<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v24i10e37978</article-id>
      <article-id pub-id-type="pmid">36240003</article-id>
      <article-id pub-id-type="doi">10.2196/37978</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Asprion</surname>
            <given-names>Petra</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Bošnjak</surname>
            <given-names>Leon</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pimentel</surname>
            <given-names>Maria da Graca</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Kang</surname>
            <given-names>Giluk</given-names>
          </name>
          <degrees>BE</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6484-5449</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>Young-Gab</given-names>
          </name>
          <degrees>BS, MS, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Computer and Information Security, and Convergence Engineering for Intelligent Drone</institution>
            <institution>Sejong University</institution>
            <addr-line>209, Neungdong-ro, Gwangjin-gu</addr-line>
            <addr-line>Seoul, 05006</addr-line>
            <country>Republic of Korea</country>
            <phone>82 0269352424</phone>
            <email>alwaysgabi@sejong.ac.kr</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9585-8808</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Computer and Information Security, and Convergence Engineering for Intelligent Drone</institution>
        <institution>Sejong University</institution>
        <addr-line>Seoul</addr-line>
        <country>Republic of Korea</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Young-Gab Kim <email>alwaysgabi@sejong.ac.kr</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>10</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>14</day>
        <month>10</month>
        <year>2022</year>
      </pub-date>
      <volume>24</volume>
      <issue>10</issue>
      <elocation-id>e37978</elocation-id>
      <history>
        <date date-type="received">
          <day>14</day>
          <month>3</month>
          <year>2022</year>
        </date>
        <date date-type="rev-request">
          <day>13</day>
          <month>7</month>
          <year>2022</year>
        </date>
        <date date-type="rev-recd">
          <day>2</day>
          <month>8</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>30</day>
          <month>8</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Giluk Kang, Young-Gab Kim. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 14.10.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2022/10/e37978" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>With the recent use of IT in health care, a variety of eHealth data are increasingly being collected and stored by national health agencies. As these eHealth data can advance the modern health care system and make it smarter, many researchers want to use these data in their studies. However, using eHealth data brings about privacy and security concerns. The analytical environment that supports health care research must also consider many requirements. For these reasons, countries generally provide research platforms for health care, but some data providers (eg, patients) are still concerned about the security and privacy of their eHealth data. Thus, a more secure platform for health care research that guarantees the utility of eHealth data while focusing on its security and privacy is needed.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to implement a research platform for health care called the health care big data platform (HBDP), which is more secure than previous health care research platforms. The HBDP uses attribute-based encryption to achieve fine-grained access control and encryption of stored eHealth data in an open environment. Moreover, in the HBDP, platform administrators can perform the appropriate follow-up (eg, block illegal users) and monitoring through a private blockchain. In other words, the HBDP supports accountability in access control.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We first identified potential security threats in the health care domain. We then defined the security requirements to minimize the identified threats. In particular, the requirements were defined based on the security solutions used in existing health care research platforms. We then proposed the HBDP, which meets defined security requirements (ie, access control, encryption of stored eHealth data, and accountability). Finally, we implemented the HBDP to prove its feasibility.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>This study carried out case studies for illegal user detection via the implemented HBDP based on specific scenarios related to the threats. As a result, the platform detected illegal users appropriately via the security agent. Furthermore, in the empirical evaluation of massive data encryption (eg, 100,000 rows with 3 sensitive columns within 46 columns) for column-level encryption, full encryption after column-level encryption, and full decryption including column-level decryption, our approach achieved approximately 3 minutes, 1 minute, and 9 minutes, respectively. In the blockchain, average latencies and throughputs in 1Org with 2Peers reached approximately 18 seconds and 49 transactions per second (TPS) in read mode and approximately 4 seconds and 120 TPS in write mode in 300 TPS.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The HBDP enables fine-grained access control and secure storage of eHealth data via attribute-based encryption cryptography. It also provides nonrepudiation and accountability through the blockchain. Therefore, we consider that our proposal provides a sufficiently secure environment for the use of eHealth data in health care research.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>blockchain</kwd>
        <kwd>attribute-based encryption</kwd>
        <kwd>eHealth data</kwd>
        <kwd>security</kwd>
        <kwd>privacy</kwd>
        <kwd>cloud computing</kwd>
        <kwd>research platform for health care</kwd>
        <kwd>accountability</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>interoperability</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The development of modern technologies such as the Internet of Things (IoT), cloud computing, big data, and blockchain affects many aspects of human life. Primarily, these technologies have introduced changes in health care. The quality of health care services and operations has also improved because of the digitization of the health care system. Furthermore, with the advancement in sensors, the eHealth data generated by IoT devices for health care are increasingly being collected by health facilities and national health agencies. These eHealth data generally include electronic medical records (EMRs) and personal health records (PHRs), which contain a considerable amount of personal information such as any disease a patient may have and the patient’s medical record number. Thus, some eHealth data subjects have expressed security and privacy concerns related to the use of eHealth data. For this reason, the use of eHealth data is currently governed by many legal regulations, including the Health Insurance Portability and Accountability Act [<xref ref-type="bibr" rid="ref1">1</xref>], General Data Protection Regulation (GDPR) [<xref ref-type="bibr" rid="ref2">2</xref>], and California Consumer Privacy Act [<xref ref-type="bibr" rid="ref3">3</xref>]. However, the security of eHealth data has frequently been breached, and the number of cyberattacks launched to hijack eHealth data intended for health care services is on the rise [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        <p>Nevertheless, using eHealth data for health care research has many advantages (eg, improving treatment and prescriptions for patients, increasing the efficiency of health care systems, and expanding knowledge of diseases), so many researchers hope to use them for their studies [<xref ref-type="bibr" rid="ref5">5</xref>]. However, the interoperability, utility, and data linkage of eHealth data as well as privacy laws (eg, Health Insurance Portability and Accountability Act, GDPR, and California Consumer Privacy Act) and analytics tools must be considered when a research platform for health care is built. Furthermore, security and privacy measures (eg, anonymization and access control) for an open research environment for eHealth data are needed, and many privacy laws must be complied with. Owing to these complex requirements, most research platforms for health care development are being led by national governments. For example, as depicted in <xref rid="figure1" ref-type="fig">Figure 1</xref>, the Ministry of Health and Welfare of South Korea [<xref ref-type="bibr" rid="ref6">6</xref>] operates a closed network–based analysis center that supports a research environment for analyzing eHealth data. However, researchers must visit the analysis center as they are not able to connect to it remotely or on the web. Not only is this analysis center inconvenient to visit, but it also presents a challenge to efficiently analyzing eHealth data as programming errors can only be corrected via books because of the closed nature of the network. Moreover, the eHealth data requested by the researchers are immediately deleted after use, which reduces the utility of the data.</p>
        <p>The National Health Service (NHS) in England also offers eHealth data to researchers and clinicians through a Data Access Request Service (DARS) [<xref ref-type="bibr" rid="ref7">7</xref>]. The NHS DARS provides various analytical tools such as Databricks, R Studio, and Hue in the data access environment, and it does not require the researcher to visit the research analysis center, unlike the center in South Korea. The NHS DARS also provides many security solutions (eg, 2-factor authentication, data-sharing audits, and anonymization) to ensure the security and privacy of eHealth data. Furthermore, the Swiss Personalized Health Network offers a secure infrastructure for the exchange and use of eHealth data for research [<xref ref-type="bibr" rid="ref8">8</xref>]. In the Swiss Personalized Health Network, eHealth data can be accessed only from reliable hospitals and universities or the virtual private network, which are environments. Researchers must take the web-based ethics training and are required to complete 2-factor authentication. However, data subjects (ie, patients) are still concerned about unauthorized data reuse and sharing, and they hope to be involved in eHealth data access decisions [<xref ref-type="bibr" rid="ref9">9</xref>]. In addition, even if eHealth data are deidentified and anonymized, reidentification is still possible via other big data [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. In other words, studies on health care research platforms are needed to provide a more secure analytical environment in light of the apprehension of data subjects regarding the security and privacy of their eHealth data.</p>
        <p>Therefore, we propose a secure research platform for health care, referred to as the health care big data platform (HBDP). In this study, we considered only a secure and open research environment, although a research platform for health care has many requirements. The HBDP uses a private blockchain to provide a decentralized persistent log database (DB) in which user activities on the platform are recorded with a time stamp by a smart contract. This helps the platform administrator conduct the appropriate follow-up and monitoring of security threats. Furthermore, the HBDP uses attribute-based encryption (ABE) to ensure the security and privacy of eHealth data and prevent eHealth data leakage by insiders. To the best of our knowledge, this is the first study on a secure research platform that is focused on accountability to secure the use of eHealth data in an open environment based on blockchain and ABE. The main contributions of this study are summarized in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Access procedure for analyzing eHealth data in South Korea.</p>
          </caption>
          <graphic xlink:href="jmir_v24i10e37978_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <boxed-text id="box1" position="float">
          <title>Main contributions of this study.</title>
          <p>
            <bold>Main contributions</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>We propose the health care big data platform (HBDP), which supports the accountability, access control, and encryption of stored eHealth data using attribute-based encryption and a private blockchain in an open environment. In particular, we focused on accountability in access control. We also analyzed previous research platforms for health care from a security perspective.</p>
            </list-item>
            <list-item>
              <p>For accountability in access control, a smart contract is designed to record in real time the success or failure of user activities (eg, log-in and use of eHealth data) on the HBDP. In particular, the contract enables user monitoring and illegal user detection in the HBDP anytime.</p>
            </list-item>
            <list-item>
              <p>To prove and demonstrate the feasibility of the HBDP, we implemented a framework for the HBDP using Hyperledger Fabric (The Linux Foundation) [<xref ref-type="bibr" rid="ref12">12</xref>], OpenABE library (Zeutro) [<xref ref-type="bibr" rid="ref13">13</xref>], and OpenStack (Open Infrastructure Foundation) [<xref ref-type="bibr" rid="ref14">14</xref>], and we evaluated its security by using case studies on the detection of illegal users.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Prior Work</title>
        <sec>
          <title>Overview</title>
          <p>To analyze prior work, we first collected and analyzed well-known health care standards for the interoperability of eHealth data. After analyzing the standards, we searched existing health care studies related to the blockchain using the terms “blockchain” AND “access OR data sharing OR access control” AND “healthcare” for literature review in IEEE Xplore, Wiley Online Library, ScienceDirect, and MDPI. The results identified 501 papers in IEEE Xplore, 943 articles in the Wiley Online Library, 2599 articles in ScienceDirect, and 24,219 articles in MDPI. To select suitable studies, we added some filters (ie, published from 2018 to 2022 and cited by ≥5 journals) based on these results. We also reviewed the abstracts and titles of the papers. On the basis of these works, we finally selected 9 papers (ie, IEEE Xplore: n=4, 44%; Wiley Online Library: n=2, 22%; ScienceDirect: n=2, 22%; and MDPI: n=1, 11%).</p>
          <p>Furthermore, we searched health care research platforms from 2015 to 2022 using the terms “healthcare research platform” and “clinical research platform” in Google Scholar. The results showed approximately 849,000 and 1,480,000 papers for each keyword, respectively. To identify suitable studies, we also reviewed the abstracts and titles. In particular, we examined the security solutions in each study and finally selected 6 papers. This section analyzes the identified studies via these processes in detail.</p>
        </sec>
        <sec>
          <title>Standards for Interoperability of eHealth Data</title>
