Cited By
View all- Zafar A(2025)Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathwaysJournal of Cybersecurity10.1093/cybsec/tyaf00211:1Online publication date: 19-Feb-2025
Review | Number of reviewed studies | Key findings | DLT use cases in health-care | DLT characteristics | |
---|---|---|---|---|---|
Technical characteristics | Administrative characteristics | ||||
Abu-Elezz et al. [15] | 37 | –Patient-related and healthcare organizational-related use cases –Organizational, social, or technical threats of blockchain | ![]() | ![]() | ![]() |
De Aguiar et al. [14] | unknown | –Pertinent use cases of blockchain in healthcare –Purposes of utilizing blockchain in each use case –Limitations and advantages of commonly known blockchain-based applications in healthcare | ![]() | ![]() | ![]() |
Durneva et al. [17] | 70 | –Pertinent use cases of blockchain in healthcare –Health information technology challenges that blockchain addressed –Barriers and challenges of utilizing blockchain in healthcare | ![]() | ![]() | ![]() |
Hasselgren et al. [1] | 39 | –Pertinent use cases of blockchain in healthcare –Purposes and challenges of utilizing blockchain –Prevalent types of DLT designs, consensus algorithms, and the support of smart contracts | ![]() | ![]() | ![]() |
Hölbl et al. [18] | 33 | –Pertinent use cases of blockchain in healthcare –Prevalent types of DLT designs, consensus algorithms, and the support of smart contracts | ![]() | ![]() | ![]() |
Hussien et al. [2] | 58 | –Pertinent use cases of blockchain in healthcare –Purposes and (technical) challenges of utilizing blockchain | ![]() | ![]() | ![]() |
Kuo et al. [16] | 10 | –Prevalent types of DLT designs, consensus algorithms, and support of smart contracts | ![]() | ![]() | ![]() |
Tandon et al. [13] | 42 | –Pertinent use cases of blockchain in healthcare –Purposes and challenges of utilizing blockchain –Prevalent types of blockchain designs and consensus algorithms | ![]() | ![]() | ![]() |
This study | 185 | –Pertinent use cases of DLT in healthcare –Purposes of utilizing DLT –Rationales of desired DLT characteristics for the identified use cases | ![]() | ![]() | ![]() |
TITLE-ABSTR-KEY (distributed ledger technology OR DLT OR blockchain) AND TITLE-ABSTR-KEY (health* OR medical) AND TITLE-ABSTR-KEY (application OR scenario OR use case)
Use case: patient-centric health data management | ||
---|---|---|
![]() | ||
PHI: patient health information | ||
Purpose | Description of purpose | Key DLT characteristics |
Access management | Enabling patients to authorize and revoke access to specific health information | Flexibility: Interoperability [33]; Use of smart contracts [34]; Token support [35] Opaqueness: Transaction content visibility [36]; User unidentifiability [35]; Node controller verification [37]; Policy: Compliance [37] Performance: Scalability [38]; Resource consumption [39]; Transaction validation latency [40] Practicality: Ease of node setup [39]; Ease of use [39] Security: Authenticity [31]; Availability [32]; Confidentiality [30]; Consistency [30]; Fault tolerance [40]; Integrity [31]; Isolation [41]; Strength of cryptography [32] |
Secure record-keeping | Maintaining log files of activities within DLT-based applications for patient-centric health data management to prevent tampering | Flexibility: Interoperability [29]; Use of smart contracts [38]; Token support [42] Opaqueness: Transaction content visibility [36]; User unidentifiability [35]; Node controller verification [25] Policy: Compliance [25] Performance: Scalability [38]; Resource consumption [24] Practicality: Ease of use [29] Security: Confidentiality [42]; Integrity [25]; Isolation [35]; Strength of cryptography [38]; |
Data sharing incentivization | Establishing a trustworthy and transparent environment to encourage patients to share their health data | Flexibility: Interoperability [43]; Use of smart contracts [36] Opaqueness: Transaction content visibility [36]; Node controller verification [36] Policy: Degree of decentralization [43]; Incentive mechanism [36] Security: Availability [44]; Confidentiality [44]; Integrity [44] |
Use case: management of EHRs | ||
---|---|---|
![]() | ||
Purpose | Description of purpose | Key DLT characteristics |
