Skip to main content
Log in

Towards the Use of Blockchain in Mobile Health Services and Applications

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With the advent of cryptocurrencies and blockchain, the growth and adaptation of cryptographic features and capabilities were quickly extended to new and underexplored areas, such as healthcare. Currently, blockchain is being implemented mainly as a mechanism to secure Electronic Health Records (EHRs). However, new studies have shown that this technology can be a powerful tool in empowering patients to control their own health data, as well for enabling a fool-proof health data history and establishing medical responsibility. Additionally, with the proliferation of mobile health (m-Health) sustained on service-oriented architectures, the adaptation of blockchain mechanisms into m-Health applications creates the possibility for a more decentralized and available healthcare service. Hence, this paper presents a review of the current security best practices for m-Health and the most used and widely known implementations of the blockchain protocol, including blockchain technologies in m-Health. The main goal of this comprehensive review is to further discuss and elaborate on identified open-issues and potential use cases regarding the uses of blockchain in this area. Finally, the paper presents the major findings, challenges and advantages on future blockchain implementations for m-Health services and applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System, https://bitcoin.org/bitcoin.pdf. Accessed 15 September 2020, 2008.

  2. Harman, L. B., Flite, C. A., and Bond, K., State of the art and science: Electronic Health Records: Privacy, Confidentiality, and Security. Am. Med. Assoc. J. Ethics No. 9, 14:712-719, 2012. https://doi.org/10.1001/virtualmentor.2012.14.9.stas1-1209.

  3. Eligma. White paper: Eligma - AI-driven and blockchain-based cognitive commerce platform. http://www.prweb.com/releases/2018/03/prweb15375060.htm. Accessed in 15 September 2020, 2018.

  4. Silva, B. M. C., Rodrigues, J. J. P. C., de la Torre Díez, I., López-Coronado, M., and Saleem, K., Mobile-health: A review of current state in 2015. J. Biomed. Inform. 56:265-272, 2015. https://doi.org/10.1016/j.jbi.2015.06.003.

  5. Jha, A. K., DesRoches, C. M., Campbell, E. G., Donelan, K., Rao, S. R., Ferris, T. G., Shields, A., Rosenbaum, S., and Blumenthal, D., Use of electronic health records in US hospitals. N. Engl. J. Med.. 360:1628–1638, 2009. https://doi.org/10.1056/NEJMsa0900592.

  6. Boulos, M. K., Wheeler, S., Tavares, C., and Jones, R., How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. Biomed. Eng. Online. 10:24, 2011. https://doi.org/10.1186/1475-925X-10-24.

  7. Nurgalieva, L., O’Callaghan, D. and Doherty, G., Security and Privacy of mHealth Applications: A Scoping Review. IEEE Access, 8:104247-104268, 2020, https://doi.org/10.1109/ACCESS.2020.2999934.

  8. Jara, H. R. and Schafir, E., E-Health: An introduction to the challenges of privacy and security. In: 2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV), 2014.

  9. Steinhubl, S., Muse, E. and Topol, E., Can mobile health technologies transform health care? Jama. 310:2395–2396, 2013. https://doi.org/10.1001/jama.2013.281078.

  10. Ventola, C. L., Mobile devices and apps for health care professionals: uses and benefits. P&T No. 5. 39(5), 2014.

  11. Källander, K., Tibenderana, J., Akpogheneta, O, Strachan, D., Hill, Z., Asbroek, A., Conteh, L., Kirkwood, B. and Meek, S., Mobile health (mHealth) approaches and lessons for increased performance and retention of community health workers in low-and middle-income countries: a review. Journal of medical Internet research, 15(1):e17. 2013. https://doi.org/10.2196/jmir.2130.

  12. Aranda-Jan, C., Mohutsiwa-Dibe, N., and Loukanova, S., Systematic review on what works, what does not work and why of implementation of mobile health (mHealth) projects in Africa. BMC Public Health, 14:188, 2014. https://doi.org/10.1186/1471-2458-14-188.

  13. Kish, L., and Topol, E., Unpatients—why patients should own their medical data. Nat. Biotechnol., 33(9):921–924, 2015. https://doi.org/10.1038/nbt.3340.

