Page 205 - Big Data Analytics for Intelligent Healthcare Management
P. 205
198 CHAPTER 8 BLOCKCHAIN IN HEALTHCARE: CHALLENGES AND SOLUTIONS
Providers
Analysers Patients
Payers
FIG. 8.1
Different stakeholders of healthcare big data.
orthopedic surgeon asking for some information from a cardiologist in an informal way. In the view
model, one provider can see the data by entering into the record with another provider. For example, a
doctor from the surgery department can access the X-ray taken in the emergency department. The se-
curity approaches in this model are not based on the relationship that exists between the patient and the
provider, but mostly the approach is done in a temporary way. The policies behind the working prin-
ciple of the above models are subject to the rule and law of the local government of that particular
country. Hassanien et al. [3] discussed the challenges of handling big data in the medical sector
and introduced a new term called “medical of things.” Smart healthcare information pattern mining
is another challenge [4]. A huge amount of medical big data is generated from smart Internet of Things
(IoT) devices so this is another huge sector to explore. Dey et al. [5] mentioned that the IoT system has
several layers where sensors have engaged in order to collect data. That study analyzed the challenges
in every layer, i.e., the whole IoT ecosystem. Similarly, Kamal et al. [6] analyzed the medical data
classification using a map-reduce framework with existing challenges. Another study discussed the
necessity of healthcare data optimization for cloud computing [7].
The blockchain-based model gives the healthcare market a new dimension by considering safety
aspects for data integrity and developing standardized and formalized contracts for accessing the data.
When we work with EHRs, which store the data with a different workflow, it is difficult to know the
identity of the person who does what and when the work has been performed. The blockchain-based
model puts a time stamp on every workflow and also puts an identity to it and the copies are distributed
to each participated node in the network. So, if there is modification or update in any node, it is equally
distributed to all the nodes and is visible to everybody accessing it anywhere in the world. The model
ensures that the data integrity is maintained between the endpoints without any human intervention.