Page 213 - Big Data Analytics for Intelligent Healthcare Management
P. 213

206     CHAPTER 8 BLOCKCHAIN IN HEALTHCARE: CHALLENGES AND SOLUTIONS




                A hash algorithm: This hash algorithm is used in order to map random information into the definite
             length of hash. A little in-hash data results in a big difference in actual data, which makes falsification
             difficult in any data recorded by blockchain technology.
                A digital signature: First used by Johnson et al. [43] as the elliptical curve digital signature algo-
             rithm ECDSA. A digital signature is processed to prove the validity of the blockchain transmission.
             Public and private keys are present in order to provide a double layer of authentication. Personal trans-
             actions can be managed using the private key and external security can be managed using the
             public key.
                Forking: A forking of the blockchain happens when the chain of blocks diverges into two paths.
             Since diverse participants need to agree on common rules, often more than one blockchain is generated.
             However, after consensus and appropriate regulation, this forking problem is solved. Three types of
             forking were mentioned by Castor [44]: hard fork, soft fork, and user centric fork.
                Blockchain types: Blockchain technology is divided into three types based on its user-level per-
             mission and scope in the healthcare sector by Linn and Koo [45]. Among the public, private, and con-
             sortium layer, two types of blockchain are mostly used for organization of the healthcare sector. Fig. 8.9
             elaborates on the different types of blockchain.
                Consensus algorithm: Consensus algorithm is a process in blockchain technology by which any
             new block (new transaction) is being approved by a set of legal nodes or distributed systems. Com-
             monly used consensus protocols or mechanisms are discussed and compared in Table 8.1.



             8.2.3 HOW BLOCKCHAIN WORKS
             An example of a blockchain transaction is described in Fig. 8.10. First of all, the two parties decide to
             perform a transaction or exchange information. A group of nodes associated to those parties approves
             the legality of the transaction parties as well as the smart contract between them. After successful hash-
             ing and consensus from every involved party with any aforementioned consensus algorithm, a new
             block is finalized. Finally, a new block with detailed transaction information is added to the existing
             block and the transaction finishes.
                Prerequisites of blockchain technology: To set up this technology, the following prerequisites are
             needed: several connected nodes (computers), a block data storing software or hashing software, a con-
             sensus algorithm to make decisions, and finally a network system with fast Internet connectivity.




             8.3 PRIVACY OF HEALTHCARE BIG DATA
             Digital identity: A digital identity refers to any online identity of any individual or organization. A
             digital identity consists of information or attributes related to any particular entity (individual, orga-
             nization, or electronic device). The information contained in a digital identity allows assessment and
             authentication of an entity on the web. However, through digital identity (online identity), any civil and
             personal information associated with any online activities can be detected.
                Personally identifiable information (PII): Any data or information that could lead to a specific
             organization or individual is called personally identifiable information or PII. Nowadays, PII is also
             knownas sensitive personal information (SPI) or personal data (PD) or personal information (PI) all over
             the world. Any distinguishable information that can be used to separate the personal identity is also
   208   209   210   211   212   213   214   215   216   217   218