  14. Shahriyar, R., Bari, F., Kundu, G., Ahamed, S. I., and Akbar, M., Intelligent mobile health monitoring system (IMHMS). In: International Conference on Electronic Healthcare, 2009.

  15. Sarwar, M., and Soomro, T. R., Impact of Smartphone’s on Society. Eur. J. Sci. Res., 98:216–226, 2013.

  16. Fox, S., and Duggan, M., Mobile health 2010, Pew Internet & American Life Project Washington, DC., 2010. https://www.pewresearch.org/internet/2010/10/19/mobile-health-2010/. Accessed in 10 of September 2020. https://www.vodafone.com/covid19/news-connected/how-technology-is-connecting-mothers-with-critical-health-services-in-africa.

  17. Lorenz, A., Mielke, D., Oppermann, R., and Zahl, L., Personalized mobile health monitoring for elderly. In: Proceedings of the 9th international conference on Human computer interaction with mobile devices and services, 2007.

  18. Bourouis, A., Feham, M., and Bouchachia, A., Ubiquitous mobile health monitoring system for elderly (UMHMSE). arXiv preprint arXiv:1107.3695, 2011. https://doi.org/10.5121/ijcsit.2011.3306.

  19. Díaz-Bossini, J.-M., and Moreno, L., Accessibility to Mobile Interfaces for Older People. Proced. Comp. Sci.. 27:57-66, 2014. https://doi.org/10.1016/j.procs.2014.02.008.

  20. Lorenz, A., and Oppermann, R., Mobile health monitoring for the elderly: Designing for diversity. Perv. Mob. Comp.. 5:478–495, 2009. https://doi.org/10.1016/j.pmcj.2008.09.010.

  21. Chan, V., Ray, P., and Parameswaran, N., Mobile e-Health monitoring: an agent-based approach. IET Commun.. 2:223–230, 2008. https://doi.org/10.1049/iet-com:20060646.

  22. Holzinger, A., and Errath, M., Mobile computer Web-application design in medicine: some research based guidelines. Univ. Access Inf. Soc.. 6:31–41, 2007. https://doi.org/10.1007/s10209-007-0074-z.

  23. Nike Inc. Nike+. https://www.nike.com/pt/nrc-app. Accessed in 15 September 202, 2020

  24. Silva, B. M., Lopes, I. M., Rodrigues, J. J. P. C., and Ray, P., SapoFitness: A mobile health application for dietary evaluation. In: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, 2011.

  25. Lv, Z., Xia, F., Wu, G., Yao, L., and Chen, Z., iCare: a mobile health monitoring system for the elderly. In: Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom), 2010.

  26. del Rosario, M., Redmond, S., and Lovell, N., Tracking the evolution of smartphone sensing for monitoring human movement. Sensors. 15:18901–18933, 2015. https://doi.org/10.3390/s150818901.

  27. Otto, C., Milenkovic, A., Sanders, C., Jovanov, E., System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed.. 1:307–326, 2006.

  28. Luxton, D. D., Kayl, R. A., and Mishkind, M. C., mHealth data security: The need for HIPAA-compliant standardization. Telemed. e-Health. 18:284–288, 2012. https://doi.org/10.1089/tmj.2011.0180.

  29. Krutz, R. L., and Vines, R. D., Cloud security: A comprehensive guide to secure cloud computing. Hoboken: Wiley Publishing, 2010

  30. Chen, D., and Zhao, H., Data security and privacy protection issues in cloud computing. In: Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, 2012.

  31. Top Threats Working Group CSA. The Treacherous 12 Cloud Computing Top Threats in 2016. Cloud Security Alliance, 2016. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf. Accessed in 15 September 2020.

  32. 104th Congress of the United States of America. Health Insurance Portability and Accountability Act of 1996, 1996. https://www.cdc.gov/phlp/publications/topic/hipaa.html. Accessed in 15 September 2020.

  33. Government of Canada, Justice Law Website. Personal Information Protection and Electronic Documents Act, 2000. https://laws-lois.justice.gc.ca/ENG/ACTS/P-8.6/index.html. Accessed in 15 September 2020.