          <p>For a long time, eHealth data have been limited to being shared and accessed between health care providers owing to interoperability issues such as differences in representation (eg, vocabularies and terminologies), equipment, and data formats. These issues currently make it difficult for health care providers to ensure continuity of care for patients or analyze eHealth data in health care. Therefore, many health care organizations are publishing interoperability standards for eHealth data in health care. Clinical Document Architecture (CDA) [<xref ref-type="bibr" rid="ref15">15</xref>] is an XML-based markup standard for clinical document exchange designed by Health Level 7 (HL7). CDA prescribes the structure and semantics of clinical documents for interaction between health care systems. The central aspect of CDA is easily exchanging clinical documents and making them readable. However, CDA-based documentation has the disadvantage of making it complex and difficult. For this reason, CDA has been extended to Consolidated CDA with improved complexity and interoperability. Fast Healthcare Interoperability Resources (FHIR) [<xref ref-type="bibr" rid="ref16">16</xref>] is a standard to ensure the interoperability of health care systems or services also developed by HL7. The FHIR improved the limitations of the previously developed HL7 versions 2 and 3 (eg, implementation complexity and structured data model) to make the exchange of medical information easier. Furthermore, it was developed based on the representational state transfer architecture, so it is easy to implement health care services for mobile phones, wearable devices, and tablet devices beyond computers. Thus, the FHIR is currently one of the most popular standards for the interoperability of eHealth data in health care. The Observational Medical Outcomes Partnership (OMOP) Common Data Model (CDM) [<xref ref-type="bibr" rid="ref17">17</xref>] is an open community standard for the eHealth data model managed by Observational Health Data Sciences and Informatics. The OMOP CDM solves the interoperability issues of eHealth by structuring the data model and the content of observational data. The OMOP CDM structures eHealth data to provide a common data model and converts them into a common representation through the OMOP to provide the common physical and logical interoperability model. When a health care DB is designed via the OMOP CDM, it can use standardized analysis tools and help analyze eHealth data systematically. It also increases the efficiency of joint research. Digital Imaging and Communications in Medicine (DICOM) [<xref ref-type="bibr" rid="ref18">18</xref>] is a data format standard for the interoperability of medical imaging such as magnetic resonance imaging, computed tomography, and x-rays. DICOM has defined the format of medical imaging so that medical images captured by various imaging devices can be transmitted and exchanged. DICOM is generally stored, processed, and transmitted via the picture archiving and communication system and is the best known today in health care. Cross-Enterprise Document Sharing (XDS) [<xref ref-type="bibr" rid="ref19">19</xref>] is an integrated profile for eHealth data developed by Integrating the Healthcare Enterprise in 2004. In particular, XDS can share various standard-based clinical documents such as the HL7 CDA, general strings, and binary data. In other words, XDS represents a comprehensive and universal technology. In addition to the aforementioned standards, various standards are being established for the interoperability of eHealth data by many health care organizations. We consider that these standards do not provide perfect interoperability of eHealth data but can still be addressed in the near future. Thus, the interoperability of eHealth data is the main requirement in the research platform for health care, but it is not the main focus of this study.</p>
        </sec>
        <sec>
          <title>Secure eHealth Data Sharing via Blockchain</title>
          <p>The blockchain has many advantages (eg, data integrity, decentralization, and programmable smart contract), so many research areas have been trying to use it. In particular, the blockchain has been widely used to address the integrity, scalability, and sharing of eHealth data. However, in addition, eHealth data require security mechanisms such as access control, cryptography, and authentication owing to privacy and security issues. For this reason, many studies generally use these security mechanisms with the blockchain. <xref ref-type="table" rid="table1">Table 1</xref> shows the strengths and weaknesses of these studies and the HBDP. Yang et al [<xref ref-type="bibr" rid="ref20">20</xref>] proposed an architecture that can use blockchain in the existing health care system. The architecture has recorded all accesses, such as select, insert, and delete, using two smart contracts (ie, summary contract and record relationship contract) to ensure the integrity of data records. The architecture also performs access control via an access control list. Madine et al [<xref ref-type="bibr" rid="ref21">21</xref>] proposed a blockchain-based, patient-centric PHR management system. The system uses trusted oracles that perform proxy re-encryption to share the PHRs securely. Furthermore, the system uses a reputation system to track an oracle’s behavior and give a rating score to identify the misbehaving oracles. Thus, the system lets them fetch, store securely, and share medical data. Zhang et al [<xref ref-type="bibr" rid="ref22">22</xref>] presented the architecture for sharing clinical data based on blockchain. The architecture used the FHIR standard and blockchain to solve clinical data interoperability and is called FHIRChain. The FHIRChain helps enable collaborative clinical decision-making among physicians. It also allows for the sharing of clinical data in a trustless and decentralized environment and for auditing through the smart contract. Shahnaz et al [<xref ref-type="bibr" rid="ref23">23</xref>] designed the role-based access control (RBAC) framework for EMRs using smart contracts. They focused on solving the scalability problem of blockchain via the off-chain scaling mechanism.</p>
          <p>Tanwar et al [<xref ref-type="bibr" rid="ref24">24</xref>] proposed a permission-based system architecture that could share eHealth data using blockchain. In this architecture, patients can join the blockchain network through the client application and update their eHealth data on the blockchain network via chain code. They can also grant or revoke permission to clinicians and researchers for their eHealth data. In conclusion, the architecture achieves patient-centric eHealth data sharing. Figueroa et al [<xref ref-type="bibr" rid="ref25">25</xref>] used attribute-based access control for the security of a radio frequency identification system for health care. They focused on solving system problems such as scalability, synchronization, and single point of failure using blockchain. Ultimately, the system offers access control to use the medical assets from a suitable location. Daraghmi et al [<xref ref-type="bibr" rid="ref26">26</xref>] designed a blockchain-based EMR management system called MedChain. They improved the block time and system performance using proof of authority. They also used time-based smart contracts for the privacy and monitoring of EMRs. In brief, they provided a secure environment, data integrity, auditability, and accessibility using authentication techniques, hash function, and proxy re-encryption. Kaur et al [<xref ref-type="bibr" rid="ref27">27</xref>] proposed blockchain-based storage for securely sharing and querying eHealth data. The storage uses CouchDB considering the unstructured eHealth data. It also stores EMRs in the off-chain and hash of EMRs on the blockchain to ensure the integrity of EMRs and improve the efficiency of storage. Guo et al [<xref ref-type="bibr" rid="ref28">28</xref>] proposed the multi-authority ABE scheme for cloud-based telemedicine systems. In particular, the scheme protects the integrity of eHealth data (eg, diagnostic opinions) using the blockchain. Furthermore, the scheme updates and revokes the access policy easily.</p>
          <p>Most studies [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref28">28</xref>] only focused on blockchain for secure sharing and ensuring the integrity of eHealth data among hospitals. They generally mentioned traceability and accountability via the blockchain, but they did not represent methods for monitoring and accountability. However, these methods should be presented to ensure a secure environment. In particular, accountability is essential in a health care research platform in open environments. For these reasons, unlike other studies, the HBDP focused on the description of the detection method based on the blockchain to ensure accountability. In addition, in the HBDP, even if eHealth data are exported, the data are not ensured usability as they can only be decrypted and used in the HBDP. As mentioned previously, this study is the first to focus on accountability to use eHealth data in an open environment securely.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Strengths and weaknesses of blockchain-based studies and the health care big data platform (HBDP).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="130"/>
              <col width="120"/>
              <col width="200"/>
              <col width="300"/>
              <col width="250"/>
              <thead>
                <tr valign="top">
                  <td>Studies</td>
                  <td>System name</td>
                  <td>Security solutions</td>
                  <td>Strength</td>
                  <td>Weakness</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Yang et al [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                  <td>—<sup>a</sup></td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Encryption</p>
                      </list-item>
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Interoperability among existing health care systems</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The proposed architecture only focused on reading health records and did not discuss sharing of health records.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Madine et al [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Encryption</p>
                      </list-item>
                      <list-item>
                        <p>Blockchain</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>A patient-centric PHR<sup>b</sup> management system is proposed.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Not useful for an emergency where the patient is not able to delegate permission</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Zhang et al [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                  <td>FHIRChain</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Audit</p>
                      </list-item>
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>No SPoF<sup>c</sup> problem and fine-grained access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The architecture only presented the possibility of health data tracking.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Shahnaz et al [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The proposed architecture solves the scalability problem of blockchain via off-chain scaling.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The proposed architecture requires transaction costs and fees for access control.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Tanwar et al [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>A patient-centric eHealth data sharing is achieved.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Lack of flexible and fine-grained access control</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Figueroa et al [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>No SPoF problem and fine-grained access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The architecture requires transaction costs and fees for access control.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Daraghmi et al [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                  <td>MedChain</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Encryption</p>
                      </list-item>
                      <list-item>
                        <p>Authentication</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Efficient consensus mechanism and ensuring privacy via time-based smart contracts</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>No detailed description of the implementation of the proposed system using the PoA<sup>d</sup></p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Kaur et al [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Authorization</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Sharing of unstructured eHealth data and off-chain storage</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Not useful for an emergency where the patient is not able to delegate permission</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Guo et al [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                  <td>—</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Encryption</p>
                      </list-item>
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The ABE<sup>e</sup> scheme is proposed as suitable for the distributed telemedicine system.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The specific method is not presented to ensure the traceability of the schema.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Ours</td>
                  <td>HBDP</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Encryption</p>
                      </list-item>
                      <list-item>
                        <p>Audit</p>
                      </list-item>
                      <list-item>
                        <p>Access control</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The detailed methods for accountability in access control are proposed.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>The platform focuses only on 3 SRs<sup>f</sup>.</p>
                      </list-item>
                    </list>
                  </td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table1fn1">
                <p><sup>a</sup>Not presented.</p>
              </fn>
              <fn id="table1fn2">
                <p><sup>b</sup>PHR: personal health record.</p>
              </fn>
              <fn id="table1fn3">
                <p><sup>c</sup>SPoF: single point of failure.</p>
              </fn>
              <fn id="table1fn4">
                <p><sup>d</sup>PoA: proof of authority.</p>
              </fn>
              <fn id="table1fn5">
                <p><sup>e</sup>ABE: attribute-based encryption.</p>
              </fn>
              <fn id="table1fn6">
                <p><sup>f</sup>SR: security requirement.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Health Care Research Platforms</title>
          <p>The use of eHealth data in health care research can fundamentally improve health care owing to the rapid development of big data analytical technologies. For this reason, several studies have proposed health care research platforms that can be used for research using eHealth data. In this section, we review the literature with a focus on the security perspective of these research platforms. Ozaydin et al [<xref ref-type="bibr" rid="ref29">29</xref>] proposed the design of a data warehouse, which is a Healthcare Research and Analytics Data Infrastructure Solution (HRADIS). The HRADIS focuses on infrastructure for integrating disparate eHealth data to improve the efficiency of health care. The HRADIS includes an account management framework for RBAC for some eHealth data. Lunn et al [<xref ref-type="bibr" rid="ref30">30</xref>] proposed a cloud-based digital health research platform for a national longitudinal cohort study. The platform collects and manages eHealth data of sexual and gender minority adults. In this platform, all microservices are within the subnet using virtual private cloud, and eHealth data at rest are stored in the MySQL DB securely after encryption. Furthermore, the platform uses open authorization for programming interfaces, SMS text message–based 2-factor authentication, and logging services to identify malicious users and ensure the security of eHealth data. Ashfaq et al [<xref ref-type="bibr" rid="ref31">31</xref>] described the regional health care information platform in Halland, Sweden. The platform basically operates within Swedish regulations and the GDPR regarding patient data. On the platform, eHealth data can only be accessed through internal clients secured in the regional IT firewalls. The client can only use related researchers in the approved health care project via the ethical review board in Sweden. In particular, the platform provides anonymized eHealth data to ensure privacy. Conde et al [<xref ref-type="bibr" rid="ref32">32</xref>] presented an open source–based research platform to support clinical and translational studies, ITCBio. The ITCBio platform supports role and access management tools to promote research collaboration and ensure security. It also provides dynamic consent, which enables ongoing and flexible communication between patients and researchers. De Moor et al [<xref ref-type="bibr" rid="ref33">33</xref>] described a scalable and adaptable platform for the interoperability of eHealth data systems and clinical research systems. They also presented the security architecture based on many security-related standards in detail. In particular, this architecture supports various security solutions such as identity management and credential delegation. Jones et al [<xref ref-type="bibr" rid="ref34">34</xref>] proposed the Secure Anonymised Information Linkage databank, which is ensured physical, technical, and procedural control. The Secure Anonymised Information Linkage databank provides encrypted communication and prevents eHealth data from being transferred outside the user’s devices. It also performs user authentication via user credentials and 2-factor authentication tokens.</p>
