        <fig id="figure9" position="float">
          <label>Figure 9</label>
          <caption>
            <p>Guidelines for provision of the patient-centered health care information system (PHS) while ensuring security.</p>
          </caption>
          <graphic xlink:href="jmir_v23i11e24460_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>This research focuses on security engineering for P2P PHSs. Legal issues with respect to health care security management are beyond the scope of this study. A further limitation of this study is that P2P PHS is an emerging phenomenon; therefore, our study does not provide real-world experiments or a review of past P2P PHS security incidents. Moreover, the bandwidth, computation, and storage cost analyses of the proposed P2P infrastructure, how usability and deployability will affect P2P PHS adoption, and how to handle patient registration with multiple PHS providers are beyond the scope of this study.</p>
      </sec>
      <sec>
        <title>Contributions</title>
        <p>Our research provides a foundation for understanding P2P system architectures and their advantages and disadvantages. We propose and discuss a federated architecture (<xref rid="figure3" ref-type="fig">Figure 3</xref>) suitable for PHS deployment, which could be adopted by any P2P PHS provider, such as insurance companies, hospitals, or other parties who want to implement P2P PHSs while maintaining security. On the basis of the 3 different archetypical P2P system architectures, we elicited and reviewed the inherent security issues and factors promoting the security issues (<xref ref-type="table" rid="table3">Table 3</xref>). Moreover, we discuss the consequences of the security issues and apply a severity scoring system (<xref ref-type="table" rid="table4">Table 4</xref>), signifying the impact of each security issue for the 3 different architectures of P2P PHSs—centralized, hybrid, and decentralized—based on the CVSS definitions (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>). Although a comprehensive discussion of security measures to address each identified security issue is beyond the scope of this study, we offer an overview of potential security measures that are useful for maintaining security in P2P PHSs. We also extended a guideline for the secure provision of PHSs in public networks (<xref rid="figure9" ref-type="fig">Figure 9</xref>) for the P2P PHS context [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
        <p>P2P PHSs (eg, COVID-19 contact tracing systems such as PEPP-PT [<xref ref-type="bibr" rid="ref22">22</xref>] or OnePatient [<xref ref-type="bibr" rid="ref15">15</xref>]) require research from many perspectives to facilitate widespread use because they are an emerging phenomenon, pose major security issues (eg, by requiring patients to manage information security largely by themselves [<xref ref-type="bibr" rid="ref65">65</xref>]), and are understudied. Extant research on PHS security, privacy, and end-user features [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref31">31</xref>] focuses on centralized and DLT-based PHS. Our research serves as an introduction to P2P PHSs and potential security issues and countermeasures. From an ethical perspective, our study is of interest to initiatives aimed at empowering patients to take ownership of and control access to their health data. P2P PHSs promote socially desirable design features such as openness, reduced dependence on platforms, abandonment of data silos, and secure patient-to-practitioner communication. Given that the security challenges are appropriately addressed, P2P PHSs are also promising for simplifying the implementation of data protection principles (eg, GDPR [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]). Secure P2P PHSs will not only attract more stakeholders but will also be more efficient in achieving the goals of patient-centered digital ecosystems [<xref ref-type="bibr" rid="ref153">153</xref>].</p>
      </sec>
      <sec>
        <title>Future Research</title>
        <p>Opportunities for future research include improved designs of security models, such as IAS, TRM, and intelligent mobile agent–based IDS, to strengthen security. PHSs have other more safety-related security requirements that should also be incorporated in their design, such as emergency access and guardian support. Such features are vital for P2P PHS to facilitate access in situations where patients are incapacitated. However, they are also likely to invoke privacy concerns and data protection challenges, as they require access to sensitive information without consulting patients. By using reliable and patient-centered backup options, P2P PHS providers can integrate identity authentication management in backup servers to facilitate the replacement of patient credentials in a situation where they lose access to their credentials (eg, a stolen laptop). In addition to the development of approaches to improve education and awareness of patients regarding information security challenges inherent to the sharing of data with third parties [<xref ref-type="bibr" rid="ref8">8</xref>], a questionnaire-based study focusing on other P2P PHS stakeholders and asking about their security and privacy concerns with respect to P2P PHSs could yield valuable contributions. A guideline for the evaluation of P2P PHSs based on information security standards (eg, ISO 27799:2016) could also be very useful.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The idea of P2P PHSs to break up barriers among patients, health care systems, physicians, and other stakeholders is appealing. From the patients’ perspective, being empowered to conveniently take ownership of and control access to their health data through PHS might bring forth a digital ecosystem that makes patients a more active contributor in their own care and can streamline health care activities such as receiving and accurately interpreting laboratory test results. In the United States, HIPAA [<xref ref-type="bibr" rid="ref6">6</xref>] specifies that patients have the liberty “to see and get copies of their records, and request amendments”; however, the act does not go into detail on appropriate approaches to give access [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref154">154</xref>]. Currently, PHSs use DLT, P2P technology, or centralized databases for deployment. To mitigate the impact of security issues in centralized databases and the lack of fit of DLT with PHS use cases, P2P PHSs emerged (eg, OnePatient [<xref ref-type="bibr" rid="ref15">15</xref>], doc.ai brands [<xref ref-type="bibr" rid="ref7">7</xref>], or COVID-19 proximity tracing systems such as Stoop [<xref ref-type="bibr" rid="ref24">24</xref>]), which store health records locally (on any patient edge device such as a mobile phone, a tablet computer, a desktop computer, etc) under the control of individual device owners.</p>
        <p>The benefits of P2P networks for PHSs include more options for privacy self-management, autonomous control of infrastructure, and high availability. However, these advantages are associated with complications, as patients must also manage information security largely by themselves. Gartner claims that costs for remediating security issues would be reduced by 75% if only 50% of system vulnerabilities were detected and remediated before production [<xref ref-type="bibr" rid="ref155">155</xref>]. Building a successful P2P system that does not result in privacy or security violations for users is difficult [<xref ref-type="bibr" rid="ref26">26</xref>] and entails a collective effort that fixes the remaining problems (eg, absence of a centralized entity to detect malicious attacks and increased chances of exposing network traffic patterns) with clear considerations of network security and ease of use.</p>
        <p>The enormous value of health data requires the provision of security measures to protect PHSs from cyberattacks. Overcoming security and privacy barriers in P2P PHS is also important for increasing patients’ intention to use PHSs. PHS providers and developers should neither ignore the inherent or past security issues of P2P systems nor be careless about future ones.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>List of individual journals and conferences.</p>
        <media xlink:href="jmir_v23i11e24460_app1.docx" xlink:title="DOCX File , 27 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Definition of Consequence of Exploitation. The rate estimation was guided by the Common Vulnerability Scoring System which provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.</p>
        <media xlink:href="jmir_v23i11e24460_app2.docx" xlink:title="DOCX File , 22 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CIA</term>
          <def>
            <p>confidentiality, integrity, availability</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CVSS</term>
          <def>
            <p>Common Vulnerability Scoring System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DDoS</term>
          <def>
            <p>distributed denial-of-service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DHT</term>
          <def>
            <p>Distributed Hash Tables</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">DLT</term>
          <def>
            <p>distributed ledger technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">DoS</term>
          <def>
            <p>denial-of-service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">HTI</term>
          <def>
            <p>health care technology infrastructure</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">IAS</term>
          <def>
            <p>identity authentication schemes</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">IDS</term>
          <def>
            <p>intrusion detection systems</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">IHE</term>
          <def>
            <p>integrating health care enterprise</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">ISP</term>
          <def>
            <p>internet service provider</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">MitM</term>
          <def>
            <p>man-in-the-middle</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">P2P</term>
          <def>
            <p>peer-to-peer</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">PEPP-PT</term>
          <def>
            <p>Pan-European Privacy-Preserving-Proximity-Tracing</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb17">PHS</term>
          <def>
            <p>patient-centered health care information system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb18">PRS</term>
          <def>
            <p>pure random scan</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb19">TCP</term>
          <def>
            <p>transmission control protocol</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb20">TRM</term>
          <def>
            <p>trust and reputation model</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by funding from the topic Engineering Secure Systems of the Helmholtz Association (HGF) and by KASTEL Security Research Labs.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>JG is a chief executive officer at Refinio GmbH, a company that provides peer-to-peer patient-centered health care information systems (eg, OnePatient). IAY was involved in weekly discussions with software developers working on OnePatient patient-centered health care information system about peer-to-peer patient-centered health care information systems innovations, motivations, contributions, and foundational architectures for this research. BE reports grants from adidas AG, outside the submitted work. In addition, BE has a patent related to gait assessment pending and reports ownership of Portabiles GmbH and Portabiles HealthCare Technologies GmbH.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>Healthcare of the Future: the digital revolution of the healthcare sector - ecosystem, use cases, benefits, challenges and recommendations for action</article-title>
          <source>Porsche-Consulting</source>
          <year>2018</year>
          <access-date>2019-09-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.porsche-consulting.com/fileadmin/docs/Startseite/News/tt1162/Porsche_Consulting_Studie_Healthcare_of_the_Future_EN.pdf">https://www.porsche-consulting.com/fileadmin/docs/Startseite/News/tt1162/Porsche_Consulting_Studie_Healthcare_of_the_Future_EN.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure</article-title>
          <source>Electron Markets</source>
          <year>2014</year>
          <month>2</month>
          <day>8</day>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>89</fpage>
          <lpage>99</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/article/10.1007/s12525-013-0150-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12525-013-0150-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chornyi</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mauro</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Krcmar</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Evaluation framework for personal health records: Microsoft Healthvault vs. Google Health</article-title>
          <source>Proceedings of the 43rd Hawaii International Conference on System Sciences</source>
          <year>2010</year>
          <conf-name>43rd Hawaii International Conference on System Sciences</conf-name>
          <conf-date>Jan. 5-8, 2010</conf-date>
          <conf-loc>Honolulu, HI, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1109/hicss.2010.192</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krist</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Woolf</surname>
              <given-names>SH</given-names>
            </name>
