Review
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues

https://doi.org/10.1016/j.jnca.2020.102950Get rights and content

Abstract

Emerging technologies are playing a critical role in the evolution of healthcare systems by presenting eHealth to provide high-quality services and better health to wide-range of patients. Achieving the eHealth goals highly depends on employing modern information and communication technologies (ICTs) to securely and efficiently collect and transmit electronic health records (EHRs) and make them accessible to authorized users and healthcare providers. However, the adoption of EHRs in healthcare providers puts the patients’ privacy and their information security at risk of data breaches. The advent of smart contracts and blockchain technology paves a way for developing efficient EHR access control methods to support secure identification, authentication, and authorization of the clients. This paper delineates an extensive survey on the state-of-the-art blockchain-based access control methods in healthcare domain as a basis for categorizing the existing and future developments in access control area. A thematic taxonomy of the blockchain-based access control methods is also presented to recognize the security issues of the existing methods and highlight the fundamental security requirements to design a granular access control method. This paper also aims for examining the similarities and differences of the traditional access control methods and describes some substantial and outstanding issues and challenges as further directions.

Introduction

Nowadays, by developing the smart technologies, such as Internet of Things (IoT) and virtual and augmented reality, the majority of healthcare providers are interested in replacing the conventional healthcare systems with eHealth. The main objective of eHealth is to revolutionize health information management and improve the healthcare system through modern information and communication technologies (ICTs) (Pagliari et al., 2005). Delivering the health services and information, through smart IoT devices by using the Internet with the aim of reducing the cost, and enhancing the scalability and time efficiency is an application of eHealth (Sebestyen et al., 2014, Ahern et al., 2006).

To achieve these potential benefits of eHealth, it is essential for healthcare providers and industries to regulate and optimize the electronic distribution and transmission of medical information to the physicians. Undoubtedly, the key component of eHealth systems is Electronic Health Record (EHR), which refers to storing a patient’s paper chart digitally, with the purpose to promptly and securely make the information available for authorized third part (Iakovidis, 1998, Giannelos, 2019). EHRs, as a vital part of eHealth, may include all required information of a patient regarding medical history, diagnoses and treatments, laboratory results, and images (i.e., X-ray and MRI) (Shickel et al., 2018). They help to simplify the healthcare providers’ work-flow by providing an access to evidence-based tools and practices to improve patient’s care services. Indeed, the core feature of EHRs for healthcare providers is to create and manage the digital format of health information, which can be shared across multiple authorized healthcare providers (What is an electronic health record (EHR), 2019). As a result, developing a secure and efficient medical data access control to validate the permissions and share the EHRs is a fundamental prerequisite for healthcare providers.

The National Coordinator for Health Information Technology (ONC) provided a list of guidelines and regulations to meet the medical data access control requirements and overcome the existing security and privacy issues and challenges. These regulations can be categorized into four groups: (1) Identity Verification and Authentication: Patient’s authentication plays a critical role in healthcare providers and origination to preserve the patient data and prevent medical identity fraud. In other words, electronic health information in the health centers and care providers should be easily authenticable and identity proofing. However, the majority of health organizations suffer from the lack of consistent identity proofing and authentication (DeSalvo, 2015). (2) Data storage and transmission: Managing and storing huge amount of EHRs locally along with secure data sharing are known as critical challenges of electronic data in healthcare providers. (3) Developing privacy rule using computable contracts: Natural language includes legal options, relationships, and constraints, which are used to define daily interactions and transactions. However, applying natural language to legalese will usually affect a negative impact on both parties due to its incompleteness and ambiguity (Rosenberg and Xu, 2015). (4) Consistent Data Formats: Healthcare providers and IT venders usually encounter different standard format for clinical data transmission. To share the healthcare information between healthcare IT venders, the Continuity of Care Document (CCD) was developed as an XML-based standard considering with Health Level Seven International (HL7) Clinical Document Architecture (CDA) elements (, which are interoperability, understandability, security, quality and reliability, and efficiency). Due to inefficiency of CCD, in 2014, the Consolidated-Clinical Document Architecture (C-CDA) was developed as a base standard for creation and transmission of patients’ EHRs, which consists of diverse file types, progress reports, clinical summaries, and consult notes (Ali et al., 2019).