          <p>Several studies [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref34">34</xref>] have proposed health care research platforms for using eHealth data. However, most studies have focused on an efficient research environment. Some studies also did not describe security solutions in detail despite the security and privacy of eHealth data being major considerations in health care research platforms. Moreover, as mentioned previously in the Background section, eHealth data subjects are still concerned about the security and privacy of eHealth data. Thus, a study is necessary for a more secure platform for health care research that guarantees the usability of eHealth data while focusing on its security and privacy. The next section proposes a secure and expandable collaborative research platform for health care called the HBDP.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>This study designed a secure and open environment for health care research. To accomplish this, we first identify potential security threats on a health care research platform. Second, we propose security requirements (SRs) for a secure health care research platform based on these threats. Finally, we present a secure collaborative research platform for health care called the HBDP that can provide a secure analysis environment while meeting these requirements.</p>
      </sec>
      <sec>
        <title>Security Threats and Requirements on a Health Care Research Platform</title>
        <sec>
          <title>Overview</title>
          <p>A health care research platform should properly understand and mitigate security threats to provide a secure analytical environment. This subsection first identifies potential security threats of health care research platforms. We then define the SRs for mitigating these threats.</p>
        </sec>
        <sec>
          <title>Security Threats</title>
          <p>Various security threats, such as the abuse and illegal export of eHealth data, can arise on a health care research platform. However, we identified well-known security threats in the health care domain as threats to the health care research platform. In other words, many threats can occur on the platform, but we explicitly focused on threats that can occur frequently. A detailed description of the leading security threats is outlined in <xref ref-type="boxed-text" rid="box2">Textbox 2</xref>.</p>
          <boxed-text id="box2" position="float">
            <title>Leading security threats on a health care research platform.</title>
            <p>
              <bold>Leading security threats</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Unauthenticated users: on a health care research platform, unauthenticated users attempt an attack to obtain the authenticated user’s credentials [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref37">37</xref>]. In addition, attackers can invalidate the authentication factor to access eHealth data [<xref ref-type="bibr" rid="ref38">38</xref>]. Hence, a health care research platform must ensure, through user authentication, that only authenticated users have access.</p>
              </list-item>
              <list-item>
                <p>Unauthorized users: a health care research platform must ensure that only approved eHealth data are available to authorized users through appropriate authorization mechanisms [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. Moreover, the abuse and illegal sharing of eHealth data can occur on a health care research platform even by authorized users. Therefore, a health care research platform also requires a security solution that audits for these activities.</p>
              </list-item>
              <list-item>
                <p>Leaks of eHealth data by insiders: the greatest security threat for a health care research platform is a breach of eHealth data by insiders [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. A prime example of an insider is the eHealth data administrator of the health care research platform. The administrator can easily leak eHealth data as they have general authorization over them. Furthermore, insiders are difficult to detect as they are defined as suitable users within the health care research platform. For these reasons, even if eHealth data on a platform are illegally leaked, the utility of leaked data must not be ensured.</p>
              </list-item>
            </list>
          </boxed-text>
        </sec>
        <sec>
          <title>SRs for Mitigating These Threats</title>
          <p>A collaborative health care research platform in an open environment should satisfy the diverse SRs that mitigate many types of security threats. However, in this study, we only focused on 3 SRs, which are highly related to accountability in access control for a secure health care research platform based on the aforementioned identified threats. The detailed descriptions of the SRs are outlined in <xref ref-type="boxed-text" rid="box3">Textbox 3</xref>.</p>
          <boxed-text id="box3" position="float">
            <title>Security requirements (SRs) for mitigating security threats.</title>
            <p>
              <bold>SRs for threat mitigation</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>SR 1 (access control): access control is a framework that includes authentication and authorization, which is the primary SR and the most important consideration for a health care research platform. It must be performed on this platform so that only authenticated and authorized users can use eHealth data via appropriate devices. For this reason, many existing health care research platforms provide authentication or authorization using various methods [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref34">34</xref>].</p>
              </list-item>
              <list-item>
                <p>SR 2 (encryption of stored eHealth data): on a health care research platform, the encryption of stored eHealth data ensures the security and privacy of eHealth data when the data are not being used [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. In addition, even if eHealth data are leaked, the data should not be useful. Hence, the encryption of stored eHealth data is one of the most important SRs.</p>
              </list-item>
              <list-item>
                <p>SR 3 (accountability): when the authenticated and authorized user exports or uses eHealth data via the research platform for health care, the platform administrator or eHealth data provider needs to be able to track and search all the user’s activities on the platform at any time. In addition, the platform administrator must identify illegal users and conduct the appropriate follow-up or monitoring in the event of security issues. For these reasons, some health care research platforms provide logging systems or services [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>].</p>
              </list-item>
              <list-item>
                <p>Other SRs: the collaborative research platform in an open environment should satisfy various other SRs. For example, anonymization and deidentification are needed for the privacy of eHealth data as the data are sensitive and private [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Secure communication is also necessary to prevent sniffing and tampering with eHealth data and network packets [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. In addition, more SRs for the integrity and availability of eHealth data are required [<xref ref-type="bibr" rid="ref41">41</xref>]. However, as mentioned previously, we focused on the three SRs (ie, access control, encryption of stored eHealth data, and accountability) to support accountability in access control.</p>
              </list-item>
            </list>
          </boxed-text>
        </sec>
      </sec>
      <sec>
        <title>Proposed HBDP</title>
        <sec>
          <title>Overview</title>
          <p>The HBDP uses ABE for the privacy and access control of eHealth data. In particular, the privacy of eHealth data is ensured through column-level encryption even if insiders leak the data. The platform also uses a smart contract to record user activities (eg, log-in and decryption) in the blockchain. Thus, the blockchain allows platform administrators to identify illegal users and conduct appropriate follow-up and monitoring. In other words, the blockchain operates as a distributed logging system in real time and ensures the integrity and nonrepudiation of recorded user activities. In this section, to present the HBDP, we first explain the assumptions and main components in a framework. We then describe the phases of the HBDP in detail.</p>
        </sec>
        <sec>
          <title>Assumptions</title>
          <p>To describe a framework and scenarios of HBDP, we first define some assumptions. In particular, we present assumptions about other SRs (eg, secure communication, deidentification, integrity, and availability) that the HBDP does not cover. The detailed assumptions are outlined in <xref ref-type="boxed-text" rid="box4">Textbox 4</xref>.</p>
          <boxed-text id="box4" position="float">
            <title>Assumptions about other security requirements.</title>
            <p>
              <bold>Assumptions</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>As eHealth data contain a considerable amount of personally identifiable information, they are generally provided to users after deidentification and anonymization on the platform. Data linkage is also performed to increase the usability of eHealth data before they are provided to users. However, this study did not cover deidentification, anonymization, and data linkage. Thus, all the eHealth data on the platform are assumed to be deidentified and linked via trusted third-party organizations. In addition, eHealth data are assumed to be provided by institutions registered on the platform.</p>
              </list-item>
              <list-item>
                <p>This study did not cover secure communication between the health care big data platform (HBDP) and the users. Therefore, we assume that the HBDP is securely communicating with its users by using transport layer security protocol–based communication, which is used for secure communication on the internet and across networks. This assumption also holds for communication on the blockchain network.</p>
              </list-item>
              <list-item>
                <p>Users are assumed to be researchers or physicians with a specific institution that is registered on the HBDP. Thus, they do not need to prove that they are researchers or physicians affiliated with the institution when they register on the platform, but authentication and authorization for access to eHealth data for users are performed on the platform. Furthermore, we also assume that the HBDP provides a variety of analytical tools and methods for researchers to efficiently analyze eHealth data and that the user analysis process is recorded on the distributed ledger, including the analytical tools used.</p>
              </list-item>
            </list>
          </boxed-text>
        </sec>
        <sec>
          <title>Main Components</title>
          <p>We present a secure collaborative platform for health care research that ensures the privacy and security of eHealth data, called the HBDP. <xref rid="figure2" ref-type="fig">Figure 2</xref> shows a brief overview of our proposed framework for the HBDP. Our proposed framework has 3 main components: users, the HBDP, and the blockchain network. A detailed description of the main components is outlined in <xref ref-type="boxed-text" rid="box5">Textbox 5</xref>.</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>Overview of our proposed framework for the health care big data platform.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <boxed-text id="box5" position="float">
            <title>Main components of our proposed framework.</title>
            <p>
              <bold>Framework components</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Users: physicians and researchers who analyze and use eHealth data to treat patients or use them for health care research are representative of this group. They should be required to have a device such as a smartphone or a fingerprint scanner with a GPS for authentication and access control on the platform.</p>
              </list-item>
              <list-item>
                <p>Health care big data platform (HBDP): the HBDP keeps eHealth data secure and provides an environment where users can use and analyze the data. The platform consists of a security agent and databases (DBs) in a cloud computing environment. DBs are configured as eHealth DBs and user DBs. The eHealth data DB stores eHealth data. The user DB stores user information such as the user ID, hashed password, and user attributes (eg, user department and position). The security agent is a key component of the platform. It performs encryption and decryption of eHealth data using attribute-based encryption. It also requests, as a blockchain client, the blockchain network to record or obtain user activities.</p>
              </list-item>
              <list-item>
                <p>Blockchain network: the blockchain network consists of a single smart contract, a distributed ledger, and peers. The transactions recorded on the blockchain network are immutable unless the ledgers of all peers are modified. For this reason, the blockchain can be used as a distributed logging system that provides strong accountability, so we use the blockchain network for the tracking of user activities on the HBDP. More specifically, the blockchain communicates with the security agents on the HBDP and helps ensure the accountability and nonrepudiation of the platform. Peers are health facilities and research institutes registered on the platform. They can be endorsing peers or committing peers depending on their system performance. The smart contracts record user activities with time stamps on the distributed ledger, which helps the distributed ledger in the blockchain act as logs for the HBDP.</p>
              </list-item>
            </list>
          </boxed-text>
        </sec>
        <sec>
          <title>Phases of the HBDP</title>
          <sec>
            <title>Overview</title>
            <p>To support secure analytical environments, the HBDP has 4 phases (ie, user registration, storage, download, and use). Each phase is configured to satisfy our defined SRs (ie, the user registration and download phases meet the access control requirement, the storage phase meets the encryption of stored eHealth data requirement, and the use phase achieves accountability). A detailed description of each phase is provided in the following sections.</p>
          </sec>
          <sec>
            <title>User Registration Phase</title>
            <p>The user registration phase is the first operation for authentication in “access control,” which is one of the SRs of a health care research platform. This phase is stored with the user ID and attributes in the user DB on the HBDP. <xref rid="figure3" ref-type="fig">Figure 3</xref> shows a sequence of the user registration phase; the details are described in this section. The user accesses the HBDP and enters the user ID, password, and attributes (eg, the user’s department and position). At this time, we assume that this user is authorized by an institution participating in the HBDP. The security agent on this platform then inserts the entered user information into the user DB. The security agent requests device enrollment from the user with the registration result. The user accesses the platform using their device and enters the registered ID, password, and device identifier. The user device then requests the security agent to enroll it along with the entered ID and password. The security agent performs password-based authentication using the received ID and password. If this authentication is successful, the device ID value is inserted into the user DB, and the security agent relays the result of the device enrollment to the device. After that, the user can access the HBDP at any time.</p>
            <fig id="figure3" position="float">
              <label>Figure 3</label>
              <caption>