Access management | Controlling access permissions for EHRs | Flexibility: Interoperability [57]; Use of smart contracts [55]; Token support [66] Opaqueness: User unidentifiability [58]; Node controller verification [60] Policy: Compliance [59] Performance: Resource consumption [67]; Transaction validation latency [55] Practicality: Ease of use [63] Security: Authenticity [68]; Availability [69]; Confidentiality [55]; Consistency [59]; Integrity [56]; Non-repudiation [56] |
Secure record-keeping | Recording log files of operations on EHRs in a secure and transparent manner | Flexibility: Interoperability [70]; Use of smart contracts [71] Opaqueness: User unidentifiability [71]; Node controller verification [72] Performance: Scalability [70]; Resource consumption [67] Practicality: Ease of use [71] Security: Authenticity [73]; Availability [69]; Confidentiality [73]; Integrity [72]; Non-repudiation [69]; Strength of cryptography [73] |
Use case: RPM | ||
---|---|---|
![]() | ||
Purpose | Description of purpose | Key DLT characteristics |
Access management | Controlling fine-grained access permissions over health data gathered by various remote devices | Flexibility: Interoperability [75]; Use of smart contracts [81] Opaqueness: Transaction content visibility [77]; User unidentifiability [83]; Node controller verification [81] Policy: Compliance [84]; Degree of decentralization [76] Performance: Scalability [85]; Resource consumption [84]; Throughput [81]; Transaction validation latency [81] Practicality: Transaction fee [84] Security: Availability [86]; Censorship resistance [83]; Confidentiality [75]; Fault tolerance [75]; Integrity [87]; Non-repudiation [76]; Reliability [75] |
Secure record-keeping | Timestamping and logging data transmissions with RPM accurately and securely | Opaqueness: Node controller verification [88] Policy: Compliance [84]; Degree of decentralization [76] Performance: Scalability [89]; Resource consumption [84]; Throughput [84]; Transaction validation latency [90] Practicality: Transaction fee [84] Security: Authenticity [88]; Availability [90]; Confidentiality [87]; Integrity [87]; Non-repudiation [76] |
Process automation | Notifying of abnormal situations automatically for the timely detection of possible medical conditions | Flexibility: Use of smart contracts [77] Opaqueness: User unidentifiability [77]; Node controller verification [91] Policy: Compliance [91] Security: Scalability [77]; Transaction validation latency [88]; Authenticity [77]; Strength of cryptography [77] |
Use case: biomedical research | ||
---|---|---|
![]() | ||
Purpose | Description of purpose | Key DLT characteristics |
Access management | Defining and operating rules for access to research data and preventing study results from arbitrary manipulation | Flexibility: Interoperability [105]; smart contracts [102] Opaqueness: Traceability [102]; Transaction validation latency [95]; User unidentifiability [100]; Node controller verification [100] Security: Integrity [102] |
Secure record-keeping | Recording data gathered through research studies according to documentation requirements for biomedical research | Opaqueness: Traceability [102]; Transaction validation latency [95]; Node controller verification [94] Security: Confidentiality [94]; Integrity [102] |
Data sharing incentivization | Incentivizing individuals to participate in research studies | Opaqueness: User unidentifiability [100]; Node controller verification [100] Security: Confidentiality [103]; Integrity [100] |
Process automation | Monitoring specific values (e.g., effects of a drug on participants) generated in biomedical research without manual checks | Flexibility: Interoperability [99]; Use of smart contracts [99] Opaqueness: Node controller verification [101] Performance: Block creation interval [99]; Throughput [99] |
Use case: SCM for pharmaceutical drugs or medical devices | ||
---|---|---|
![]() | ||
Purpose | Description of purpose | Key DLT characteristics |
Secure record-keeping | Recording data generated during procurement, production, and delivery of pharmaceutical drugs or medical devices according to related regulations in an accurate manner | Flexibility: Use of smart contracts [115] Opaqueness: Transaction content visibility [112]; Node controller verification [115] Policy: Compliance [115] Performance: Block size limit [113]; Scalability [113]; Throughput [114]; Transaction validation latency [114] Practicality: Ease of node setup [108]; Ease of use [113] Security: Authenticity [116]; Availability [114]; Integrity [107] |