          </person-group>
          <article-title>A vision for patient-centered health information systems</article-title>
          <source>J Am Med Assoc</source>
          <year>2011</year>
          <month>01</month>
          <day>19</day>
          <volume>305</volume>
          <issue>3</issue>
          <fpage>300</fpage>
          <lpage>1</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21245186"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jama.2010.2011</pub-id>
          <pub-id pub-id-type="medline">21245186</pub-id>
          <pub-id pub-id-type="pii">305/3/300</pub-id>
          <pub-id pub-id-type="pmcid">PMC4945156</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Architecture and design of a patient-friendly eHealth web application: patient information leaflets and supplementary services</article-title>
          <source>Proceedings of the 18th Americas Conference on Informati­on Systems (AMCIS 2012)</source>
          <year>2012</year>
          <conf-name>18th Americas Conference on Informati­on Systems (AMCIS 2012)</conf-name>
          <conf-date>August 9-11, 2012</conf-date>
          <conf-loc>Seattle, Washington</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ssrn.com/abstract=2152925"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Horne</surname>
              <given-names>WC</given-names>
            </name>
            <name name-style="western">
              <surname>Miled</surname>
              <given-names>ZB</given-names>
            </name>
          </person-group>
          <article-title>Making the case for a P2P personal health record</article-title>
          <source>Information</source>
          <year>2020</year>
          <month>10</month>
          <day>31</day>
          <volume>11</volume>
          <issue>11</issue>
          <fpage>512</fpage>
          <pub-id pub-id-type="doi">10.3390/info11110512</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Doc.AI brands: Passport, Serenity, Doc.ai, and Genewall</article-title>
          <source>Doc.ai</source>
          <year>2020</year>
          <access-date>2019-10-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doc.ai/">https://doc.ai/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hager</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lindblad</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Brommels</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Salomonsson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wannheden</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Sharing patient-controlled real-world data through the application of the theory of commons: action research case study</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>01</month>
          <day>19</day>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>e16842</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/1/e16842/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/16842</pub-id>
          <pub-id pub-id-type="medline">33464212</pub-id>
          <pub-id pub-id-type="pii">v23i1e16842</pub-id>
          <pub-id pub-id-type="pmcid">PMC7854041</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sinthanayothin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bholsithi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Wongwaen</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Xuto</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>ZBaby: Android application for pregnancy due date, fetus development simulation and weight gain during pregnancy</article-title>
          <source>Proceedings of the International Computer Science and Engineering Conference (ICSEC)</source>
          <year>2014</year>
          <conf-name>International Computer Science and Engineering Conference (ICSEC)</conf-name>
          <conf-date>July 30 - Aug. 1, 2014</conf-date>
          <conf-loc>Khon Kaen, Thailand</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icsec.2014.6978130</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spitzer</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>63% of Americans don't know where their medical data is stored: 8 survey insights</article-title>
          <source>Becker's Healthcare</source>
          <year>2018</year>
          <access-date>2018-10-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.beckershospitalreview.com/ehrs/63-of-americans-don-t-know-where-their-medical-data-is-stored-8-survey-insights.html">https://www.beckershospitalreview.com/ehrs/63-of-americans-don-t-know-where-their-medical-data-is-stored- 8-survey-insights.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
          <article-title>MedicalChain Whitepaper version 2.1</article-title>
          <source>MedicalChain</source>
          <year>2018</year>
          <access-date>2018-12-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medicalchain.com/Medicalchain-Whitepaper-EN.pdf">https://medicalchain.com/Medicalchain-Whitepaper-EN.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <source>HealthBank</source>
          <year>2019</year>
          <access-date>2019-01-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthbank.coop/">https://www.healthbank.coop/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>DeAlmeida</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Parmanto</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Applying a user-centered approach to building a mobile personal health record app: development and usability study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>07</month>
          <day>05</day>
          <volume>7</volume>
          <issue>7</issue>
          <fpage>e13194</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/7/e13194/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13194</pub-id>
          <pub-id pub-id-type="medline">31278732</pub-id>
          <pub-id pub-id-type="pii">v7i7e13194</pub-id>
          <pub-id pub-id-type="pmcid">PMC6640070</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <article-title>Aligning stakeholders in a new healthcare ecosystem</article-title>
          <source>MintHealth</source>
          <year>2018</year>
          <access-date>2019-03-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.minthealth.io/wp-content/uploads/2018/04/MH_WHITEPAPER_04.18.pdf">https://www.minthealth.io/wp-content/uploads/2018/04/MH_WHITEPAPER_04.18.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <article-title>OnePatient</article-title>
          <source>RefinioONE</source>
          <year>2019</year>
          <access-date>2018-10-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://refinio.net/software.html">https://refinio.net/software.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kleinke</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <article-title>Dot-gov: market failure and the creation of a national health information technology system</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2005</year>
          <volume>24</volume>
          <issue>5</issue>
          <fpage>1246</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.24.5.1246</pub-id>
          <pub-id pub-id-type="medline">16162569</pub-id>
          <pub-id pub-id-type="pii">24/5/1246</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Azaria</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ekblaw</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Vieira</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lippman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Medrec: using blockchain for medical data access and permission management</article-title>
          <source>Proceedings of the 2nd International Conference on Open and Big Data (OBD)</source>
          <year>2016</year>
          <conf-name>2nd International Conference on Open and Big Data (OBD)</conf-name>
          <conf-date>Aug. 22-24, 2016</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <fpage>25</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1109/obd.2016.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beinke</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Fitte</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Teuteberg</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Towards a stakeholder-oriented blockchain-based architecture for electronic health records: design science research study</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>10</month>
          <day>07</day>
          <volume>21</volume>
          <issue>10</issue>
          <fpage>e13585</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/10/e13585/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13585</pub-id>
          <pub-id pub-id-type="medline">31593548</pub-id>
          <pub-id pub-id-type="pii">v21i10e13585</pub-id>
          <pub-id pub-id-type="pmcid">PMC6914222</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>CS</given-names>
            </name>
          </person-group>
          <article-title>Bitcoin: a peer-to-peer electronic cash system</article-title>
          <source>SSRN J</source>
          <year>2020</year>
          <fpage>9986</fpage>
          <pub-id pub-id-type="doi">10.2139/ssrn.3440802</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>King</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>P2HR, a personalized condition-driven person health record</article-title>
          <source>Master thesis submitted to the Faculty of Purdue University, Indianapolis, Indiana</source>
          <year>2017</year>
          <access-date>2019-10-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarworks.iupui.edu/handle/1805/13604">https://scholarworks.iupui.edu/handle/1805/13604</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Geissbuhler</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Spahni</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Assimacopoulos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Raetzo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gobet</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Design of a patient-centered, multi-institutional healthcare information network using peer-to-peer communication in a highly distributed architecture</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2004</year>
          <volume>107</volume>
          <issue>Pt 2</issue>
          <fpage>1048</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="medline">15360972</pub-id>
          <pub-id pub-id-type="pii">D040004546</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Troncoso</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Payer</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hubaux</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Salathé</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Larus</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bugnion</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lueks</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Stadler</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Pyrgelis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Antonioli</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Barman</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chatel</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Decentralized privacy-preserving proximity tracing - GitHub DP-3T Documents</article-title>
          <source>GitHub</source>
          <year>2020</year>
          <access-date>2020-07-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/DP-3T/documents">https://github.com/DP-3T/documents</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ippolito</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>YW</given-names>
            </name>
          </person-group>
          <article-title>Contact tracing mobile apps for COVID-19: privacy considerations and related trade-offs</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <access-date>2020-04-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2003.11511">https://arxiv.org/abs/2003.11511</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ulrich</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bernauer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Blocher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gollatz</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Judmayer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Koppmann</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kudera</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lohninger</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Merzdovnik</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ronacher</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schrems</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Technical and legal review of the stopp corona app by the Austrian Red Cross</article-title>
          <source>NOYB – European Center for Digital Rights</source>
          <year>2020</year>
          <access-date>2020-05-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://noyb.eu/sites/default/files/2020-04/report_stopp_corona_app_english_v1.0_0.pdf">https://noyb.eu/sites/default/files/2020-04/report_stopp_corona_app_english_v1.0_0.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rushby</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Design and verification of secure systems</article-title>
          <source>SIGOPS Oper Syst Rev</source>
          <year>1981</year>
          <month>12</month>
          <volume>15</volume>
          <issue>5</issue>
          <fpage>12</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1145/1067627.806586</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Troncoso</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Isaakidis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Danezis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Halpin</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Systematizing decentralization and privacy: lessons from 15 years of research and deployments</article-title>