The ideal solution to meet these requirements and improve the scalability and efficiency is to leverage of cloud-based healthcare system (Li et al., 2013, Qian et al., 2014, Zhang et al., 2018b) and in which the EHRs must be outsource to the cloud storage and the management of data will be delegated to cloud service providers. These methods usually use attribute-based encryption (ABE) or identity-based encryption (IBE) to define the access policies and permission revocations (Sookhak et al., 2017). However, the CSPs are not fully trustable (honest but curious) and the patients’ privacy may be at risk. For example, the CSPs may share the EHRs with other organizations for research or drug advertising purposes without taking the data owners’ permissions results in critical information leakage issues. Preserving the integrity of outsourced data in cloud-based system also requires leveraging a remote data auditing schemes that inures considerable computation and communication overhead on users and cloud servers. Moreover, cloud computing can be used to develop centralized applications, which are not secure when the CSPs are under attacked and compromised (Sookhak et al., 2014, Sookhak et al., 2015, Sookhak et al., 2018). The huge number of data breach reports clearly shows the data security and privacy deficiencies, which can be addressed using blockchain technology (HHS Proposes, 2019).

As a matter of fact, implementing a score EHR access control method highly depends on supporting identification, authentication, and authorization (permission verification) (Ausanka-Crues, 2001). Access control methods require to ensure the legitimated users are only able to access resources while they are able to track and audit effectively the users’ activities. The blockchain technology has arisen as a potential solution to meet such requirements, which provides a decentralized, trust-less, tamper-proof, distributed ledgers over pear to pear network (Zheng et al., 2018). The blockchain is also invulnerable against the central point of failure since all nodes in blockchain architecture are correspondingly and collaboratively provides services without relying on a central server. Moreover, the blockchain consists of a set of immutable and distributed digital ledgers that are responsible for tracking the transactions and record them on digital blocks (Halamka et al., 2017). The immutable audit trail feature of blockchain makes it suitable to develop a trustworthy and secure environment against integrity issues. The next reason to apply blockchain in access control methods is enabling transparency of information in which all participants have capability to view all information leads to data leakage prevention and higher possibility of malicious detection. On the other hand, the blockchain technologies are capable of using the smart contract features to facilitate users’ authentication and authorization under programmable policies in a fully distributed nature (Hölbl et al., 2018, Frey, 2018, McLeod and Dolezel, 2018). Smart contracts have been developed as an alternative to translate the legal relationships from natural language to a set of computer standard that can be run effectively by blockchain.

It is worth noting that blockchains are generally categorized in two main classes, namely permissionless and permissioned. In a permissionless (also called public) blockchain, any participant can read and write on the ledger and even can participate in consensus process. In the latter case, participant actions are controlled by a central entity. Permissioned blockchains are further classified into public and private categories. In private permissioned blockchains all actions including read, write and consensus are taken unilaterally by a per-selected group of participant. However, public permissioned blockchains allow all participant to read the ledger (Meng et al., 2018).

The main contributions of the survey are: (1) Providing a detail review on the state-of-the-art EHR access control methods over blockchain, which have not be fully covered in the existing works, (2) Critical analysis and classification of the recent access control methods in healthcare into two diverse groups, namely permissioned and permissionless blockchain, with focusing on smart contracts feature as the core factor to develop such techniques, (3) Presenting a thematic taxonomy of the blockchain-based access control methods on the basis of essential parameters and attributes, such as type of blockchain and ledger, consensus protocol, access control development strategy (identification, authentication and authorization, type of EHR storage, and supporting features, and (4) Comparing the existing methods based on the proposed thematic taxonomy to identify the substantial and outstanding issues and challenges as further directions.