Process automation | (Partly) Automating negotiation and payment processes within the supply of pharmaceutical drugs or medical devices | Flexibility: Use of smart contracts [106] Opaqueness: Transaction content visibility [106] Security: Availability [114]; Confidentiality [106]; Consistency [114]; Integrity [106]; Non-repudiation [106] |
Use case: contact tracing and warning for pandemics | ||
---|---|---|
![]() | ||
Purpose | Description of purpose | Key DLT characteristics |
Secure record- keeping | Storing individuals’ spatial movements, their infection status, and other related information for tracing their encounters with others | Flexibility: Use of smart contracts [122]; Opaqueness: Traceability [117]; User unidentifiability [122]; Node controller verification [124] Policy: Compliance [124]; Degree of decentralization [123] Security: Scalability [122]; Transaction validation latency [122]; Authenticity [117]; Availability [122]; Consistency [123]; Integrity [117] |
Process automation | Evaluating individuals’ movements and notifying them of potential infection risks based on their encounters | Flexibility: Use of smart contracts [117]; Opaqueness: Node controller verification [117]; Security: Scalability [118]; Transaction validation latency [117] |
RQ | Key findings | Implications for research |
---|---|---|
RQ1 | —Six pertinent and two nascent DLT use cases in the health domain —Four general purposes of utilizing DLT in healthcare —While the basic idea of a purpose is consistent across use cases, there are use case-specific peculiarities | Our results reinforce the need for more contextualized research on and designs of DLT-based applications in healthcare. Especially researchers should consider and transparently report the domain-specific use case and the purpose for which they use DLT, when proposing, discussing, or evaluating DLT-based applications for healthcare. |
RQ2 | —30 DLT characteristics were proposed for DLT-based applications in the six pertinent use cases —Both use cases and purposes of utilizing DLT as well as their interplay can influence the requirements of DLT-based applications —The identified rationales provide a useful basis for explaining the suitability of specific DLT characteristics for a DLT-based application —Some DLT characteristics (e.g., auditability) are currently understudied | The identified rationales help to disentangle the concrete contributions of DLT to various use case-specific challenges in healthcare. Besides, the saturation of existing studies on DLT in healthcare in terms of some DLT characteristics is insufficient. Research on DLT in healthcare has a long way to go for a holistic picture of DLT-based applications. |
DLT Property | DLT Characteristics |
---|---|
Flexibility | —Interoperability |
—Maintainability | |
—Use of Smart Contracts | |
—Token Support | |
—Transaction Payload | |
Opaqueness | —Traceability |
—Transaction Content Visibility | |
—User Unidentifiability | |
—Node Controller Verification | |
Policy | —Auditability |
—Compliance | |
—Degree of Decentralization | |
—Incentive Mechanism | |
—Liability | |
Performance | —Block Creation Interval |
—Block Size Limit | |
—Confirmation Latency | |
—Resource Consumption | |
—Propagation Delay | |
—Scalability | |
—Stale Block Rate | |
—Throughput | |
—Transaction Validation Latency | |
Practicality | —Transaction Fee |
—Ease of Node Setup | |
—Ease of Use | |
—Support for Constrained Devices | |
Security | —Atomicity |
—Authenticity | |
—Availability | |
—Censorship Resistance | |
—Confidentiality | |
—Consistency | |
—Durability | |
—Fault Tolerance | |
—Integrity | |
—Isolation | |
—Non-Repudiation | |
—Reliability | |
—Strength of Cryptography |
![]() |
![]() |
When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection ...
Blockchain has been increasingly used as a component to enable decentralisation in software architecture for a variety of applications. Blockchain governance has received considerable attention to ensure the safe and appropriate use ...
With the advent of Bitcoin, a cryptographically-enabled peer-to-peer digital payment system, blockchain together with a whole package of distributed ledger technologies, which serve as the underlying foundation of all the crypto-currencies, have been ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in