                <p>User registration phase.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
          <sec>
            <title>Storage Phase</title>
            <p>Attempts to leak eHealth data stored by the HBDP may frequently occur. Even if eHealth data are inevitably leaked in these attempts, the nonusability of the data should be ensured. For this reason, in the storage phase, as shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>, the security agent encrypts eHealth data using the locations of institutions registered on the platform before storing the eHealth data on the platform.</p>
            <p>In particular, some columns are sensitive columns that provide usability for researchers during the analysis of eHealth data or can be combined with other big data to identify individuals. The storage phase is the operation that ensures the “encryption of stored eHealth data,” which is one of the SRs for health care research platforms. This phase ensures that, even if eHealth data are illegally shared or leaked by the administrator or a malicious attacker on the platform, their usability is not ensured because of column-level encryption. Moreover, column-level encryption allows users to use decrypted eHealth data only at their institutions as the decryption of eHealth data fails if the user’s real-time location does not match the user’s institution.</p>
            <fig id="figure4" position="float">
              <label>Figure 4</label>
              <caption>
                <p>Storage phase.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
          <sec>
            <title>Download Phase</title>
            <p>The download phase is the prerequisite for the authorization process in the “access control” for the SRs of the health care research platform. This phase encrypts all contents of column-level–encrypted eHealth data via user attributes (eg, user position and department) to enable the user to download eHealth data. Therefore, the data provided during the download phase are encrypted, so they are impossible to analyze even if a third party obtains them. The download phase is not an essential phase but can increase the efficiency when collaborative research is conducted. For example, if all collaborative researchers are authorized on the platform, the researcher sends eHealth data after the first analysis to another researcher for collaboration. Another researcher can then proceed with further work based on the analyzed eHealth data on the platform. <xref rid="figure5" ref-type="fig">Figure 5</xref> shows the download phase on the platform. A detailed description of the download phase is provided in the following paragraph.</p>
            <p>The user first logs into the HBDP and selects the eHealth data on the download page. The security agent on the platform then sends a query for the eHealth data requested by the user to the eHealth data DB. The eHealth data DB provides column-level–encrypted eHealth data to the security agent. After that, the security agent requests user information, such as the user’s attributes and ID, from the user DB. The user DB provides the requested user information to the security agent. The security agent encrypts the column-level–encrypted eHealth data one more time using the provided user information and offers the full encrypted eHealth data. The eHealth data provided during the download phase are encrypted, so they are impossible to analyze even if a third party obtains them.</p>
            <fig id="figure5" position="float">
              <label>Figure 5</label>
              <caption>
                <p>Download phase.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
          <sec>
            <title>Use Phase</title>
            <p>The use phase performs “access control,” which is one of the SRs for the health care research platform. This phase also ensures “accountability” as the use activity of the user on the platform is recorded with a time stamp in the distributed ledger. <xref rid="figure6" ref-type="fig">Figure 6</xref> shows the sequence of the use phase; the details are described in the following paragraphs.</p>
            <p>The user logs into the HBDP (ie, password-based authentication) and uploads encrypted eHealth data. The security agent on the platform then requests user and device information from the user DB for decryption and fingerprint authentication. The user DB provides the security agent with the user attributes and user device ID. The security agent uses the device ID value to request fingerprint authentication and real-time location from the user device. The user enters a fingerprint via the enrolled device on the platform for second user authentication. If the user succeeds in fingerprint authentication, the device sends a real-time GPS location to the security agent. The security agent decrypts the eHealth data uploaded by the user using the location and user attributes. In particular, at this time, full decryption is performed on encrypted rows, and column-level decryption is then performed on column-level–encrypted columns (ie, sensitive columns). After the decryption of the eHealth data, the security agent requests the blockchain peer to record the decryption result with a time stamp in the blockchain. Blockchain peers execute a smart contract to record the decryption result on the distributed ledger, and the smart contract inserts the decryption result on the distributed ledger. When the decryption result is recorded in the distributed ledger, the smart contract returns the execution result to the blockchain peers. The blockchain peers send the received execution result to the security agent. Finally, the security agent provides the decrypted eHealth data to the user, and the user is able to use the data only on the platform. In conclusion, for the user to use eHealth data on the HBDP, the data must be decrypted on the platform.</p>
            <p>Algorithms 1 and 2 are a pseudocode of the security agent. Algorithms are composed of password-based authentication and decryption of the eHealth data along with the detection of illegal users. In particular, algorithm 1 (<xref rid="figure7" ref-type="fig">Figure 7</xref>) first checks whether the user’s ID is locked; if the user’s ID is not locked, it authenticates the user’s credentials. The security agent then requests to record the result of the user log-in activity in the blockchain.</p>
            <p>By contrast, algorithm 2 (<xref rid="figure8" ref-type="fig">Figure 8</xref>) first performs fingerprint-based authentication for the user’s real-time location. After that, the security agent decrypts the data using the created policy via user information, including the location. Finally, the security agent requests to record the result of the use activity of the user in the blockchain. In particular, before recording the result from the procedure, the security agent checks the distributed ledger for the most recent consecutive failed activities in the previous records.</p>
            <fig id="figure6" position="float">
              <label>Figure 6</label>
              <caption>
                <p>Use phase.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
            <fig id="figure7" position="float">
              <label>Figure 7</label>
              <caption>
                <p>Algorithm 1: pseudocode of authentication for the security agent.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
            <fig id="figure8" position="float">
              <label>Figure 8</label>
              <caption>
                <p>Algorithm 2: pseudocode of use for the security agent.</p>
              </caption>
              <graphic xlink:href="jmir_v24i10e37978_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
        </sec>
        <sec>
          <title>Implementation</title>
          <p>To demonstrate and prove the feasibility of the HBDP, we implemented the main components of a framework based on the software development life cycle. The software development life cycle is generally configured as requirement analysis, design, implementation, testing, and evolution steps. Following these steps, we first identified SRs (see the SRs in the Security Threats and Requirements on a Health Care Research Platform section). Second, the components were designed based on 3 identified SRs (ie, access control, encryption of stored eHealth data, and accountability). Third, we implemented these components. <xref ref-type="boxed-text" rid="box6">Textbox 6</xref> shows the specifications for the configuration and implementation environment in detail. We configured the blockchain network for detecting illegal users and a cloud environment to create a scalable, collaborative, and secure environment in the HBDP. In particular, we built the cloud environment using OpenStack (Open Infrastructure Foundation), an open-source cloud operating system, and then developed a web server using the Python-based Flask framework (Python Software Foundation) [<xref ref-type="bibr" rid="ref42">42</xref>]. We also developed an Android app for user authentication, the security agent for detecting illegal users and monitoring, and a chain code to record and manage user activities. Fourth, the components are tested using a security analysis of the HBDP via case studies in the Results section. Finally, the components are analyzed in the Discussion section to evaluate them.</p>
          <p><xref rid="figure9" ref-type="fig">Figure 9</xref> shows an overview of our implementation and the interactions between the main components. As mentioned previously, our implementation is a proof of concept for demonstrating the features realized by the HBDP.</p>
          <p>On a research platform for health care, the cloud environment not only provides various big data analytical tools in the form of software as a service but also provides an environment where researchers can collaborate. The cloud environment also provides scalability and an open environment.</p>
          <p><xref rid="figure10" ref-type="fig">Figure 10</xref> shows some pages from the HBDP. <xref rid="figure10" ref-type="fig">Figure 10</xref>A is a page that is shown when a user successfully logs in by entering a registered user ID and password. Users who successfully log in can access this platform at any time and download eHealth data that can be used on the page shown in <xref rid="figure10" ref-type="fig">Figure 10</xref>B.</p>
          <boxed-text id="box6" position="float">
            <title>Specifications of our implementation environment.</title>
            <p>
              <bold>Environment specifications</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Processor: Intel Xeon processor E5620 2.40 GHz</p>
              </list-item>
              <list-item>
                <p>Memory: 32 GB</p>
              </list-item>
              <list-item>
                <p>Operating system: Ubuntu Linux 18.04.5 LTS</p>
              </list-item>
              <list-item>
                <p>Smartphone: Galaxy S21 (SM-G991N)</p>
              </list-item>
              <list-item>
                <p>Languages: Go language, Java, Python, and C++</p>
              </list-item>
              <list-item>
                <p>Docker engine: version 20.10.7</p>
              </list-item>
              <list-item>
                <p>OpenStack: version 5.2.0 (Stein)</p>
              </list-item>
              <list-item>
                <p>MySQL: version 5.7.36</p>
              </list-item>
              <list-item>
                <p>Android: version 11</p>
              </list-item>
              <list-item>
                <p>Hyperledger Fabric: version 1.4</p>
              </list-item>
            </list>
          </boxed-text>
          <fig id="figure9" position="float">
            <label>Figure 9</label>
            <caption>
              <p>Overview of our implementation.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure10" position="float">
            <label>Figure 10</label>
            <caption>
              <p>Implemented health care big data platform (HBDP).</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig10.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>We also developed an Android app to use fingerprint authentication and real-time location information. In particular, we used Firebase (Firebase Inc) [<xref ref-type="bibr" rid="ref43">43</xref>] for messaging the Android app. <xref rid="figure11" ref-type="fig">Figure 11</xref> shows some pages of the implemented app. In <xref rid="figure11" ref-type="fig">Figure 11</xref>A, the app performs user registration and device enrollment on the platform. In addition, <xref rid="figure11" ref-type="fig">Figure 11</xref>B shows device enrollment for fingerprint authentication and real-time location information. Finally, <xref rid="figure11" ref-type="fig">Figure 11</xref>C shows a fingerprint authentication request when the user wants to use encrypted eHealth data.</p>
          <p>Furthermore, we used the OpenABE library (Zeutro) to perform the encryption and decryption of eHealth data. The eHealth data were anonymous and deidentified open data from the Korea Disease Control and Prevention Agency. The data were from the National Health and Nutrition Examination Survey in South Korea, and they included ID, gender, age, region, and income. In particular, we defined the sensitive columns in our implementation as age and region. <xref rid="figure12" ref-type="fig">Figure 12</xref> shows the eHealth data at each phase on the platform. <xref rid="figure12" ref-type="fig">Figure 12</xref>A shows the eHealth data with column-level encryption when they are stored on the platform by the security agent. In addition, when the user downloads eHealth data, they are offered after full encryption of the column-level–encrypted eHealth data using the user attributes stored on the platform, as shown in <xref rid="figure12" ref-type="fig">Figure 12</xref>B. Finally, <xref rid="figure12" ref-type="fig">Figure 12</xref>C shows the decrypted eHealth data, which can be used by authorized users on the platform.</p>
          <p>Generally, blocks in the blockchain are identified by hashes, and the blocks are connected because they have a hash of the previous block. In other words, alteration is impossible unless the blocks of all participants are modified. Therefore, on the platform, the private blockchain is used as a decentralized persistent logging system. We built the blockchain network using Hyperledger Fabric (The Linux Foundation) and designed a smart contract for accountability. <xref rid="figure13" ref-type="fig">Figure 13</xref> shows a web page for detecting illegal users (ie, unauthenticated and unauthorized users) using the distributed ledger. This page helps platform administrators search for specific user activities as well as identify and respond to the actors when security threats arise. In short, the distributed ledger in our implementation provides accountability and nonrepudiation to the HBDP.</p>
          <fig id="figure11" position="float">
            <label>Figure 11</label>
            <caption>
              <p>Android app.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig11.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure12" position="float">
            <label>Figure 12</label>
            <caption>
              <p>Encryption and decryption of eHealth data in the health care big data platform.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig12.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure13" position="float">
            <label>Figure 13</label>
            <caption>
              <p>Web page for detection of illegal users.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig13.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview</title>
        <p>To show the proof of concept, the previous section implemented the HBDP. This section describes case studies of illegal user detection for security analysis via the implemented HBDP. This section also presents the results of several conducted experiments, which show the efficiency of the private blockchain and ABE cryptography.</p>
      </sec>
      <sec>
        <title>Case Studies of Detection of Illegal Users</title>
        <sec>
          <title>Overview</title>
          <p>In addition to the aforementioned security threats, many security threats (eg, the misuse and abuse of eHealth data) can arise on a health care research platform in an open environment. Thus, a secure health care research platform must be able to detect and trace the threats. This subsection describes how to detect two representative security threats—unauthenticated and unauthorized users—through the distributed ledger on the HBDP in an open environment. Moreover, we present the possibility of detecting other security threats through monitoring and access control processes.</p>