          <source>Proc Privacy Enhanc Technol</source>
          <year>2017</year>
          <volume>4</volume>
          <fpage>404</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciendo.com/article/10.1515/popets-2017-0056"/>
          </comment>
          <pub-id pub-id-type="doi">10.1515/popets-2017-0056</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <article-title>Solid project by Tim Berners-Lee</article-title>
          <source>Solid Project</source>
          <year>2020</year>
          <access-date>2020-02-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://solidproject.org/">https://solidproject.org/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaletsch</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy engineering: personal health records in cloud computing environments</article-title>
          <source>Proceedings of the International Conference on Information Systems, ICIS 2011</source>
          <year>2011</year>
          <conf-name>International Conference on Information Systems, ICIS 2011</conf-name>
          <conf-date>December 4-7, 2011</conf-date>
          <conf-loc>Shanghai, China,</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/221600139_Privacy_Engineering_Personal_Health_Records_in_Cloud_Computing_Environments"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubovitskaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Secure and trustable electronic medical records sharing using blockchain</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2017</year>
          <volume>2017</volume>
          <fpage>650</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29854130"/>
          </comment>
          <pub-id pub-id-type="medline">29854130</pub-id>
          <pub-id pub-id-type="pmcid">PMC5977675</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Señor</surname>
              <given-names>IC</given-names>
            </name>
            <name name-style="western">
              <surname>Lozoya</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy in electronic health records: a systematic literature review</article-title>
          <source>J Biomed Inform</source>
          <year>2013</year>
          <month>06</month>
          <volume>46</volume>
          <issue>3</issue>
          <fpage>541</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://linkinghub.elsevier.com/retrieve/pii/S1532-0464(12)00186-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2012.12.003</pub-id>
          <pub-id pub-id-type="medline">23305810</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(12)00186-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Müthing</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brüngel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Friedrich</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Server-focused security assessment of mobile health apps for popular mobile platforms</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>01</month>
          <day>23</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>e9818</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/1/e9818/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9818</pub-id>
          <pub-id pub-id-type="medline">30672738</pub-id>
          <pub-id pub-id-type="pii">v21i1e9818</pub-id>
          <pub-id pub-id-type="pmcid">PMC6364205</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farn</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hwang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Study on applying ISO/DIS 27799 to healthcare industry's ISMS</article-title>
          <source>WSEAS Transactions on Biology and Biomedicine</source>
          <year>2007</year>
          <access-date>2020-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://wseas.org/wseas/cms.action?id=4011">https://wseas.org/wseas/cms.action?id=4011</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schneier</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Phil</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Applied Cryptography: Protocols, Algorithms, Source Code in C</source>
          <year>2007</year>
          <publisher-loc>New York, United States</publisher-loc>
          <publisher-name>John Wiley &#38; Sons</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nurgalieva</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>O'Callaghan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy of mhealth applications: a scoping review</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>104247</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.2999934</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vu</surname>
              <given-names>QH</given-names>
            </name>
            <name name-style="western">
              <surname>Lupu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ooi</surname>
              <given-names>BC</given-names>
            </name>
          </person-group>
          <article-title>Architecture of peer-to-peer systems</article-title>
          <source>Peer-to-Peer Computing</source>
          <year>2010</year>
          <publisher-loc>Berlin</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>11</fpage>
          <lpage>37</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vakili</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Khorsandi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Engineering a peer to peer architecture: a complex adaptive system approach</article-title>
          <source>Proceedings of the IEEE International Systems Conference</source>
          <year>2010</year>
          <conf-name>IEEE International Systems Conference</conf-name>
          <conf-date>April 5-8, 2010</conf-date>
          <conf-loc>San Diego, CA, USA</conf-loc>
          <fpage>520</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1109/systems.2010.5482487</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <article-title>Records, computers, and the rights of citizens: Report of the US Dept Welfare Secretary's Advisory Committee on Automated Personal Data Systems</article-title>
          <source>US Department of Health, Education and Welfare</source>
          <year>1973</year>
          <access-date>2020-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.justice.gov/opcl/docs/rec-com-rights.pdf">https://www.justice.gov/opcl/docs/rec-com-rights.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gassmann</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>OECD guidelines governing the protection of privacy and transborder flows of personal data</article-title>
          <source>Comput Networks (1976)</source>
          <year>1981</year>
          <month>4</month>
          <volume>5</volume>
          <issue>2</issue>
          <fpage>127</fpage>
          <lpage>41</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/abs/pii/0376507581900684"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/0376-5075(81)90068-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <article-title>Notifiable Data Breaches Report: July–December 2019</article-title>
          <source>The Office of the Australian Information Commissioner (OAIC)</source>
          <year>2020</year>
          <access-date>2020-07-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-data-breaches-report-july-december-2019/">https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-data-breaches-report-july-december-2019/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <article-title>Protenus 2019 Breach Barometer: 15m+ patient records breached in 2018 as hacking incidents continue to climb</article-title>
          <source>Protenus, Inc. in Collaboration with DataBreaches.net</source>
          <year>2019</year>
          <access-date>2020-04-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://email.protenus.com/hubfs/Breach_Barometer/2018/2019%20Breach%20Barometer%20Annual%20Report.pdf">https://email.protenus.com/hubfs/Breach_Barometer/2018/2019%20Breach%20Barometer%20Annual%20Report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burton</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>De Boel</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kuner</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The final European Union general data protection regulation</article-title>
          <source>Wilson Sonsini</source>
          <year>2016</year>
          <access-date>2020-06-02</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.wsgr.com/en/insights/the-final-european-union-general-data-protection-regulation.html">https://www.wsgr.com/en/insights/the-final-european-union-general-data-protection-regulation.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Security, privacy, and confidentiality issues on the internet</article-title>
          <source>J Med Internet Res</source>
          <year>2002</year>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>E12</fpage>
          <pub-id pub-id-type="doi">10.2196/jmir.4.2.e12</pub-id>
          <pub-id pub-id-type="medline">12554559</pub-id>
          <pub-id pub-id-type="pmcid">PMC1761937</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naoumov</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ross</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Exploiting P2P systems for DDoS attacks</article-title>
          <source>Proceedings of the 1st international conference on Scalable information systems</source>
          <year>2006</year>
          <conf-name>InfoScale '06: 1st International Conference on Scalable Information Systems</conf-name>
          <conf-date>May 30-June 1, 2006</conf-date>
          <conf-loc>Hong Kong, China</conf-loc>
          <fpage>47</fpage>
          <pub-id pub-id-type="doi">10.1145/1146847.1146894</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jan</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Nanda</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>RP</given-names>
            </name>
          </person-group>
          <article-title>A Sybil attack detection scheme for a forest wildfire monitoring application</article-title>
          <source>Future Generation Comput. Syst</source>
          <year>2018</year>
          <month>03</month>
          <volume>80</volume>
          <fpage>613</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/pii/S0167739X16301522"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.future.2016.05.034</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nwebonyi</surname>
              <given-names>FN</given-names>
            </name>
            <name name-style="western">
              <surname>Martins</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Reputation based approach for improved fairness and robustness in P2P protocols</article-title>
          <source>Peer-to-Peer Netw Appl</source>
          <year>2018</year>
          <month>12</month>
          <day>6</day>
          <volume>12</volume>
          <issue>4</issue>
          <fpage>951</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s12083-018-0701-x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12083-018-0701-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wallach</surname>
              <given-names>DS</given-names>
            </name>
          </person-group>
          <article-title>A survey of peer-to-peer security issues</article-title>
          <source>Proceedings of the International Symposium on Software Security</source>
          <year>2003</year>
          <conf-name>International Symposium on Software Security</conf-name>
          <conf-date>November 4-6, 2003</conf-date>
          <conf-loc>Tokyo, Japan</conf-loc>
          <fpage>42</fpage>
          <lpage>57</lpage>
          <pub-id pub-id-type="doi">10.1007/3-540-36532-x_4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Analyzing and mitigating security threats in P2P systems</article-title>
          <source>Darmstadt, Technische Universität, [Ph.D. Thesis]</source>
          <year>2018</year>
          <access-date>2019-10-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tuprints.ulb.tu-darmstadt.de/7812/">https://tuprints.ulb.tu-darmstadt.de/7812/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Steve</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Host software - RFC-1</article-title>
          <source>Datacracker - IETF</source>
          <year>1969</year>
          <access-date>2019-06-02</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tools.ietf.org/html/rfc1">https://tools.ietf.org/html/rfc1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doyle</surname>
              <given-names>JF</given-names>
            </name>
          </person-group>
          <article-title>Peer-to-peer: harnessing the power of disruptive technologies</article-title>
          <source>Ubiquity</source>
          <year>2001</year>
          <month>05</month>
          <volume>2001</volume>
          <issue>May</issue>
          <fpage>2</fpage>
          <pub-id pub-id-type="doi">10.1145/375348.377427</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Buford</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Akon</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Handbook of Peer-to-Peer Networking</source>
          <year>2010</year>
          <publisher-loc>Boston, MA</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>1</fpage>
          <lpage>1500</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Urovi</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Olivieri</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Bromuri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fornara</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>MI</given-names>
            </name>
          </person-group>