  34. Australian Law Reform Commision. Australian Privacy Law & Practice - Key Recommendations for Health Information Privacy Reform, 2000 https://www.alrc.gov.au/news/australian-privacy-law-practice-key-recommendations-for-health-information-privacy-reform/. Accessed in 15 September 2020.

  35. Vayena, E., Dzenowagis, J., Brownstein, J. S., and Sheikh, A., Policy implications of big data in the health sector. Bull. World Health Organ. 96:66–68, 2018. https://doi.org/10.2471/BLT.17.197426.

  36. Feng, D.-G., Zhang, M., Zhang, Y., and Xu, Z., Study on cloud computing security. J. Softw., 22:71–83, 2011. https://doi.org/10.3724/SP.J.1001.2011.03958.

  37. Kandukuri, B. R., Rakshit, A., and others, Cloud security issues. In: Services Computing, 2009. SCC'09. IEEE International Conference on, 2009.

  38. Wang, C., Chow, S. S. M., Wang, Q., Ren, K., and Lou, W., Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput., 62:362–375, 2013. https://doi.org/10.1109/TC.2011.245.

  39. Apostolopoulos, G., Peris, V., and Saha, D., Transport Layer Security: How much does it really cost?," in INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 1999.

  40. Wang, Q., Zhou, D., and Li, Y., Secure outsourced calculations with homomorphic encryption. arXiv e-prints, 12, 2018. https://doi.org/10.5121/acij.2018.9601.

  41. Gentry, C., and Boneh, D. A fully homomorphic encryption scheme. Stanford University Stanford, 2009. https://crypto.stanford.edu/craig/craig-thesis.pdf. Accessed in 15 September 2020.

  42. Gentry, C., and Halevi, S., Implementing gentry’s fully-homomorphic encryption scheme. In: Annual international conference on the theory and applications of cryptographic techniques, 2011.

  43. Wang, W., Hu, Y., Chen, L., Huang, X., and Sunar, B., Accelerating fully homomorphic encryption on GPUs. In: Proceedings of the IEEE High Performance Extreme Computing Conference, 2012.

  44. Liu, J., Lu, Y.-H., and Koh, C.-K., Performance analysis of arithmetic operations in homomorphic encryption. Electrical and Computer Engineering (ECE) Technical Reports. Paper 404. 13 December, 2010. http://docs.lib.purdue.edu/ecetr/404.

  45. Kim, S., Omori, M., Hayashi, T., Omori, T., Wang, L., and Ozawa, S., Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption. In: International Conference on Neural Information Processing, 2018.

  46. Toapanta, S. M. T., Chalén, L. J. C., and Ortiz, J. G., A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture, 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), September 2020. https://doi.org/10.1109/ICPICS50287. 2020.9202073.

  47. Jain, A. K., Ross, A., and Pankanti, S., Biometrics: a tool for information security. IEEE Transact. Info. Foren. Sec., 1(6):125-143, 2006. https://doi.org/10.1109/TIFS.2006.873653.

  48. Qiu, Y., Gigliotti, J. V., Wallace, M., Griggio, F., Demore, C. E. M., Cochran, S., and Trolier-McKinstry, S., Piezoelectric micromachined ultrasound transducer (PMUT) arrays for integrated sensing, actuation and imaging. Sensors. 15:8020–8041, 2015. https://doi.org/10.3390/s150408020.

  49. Schroeder, C. C., Biometric security process for authenticating identity and credit cards, visas, passports and facial recognition, Google Patents, 1998 https://patents.google.com/patent/US5787186A/en. Accessed in 15 September 2020.

  50. Deane, F., Barrelle, K., Henderson, R., and Mahar, D., Perceived acceptability of biometric security systems. Comp. Sec.. 14:225–231, 1995. https://doi.org/10.1016/0167-4048(95)00005-S.

  51. Martinsen, O. G., Clausen, S., Nysæther, J. B., and Grimnes, S., Utilizing characteristic electrical properties of the epidermal skin layers to detect fake fingers in biometric fingerprint systems—A pilot study. IEEE Trans. Biomed. Eng.. 54:891–894, 2007. https://doi.org/10.1109/TBME.2007.893472.

