Applications of Blockchain Within Healthcare

Authors

  • Liam Bell The Cyber Academy, Edinburgh Napier University, Edinburgh, UK
  • William J Buchanan, OBE, PhD, FBCS, FIET, CEng, BSc (Hons) The Cyber Academy, Edinburgh Napier University, Edinburgh, UK http://orcid.org/0000-0003-0809-3523
  • Jonathan Cameron NHS NSS, Edinburgh, UK
  • Owen Lo The Cyber Academy, Edinburgh Napier University, Edinburgh, UK

DOI:

https://doi.org/10.30953/bhty.v1.8

Keywords:

Asset Tracking, Blockchain, Drug tracking, Ethereum, Healthcare, Internet of Things

Abstract

There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical tracing, and health insurance. Within device tracking, hospitals can trace their asset within a blockchain infrastructure, including through the complete lifecycle of a device. The information gathered can then be used to improve patient safety and provide after-market analysis to improve efficiency savings. This paper outlines recent work within the areas of pharmaceutical traceability, data sharing, clinical trials, and device tracking.

Keywords: Asset Tracking, Blockchain, Drug tracking, Ethereum, Healthcare, Internet of Things, IoT

Downloads

Download data is not yet available.

Author Biographies

William J Buchanan, OBE, PhD, FBCS, FIET, CEng, BSc (Hons), The Cyber Academy, Edinburgh Napier University, Edinburgh, UK

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS and the IET. He was appointed an Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security. Currently he leads the Centre for Distributed Computing, Networks, and Security and The Cyber Academy (http://thecyberacademy.org).

His main research focus is around information sharing, such as using Trust and Governance Policies, threat analysis, cryptography, and triage within digital forensics. This has led to several World-wide patents, and in three highly successful spin-out companies: Zonefox (zonefox.com); Symphonic Software (www.symphonicsoft.com/); and Cyan Forensics (cyanforensics.com).

Bill regularly appears on TV and radio related to computer security, and has given evidence to the Justice Committee at the Scottish Parliament, along with being part of the BBC Scottish Independence Team of Experts (speciality: Cyber Security). This includes appearances on Newsnight Scotland, Good Morning Scotland, Panorama, and Radio 5 Newsdrive.

Bill was named as one of the Top 100 people for Technology in Scotland for 2012, 2013, 2014, 2015 and 2016. In Feb 2016, he was also included in the FutureScot "Top 50 Scottish Tech People Who Are Changing The World". Recently his work on Secret Shares received “Innovation of the Year” at the Scottish Knowledge Exchange Awards, for a research project which involves splitting data into secret shares, and can then be distributed across a public Cloud-based infrastructure. He was included in the JISC Top 50 Higher Education Social Media Influencers in 2015.

His current work focuses on the secret share methods [1][2], and especially in how documents can be stored securely in public cloud based systems. The current cryptography work around secret shares has won several awards, and is the basis for new funded work. This is further enhanced with work around sticky policies and identity based encryption [3], and which aims to integrate access rights on document within public cloud systems. This includes the storage of high risk documents, such as health care records and financial information. Along with this he has new research work which integrates machine learning into insider threat detection, and within side channel analysis on embedded systems [4].

Bill’s work around information sharing models for trust and governance, which was funded through two EPSRC grants, is now showing significant impact with the integration of over 7,000 health and social care entities within London, and which will be able to share information in a secure and trusted way [5][6].

Esteem indicators
• Creator of three successful spin-out companies: Zonefox, Symphonic Software and Cyan Forensics.
• Four US/World patents in Cyber Security.
• Invited keynote speaker at many conferences, including IEEE e-Health 2016 (on information sharing in health care).
• Part of editorial team for a range of international conferences.
• Editor-in-Chief, Journal of Cyber Security Technology.
• Editor of Cyber Security Series for River Publishers.
• Winner, Innovation of the Year, Knowledge Exchange Awards, 2016.
• Top 50 people in HE in social media. This social media activity mainly relates to Cyber Security.
• Fellow of IET and BCS.
• Winner, Scottish Cyber Evangelist of the Year, 2016.
• Top 50 Scottish Tech People Who Are Changing The World, FutureScot, 2016.
• PhD Examiner for a wide range of universities, including Royal Holloway, Cranfield University and University of Plymouth, along with being a PhD examiner for a number of European universities.
• External Examiner for a number of universities, including recent ones with Royal Holloway and Dublin City University.
Bill has one of the most extensive academic sites in the World (http://asecuritysite.com), and is involved in many areas of novel research and teaching in cryptography and cyber security. He has published over 27 academic books, and over 250 academic research papers, along with several awards for excellence in research, innovation and teaching.

He has led many innovations in teaching related to Cyber Security, including with the DFET Cloud Training project and leads the Scottish EU Centre of Excellence for Law Enforcement Training within the 2Center Network, along with being part of the setup of SIPR (Scottish Institute for Police Research). He currently leads on a range of training projects with Police Scotland and a range of industry partners.

Relevant recent publications
[1] E. Ukwandu, W. J. Buchanan, L. Fan, G. Russell, and O. Lo, “RESCUE: Resilient secret sharing cloud-based architecture,” in Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, 2015, vol. 1, pp. 872–879.
[2] W. Buchanan, D. Lanc, E. Ukwandu‎, L. Fan, and G. and, “The Future Internet: A World of Secret Shares,” Futur. Internet, vol. 7, no. 4, pp. 445–464, 2015.
[3] G. Spyra, W. J. Buchanan, and E. Ekonomou, “Sticky policy enabled authenticated OOXML,” in 2016 SAI Computing Conference (SAI), 2016, pp. 1118–1122.
[4] O. Lo, W. J. Buchanan, and D. Carson, “Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA),” J. Cyber Secur. Technol., pp. 1–20, Sep. 2016.
[5] L. Fan, W. Buchanan, C. Thümmler, O. Lo, A. Khedim, O. Uthmani, A. Lawson, and D. Bell, “DACAR platform for eHealth services cloud,” in Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011, 2011, pp. 219–226.
[6] L. Fan, W. J. Buchanan, O. Lo, C. Thuemmler, A. Lawson, O. Uthmani, E. Ekonomou, and A. S. Khedim, “SPoC: Protecting Patient Privacy for e-Health Services in the Cloud,” Int. Conf. eHealth, Telemedicine, Soc. Med. eTELEMED, no. 4, pp. 98–104, 2012.

Owen Lo, The Cyber Academy, Edinburgh Napier University, Edinburgh, UK

Owen Lo received a BEng (2010) degree in Computer Networks and Distributed Systems from Edinburgh Napier University, and, more recently, was also awarded a PhD (2015) degree in health informatics from the same institute.
Currently he is a Research Fellow of Centre for Distributed Computing, Networking and Security at Edinburgh Napier University. Owen has contributed to numerous research projects during his time at Edinburgh Napier University including evaluation of a cloud-based e-Health platform (Cloud4Health), implementation of a data governance engine (safi.re), evaluation of an Anonymised, Distributed, e-Commerce Architecture (ADeCA) and development of digital forensic investigation tools (Fragment Finder).

His current research area is on side-channel attacks which is a technique used to attack a cryptographic system by monitoring the physical outputs of the system. Additionally, he is involved in the spin-out project named Fragment Finder which aims to develop a suite of digital investigation tools to enable rapid detection of contraband data.

Downloads

Published

2018-05-29

How to Cite

Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today, 1. https://doi.org/10.30953/bhty.v1.8

Issue

Section

Reviews

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)