          <article-title>A peer to peer agent coordination framework for IHE based cross-community health record exchange</article-title>
          <source>Proceedings of the 28th Annual ACM Symposium on Applied Computing</source>
          <year>2013</year>
          <conf-name>SAC '13: 28th Annual ACM Symposium on Applied Computing</conf-name>
          <conf-date>March 18 - 22, 2013</conf-date>
          <conf-loc>Coimbra Portugal</conf-loc>
          <fpage>1355</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1145/2480362.2480617</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Palomar</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Estevez-Tapiado</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hernandez-Castro</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ribagorda</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security in P2P networks: survey and research directions</article-title>
          <source>Emerging Directions in Embedded and Ubiquitous Computing</source>
          <year>2006</year>
          <publisher-loc>Berlin</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>183</fpage>
          <lpage>92</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kurose</surname>
              <given-names>JF</given-names>
            </name>
          </person-group>
          <source>Computer Networking: A Top-Down Approach (6th Edition)</source>
          <year>2012</year>
          <publisher-loc>London, U.K</publisher-loc>
          <publisher-name>Pearson</publisher-name>
          <fpage>1</fpage>
          <lpage>864</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>López-Fuentes</surname>
              <given-names>FD</given-names>
            </name>
            <name name-style="western">
              <surname>Eugui-De-Alba</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Ortíz-Ruiz</surname>
              <given-names>OM</given-names>
            </name>
          </person-group>
          <article-title>Evaluating P2P networks against eclipse attacks</article-title>
          <source>Procedia Technol</source>
          <year>2012</year>
          <volume>3</volume>
          <fpage>61</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.protcy.2012.03.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kaashoek</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Karger</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Stoica</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Looking up data in P2P systems</article-title>
          <source>Commun ACM</source>
          <year>2003</year>
          <month>02</month>
          <volume>46</volume>
          <issue>2</issue>
          <fpage>43</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1145/606272.606299</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Barik</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Banerjee</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Goal based threat modeling for peer-to-peer cloud</article-title>
          <source>Procedia Comput Sci</source>
          <year>2016</year>
          <volume>89</volume>
          <fpage>64</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2016.06.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Feldotto</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Scheideler</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Graffi</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>A self-stabilizing overlay network for nodes with heterogeneous bandwidths</article-title>
          <source>Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing</source>
          <year>2014</year>
          <conf-name>14th IEEE International Conference on Peer-to-Peer Computing</conf-name>
          <conf-date>Sept. 8-12, 2014</conf-date>
          <conf-loc>London, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1109/p2p.2014.6934300</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sanchez-Artigas</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia-Lopez</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>On routing in distributed hash tables: is reputation a shelter from malicious behavior and churn?</article-title>
          <source>Proceedings of the IEEE Ninth International Conference on Peer-to-Peer Computing</source>
          <year>2009</year>
          <conf-name>IEEE Ninth International Conference on Peer-to-Peer Computing</conf-name>
          <conf-date>Sept. 9-11, 2009</conf-date>
          <conf-loc>Seattle, WA, USA</conf-loc>
          <fpage>31</fpage>
          <lpage>40</lpage>
          <pub-id pub-id-type="doi">10.1109/p2p.2009.5284546</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Mittal</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Borisov</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems</article-title>
          <source>Proceedings of the 17th ACM Conference on Computer and Communications Security</source>
          <year>2010</year>
          <conf-name>CCS '10: 17th ACM Conference on Computer and Communications Security 2010</conf-name>
          <conf-date>Oct 4-8, 2010</conf-date>
          <conf-loc>Chicago Illinois USA</conf-loc>
          <fpage>308</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1145/1866307.1866343</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omicini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Denti</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>From tuple spaces to tuple centres</article-title>
          <source>Sci Comput Program</source>
          <year>2001</year>
          <month>11</month>
          <volume>41</volume>
          <issue>3</issue>
          <fpage>277</fpage>
          <lpage>94</lpage>
          <pub-id pub-id-type="doi">10.1016/s0167-6423(01)00011-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vo</surname>
              <given-names>HT</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Bestpeer++: a peer-to-peer based large-scale data processing platform</article-title>
          <source>IEEE Trans Knowl Data Eng</source>
          <year>2014</year>
          <month>6</month>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>1316</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1109/tkde.2012.236</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Decker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Eidenbenz</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wattenhofer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Exploring and improving BitTorrent topologies</article-title>
          <source>Proceedings of the IEEE P2P 2013 Conference</source>
          <year>2013</year>
          <conf-name>IEEE P2P 2013 Conference</conf-name>
          <conf-date>Sept. 9-11, 2013</conf-date>
          <conf-loc>Trento, Italy</conf-loc>
          <pub-id pub-id-type="doi">10.1109/P2P.2013.6688698</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Leon</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Stalick</surname>
              <given-names>AQ</given-names>
            </name>
            <name name-style="western">
              <surname>Jillepalli</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Haney</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Sheldon</surname>
              <given-names>FT</given-names>
            </name>
          </person-group>
          <article-title>Blockchain: properties and misconceptions</article-title>
          <source>Asia Pcfc Jrnl Innvtn &#38; Entrprnshp</source>
          <year>2017</year>
          <month>12</month>
          <day>04</day>
          <volume>11</volume>
          <issue>3</issue>
          <fpage>286</fpage>
          <lpage>300</lpage>
          <pub-id pub-id-type="doi">10.1108/apjie-12-2017-034</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Donnelly</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The PACE system: a P2P architecture for cloud based EHealth systems 2015</article-title>
          <source>Master of Science thesis, Dublin City University</source>
          <year>2015</year>
          <access-date>2020-02-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://doras.dcu.ie/20781/">http://doras.dcu.ie/20781/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdullahi</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kluge</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Eskofier</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Online at will: a novel protocol for mutual authentication in peer-to-peer networks for patient-centered health care information systems</article-title>
          <source>Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021)</source>
          <year>2021</year>
          <conf-name>54th Hawaii International Conference on System Sciences (HICSS 2021)</conf-name>
          <conf-date>Jan 05, 2021</conf-date>
          <conf-loc>Kauai, Hawaii, USA</conf-loc>
          <fpage>3828</fpage>
          <pub-id pub-id-type="doi">10.24251/hicss.2021.463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia-Molina</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Improving search in peer-to-peer networks</article-title>
          <source>Proceedings 22nd International Conference on Distributed Computing Systems</source>
          <year>2002</year>
          <month>07</month>
          <conf-name>22nd International Conference on Distributed Computing Systems</conf-name>
          <conf-date>July 2-5, 2002</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <fpage>5</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/1022237"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ICDCS.2002.1022237</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Liberati</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>DG</given-names>
            </name>
          </person-group>
          <article-title>Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement</article-title>
          <source>Int J Surg</source>
          <year>2010</year>
          <volume>8</volume>
          <issue>5</issue>
          <fpage>336</fpage>
          <lpage>41</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://linkinghub.elsevier.com/retrieve/pii/S1743-9191(10)00040-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijsu.2010.02.007</pub-id>
          <pub-id pub-id-type="medline">20171303</pub-id>
          <pub-id pub-id-type="pii">S1743-9191(10)00040-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kitchenham</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Charters</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Guidelines for performing systematic literature reviews in software engineering</article-title>
          <source>EBSE Technical Report, Keele University and University of Durham</source>
          <year>2007</year>
          <access-date>2019-10-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf">https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Friese</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Qualitative Data Analysis with ATLAS</source>
          <year>2019</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications Ltd</publisher-name>
          <fpage>1</fpage>
          <lpage>344</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Braun</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Using thematic analysis in psychology</article-title>
          <source>Qualitative Research in Psychology</source>
          <year>2006</year>
          <month>01</month>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>77</fpage>
          <lpage>101</lpage>
          <pub-id pub-id-type="doi">10.1191/1478088706qp063oa</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lui</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Identity attack and anonymity protection for P2P-VoD systems</article-title>
          <source>Proceedings of the Nineteenth IEEE International Workshop on Quality of Service</source>
          <year>2011</year>
          <conf-name>Nineteenth IEEE International Workshop on Quality of Service</conf-name>
          <conf-date>June 6-7, 2011</conf-date>
          <conf-loc>San Jose, CA, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iwqos.2011.5931313</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gheorghe</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Lo Cigno</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Montresor</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy issues in P2P streaming systems: a survey</article-title>
          <source>Peer-to-Peer Netw Appl</source>
          <year>2010</year>
          <month>4</month>
          <day>23</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>75</fpage>
          <lpage>91</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/article/10.1007/s12083-010-0070-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12083-010-0070-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>An</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management</article-title>
          <source>Peer-to-Peer Netw Appl</source>
          <year>2011</year>
          <month>1</month>
          <day>7</day>
          <volume>4</volume>
          <issue>4</issue>
          <fpage>410</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/article/10.1007/s12083-010-0098-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12083-010-0098-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Helvik</surname>
              <given-names>BE</given-names>
            </name>
          </person-group>
          <article-title>Towards green P2P: understanding the energy consumption in P2P under content pollution</article-title>
          <source>Proceedings of the IEEE/ACM Int'l Conference on Green Computing and Communications &#38; Int'l Conference on Cyber, Physical and Social Computing</source>
          <year>2010</year>