The organization of the remainder of the article is as follows. Section 2 reviews on the related works in healthcare domain. Section 3 describes the principal concept of smart contract along with its mechanism and architecture. Section 4 explains the permissionless blockchain technology and provides a critical review on the EHR access control using permissionless-based smart contract. The permissioned blockchain as well as the comprehensive survey on permissioned-based EHR access control methods are presented in Section 5. Section 6 describes a thematic taxonomy of the traditional access control method in healthcare system to compare these methods based on the designed taxonomy. Section 7 discusses security issues and challenge of current approaches and finally Section 8 concludes the survey and provide some future directions.

Section snippets

Related work

Although blockchain and smart contracts are widely utilized in different domains including supply chain control (Salah et al., 2019), proof of delivery (Hasan and Salah, 2018a, Hasan and Salah, 2018b), and IoT access control (Novo, 2018), this paper concentrates on access control development over blockchain system for healthcare. Hence, this section makes an overview on the existing works in this specific area.

Kumar et al. (2018) provides an overview on blockchain applications in healthcare

Smart contract

Smart contracts refer to a series of computer codes and protocols that can automatically execute and enforce an agreement when the specified conditions are met. The contract may be presented in either a standalone code or a traditional written agreement between parties with the aim of executing specific provisions, such as transferring fees (Levi and Lipton, 2018, Cieplak and Leefatt, 2017, Liu and Liu, 2019). Smart contracts help to reduce transaction fees by excluding the trusted third-party

Permissionless blockchain

Permissionless blockchains emerged as a form of Distributed Ledger Technology (DLT) that is constructed on the basis of cryptographic protocols to be resistant to tampering while storing and transmitting information through peer-to-peer (P2P) networks (Neudecker and Hartenstein, 2019). The blockchain users are capable of creating personal addresses to be interacted with the network by submitting transactions to the ledgers with the aim of modifying the state. Since permissionless blockchains

Permissioned blockchain

Permissioned blockchains arise as closed ecosystems wherein the participants are known and must register into system before joining, are unable to read the recorded histories and submit a transaction. They usually controlled by centralized organizations as a private network. It is critical requirements and regulations in some enterprises, such as healthcare providers and financial sectors. In other words, the business sectors may not be able to entirely trust permissionless blockchains

Taxonomy and comparison of blockchain-based EHR access control methods

Fig. 8 displays a taxonomy of the existing Blockchain-based EHR access control methods, which is categorized on the basis of: Type of blockchain and ledger, Consensus protocol, Access control development strategy (Identification, Authentication and Authorization), Type of EHR storage, and Supporting features.

The attribute of Blockchain type indicates how the users can use or join the blockchain system. In public blockchain, any person who have access to internet connection is able to take part

Open issues and challenges

This section analyzes the issues and challenges of the existing EHR access control methods along with possible solutions to overcome such issues.

  • 1.

    User and Attribute Revocation in Smart Contract-bases access Control Methods: Smart contract is one of the most important components of blockchain technology that can be used by data owners to define access control polices. To support user revocation, the data owner needs to update the smart contract add a new block into the blockchain. However,

Conclusion

This paper characterized the applications of smart contracts and blockchain technology in healthcare domain with focusing on EHR access control development. We started by explaining the smart contract as the core component of the majority of blockchain based access control methods along with the potential applications, mechanism, and general architecture of smart contracts. Moreover, we taxonomized the EHR access control methods on the basis of the blockchain and ledger types, consensus

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Mehdi Sookhak (Senior Member, IEEE) received the Ph.D. degree in computer science, major in information security, from the University of Malaya (UM), in 2015. From 2012 to 2015, he was with the Center of Mobile Cloud Computing Research (C4MCCR), UM. From 2016 to 2017, he was with Carleton University, Canada, as a Postdoctoral Fellow. He is currently an Assistant Professor of cybersecurity with Illinois State University, Normal, IL, USA. He has authored more than 40 articles in high ranking

References (160)

  • AzariaA. et al.