        </sec>
        <sec>
          <title>Detection of an Unauthenticated User</title>
          <p>One of the most common attacks attempted by unauthenticated users is the brute-force attack. Therefore, in this scenario, we assume that an unauthenticated user continuously tries to log into (ie, launches a brute-force attack on) the HBDP by stealing the user ID. <xref rid="figure14" ref-type="fig">Figure 14</xref> shows the sequences for detecting an unauthenticated user on the platform. A detailed explanation of this case study is provided in the following paragraphs.</p>
          <fig id="figure14" position="float">
            <label>Figure 14</label>
            <caption>
              <p>Detection of unauthenticated user.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig14.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>The attacker first steals the user ID that is used on the HBDP and then connects to the platform and inputs the stolen user ID and a random password. The security agent that receives the user ID and password retrieves the user information from the user DB and performs password-based user authentication. After that, the security agent requests the blockchain peer to record the log-in result in the distributed ledger. The blockchain peer records the log-in result through the execution of a smart contract and sends the recorded result to the security agent. The security agent receives the recorded result and then informs the attacker of the log-in failure. The attacker receives the result of the failed log-in and then continuously tries to log in using a random password with the stolen user ID. If the aforementioned sequence is repeated and the log-in fails 2 more times, the user ID is blocked by the security agent. In addition, the security agent requests fingerprint authentication to unblock the user ID from the device enrolled in the HBDP. As a result, platform users will be able to recognize that there has been an illegal log-in attempt. Furthermore, the security agent forwards these attempts to the platform administrator to help them analyze illegal log-in attempts based on the distributed ledger in detail.</p>
        </sec>
        <sec>
          <title>Prevention of the Misuse (or Abuse) of eHealth Data by an Unauthorized User</title>
          <p>The eHealth data that can be downloaded from the HBDP depend on the user’s department and position. For this reason, there is a possibility that unauthorized users can receive encrypted eHealth data from an authorized user. Therefore, we assume that an unauthorized user of the eHealth data wants to use illegally shared or leaked eHealth data. <xref rid="figure15" ref-type="fig">Figure 15</xref> shows the procedure for detecting the illegal sharing of eHealth data. The details are described in the following paragraphs.</p>
          <fig id="figure15" position="float">
            <label>Figure 15</label>
            <caption>
              <p>Detection of unauthorized user.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig15.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>The unauthorized user first obtains encrypted eHealth data in the wrong way from the authorized user. After that, the unauthorized user connects to the HBDP and uploads the illegally shared eHealth data to be used after log-in to the platform. The security agent that receives the eHealth data obtains user information from the user DB and requests fingerprint authentication from the enrolled device. The unauthorized user performs fingerprint authentication. If authentication is successful, the device sends a real-time location along with the signature to the security agent. The security agent then decrypts the eHealth data with the received attributes and real-time location after verification of the signature. However, the decryption of eHealth data fails because the unauthorized user’s attributes do not match the user attributes used for the encryption of the eHealth data. The security agent requests that the decryption result be recorded on the distributed ledger and then informs the unauthorized user that the decryption has failed after the unauthorized user’s activity is recorded on the ledger. If the aforementioned sequence is repeated and the decryption fails one more time, the user ID is blocked by the security agent. The security agent also sends these attempts to the platform administrator to help them analyze illegal use attempts based on the ledger in detail.</p>
          <p>In our implementation, various security threats can be detected and blocked, as can unauthenticated and unauthorized users. For example, even if attackers try to decrypt the eHealth data by stealing the user’s ID and password, decryption is impossible as fingerprint authentication fails. In addition, even if fingerprint authentication is successful by manipulating the device, decryption is impossible because of incorrect real-time location information. In other words, the HBDP has ensured the security and privacy of eHealth data. Furthermore, the platform administrator can detect illegal users through periodical monitoring as all user activities on the HBDP are recorded in the distributed ledger. In particular, to use even leaked data, they should be decrypted on the HBDP depending on the use phase. Thus, the administrator can detect this behavior through monitoring. Finally, the HBDP also does not ensure the usefulness of eHealth data via column-level encryption even if leaks by malicious users occur. In conclusion, the HBDP can provide researchers with an open and secure environment in which to efficiently analyze eHealth data.</p>
        </sec>
      </sec>
      <sec>
        <title>Performance Evaluation of the HBDP</title>
        <sec>
          <title>Overview</title>
          <p>Our main concepts are the proposal of a secure research platform for health care and the detection of illegal users using the distributed ledger. For this concept, we presented case studies in the previous section. However, performance is an important factor in proving system efficiency, so we briefly present and describe a performance evaluation of the implemented HBDP in this section.</p>
        </sec>
        <sec>
          <title>Average Time for Cryptography</title>
          <p>To measure the average time, we performed 10 rounds of encryption and decryption with changes in the number of rows and sensitive columns, as shown in <xref ref-type="boxed-text" rid="box7">Textbox 7</xref>.</p>
          <p><xref rid="figure16" ref-type="fig">Figure 16</xref> shows the average encryption and decryption times for the number of rows per number of sensitive columns. <xref rid="figure16" ref-type="fig">Figure 16</xref>A shows the average column-level encryption time based on the number of rows. In <xref rid="figure16" ref-type="fig">Figure 16</xref>A, if the maximum number of rows is 200,000 and the number of sensitive columns is 5, the maximum average time is approximately 10 minutes. Furthermore, <xref rid="figure16" ref-type="fig">Figure 16</xref>B shows the average full encryption time for changes in the number of rows versus each number of encrypted sensitive columns when the user downloads eHealth data from the platform (see the Download Phase section). Significantly, as this work encrypts the rows, the number of encrypted sensitive columns does not greatly affect the full encryption time. In other words, the encryption time is not dramatically increased with an increase in the number of encrypted sensitive columns. <xref rid="figure16" ref-type="fig">Figure 16</xref>C shows the average full decryption including column-level decryption time for the number of rows versus each number of encrypted sensitive columns when the user uses eHealth data on the HBDP (see the Use Phase section). As this work performs decryption twice, the decryption time required increases dramatically compared with full encryption. If the maximum number of rows is 200,000 and the number of sensitive columns is 5, the average time is approximately 27 minutes, so the HBDP has limitations in use for actual cases. However, we believe that several methods can solve this problem. A discussion of these methods is detailed in the following subsections.</p>
          <boxed-text id="box7" position="float">
            <title>Simulation parameters for evaluation of cryptography.</title>
            <p>
              <bold>Simulation parameters</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Rounds: 10</p>
              </list-item>
              <list-item>
                <p>Number of rows: 50,000, 100,000, and 200,000</p>
              </list-item>
              <list-item>
                <p>Number of sensitive columns within 46 columns: 1, 3, and 5</p>
              </list-item>
              <list-item>
                <p>Type of cryptography: column-level encryption, full encryption after column-level encryption in the download phase, and full decryption including column-level decryption in the use phase</p>
              </list-item>
            </list>
          </boxed-text>
          <fig id="figure16" position="float">
            <label>Figure 16</label>
            <caption>
              <p>Average time of cryptography.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig16.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Blockchain Performances</title>
          <p>The private blockchain is a distributed logging system that helps detect illegal users on the HBDP. For this reason, we did not evaluate the block and query times and focused only on the accountability and nonrepudiation provided by blockchain features. Therefore, in this section, the write and read times of the designed smart contract are evaluated using Hyperledger Caliper (The Linux Foundation) [<xref ref-type="bibr" rid="ref44">44</xref>]. We first executed 5 rounds of writing transactions onto the ledger of the blockchain network, with 1000 transactions in each round at rates of 100, 150, 200, 250, and 300 transactions per second (TPS), as shown in <xref ref-type="boxed-text" rid="box8">Textbox 8</xref>. We then executed 5 rounds of reading transactions into the ledger’s blockchain network at rates of 100, 150, 200, 250, and 300 TPS, with 1000 transactions in each round after writing 100 transactions. In particular, at this time, we assume that the platform administrator searches 100 records of previous user activity.</p>
          <p><xref rid="figure17" ref-type="fig">Figure 17</xref> and <xref rid="figure18" ref-type="fig">Figure 18</xref> show the average latencies and throughputs of our executions. In <xref rid="figure17" ref-type="fig">Figure 17</xref>A, the 1Org with 1Peer in write mode takes &#60;3 seconds in 300 TPS, which is a much lower latency than other networks. Conversely, the 1Org with 1Peer in write mode has a higher throughput (approximately 150 TPS) than other networks, as shown in <xref rid="figure18" ref-type="fig">Figure 18</xref>A. The 1Org with 1Peer in read mode has an average latency of approximately 14 seconds and a throughput of approximately 63 TPS in 300 TPS, as shown in <xref rid="figure17" ref-type="fig">Figure 17</xref>B and  <xref rid="figure18" ref-type="fig">Figure 18</xref>B. For the 2Orgs with 2Peers in read mode, the average latency and throughput reach approximately 19 seconds and 47 TPS, respectively, in 300 TPS. The results show that many organizations and peers reached high latency and low throughput in both read and write modes, so the latency and throughput are inversely proportional in write mode.</p>
          <boxed-text id="box8" position="float">
            <title>Simulation parameters for evaluation of the blockchain.</title>
            <p>
              <bold>Simulation parameters</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Rounds: 5</p>
              </list-item>
              <list-item>
                <p>Transactions: 1000 each</p>
              </list-item>
              <list-item>
                <p>Transaction rates: 100, 150, 200, 250, and 300</p>
              </list-item>
              <list-item>
                <p>Transaction mode: read and write</p>
              </list-item>
              <list-item>
                <p>Networks: 2Orgs with 2Peers, 2Orgs with 1Peer, and 1Org with 1Peer</p>
              </list-item>
              <list-item>
                <p>Orderer: solo</p>
              </list-item>
            </list>
          </boxed-text>
          <fig id="figure17" position="float">
            <label>Figure 17</label>
            <caption>
              <p>Average transaction latencies.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig17.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure18" position="float">
            <label>Figure 18</label>
            <caption>
              <p>Transaction throughputs.</p>
            </caption>
            <graphic xlink:href="jmir_v24i10e37978_fig18.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In the Results section, we first conducted a security analysis of the HBDP. The results showed that the HBDP provides a secure environment. We then presented the average times for cryptography and blockchain performance of the HBDP to evaluate its efficiency. As a result, some performances (eg, high decryption time depending on the number of encrypted columns) showed to need improvement. Therefore, we first discuss these results in this section. Some limitations of the HBDP are then presented. In addition, we compare the HBDP with prior works. Finally, we describe our further works on blockchain and IoT.</p>
        <p>The HBDP provides a secure research environment but has several challenges to solve to be efficient. Thus, this subsection discusses our results and these challenges in detail. First, to prove accountability in the HBDP, we presented case studies on detecting unauthenticated and unauthorized users via the implemented HBDP. In addition, we described some methods to detect other security threats via the process of access control and monitoring. The results showed that the HBDP supports accountability in access control.</p>
        <p>Second, as the number of sensitive columns increased, column-level encryption and full decryption including column-level decryption times increased significantly in our results. This issue would cause inconvenience to users in a real environment. To address this issue, we present some solutions. First, when eHealth data have many sensitive columns, efficient cryptography times can be achieved by merging these columns into 1 column to perform encryption and decryption. Second, the security agent can be configured first to perform decryption of some columns to show eHealth data and then decrypt other columns in the background process. This method may make the user feel that the delay is minimal compared with the previous approach. Finally, in the cloud environment, multiple security agents can be configured to perform parallel processing [<xref ref-type="bibr" rid="ref45">45</xref>-<xref ref-type="bibr" rid="ref47">47</xref>]. This method is efficient and the most widely used approach. Unfortunately, our work did not use these methods, but they are expected to provide better cryptography times.</p>
        <p>Finally, the read mode in blockchain has higher latency and lower throughput than the write mode by approximately ≥60%. In general, blockchain performance has higher latency and lower throughput in write mode than in read mode, but our evaluation showed the opposite result. This result might have been due to the process of looking up and reading all the records of 100 transactions. Nevertheless, the blockchain can be used sufficiently as a distributed logging system for the HBDP as it did not show poor performance. To prove this effectiveness, our discussion can be extended through a performance comparison evaluation with existing studies. However, we did not conduct the performance comparison because of differences in the implementation environment and configuration. The blockchain performance is generally affected by the role configuration of peers and orderers, differences in consensus algorithms, and blockchain type. Furthermore, even if a smart contract performs the same function, the performance can vary depending on how the smart contract is implemented. In conclusion, we consider that a comparison of the performances is useless in perfect nonequivalent environments.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>A health care research platform must offer an efficient environment as the primary purpose of the HBDP is to analyze eHealth data and then use the resulting values for research. For this environment, the interoperability of eHealth data, analytical and visualization tools, and data linkage are needed, but the HBDP implemented a few functions for eHealth data. Hence, in our future work, the HBDP will offer an efficient research platform that provides various analytics and visualization tools (eg, Hadoop, Tableau, and Spark) as software as a service.</p>