          <conf-name>IEEE/ACM Int'l Conference on Green Computing and Communications &#38; Int'l Conference on Cyber, Physical and Social Computing</conf-name>
          <conf-date>Dec. 18-20, 2010</conf-date>
          <conf-loc>Hangzhou, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/greencom-cpscom.2010.45</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Almeida</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Natif</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>da Silva</surname>
              <given-names>AP</given-names>
            </name>
            <name name-style="western">
              <surname>Vieira</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Pollution and whitewashing attacks in a P2P live streaming system: analysis and counter-attack</article-title>
          <source>Proceedings of the IEEE International Conference on Communications (ICC)</source>
          <year>2013</year>
          <conf-name>IEEE International Conference on Communications (ICC)</conf-name>
          <conf-date>June 9-13, 2013</conf-date>
          <conf-loc>Budapest, Hungary</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icc.2013.6654819</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Analysis on security issues for mobile P2P networks</article-title>
          <source>Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing</source>
          <year>2012</year>
          <conf-name>8th International Conference on Wireless Communications, Networking and Mobile Computing</conf-name>
          <conf-date>Sept. 21-23, 2012</conf-date>
          <conf-loc>Shanghai, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/WICOM.2012.6478429</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yue</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Qiu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ji</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>P2P attack taxonomy and relationship analysis</article-title>
          <source>Proceedings of the 11th International Conference on Advanced Communication Technology</source>
          <year>2009</year>
          <conf-name>11th International Conference on Advanced Communication Technology</conf-name>
          <conf-date>Feb. 15-18, 2009</conf-date>
          <conf-loc>Gangwon, Korea (South)</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/4809630?arnumber=4809630"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Chellappan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Xuan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Peer-to-peer system-based active worm attacks: modeling, analysis and defense</article-title>
          <source>Comput Commun</source>
          <year>2008</year>
          <month>11</month>
          <volume>31</volume>
          <issue>17</issue>
          <fpage>4005</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1016/j.comcom.2008.08.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Seedorf</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Camenisch</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kesdogan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Security issues for P2P-based voice-and video-streaming applications</article-title>
          <source>iNetSec 2009 - Open Research Problems in Network Security. IFIP Advances in Information and Communication Technology</source>
          <year>2009</year>
          <publisher-loc>Berlin</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>95</fpage>
          <lpage>110</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Washbourne</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A survey of P2P network security</article-title>
          <source>arXiv</source>
          <year>2015</year>
          <access-date>2019-10-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1504.01358">https://arxiv.org/abs/1504.01358</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A survey of peer-to-peer attacks and counter attacks</article-title>
          <source>The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)</source>
          <year>2012</year>
          <access-date>2018-10-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://worldcomp-proceedings.com/proc/p2012/SAM9754.pdf">http://worldcomp-proceedings.com/proc/p2012/SAM9754.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chunyan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhiyu</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The research of worms in P2P networks</article-title>
          <source>Proceedings of the International Conference on Computational Intelligence and Natural Computing</source>
          <year>2009</year>
          <conf-name>International Conference on Computational Intelligence and Natural Computing</conf-name>
          <conf-date>June 6-7, 2009</conf-date>
          <conf-loc>Wuhan, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cinc.2009.248</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sokolova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>El Emam</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Arbuckle</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Neri</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Rose</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jonker</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>P2P watch: personal health information detection in peer-to-peer file-sharing networks</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <month>07</month>
          <day>09</day>
          <volume>14</volume>
          <issue>4</issue>
          <fpage>e95</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2012/4/e95/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1898</pub-id>
          <pub-id pub-id-type="medline">22776692</pub-id>
          <pub-id pub-id-type="pii">v14i4e95</pub-id>
          <pub-id pub-id-type="pmcid">PMC3415260</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdelouahab</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bouabdallah</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Achemlal</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Laniepce</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The Topology change attack: threat and impact</article-title>
          <source>J Universal Comput Sci</source>
          <year>2009</year>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>465</fpage>
          <lpage>87</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/220348953_The_Topology_Change_Attack_Threat_and_Impact"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>McGuire</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Willey</surname>
              <given-names>ND</given-names>
            </name>
          </person-group>
          <article-title>The evolution of the peer-to-peer file sharing industrythe security risks for users</article-title>
          <source>Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)</source>
          <year>2008</year>
          <conf-name>41st Annual Hawaii International Conference on System Sciences (HICSS 2008)</conf-name>
          <conf-date>Jan. 7-10, 2008</conf-date>
          <conf-loc>Waikoloa, HI, USA</conf-loc>
          <fpage>7</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1109/hicss.2008.436</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Responsive Security: Be Ready to be Secure</source>
          <year>2014</year>
          <publisher-loc>Boca Raton</publisher-loc>
          <publisher-name>CRC Press</publisher-name>
          <fpage>1</fpage>
          <lpage>259</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Tu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A P2P e-commerce related network security issue: P2P worm</article-title>
          <source>Proceedings of the International Symposium on Electronic Commerce and Security</source>
          <year>2008</year>
          <conf-name>International Symposium on Electronic Commerce and Security</conf-name>
          <conf-date>Aug. 3-5, 2008</conf-date>
          <conf-loc>Guangzhou, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/isecs.2008.187</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barse</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Tidke</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A study on BOTNET attacks and detection techniques</article-title>
          <source>IOSR J Electri Electron Eng (IOSR-JEEE)</source>
          <year>2020</year>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iosrjournals.org/iosr-jeee/Papers/Vol15-Issue3/Series-2/A1503020105.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.9790/1676-1503020105</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Aslam</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zou</surname>
              <given-names>CC</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Król</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fay</surname>
              <given-names>d</given-names>
            </name>
            <name name-style="western">
              <surname>Gabryś</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Analysis of peer-to-peer botnet attacks and defenses</article-title>
          <source>Propagation Phenomena in Real World Networks. Intelligent Systems Reference Library</source>
          <year>2015</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jang-Jaccard</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nepal</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A survey of emerging threats in cybersecurity</article-title>
          <source>J Comput Syst Sci</source>
          <year>2014</year>
          <month>08</month>
          <volume>80</volume>
          <issue>5</issue>
          <fpage>973</fpage>
          <lpage>93</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/pii/S0022000014000178"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jcss.2014.02.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Milpitas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>SonicWALL sees dramatic jump in IoT malware, encrypted threats, web app attacks through third quarter</article-title>
          <source>SonicWALL</source>
          <year>2019</year>
          <access-date>2020-06-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sonicwall.com/news/dramatic-jump-in-iot-malware-encrypted-threats-web-app-attacks-third-quarter/">https://www.sonicwall.com/news/dramatic-jump-in-iot-malware-encrypted-threats-web-app-attacks-third-quarter/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Engle</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Vulnerabilities of P2P systems and a critical look at their solutions</article-title>
          <source>Technical Report, Kent State University</source>
          <year>2006</year>
          <access-date>2018-10-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.semanticscholar.org/paper/Vulnerabilities-of-P2P-Systems-and-a-Critical-Look-Engle-Khan/4f86c19fd5b8147cbc5da222903a8c48e79cf7f8">https://www.semanticscholar.org/paper/Vulnerabilities-of-P2P-Systems-and-a-Critical-Look-Engle-Khan/4f86c19fd5b8147cbc5da222903a8c48e79cf7f8</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Vecchio</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Putra</surname>
              <given-names>GD</given-names>
            </name>
            <name name-style="western">
              <surname>Kanhere</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Antonelli</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>A decentralized peer-to-peer remote health monitoring system</article-title>
          <source>Sensors (Basel)</source>
          <year>2020</year>
          <month>03</month>
          <day>16</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>s20061656</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.mdpi.com/resolver?pii=s20061656"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s20061656</pub-id>
          <pub-id pub-id-type="medline">32188135</pub-id>
          <pub-id pub-id-type="pii">s20061656</pub-id>
          <pub-id pub-id-type="pmcid">PMC7146265</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schäfer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Malinka</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Security in peer-to-peer networks: empiric model of file diffusion in BitTorrent</article-title>
          <source>Proceedngs of the Fourth International Conference on Internet Monitoring and Protection</source>
          <year>2009</year>
          <conf-name>Fourth International Conference on Internet Monitoring and Protection</conf-name>
          <conf-date>May 24-28, 2009</conf-date>
          <conf-loc>Venice/Mestre, Italy</conf-loc>
          <fpage>39</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1109/icimp.2009.14</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kamat</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gite</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Patil</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A critical analysis of P2P communication, security concerns and solutions</article-title>
          <source>Int J Appl Eng Res</source>
          <year>2014</year>
          <volume>9</volume>
          <fpage>30899</fpage>
          <lpage>909</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/profile/Shilpa-Gite/publication/273695211_Privacy_Preserving_Auditing_Protocol_Using_Cryptography_for_Cloud_Storage_Systems/links/55a382a108aea517405cf2a8/Privacy-Preserving-Auditing-Protocol-Using-Cryptography-for-Cloud-Storage-Systems.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ni</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Quantitative analysis and countermeasures research of P2P routing attacks</article-title>
          <source>Proceedings of the 2nd International Workshop on Intelligent Systems and Applications</source>