    Medrec: Using blockchain for medical data access and permission management

  • Aziz, M.A., Guide to Ethereum : What is Gas , Gas Limit and Gas Price ? Master the Crypto. URL...
  • BackesM. et al.
  • BastiaanM.

    Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin

    (2015)
  • Ben-SassonE. et al.

    Zerocash: Decentralized anonymous payments from bitcoin

  • BenderD. et al.

    HL7 FHIR: An agile and restful approach to healthcare information exchange

  • BenetJ.

    IPFS - content addressed, versioned, P2p file system

    (2014)
  • BethencourtJ. et al.

    Ciphertext-policy attribute-based encryption

  • BlazeM. et al.

    Divertible protocols and atomic proxy cryptography

  • BondiA.B.

    Characteristics of scalability and their impact on performance

  • BonehD. et al.

    Short signatures from the weil pairing

  • BrickellE. et al.

    Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities

    IEEE Trans. Dependable Secure Comput.

    (2012)
  • BrownR.G.

    The corda platform: An introduction

    Corda Platform White PaperTech. rep.

    (2018)
  • ButerinV.

    Ethereum white paper

    Etherum

    (2014)
  • CastroM. et al.

    Practical byzantine fault tolerance

  • CastroM. et al.

    Practical byzantine fault tolerance and proactive recovery

    ACM Trans. Comput. Syst.

    (2002)
  • ChangY.C. et al.

    Privacy preserving keyword searches on remote encrypted data

  • ChenS. et al.

    A blockchain-based supply chain quality management framework

  • ChohanU.W.

    A history of dogecoin

    SSRN Electron. J.

    (2018)
  • CieplakJ. et al.

    Smart contracts: A smart way to automate performance

    Georget. Law Technol. Rev.

    (2017)
  • ConfaisB. et al.

    An object store service for a fog/edge computing infrastructure based on IPFS and a scale-out NAS

  • CrnojaI.

    Machine learning and data privacy: Contradiction or partnership?

    (2019)
  • CrockfordD.

    The application/json media type for javascript object notation

  • CromanK. et al.

    On scaling decentralized blockchains (a position paper)

  • DabbaghM. et al.

    The evolution of blockchain: A bibliometric study

    IEEE Access

    (2019)
  • Delegated Proof of Stake (DPoS): What is It? — Complete Beginners Guide, URL...
  • DeSalvoK.B.

    Connecting Health and Care for the Nation : A Shared Nationwide Interoperability Roadmap Executive SummaryTech. rep.

    (2015)
  • DiasJ.P. et al.

    A blockchain-based scheme for access control in e-health scenarios

  • Distributed Hash Tables (DHT) – IPFS Documentation, URL...
  • DouceurJ.R.
  • DubovitskayaA. et al.

    Secure and trustable electronic medical records sharing using blockchain

  • DwivediA. et al.

    A decentralized privacy-preserving healthcare blockchain for IoT

    Sensors

    (2019)
  • DworkC.

    Differential privacy: A survey of results

  • EOS.IO Technical White Paper v2Tech. rep.

    (2018)
  • EyalI.

    Blockchain technology: Transforming libertarian cryptocurrency dreams to finance and banking realities

    Computer

    (2017)
  • FreyB.B.

    Health insurance portability and accountability act

  • GiannelosN.

    EHR, the core component of eHealth

  • GoodmanL.

    Tezos-a self-amending crypto-ledger white paper

    Tomi.InstituteTech. rep.

    (2014)
  • GriggsK.N. et al.

    Healthcare blockchain system using smart contracts for secure automated remote patient monitoring

    J. Med. Syst.

    (2018)
  • GuC. et al.