        <p>Furthermore, in this study, the HBDP only focused on three SRs (ie, access control, encryption of stored eHealth data, and accountability), but various additional SRs (eg, deidentification) are needed for a more secure environment. In addition, even after deidentification of eHealth data, the possibility of reidentification remains. Thus, our future work should also provide other SRs and methods to reduce the risk of reidentification through reidentification assessments in advance [<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>].</p>
        <p>Finally, the main scope of this study was access control and accountability for a research platform for health care, so the HBDP did not ensure the integrity and availability of eHealth data. In the HBDP, by also writing the hash of eHealth data on the distributed ledger, integrity can be ensured but not completely. For this reason, the HBDP needs solutions to ensure the integrity and availability of eHealth data for a complete research platform for health care. Availability and integrity can be generally ensured by existing cryptography technologies (eg, diverse types of firewalls, message authentication codes, intrusion detection systems, and hash functions). We also consider that some studies [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref54">54</xref>] are helpful for an efficient health care research platform.</p>
      </sec>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>For discussions of the HBDP, this section compares the HBDP with the existing health care research platforms based on defined SRs. <xref ref-type="table" rid="table2">Table 2</xref> shows that the HBDP and previous research platforms met specific SRs. First, access control (ie, authentication and authorization methods) was partially addressed in all studies [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref34">34</xref>] and was also addressed in the HBDP. In particular, some of the studies [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>] granted access to eHealth data through direct approval from the relevant authorities or contracts. However, this access control is cumbersome and complex, and there is a possibility of overly limiting the use of data. Some studies [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref34">34</xref>] used RBAC for access control, but RBAC cannot easily provide fine-grained access control. By contrast, ABE encryption generally achieves fine-grained access control as administrators can create detailed security policies using various attributes [<xref ref-type="bibr" rid="ref55">55</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]. ABE has also been able to achieve flexible access control recently [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. Hence, the HBDP enables fine-grained access control through the various sensing data of IoT devices as we use ABE encryption, unlike existing research platforms for health care. Furthermore, two studies that provided encryption for stored eHealth data were those by Lunn et al [<xref ref-type="bibr" rid="ref30">30</xref>], Jones et al [<xref ref-type="bibr" rid="ref34">34</xref>], and the HBDP. This encryption is needed to prevent illegal leaks by insiders and malicious attackers. Even anonymized eHealth data must be encrypted when they are stored on a research platform to make reidentification difficult and useless if the eHealth data are leaked. Finally, accountability is an audit trail that helps the platform administrator take appropriate action when a security incident occurs and mitigate security threats via monitoring. However, the logging system was implemented in a centralized form in the studies by Lunn et al [<xref ref-type="bibr" rid="ref30">30</xref>] and Jones et al [<xref ref-type="bibr" rid="ref34">34</xref>]. A centralized system has difficulty operating a logging service when the system is unavailable, and there is a possibility that the integrity of logs can be undermined by attackers. The HBDP uses a logging system in a decentralized form via blockchain and, thus, even if 1 node is unavailable, logging is still possible and ensures the integrity of logs as all peers own the distributed ledger. Moreover, we presented detailed methods of illegal user detection to prove accountability in the HBDP, unlike previous platforms.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Comparison of the health care big data platform (HBDP) and related studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="270"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <thead>
              <tr valign="top">
                <td colspan="2">SRs<sup>a</sup></td>
                <td colspan="7">Studies</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>Ozaydin et al [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>Lunn et al [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>Ashfaq et al [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>Conde et al [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>De Moor et al [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Jones et al [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Ours</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="9">
                  <bold>SR 1<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Authentication</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Authorization</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Fine-grained access control</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td colspan="2">SR 2<sup>c</sup>—encryption (encryption level and content of eHealth data)</td>
                <td>
                  <break/>
                </td>
                <td>✓ (Full data and medical report)</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓ (Sensitive data and identifiable data)</td>
                <td>✓ (Sensitive data and medical condition)</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>SR 3<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Decentralization</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Centralization</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Illegal user detection methods</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>SR: security requirement.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>Access control.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>Encryption of stored eHealth data.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>Accountability.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Private Blockchain</title>
        <p>eHealth data subjects hope to strengthen their rights by participating directly in eHealth data access decisions. They are also concerned with the privacy and security of eHealth data. However, when they directly participate in access decisions, it has the potential to stifle or unduly limit the usability of eHealth data in research (eg, the approval of researchers’ requests to use eHealth data is delayed for a long time or they are unconditionally refused). Therefore, the subjects’ rights must be ensured in other ways. With the distributed ledger of the blockchain, we expect that providers can supervise although not directly participate in access decisions. For example, eHealth data subjects can easily search the use history and users of their eHealth data at any time via the distributed ledger on the platform and object to the use if there are any issues. In addition, as the recorded history of the blockchain is difficult to alter, it is expected to elicit greater trust from eHealth subjects. Although we did not implement this supervisory function, we expect that further research will help address concerns about the use of eHealth data as well as advance the rights of eHealth data subjects.</p>
      </sec>
      <sec>
        <title>Interoperability on IoT Devices</title>
        <p>The eHealth data from various sensors and IoT devices are rapidly increasing and being collected in many health facilities. These eHealth data can improve public health and provide high-quality customized health care services when they are used in research, so they must be offered on a health care research platform. In general, IoT devices are connected to and managed by IoT platforms. However, it is currently difficult to share or use collected eHealth data because of the various interoperability issues on IoT platforms. In particular, secure interoperability cannot be guaranteed as each IoT platform has different access control methods and security policies for IoT devices. Therefore, our future research will provide various and detailed eHealth data to researchers by ensuring the secure interoperability of IoT platforms on the HBDP.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The use of eHealth data in health care research offers promising potential and advantages. However, eHealth data are more sensitive than other big data as they contain more personal information, so the privacy and security of eHealth data must be ensured for them to be used in studies. In addition, eHealth data subjects are still concerned about unauthorized data reuse and sharing within existing health care research platforms. Thus, we designed a more secure collaborative platform for health care research called the HBDP. This platform ensures the privacy and security of eHealth data using a private blockchain and ABE cryptography. The private blockchain operates as a decentralized persistent log DB in which all activities occurring on the HBDP are recorded with time stamps. As a result, the records in the blockchain (ie, distributed ledger) help platform administrators and users detect and respond to unauthenticated and unauthorized users on the HBDP. ABE cryptography ensures privacy even if eHealth data are leaked from the platform and enables detailed and fine-grained access control using situational information. Furthermore, we developed and tested the HBDP, blockchain network, and an Android app using Hyperledger Fabric, OpenStack, and OpenABE library to show the feasibility of the platform. We also described the detection of illegal users (ie, unauthenticated and unauthorized users) via case studies. As this study focused only on a secure environment for health care research, some future work is needed to provide an efficient and complete research platform. Nevertheless, we believe that the HBDP will provide a sufficiently secure environment for the use of eHealth data in health care research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ABE</term>
          <def>
            <p>attribute-based encryption</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CDA</term>
          <def>
            <p>Clinical Document Architecture</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CDM</term>
          <def>
            <p>Common Data Model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DARS</term>
          <def>
            <p>Data Access Request Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">DB</term>
          <def>
            <p>database</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">DICOM</term>
          <def>
            <p>Digital Imaging and Communications in Medicine</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">EMR</term>
          <def>
            <p>electronic medical record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">FHIR</term>
          <def>
            <p>Fast Healthcare Interoperability Resources</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">HBDP</term>
          <def>
            <p>health care big data platform</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">HL7</term>
          <def>
            <p>Health Level 7</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">HRADIS</term>
          <def>
            <p>Healthcare Research and Analytics Data Infrastructure Solution</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">IoT</term>
          <def>
            <p>Internet of Things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">NHS</term>
          <def>
            <p>National Health Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">OMOP</term>
          <def>
            <p>Observational Medical Outcomes Partnership</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">PHR</term>
          <def>
            <p>personal health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb17">RBAC</term>
          <def>
            <p>role-based access control</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb18">SR</term>
          <def>
            <p>security requirement</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb19">TPS</term>
          <def>
            <p>transactions per second</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb20">XDS</term>
          <def>
            <p>Cross-Enterprise Document Sharing</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by the National Research Foundation of Korea grant funded by the Korean government (2021R1A2C2012635).</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>GK wrote this paper and performed the implementation. YGK supervised and coordinated the investigation.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>Health Insurance Portability and Accountability Act</article-title>
          <source>U.S. Department of Health &#38; Human Services</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations">https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>General data protection regulation</article-title>
          <source>Intersoft Consulting</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gdpr-info.eu">https://gdpr-info.eu</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>California Consumer Privacy Act</article-title>
          <source>State of California Department of Justice</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://oag.ca.gov/privacy/ccpa">https://oag.ca.gov/privacy/ccpa</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Seo</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>A comprehensive survey on security and privacy for electronic health data</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2021</year>
          <month>09</month>
          <day>14</day>
          <volume>18</volume>
          <issue>18</issue>
          <fpage>9668</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph18189668"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph18189668</pub-id>
          <pub-id pub-id-type="medline">34574593</pub-id>
          <pub-id pub-id-type="pii">ijerph18189668</pub-id>
          <pub-id pub-id-type="pmcid">PMC8465695</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Keefe</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Rubin</surname>
              <given-names>DB</given-names>
            </name>
          </person-group>
          <article-title>Individual privacy versus public good: protecting confidentiality in health research</article-title>
          <source>Stat Med</source>
          <year>2015</year>
          <month>10</month>
          <day>15</day>
          <volume>34</volume>
          <issue>23</issue>
          <fpage>3081</fpage>
          <lpage>103</lpage>
          <pub-id pub-id-type="doi">10.1002/sim.6543</pub-id>
          <pub-id pub-id-type="medline">26045214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <article-title>The research platform for healthcare in the South Korea</article-title>
          <source>Ministry of Health and Welfare</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hcdl.mohw.go.kr">https://hcdl.mohw.go.kr</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Data access request service (DARS)</article-title>
          <source>National Health Service Digital</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.nhs.uk/services/data-access-request-service-dars">https://digital.nhs.uk/services/data-access-request-service-dars</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Swiss Personalized Health Network (SPHN) homepage</article-title>
          <source>Swiss Personalized Health Network</source>