          <year>2010</year>
          <conf-name>2nd International Workshop on Intelligent Systems and Applications</conf-name>
          <conf-date>May 22-23, 2010</conf-date>
          <conf-loc>Wuhan, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iwisa.2010.5473277</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Qi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>P2P network-targeted DDoS attacks</article-title>
          <source>Proceedings of the Second International Conference on the Applications of Digital Information and Web Technologies</source>
          <year>2009</year>
          <conf-name>Second International Conference on the Applications of Digital Information and Web Technologies</conf-name>
          <conf-date>Aug. 4-6, 2009</conf-date>
          <conf-loc>London, UK</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icadiwt.2009.5273837</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Roh</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A DDoS attack by flooding normal control messages in Kad P2P networks</article-title>
          <source>Proceedings of the 14th International Conference on Advanced Communication Technology (ICACT)</source>
          <year>2012</year>
          <conf-name>14th International Conference on Advanced Communication Technology (ICACT)</conf-name>
          <conf-date>Feb. 19-22, 2012</conf-date>
          <conf-loc>PyeongChang, Korea (South)</conf-loc>
          <fpage>19</fpage>
          <lpage>22</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/6174645"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cuevas</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kryczka</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cuevas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kaune</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Guerrero</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rejaie</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Is content publishing in BitTorrent altruistic or profit-driven?</article-title>
          <source>Proceedings of the 6th International COnference</source>
          <year>2010</year>
          <conf-name>Co-NEXT '10: Conference on emerging Networking EXperiments and Technologies</conf-name>
          <conf-date>Nov. 30 - Dec. 03, 2010</conf-date>
          <conf-loc>Philadelphia, Pennsylvania</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1145/1921168.1921183</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Divac-Krnic</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ackermann</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>31 security-related issues in peer-to-peer networks</article-title>
          <source>Peer-to-Peer Systems and Applications</source>
          <year>2005</year>
          <publisher-loc>Berlin</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>529</fpage>
          <lpage>45</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Little</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kabore</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kabore</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>A study of index poisoning in peer-to-peer file sharing systems</article-title>
          <source>Int J Cybernet Informatics</source>
          <year>2014</year>
          <month>12</month>
          <day>31</day>
          <volume>3</volume>
          <issue>6</issue>
          <fpage>11</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.5121/ijci.2014.3602</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Roh</surname>
              <given-names>BH</given-names>
            </name>
          </person-group>
          <article-title>DDoS attack by file request redirection in Kad P2P network</article-title>
          <source>Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery</source>
          <year>2012</year>
          <conf-name>International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery</conf-name>
          <conf-date>Oct. 10-12, 2012</conf-date>
          <conf-loc>Sanya, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cyberc.2012.91</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karame</surname>
              <given-names>GO</given-names>
            </name>
            <name name-style="western">
              <surname>Androulaki</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Capkun</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Double-spending fast payments in bitcoin</article-title>
          <source>Proceedings of the 2012 ACM conference on Computer and Communications Security</source>
          <year>2012</year>
          <conf-name>CCS'12: the ACM Conference on Computer and Communications Security</conf-name>
          <conf-date>October 16 - 18, 2012</conf-date>
          <conf-loc>Raleigh North Carolina USA</conf-loc>
          <fpage>906</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1145/2382196.2382292</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McConaghy</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Marques</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>BigchainDB: a scalable blockchain database - Whitepaper</article-title>
          <source>BigChainDB</source>
          <year>2016</year>
          <access-date>2019-10-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bigchaindb.com/whitepaper/">https://www.bigchaindb.com/whitepaper/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Touceda</surname>
              <given-names>DS</given-names>
            </name>
            <name name-style="western">
              <surname>Sierra</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Izquierdo</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schulzrinne</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Survey of attacks and defenses on P2PSIP communications</article-title>
          <source>IEEE Commun Surv Tutorials</source>
          <year>2011</year>
          <fpage>00152</fpage>
          <pub-id pub-id-type="doi">10.1109/surv.2011.060711.00152</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tselios</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Birkos</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Galiotos</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kotsopoulos</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dagiuklas</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Malicious threats and novel security extensions in P2PSIP</article-title>
          <source>Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops</source>
          <year>2012</year>
          <conf-name>IEEE International Conference on Pervasive Computing and Communications Workshops</conf-name>
          <conf-date>19-23 March, 2012</conf-date>
          <conf-loc>Lugano, Switzerland</conf-loc>
          <fpage>19</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1109/percomw.2012.6197612</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kohnen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Leske</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rathgeb</surname>
              <given-names>EP</given-names>
            </name>
          </person-group>
          <article-title>Conducting and optimizing eclipse attacks in the Kad peer-to-peer network</article-title>
          <source>Proceedings of the International Conference on Research in Networking</source>
          <year>2009</year>
          <conf-name>International Conference on Research in Networking</conf-name>
          <conf-date>May 11-15, 2009</conf-date>
          <conf-loc>Aachen, Germany</conf-loc>
          <fpage>104</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-642-01399-7_9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zou</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Survey of eclipse attacks on DHT networks</article-title>
          <source>Qinghua Daxue Xuebao / J Tsinghua Univ</source>
          <year>2011</year>
          <volume>51</volume>
          <issue>10</issue>
          <fpage>1306</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/289865717_Survey_of_eclipse_attacks_on_DHT_networks"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aiello</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Milanesio</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ruffo</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Schifanella</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>An identity-based approach to secure P2P applications with Likir</article-title>
          <source>Peer-to-Peer Netw Appl</source>
          <year>2011</year>
          <month>1</month>
          <day>6</day>
          <issue>4</issue>
          <fpage>420</fpage>
          <lpage>38</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/article/10.1007/s12083-010-0099-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12083-010-0099-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Qiu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The analysis of security threats in structured P2P load balancing schemes</article-title>
          <source>Proceedings of the International Conference on Cloud and Service Computing</source>
          <year>2011</year>
          <conf-name>International Conference on Cloud and Service Computing</conf-name>
          <conf-date>Dec. 12-14, 2011</conf-date>
          <conf-loc>Hong Kong, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/csc.2011.6138537</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref111">
        <label>111</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Douceur</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The sybil attack</article-title>
          <source>Proceedings of the International Workshop on Peer-to-Peer Systems</source>
          <year>2002</year>
          <conf-name>International Workshop on Peer-to-Peer Systems</conf-name>
          <conf-date>March 7-8, 2002</conf-date>
          <conf-loc>Cambridge, MA, USA</conf-loc>
          <fpage>251</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1007/3-540-45748-8_24</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref112">
        <label>112</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kannengießer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lins</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Trade-offs between distributed ledger technology characteristics</article-title>
          <source>ACM Comput Surv</source>
          <year>2020</year>
          <month>07</month>
          <volume>53</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>37</lpage>
          <pub-id pub-id-type="doi">10.1145/3379463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref113">
        <label>113</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Moon</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Vu</surname>
              <given-names>AV</given-names>
            </name>
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>MS</given-names>
            </name>
          </person-group>
          <article-title>A stealthier partitioning attack against bitcoin peer-to-peer network</article-title>
          <source>Proceedings of the IEEE Symposium on Security and Privacy (SP)</source>
          <year>2020</year>
          <conf-name>IEEE Symposium on Security and Privacy (SP)</conf-name>
          <conf-date>May 18-21, 2020</conf-date>
          <conf-loc>San Francisco, CA, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/sp40000.2020.00027</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref114">
        <label>114</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heilman</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kendler</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zohar</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Eclipse attacks on bitcoin's peer-to-peer network</article-title>
          <source>Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)</source>
          <year>2015</year>
          <conf-name>24th USENIX Security Symposium (USENIX Security 15)</conf-name>
          <conf-date>August 12-14, 2015</conf-date>
          <conf-loc>Washington, D. C</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref115">
        <label>115</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vanhoef</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Piessens</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Key reinstallation attacks: forcing nonce reuse in WPA2</article-title>
          <source>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</source>
          <year>2017</year>
          <conf-name>CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security</conf-name>
          <conf-date>October 30 - November 3, 2017</conf-date>
          <conf-loc>Dallas Texas USA</conf-loc>
          <fpage>1313</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1145/3133956.3134027</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref116">
        <label>116</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yoon</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>HS</given-names>
            </name>
          </person-group>
          <article-title>Security analysis of vulnerable Wi-Fi Direct</article-title>
          <source>Proceedings of the 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC)</source>
          <year>2012</year>
          <conf-name>8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC)</conf-name>
          <conf-date>Aug. 27-29, 2012</conf-date>
          <conf-loc>Gyeongju, Korea (South)</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/6418681"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref117">
        <label>117</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dejmal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fern</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Reinforcement learning for vulnerability assessment in peer-to-peer networks</article-title>