    Efficient public key encryption with keyword search schemes from pairings

  • Cited by (86)

    View all citing articles on Scopus

    Mehdi Sookhak (Senior Member, IEEE) received the Ph.D. degree in computer science, major in information security, from the University of Malaya (UM), in 2015. From 2012 to 2015, he was with the Center of Mobile Cloud Computing Research (C4MCCR), UM. From 2016 to 2017, he was with Carleton University, Canada, as a Postdoctoral Fellow. He is currently an Assistant Professor of cybersecurity with Illinois State University, Normal, IL, USA. He has authored more than 40 articles in high ranking journals and conferences. He is an Editor of several ISI journals (i.e., Vehicular Communications and Electronics) and chair of several conferences. His areas of interest include cloud and mobile cloud computing, fog computing, vehicular network, Blockchain, computation outsourcing, access control, network security, wireless sensor Network, and big data security.

    Mohammad Reza Jabbarpour is currently Assistant Professor at ICT Research Group of Niroo Research Institute (NIR), Tehran, Iran. He received his Ph.D. in Computer Science with Data Communication and Computer Network specialty from University of Malaya (UM), Malaysia, in 2015 where he was an active researcher in Mobile Adhoc Technology Lab. From 2016 to 2017, he was with Iran Telecommunication Research Center (ITRC), Iran as a postdoctoral fellow. He also served as Assistant Professor in the Department of Computer Engineering, Islamic Azad University North Tehran Branch, Iran from 2016 to 2018. He has authored more than 35 papers in high ranking journals and conferences. He has received various awards including WiC 2015: Asia Invention Association grand award, Gold medal, PECIPTA 2015: Bronze Medal, Singapore Challenge: Merit award for his patented idea. His current research interests include Blockchain, Big Data Analytics, Vehicular Network and Connected Vehicles, Artificial Intelligence, and Smart Grids and Cities.

    Nader Sohrabi Safa is a lecturer in School of Computing, Electronics and Mathematics, Coventry University, UK. He was a member of Cyber Security Centre, WMG, University of Warwick, before joining Coventry University. He has completed five years postdoctoral in South Africa and the UK. His teaching and research experience mostly are in domain of cyber security. He has research experience and publication in the domain of cybersecurity, information security in IoT, cloud and fog security, and application of AI. Nader has taught several modules in the domain of information security and computer science. He has 15-year experience in analyzing, designing, and programming with C# and SQL server. He is PC member in several international conferences every year and reviewer in several journals with impact factor.

    F. Richard Yu (Fellow, IEEE) received the Ph.D. degree in electrical engineering from the University of British Columbia, Vancouver, BC, Canada, in 2003. From 2002 to 2006, he was with Ericsson, Lund, Sweden, and with a start-up in California, USA. In 2007, he joined Carleton University, Ottawa, ON, Canada, where he is currently a Professor. His research interests include wireless cyber–physical systems, connected/autonomous vehicles, security, distributed ledger technology, and deep learning. He is the recipient of the IEEE Outstanding Service Award in 2016, IEEE Outstanding Leadership Award in 2013, Carleton Research Achievement Award in 2012, the Ontario Early Researcher Award (formerly Premiers Research Excellence Award) in 2011, the Excellent Contribution Award at IEEE/IFIP TrustCom 2010, the Leadership Opportunity Fund Award from Canada Foundation of Innovation in 2009, and the Best Paper Awards at IEEE International Conference on Computing, Networking and Communication 2018, IEEE Vehicular Technology Conference 2017 Spring, IEEE International Conference on Communications, IEEE Global Communications Conference, IEEE/IFIP TrustCom 2009, and International Conference on Networking 2005. He serves on the Editorial Boards of several journals, including Co-Editor-in-Chief for Ad Hoc & Sensor Wireless Networks, Lead Series Editor for the IEEE Transactions on Vehicular Technology, IEEE Transactions on Green Communications and Networking, and IEEE Communications Surveys and Tutorials. He was the Technical Program Committee Co-Chair of numerous conferences. He is a Registered Professional Engineer in the Province of Ontario, Canada, and a Fellow of the Institution of Engineering and Technology. He is a Distinguished Lecturer, the Vice President (Membership), and an elected member of the Board of Governors of the IEEE Vehicular Technology Society.(Based on document published on 9 March 2020).

    View full text