          <access-date>2022-07-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://sphn.ch">https://sphn.ch</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atkin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Crosby</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Dunn</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Price</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Marston</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Crawford</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>O'Hara</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Morgan</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Levermore</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gallier</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Modhwadia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Attwood</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Perks</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Denniston</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Gkoutos</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Dormer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rosser</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ignatowicz</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fanning</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sapey</surname>
              <given-names>E</given-names>
            </name>
            <collab>PIONEER Data Hub</collab>
          </person-group>
          <article-title>Perceptions of anonymised data use and awareness of the NHS data opt-out amongst patients, carers and healthcare staff</article-title>
          <source>Res Involv Engagem</source>
          <year>2021</year>
          <month>06</month>
          <day>14</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>40</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://researchinvolvement.biomedcentral.com/articles/10.1186/s40900-021-00281-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s40900-021-00281-2</pub-id>
          <pub-id pub-id-type="medline">34127076</pub-id>
          <pub-id pub-id-type="pii">10.1186/s40900-021-00281-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC8201435</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy in big data life cycle: a survey and open challenges</article-title>
          <source>Sustainability</source>
          <year>2020</year>
          <month>12</month>
          <day>17</day>
          <volume>12</volume>
          <issue>24</issue>
          <fpage>10571</fpage>
          <pub-id pub-id-type="doi">10.3390/su122410571</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naveed</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ayday</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Fellay</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gunter</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Hubaux</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the genomic era</article-title>
          <source>ACM Comput Surv</source>
          <year>2015</year>
          <month>09</month>
          <volume>48</volume>
          <issue>1</issue>
          <fpage>6</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26640318"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2767007</pub-id>
          <pub-id pub-id-type="medline">26640318</pub-id>
          <pub-id pub-id-type="pmcid">PMC4666540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <article-title>Hyperledger fabric</article-title>
          <source>Hyperledger Foundation</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hyperledger.org/use/fabric">https://www.hyperledger.org/use/fabric</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>zeutro / openabe</article-title>
          <source>GitHub</source>
          <year>2021</year>
          <month>1</month>
          <day>28</day>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/zeutro/openabe">https://github.com/zeutro/openabe</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <article-title>The most widely deployed open source cloud software in the world</article-title>
          <source>Openstack</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.openstack.org">https://www.openstack.org</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dolin</surname>
              <given-names>RH</given-names>
            </name>
            <name name-style="western">
              <surname>Alschuler</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Boyer</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Beebe</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Behlen</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Biron</surname>
              <given-names>PV</given-names>
            </name>
            <name name-style="western">
              <surname>Shabo (Shvo)</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>HL7 clinical document architecture, release 2</article-title>
          <source>J Am Med Informatics Assoc</source>
          <year>2006</year>
          <month>01</month>
          <day>01</day>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1197/jamia.m1888</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bender</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sartipi</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>HL7 FHIR: an agile and RESTful approach to healthcare information exchange</article-title>
          <source>Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems</source>
          <year>2013</year>
          <conf-name>26th IEEE International Symposium on Computer-Based Medical Systems</conf-name>
          <conf-date>Jun 20-22, 2013</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <article-title>OMOP common data model</article-title>
          <source>Observational Health Data Sciences and Informatics</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ohdsi.org/data-standardization/the-common-data-model">https://www.ohdsi.org/data-standardization/the-common-data-model</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <article-title>Digital imaging and communications in medicine homepage</article-title>
          <source>Digital Imaging and Communications in Medicine</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.dicomstandard.org">https://www.dicomstandard.org</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noumeir</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Renaud</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>IHE cross-enterprise document sharing for imaging: interoperability testing software</article-title>
          <source>Source Code Biol Med</source>
          <year>2010</year>
          <month>09</month>
          <day>21</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>9</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scfbm.biomedcentral.com/articles/10.1186/1751-0473-5-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1751-0473-5-9</pub-id>
          <pub-id pub-id-type="medline">20858241</pub-id>
          <pub-id pub-id-type="pii">1751-0473-5-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC2954912</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Marstein</surname>
              <given-names>KE</given-names>
            </name>
          </person-group>
          <article-title>A blockchain‐based architecture for securing electronic health record systems</article-title>
          <source>Concurrency Computat Pract Exper</source>
          <year>2019</year>
          <month>08</month>
          <day>04</day>
          <volume>33</volume>
          <issue>14</issue>
          <fpage>e5479</fpage>
          <pub-id pub-id-type="doi">10.1002/cpe.5479</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Madine</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Battah</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Yaqoob</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jayaraman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Hammadi</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pesic</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ellahham</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain for giving patients control over their medical records</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>193102</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.3032553</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Lenz</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenbloom</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>FHIRChain: applying blockchain to securely and scalably share clinical data</article-title>
          <source>Comput Struct Biotechnol J</source>
          <year>2018</year>
          <volume>16</volume>
          <fpage>267</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2001-0370(18)30037-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.csbj.2018.07.004</pub-id>
          <pub-id pub-id-type="medline">30108685</pub-id>
          <pub-id pub-id-type="pii">S2001-0370(18)30037-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC6082774</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shahnaz</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Qamar</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Khalid</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Using blockchain for electronic health records</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>147782</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2019.2946373</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tanwar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Parekh</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based electronic healthcare record system for healthcare 4.0 applications</article-title>
          <source>J Inform Security Applications</source>
          <year>2020</year>
          <month>02</month>
          <volume>50</volume>
          <fpage>102407</fpage>
          <pub-id pub-id-type="doi">10.1016/j.jisa.2019.102407</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Figueroa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Añorga</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Arrizabalaga</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments</article-title>
          <source>Computers</source>
          <year>2019</year>
          <month>07</month>
          <day>31</day>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>57</fpage>
          <pub-id pub-id-type="doi">10.3390/computers8030057</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Daraghmi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Daraghmi</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>MedChain: a design of blockchain-based system for medical records access and permissions management</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>164595</fpage>
          <lpage>613</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2019.2952942</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaur</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rani</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kalra</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Blockchain‐based framework for secured storage, sharing, and querying of electronic healthcare records</article-title>
          <source>Concurrency Computat Pract Exper</source>
          <year>2021</year>
          <month>05</month>
          <day>20</day>
          <volume>33</volume>
          <issue>20</issue>
          <fpage>e6369</fpage>
          <pub-id pub-id-type="doi">10.1002/cpe.6369</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Jing</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Flexible and efficient blockchain-based ABE scheme with multi-authority for medical on demand in telemedicine system</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>88012</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2019.2925625</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ozaydin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zengul</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Oner</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Feldman</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Healthcare research and analytics data infrastructure solution: a data warehouse for health services research</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>06</month>
          <day>04</day>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>e18579</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/6/e18579/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18579</pub-id>
          <pub-id pub-id-type="medline">32496199</pub-id>
          <pub-id pub-id-type="pii">v22i6e18579</pub-id>
          <pub-id pub-id-type="pmcid">PMC7303827</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lunn</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lubensky</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hunt</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Flentje</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Capriotti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sooksaman</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Harnett</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Currie</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Neal</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Obedin-Maliver</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A digital health research platform for community engagement, recruitment, and retention of sexual and gender minority adults in a national longitudinal cohort study--the PRIDE Study</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>08</month>
          <day>01</day>
          <volume>26</volume>
          <issue>8-9</issue>
          <fpage>737</fpage>
          <lpage>48</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31162545"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz082</pub-id>
          <pub-id pub-id-type="medline">31162545</pub-id>
          <pub-id pub-id-type="pii">5509461</pub-id>
          <pub-id pub-id-type="pmcid">PMC6696499</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ashfaq</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lönn</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nilsson</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Eriksson</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Kwatra</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yasin</surname>
              <given-names>ZM</given-names>
            </name>
            <name name-style="western">
              <surname>Slutzman</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Wallenfeldt</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Obermeyer</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>PD</given-names>
            </name>
            <name name-style="western">
              <surname>Lingman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Data resource profile: regional healthcare information platform in Halland, Sweden</article-title>
          <source>Int J Epidemiol</source>
          <year>2020</year>
          <month>06</month>
          <day>01</day>
          <volume>49</volume>
          <issue>3</issue>
          <fpage>738</fpage>
          <lpage>9f</lpage>
          <pub-id pub-id-type="doi">10.1093/ije/dyz262</pub-id>
          <pub-id pub-id-type="medline">31930310</pub-id>
          <pub-id pub-id-type="pii">5701527</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Conde</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno-Conde</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Salas-Fernández</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Parra-Calderón</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>ITCBio, a clinical and translational research platform</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2019</year>
          <volume>2019</volume>
          <fpage>673</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32308862"/>
          </comment>
          <pub-id pub-id-type="medline">32308862</pub-id>
          <pub-id pub-id-type="pmcid">PMC7153134</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De Moor</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sundgren</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kalra</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dugas</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Claerhout</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Karakoyun</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ohmann</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lastic</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ammour</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Kush</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Dupont</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Cuggia</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Daniel</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Thienpont</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Coorevits</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Using electronic health records for clinical research: the case of the EHR4CR project</article-title>