          <source>Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, AAAI 2008</source>
          <year>2008</year>
          <conf-name>Twenty-Third AAAI Conference on Artificial Intelligence, AAAI 2008</conf-name>
          <conf-date>July 13-17, 2008</conf-date>
          <conf-loc>Chicago, Illinois, USA</conf-loc>
          <fpage>1655</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/220269202_Reinforcement_Learning_for_Vulnerability_Assessment_in_Peer-to-Peer_Networks"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref118">
        <label>118</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A research on the vulnerability in popular P2P protocols</article-title>
          <source>Proceedings of the 8th International Conference on Communications and Networking in China (CHINACOM)</source>
          <year>2013</year>
          <conf-name>8th International Conference on Communications and Networking in China (CHINACOM)</conf-name>
          <conf-date>Aug. 14-16, 2013</conf-date>
          <conf-loc>Guilin, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/chinacom.2013.6694630</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref119">
        <label>119</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lima</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Barros</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Medard</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Koetter</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kalker</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>KJ</given-names>
            </name>
          </person-group>
          <article-title>On counteracting Byzantine attacks in network coded peer-to-peer networks</article-title>
          <source>IEEE J Select Areas Commun</source>
          <year>2010</year>
          <month>6</month>
          <volume>28</volume>
          <issue>5</issue>
          <fpage>692</fpage>
          <lpage>702</lpage>
          <pub-id pub-id-type="doi">10.1109/jsac.2010.100607</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref120">
        <label>120</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chloe</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>U.K. High Court orders ISPs to block the pirate bay</article-title>
          <source>PC Magazine</source>
          <year>2012</year>
          <access-date>2018-11-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pcmag.com/news/297264/u-k-high-court-orders-isps-to-block-the-pirate-bay">https://www.pcmag.com/news/297264/u-k-high-court-orders-isps-to-block-the-pirate-bay</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref121">
        <label>121</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Howarth</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pavlou</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A dynamic peer-to-peer traffic limiting policy for ISP networks</article-title>
          <source>Proceedings of the IEEE Network Operations and Management Symposium - NOMS 2010</source>
          <year>2010</year>
          <conf-name>IEEE Network Operations and Management Symposium - NOMS 2010</conf-name>
          <conf-date>April 19-23, 2010</conf-date>
          <conf-loc>Osaka, Japan</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/5488483"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/NOMS.2010.5488483</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref122">
        <label>122</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schulze</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Mochalski</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Internet study 2008/2009</article-title>
          <source>IPoque Report</source>
          <year>2008</year>
          <access-date>2018-12-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://sites.cs.ucsb.edu/~almeroth/classes/W10.290F/papers/ipoque-internet-study-08-09.pdf">https://sites.cs.ucsb.edu/~almeroth/classes/W10.290F/papers/ipoque-internet-study-08-09.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref123">
        <label>123</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Control engineering and information systems</article-title>
          <source>Proceedings of the 2014 International Conference on Control Engineering and Information Systems (ICCEIS 2014)</source>
          <year>2014</year>
          <conf-name>International Conference on Control Engineering and Information Systems (ICCEIS 2014)</conf-name>
          <conf-date>June 20-22, 2014</conf-date>
          <conf-loc>Yueyang, Hunan, China</conf-loc>
          <fpage>1</fpage>
          <lpage>1052</lpage>
          <pub-id pub-id-type="doi">10.1201/b17732</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref124">
        <label>124</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Good</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Krekelberg</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Usability and privacy: a study of Kazaa P2P file-sharing</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2003</year>
          <conf-name>CHI03: Human Factors in Computing Systems</conf-name>
          <conf-date>April 5 - 10, 2003</conf-date>
          <conf-loc>Ft. Lauderdale Florida</conf-loc>
          <fpage>137</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1145/642611.642636</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref125">
        <label>125</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Data hemorrhages in the health-care sector</article-title>
          <source>Proceedings of the International Conference on Financial Cryptography and Data Security</source>
          <year>2009</year>
          <conf-name>International Conference on Financial Cryptography and Data Security</conf-name>
          <conf-date>February 23-26, 2009</conf-date>
          <conf-loc>Accra Beach, Barbados</conf-loc>
          <fpage>71</fpage>
          <lpage>89</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-642-03549-4_5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref126">
        <label>126</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Le</surname>
              <given-names>FF</given-names>
            </name>
            <name name-style="western">
              <surname>Handurukande</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Handurukande</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Massoulié</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Clustering in peer-to-peer file sharing workloads</article-title>
          <source>Peer-to-Peer Systems III</source>
          <year>2005</year>
          <publisher-loc>Berlin</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>217</fpage>
          <lpage>26</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref127">
        <label>127</label>
        <nlm-citation citation-type="web">
          <article-title>File sharing landscape 2017: where did peer-to-peer network users share which files during 2017-2018</article-title>
          <source>TECXIPIO Magazine</source>
          <access-date>2018-12-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tecxipio.com/single-post/file-sharing-in-peer-to-peer-networks-2017">https://www.tecxipio.com/single-post/file-sharing-in-peer-to-peer-networks-2017</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref128">
        <label>128</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Casadesus-Masanell</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hervas-Drane</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Competing against online sharing</article-title>
          <source>Manag Deci</source>
          <year>2010</year>
          <month>09</month>
          <day>07</day>
          <volume>48</volume>
          <issue>8</issue>
          <fpage>1247</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.emerald.com/insight/content/doi/10.1108/00251741011076771/full/html"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/00251741011076771</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref129">
        <label>129</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdullahi</surname>
              <given-names>IY</given-names>
            </name>
            <name name-style="western">
              <surname>Abdullahi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Adeshina</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>Towards a framework of configuring and evaluating Modsecurity WAF on Tomcat and Apache web servers</article-title>
          <source>Proceedings of the 15th International Conference on Electronics, Computer and Computation (ICECCO)</source>
          <year>2019</year>
          <conf-name>15th International Conference on Electronics, Computer and Computation (ICECCO)</conf-name>
          <conf-date>Dec. 10-12, 2019</conf-date>
          <conf-loc>Abuja, Nigeria</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icecco48375.2019.9043209</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref130">
        <label>130</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Associated Press</collab>
          </person-group>
          <article-title>German hospital hacked, patient taken to another city dies</article-title>
          <source>Security Week</source>
          <year>2020</year>
          <access-date>2020-12-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.securityweek.com/german-hospital-hacked-patient-taken-another-city-dies">https://www.securityweek.com/german-hospital-hacked-patient-taken-another-city-dies</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref131">
        <label>131</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Caporusso</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chea</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Abukhaled</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A game-theoretical model of ransomware</article-title>
          <source>Proceedings of the International Conference on Applied Human Factors and Ergonomics</source>
          <year>2018</year>
          <conf-name>International Conference on Applied Human Factors and Ergonomics</conf-name>
          <conf-date>July 21-25, 2018</conf-date>
          <conf-loc>Orlando, FL, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-319-94782-2_7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref132">
        <label>132</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Matthew</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>WannaCry cyber-attack cost the NHS £92m as 19,000 appointments cancelled</article-title>
          <source>The Telegraph</source>
          <year>2018</year>
          <access-date>2019-10-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/">https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref133">
        <label>133</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mohurle</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Patil</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A brief study of WannaCry threat: ransomware attack 2017</article-title>
          <source>Int J Adv Res Comput Sci</source>
          <year>2017</year>
          <volume>8</volume>
          <issue>5</issue>
          <fpage>4021</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.ijarcs.info/index.php/Ijarcs/article/view/4021"/>
          </comment>
          <pub-id pub-id-type="doi">10.26483/ijarcs.v8i5.4021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref134">
        <label>134</label>
        <nlm-citation citation-type="web">
          <article-title>Ransomware attacks grew by 118%, new ransomware families were detected, and threat actors used innovative techniques</article-title>
          <source>McAfee Labs Threats Report</source>
          <year>2019</year>
          <access-date>2019-10-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf">https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref135">
        <label>135</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Handler</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hauge</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Spognardi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dragoni</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy issues in healthcare monitoring systems: a case study</article-title>
          <source>Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies</source>
          <year>2017</year>
          <conf-name>10th International Joint Conference on Biomedical Engineering Systems and Technologies</conf-name>
          <conf-date>February 21-23, 2017</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <pub-id pub-id-type="doi">10.5220/0006224603830388</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref136">
        <label>136</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Karopoulos</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández-Ramos</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Kambourakis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nai Fovino</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Demystifying COVID-19 digital contact tracing: a survey on frameworks and mobile apps</article-title>
          <source>Wireless Commun Mobile Comput</source>
          <year>2020</year>
          <month>10</month>
          <day>17</day>
          <volume>2020</volume>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1155/2020/8851429</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref137">
        <label>137</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zeidler</surname>
              <given-names>HM</given-names>
            </name>
          </person-group>
          <article-title>This application is a continuation in part of U.S. application ser. no. 278,001 filed June 24, and now U.S. pat. no. 4,423,287, issued Dec. 27</article-title>