          <source>J Biomed Inform</source>
          <year>2015</year>
          <month>02</month>
          <volume>53</volume>
          <fpage>162</fpage>
          <lpage>73</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(14)00226-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2014.10.006</pub-id>
          <pub-id pub-id-type="medline">25463966</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(14)00226-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>KH</given-names>
            </name>
            <name name-style="western">
              <surname>Ford</surname>
              <given-names>DV</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lyons</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A profile of the SAIL databank on the UK secure research platform</article-title>
          <source>Int J Popul Data Sci</source>
          <year>2019</year>
          <month>11</month>
          <day>20</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>1134</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34095541"/>
          </comment>
          <pub-id pub-id-type="doi">10.23889/ijpds.v4i2.1134</pub-id>
          <pub-id pub-id-type="medline">34095541</pub-id>
          <pub-id pub-id-type="pii">S2399490819011340</pub-id>
          <pub-id pub-id-type="pmcid">PMC8142954</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chatterjee</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy issues of electronic healthcare system: a survey</article-title>
          <source>J Inform Optimization Sci</source>
          <year>2020</year>
          <month>02</month>
          <day>02</day>
          <volume>40</volume>
          <issue>8</issue>
          <fpage>1709</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1080/02522667.2019.1703265</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hathaliya</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>Tanwar</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>An exhaustive survey on security and privacy issues in Healthcare 4.0</article-title>
          <source>Comput Commun</source>
          <year>2020</year>
          <month>03</month>
          <volume>153</volume>
          <fpage>311</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1016/j.comcom.2020.02.018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alvarez</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Security trends in the healthcare industry</article-title>
          <source>IBM</source>
          <year>2017</year>
          <month>2</month>
          <access-date>2022-07-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ibm.com/downloads/cas/PLWZ76MM">https://www.ibm.com/downloads/cas/PLWZ76MM</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Newaz</surname>
              <given-names>AI</given-names>
            </name>
            <name name-style="western">
              <surname>Sikder</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Uluagac</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>A survey on security and privacy issues in modern healthcare systems</article-title>
          <source>ACM Trans Comput Healthcare</source>
          <year>2021</year>
          <month>07</month>
          <day>31</day>
          <volume>2</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1145/3453176</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Al-Janabi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Shourbaji</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Shojafar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Shamshirband</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications</article-title>
          <source>Egyptian Informatics J</source>
          <year>2017</year>
          <month>07</month>
          <volume>18</volume>
          <issue>2</issue>
          <fpage>113</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1016/j.eij.2016.11.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Latif</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Latif</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Abbas</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>FA</given-names>
            </name>
          </person-group>
          <article-title>Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review</article-title>
          <source>Multimed Tools Appl</source>
          <year>2018</year>
          <month>1</month>
          <day>20</day>
          <volume>77</volume>
          <issue>17</issue>
          <fpage>21947</fpage>
          <lpage>65</lpage>
          <pub-id pub-id-type="doi">10.1007/s11042-017-5540-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nasiri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sadoughi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Tadayon</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dehnad</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security requirements of internet of things-based healthcare system: a survey study</article-title>
          <source>Acta Inform Med</source>
          <year>2019</year>
          <month>12</month>
          <volume>27</volume>
          <issue>4</issue>
          <fpage>253</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32055092"/>
          </comment>
          <pub-id pub-id-type="doi">10.5455/aim.2019.27.253-258</pub-id>
          <pub-id pub-id-type="medline">32055092</pub-id>
          <pub-id pub-id-type="pii">AIM-27-253</pub-id>
          <pub-id pub-id-type="pmcid">PMC7004290</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <article-title>Flask framework</article-title>
          <source>Pallets Projects</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://flask.palletsprojects.com/en/2.0.x">https://flask.palletsprojects.com/en/2.0.x</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <article-title>Firebase homepage</article-title>
          <source>Firebase</source>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://firebase.google.com">https://firebase.google.com</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <article-title>hyperledger / caliper</article-title>
          <source>GitHub</source>
          <year>2022</year>
          <month>8</month>
          <day>8</day>
          <access-date>2022-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/hyperledger/caliper">https://github.com/hyperledger/caliper</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Parallel computing: review and perspective</article-title>
          <source>Proceedings of the 5th International Conference on Information Science and Control Engineering (ICISCE)</source>
          <year>2018</year>
          <conf-name>5th International Conference on Information Science and Control Engineering (ICISCE)</conf-name>
          <conf-date>Jul 20-22, 2018</conf-date>
          <conf-loc>Zhengzhou, China</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tian</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Vasilakos</surname>
              <given-names>AV</given-names>
            </name>
          </person-group>
          <article-title>Parallel processing systems for big data: a survey</article-title>
          <source>Proc IEEE</source>
          <year>2016</year>
          <month>11</month>
          <volume>104</volume>
          <issue>11</issue>
          <fpage>2114</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1109/jproc.2016.2591592</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ageed</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Mahmood</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeeq</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Abdulrazzaq</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dino</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Cloud computing resources impacts on heavy-load parallel processing approaches</article-title>
          <source>IOSR J Comput Eng</source>
          <year>2020</year>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>30</fpage>
          <lpage>41</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Simon</surname>
              <given-names>GE</given-names>
            </name>
            <name name-style="western">
              <surname>Shortreed</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Coley</surname>
              <given-names>RY</given-names>
            </name>
            <name name-style="western">
              <surname>Penfold</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Rossom</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Waitzfelder</surname>
              <given-names>BE</given-names>
            </name>
            <name name-style="western">
              <surname>Sanchez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lynch</surname>
              <given-names>FL</given-names>
            </name>
          </person-group>
          <article-title>Assessing and minimizing re-identification risk in research data derived from health care records</article-title>
          <source>EGEMS (Wash DC)</source>
          <year>2019</year>
          <month>03</month>
          <day>29</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>6</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30972355"/>
          </comment>
          <pub-id pub-id-type="doi">10.5334/egems.270</pub-id>
          <pub-id pub-id-type="medline">30972355</pub-id>
          <pub-id pub-id-type="pmcid">PMC6450246</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Branson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Good</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Monge</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Probst</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>El Emam</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the re-identification risk of a clinical study report anonymized under EMA policy 0070 and health Canada regulations</article-title>
          <source>Trials</source>
          <year>2020</year>
          <month>02</month>
          <day>18</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>200</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-020-4120-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s13063-020-4120-y</pub-id>
          <pub-id pub-id-type="medline">32070405</pub-id>
          <pub-id pub-id-type="pii">10.1186/s13063-020-4120-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC7029478</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Efficient public integrity checking for cloud data sharing with multi-user modification</article-title>
          <source>Proceedings of the IEEE INFOCOM 2014 - IEEE Conference on Computer Communications</source>
          <year>2014</year>
          <conf-name>IEEE INFOCOM 2014 - IEEE Conference on Computer Communications</conf-name>
          <conf-date>Apr 27 -May 02, 2014</conf-date>
          <conf-loc>Toronto, ON, Canada</conf-loc>
          <pub-id pub-id-type="doi">10.1109/infocom.2014.6848154</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Liang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Mu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation</article-title>
          <source>IEEE Trans Inform Forensic Secur</source>
          <year>2017</year>
          <month>3</month>
          <volume>12</volume>
          <issue>3</issue>
          <fpage>676</fpage>
          <lpage>88</lpage>
          <pub-id pub-id-type="doi">10.1109/tifs.2016.2631951</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Tyagi</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Blockchain data-based cloud data integrity protection mechanism</article-title>
          <source>Future Generation Comput Syst</source>
          <year>2020</year>
          <month>01</month>
          <volume>102</volume>
          <fpage>902</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1016/j.future.2019.09.028</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nabi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Toeroe</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Khendek</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Availability in the cloud: state of the art</article-title>
          <source>J Network Comput Appl</source>
          <year>2016</year>
          <month>01</month>
          <volume>60</volume>
          <fpage>54</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jnca.2015.11.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Endo</surname>
              <given-names>PT</given-names>
            </name>
            <name name-style="western">
              <surname>Rodrigues</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gonçalves</surname>
              <given-names>GE</given-names>
            </name>
            <name name-style="western">
              <surname>Kelner</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sadok</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Curescu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>High availability in clouds: systematic review and research challenges</article-title>
          <source>J Cloud Comp</source>
          <year>2016</year>
          <month>10</month>
          <day>18</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>16</fpage>
          <pub-id pub-id-type="doi">10.1186/s13677-016-0066-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goyal</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Pandey</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Sahai</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Waters</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Attribute-based encryption for fine-grained access control of encrypted data</article-title>
          <source>Proceedings of the 13th ACM conference on Computer and communications security</source>
          <year>2006</year>
          <conf-name>CCS06: 13th ACM Conference on Computer and Communications Security 2006</conf-name>
          <conf-date>Oct 30- Nov 3, 2006</conf-date>
          <conf-loc>Alexandria Virginia USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/1180405.1180418</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Hierarchical attribute-based encryption for fine-grained access control in cloud storage services</article-title>
          <source>Proceedings of the 17th ACM conference on Computer and communications security</source>
          <year>2010</year>
          <conf-name>CCS '10: 17th ACM Conference on Computer and Communications Security 2010</conf-name>
          <conf-date>Oct 4 - 8, 2010</conf-date>
          <conf-loc>Chicago Illinois USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/1866307.1866414</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Jie</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ren</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>KR</given-names>
            </name>
          </person-group>
          <article-title>Fine-grained database field search using attribute-based encryption for e-healthcare clouds</article-title>
          <source>J Med Syst</source>
          <year>2016</year>
          <month>11</month>
          <volume>40</volume>
          <issue>11</issue>
          <fpage>235</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-016-0588-0</pub-id>
          <pub-id pub-id-type="medline">27653042</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-016-0588-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Qian</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Flexible and fine-grained attribute-based data storage in cloud computing</article-title>
          <source>IEEE Trans Serv Comput</source>
          <year>2017</year>
          <month>9</month>
          <day>1</day>
          <volume>10</volume>
          <issue>5</issue>
          <fpage>785</fpage>
          <lpage>96</lpage>
          <pub-id pub-id-type="doi">10.1109/tsc.2016.2520932</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wan</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Deng</surname>
              <given-names>RH</given-names>
            </name>
          </person-group>
          <article-title>HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing</article-title>
          <source>IEEE Trans Inform Forensic Secur</source>
          <year>2012</year>
          <month>04</month>
          <volume>7</volume>
          <issue>2</issue>
          <fpage>743</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1109/tifs.2011.2172209</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