          <source>End-to-end Encryption System and Method of Operation</source>
          <year>1981</year>
          <access-date>2020-07-03</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://patents.google.com/patent/US4578530A/en">https://patents.google.com/patent/US4578530A/en</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref138">
        <label>138</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rösler</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mainka</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Schwenk</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>More is less: on the end-to-end security of group chats in Signal, WhatsApp, Threema</article-title>
          <source>Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&#38;P)</source>
          <year>2018</year>
          <conf-name>IEEE European Symposium on Security and Privacy (EuroS&#38;P)</conf-name>
          <conf-date>April 24-26, 2018</conf-date>
          <conf-loc>London, UK</conf-loc>
          <fpage>415</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1109/eurosp.2018.00036</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref139">
        <label>139</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohn-Gordon</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Cremers</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Dowling</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Garratt</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Stebila</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A formal security analysis of the Signal messaging protocol</article-title>
          <source>Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&#38;P)</source>
          <year>2017</year>
          <conf-name>IEEE European Symposium on Security and Privacy (EuroS&#38;P)</conf-name>
          <conf-date>April 26-28, 2017</conf-date>
          <conf-loc>Paris, France</conf-loc>
          <pub-id pub-id-type="doi">10.1109/eurosp.2017.27</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref140">
        <label>140</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>An efficient user-to-user authentication scheme in peer-to-peer system</article-title>
          <source>Proceedings of the First International Conference on Intelligent Networks and Intelligent Systems</source>
          <year>2008</year>
          <conf-name>First International Conference on Intelligent Networks and Intelligent Systems</conf-name>
          <conf-date>Nov. 1-3, 2008</conf-date>
          <conf-loc>Wuhan, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icinis.2008.142</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref141">
        <label>141</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Information security and privacy of patient-centered health IT services: what needs to be done?</article-title>
          <source>Proceedings of the 47th Hawaii International Conference on System Sciences</source>
          <year>2014</year>
          <conf-name>47th Hawaii International Conference on System Sciences</conf-name>
          <conf-date>Jan. 6-9, 2014</conf-date>
          <conf-loc>Waikoloa, HI, USA</conf-loc>
          <fpage>2984</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1109/hicss.2014.371</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref142">
        <label>142</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>BN</given-names>
            </name>
            <name name-style="western">
              <surname>Shields</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Margolin</surname>
              <given-names>NB</given-names>
            </name>
          </person-group>
          <article-title>A survey of solutions to the sybil attack</article-title>
          <source>University of Massachusetts Amherst, Amherst, MA</source>
          <year>2006</year>
          <access-date>2018-10-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.84.6395&#38;rep=rep1&#38;type=pdf">https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.84.6395&#38;rep=rep1&#38;type=pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref143">
        <label>143</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Damiani</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>di Vimercati</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Paraboschi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Samarati</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Violante</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>A reputation-based approach for choosing reliable resources in peer-to-peer networks</article-title>
          <source>Proceedings of the 9th ACM Conference on Computer and Communications Security</source>
          <year>2002</year>
          <conf-name>CCS02: ACM Conference on Computer and Communications Security</conf-name>
          <conf-date>November 18 - 22, 2002</conf-date>
          <conf-loc>Washington, DC USA</conf-loc>
          <fpage>207</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1145/586110.586138</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref144">
        <label>144</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Vroonhoven</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Peer to peer security</article-title>
          <source>Proceedings of the 4th Twente Student Conference on IT</source>
          <year>2006</year>
          <conf-name>4th Twente Student Conference on IT</conf-name>
          <conf-date>January 30, 2006</conf-date>
          <conf-loc>Enschede, The Netherlands</conf-loc>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=D4C9D04083126B780B5BB6CC02E129C7?doi=10.1.1.60.3334&#38;rep=rep1&#38;type=pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref145">
        <label>145</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chaokai</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Meng</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Comparison and analysis of different reputation systems for peer-to-peer networks</article-title>
          <source>Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)</source>
          <year>2010</year>
          <conf-name>Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)</conf-name>
          <conf-date>Aug. 20-22, 2010</conf-date>
          <conf-loc>Chengdu, China</conf-loc>
          <fpage>20</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1109/icacte.2010.5579838</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref146">
        <label>146</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Banik</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Pena</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Deploying agents in the network to detect intrusions</article-title>
          <source>Proceedings of the IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)</source>
          <year>2015</year>
          <conf-name>IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)</conf-name>
          <conf-date>June 28 - July 1, 2015</conf-date>
          <conf-loc>Las Vegas, NV, USA</conf-loc>
          <fpage>83</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/icis.2015.7166574</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref147">
        <label>147</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Girolami</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sventek</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Detecting worm variants using machine learning</article-title>
          <source>Proceedings of the International Symposium on Electronic Commerce and Security</source>
          <year>2008</year>
          <conf-name>ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007</conf-name>
          <conf-date>December 10-13, 2007</conf-date>
          <conf-loc>New York, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1364654.1364657"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1364654.1364657</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref148">
        <label>148</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Saxena</surname>
              <given-names>AK</given-names>
            </name>
          </person-group>
          <article-title>General study of mobile agent based Intrusion Detection System (IDS)</article-title>
          <source>J Comput Commun</source>
          <year>2016</year>
          <volume>04</volume>
          <issue>04</issue>
          <fpage>93</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scirp.org/journal/paperabs.aspx?paperid=65473"/>
          </comment>
          <pub-id pub-id-type="doi">10.4236/jcc.2016.44008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref149">
        <label>149</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Trivedi</surname>
              <given-names>BH</given-names>
            </name>
          </person-group>
          <article-title>Improving performance of mobile agent-based intrusion detection system</article-title>
          <source>Proceedings of the Fifth International Conference on Advanced Computing &#38; Communication Technologies</source>
          <year>2015</year>
          <conf-name>Fifth International Conference on Advanced Computing &#38; Communication Technologies</conf-name>
          <conf-date>Feb. 21-22, 2015</conf-date>
          <conf-loc>Haryana, India</conf-loc>
          <pub-id pub-id-type="doi">10.1109/acct.2015.118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref150">
        <label>150</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>CV</given-names>
            </name>
            <name name-style="western">
              <surname>Karunasekera</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leckie</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A peer-to-peer collaborative intrusion detection system</article-title>
          <source>Proceedings of the 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communications</source>
          <year>2005</year>
          <conf-name>13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communications</conf-name>
          <conf-date>Nov. 16-18, 2005</conf-date>
          <conf-loc>Kuala Lumpur, Malaysia</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icon.2005.1635451</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref151">
        <label>151</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hosszú</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Czirkos</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Network-based intrusion detection</article-title>
          <source>Encyclopedia of Internet Technologies and Applications</source>
          <year>2008</year>
          <publisher-loc>Hershey, Pennsylvania</publisher-loc>
          <publisher-name>IGI Global</publisher-name>
          <fpage>353</fpage>
          <lpage>9</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref152">
        <label>152</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Graham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Network security fundamentals</article-title>
          <source>Wiley Encyclopedia of Computer Science and Engineering</source>
          <year>2008</year>
          <publisher-loc>Hoboken, New Jersey, United States</publisher-loc>
          <publisher-name>John Wiley &#38; Sons</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref153">
        <label>153</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mead</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Bower</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Patient-centredness: a conceptual framework and review of the empirical literature</article-title>
          <source>Soc Sci Med</source>
          <year>2000</year>
          <month>10</month>
          <volume>51</volume>
          <issue>7</issue>
          <fpage>1087</fpage>
          <lpage>110</lpage>
          <pub-id pub-id-type="doi">10.1016/s0277-9536(00)00098-8</pub-id>
          <pub-id pub-id-type="medline">11005395</pub-id>
          <pub-id pub-id-type="pii">S0277953600000988</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref154">
        <label>154</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Woods</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Tuepker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Press</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Nazi</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Turvey</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Nichol</surname>
              <given-names>WP</given-names>
            </name>
          </person-group>
          <article-title>Patient experiences with full electronic access to health records and clinical notes through the My HealtheVet Personal Health Record Pilot: qualitative study</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>e65</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2013/3/e65"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2356</pub-id>
          <pub-id pub-id-type="medline">23535584</pub-id>
          <pub-id pub-id-type="pii">v15i3e65</pub-id>
          <pub-id pub-id-type="pmcid">PMC3636169</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref155">
        <label>155</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morana</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>How to start a software security initiative within your organization: a maturity based, and metrics driven approach</article-title>
          <source>The OWASP Foundation</source>
          <year>2009</year>
          <access-date>2018-11-02</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.owasp.org/images/c/c4/OWASP-ItalyDayEGov09_04_Morana.pdf">https://www.owasp.org/images/c/c4/OWASP-ItalyDayEGov09_04_Morana.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