  52. Seepers, R. M., Strydis, C., Sourdis, I., and Zeeuw, C. I. D., Enhancing Heart-Beat-Based Security for mHealth Applications. IEEE Journal of Biomedical and Health Informatics. 21(1):254-262, 2017. https://doi.org/10.1109/JBHI.2015.2496151.

  53. Galbally, J., Marcel, S., and Fierrez, J., Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition. IEEE Trans. Image Process.. 23(2):710-724, 2014. https://doi.org/10.1109/TIP.2013.2292332.

  54. Iovane, G., Bisogni, C., Maio, L. D., and Nappi, M., An encryption approach using Information Fusion techniques involving prime numbers and Face Biometrics. IEEE Transact. Sustain. Comput.: 1-1, 2018. https://doi.org/10.1109/TSUSC.2018.2793466.

  55. M. Hussain, A. Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal, S. Iqbal and M. Abdulnabi, "A security framework for mHealth apps on Android platform," Comp. Sec., vol. 75, pp. 191-217, 2018. https://doi.org/10.1016/j.cose.2018.02.003.

    Article  Google Scholar 

  56. Hussain, M., Zaidan, A. A., Zidan, B. B., Iqbal, S., Ahmed, M. M., Albahri, O. S., and Albahri, A. S., Conceptual framework for the security of mobile health applications on Android platform. Telematics Inform.. 35:1335-1354, 2018. https://doi.org/10.1016/j.tele.2018.03.005.

  57. Enck, W., Octeau, D., McDaniel, P. D., and Chaudhuri, S., A study of android application security. In: USENIX security symposium, 2011.

  58. Iqbal, S., Yasin, A., and Naqash, T., Android (Nougats) security issues and solutions. In: 2018 IEEE International Conference on Applied System Invention (ICASI), 2018.

  59. Dehling, T., Gao, F., Schneider, S., and Sunyaev, A., Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR mHealth uHealth, 3, 2015. https://doi.org/10.2196/mhealth.3672.

  60. Tapscott, D., and Tapscott, A., Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin Publishing Group. eBook Kindle. 2016.

  61. Iansiti, M., and Lakhani, K. R., The truth about blockchain. Harv. Bus. Rev.. 95:118–127, 2017.

  62. Li, X., Jiang, P., Chen, T., Luo, X., and Wen, Q., A survey on the security of blockchain systems. Futur. Gener. Comput. Syst., 2017. https://doi.org/10.1016/j.future.2017.08.020.

  63. Sankar, L. S., Sindhu, M., and Sethumadhavan, M., Survey of consensus protocols on blockchain applications," in 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017.

  64. Xiao, Y., Zhang, N., Lou, W., and Hou, Y. T., A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutor., 22:1432-1465, 2020. https://doi.org/10.1109/COMST.2020.2969706.

  65. Lao, L., Li, Z., Hou, S., Xiao, B., Guo, S., and Yang, Y., A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. ACM Comput. Surv., 53(2), 2020. https://doi.org/10.1145/3372136.

  66. Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., and Wang, J., Untangling Blockchain: A Data Processing View of Blockchain Systems. IEEE Trans. Knowl. Data Eng., 30(7):1366-1385, 2018. https://doi.org/10.1109/TKDE.2017.2781227.

  67. Ethereum Foundation. Ethereum, 2020. https://ethereum.org/en/foundation/. Accessed in 15 September 2020.

  68. Wood, G., DApps: What Web 3.0 Looks Like, 2014. https://gavwood.com/dappsweb3.html. Accessed in 15 September 2020.

  69. Cai, W., Wang, Z., Ernst, J. B., Hong, Z., Feng, C., and Leung, V. C. M., Decentralized Applications: The Blockchain-Empowered Software System. IEEE Access. 6:53019-53033, 2018. https://doi.org/10.1109/ACCESS.2018.2870644.

  70. Li, S., Application of Blockchain Technology in Smart City Infrastructure. In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018.

  71. Biswas, K., and Muthukkumarasamy, V., Securing Smart Cities Using Blockchain Technology," in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016.

  72. Nagothu, D., Xu, R., Yahya Nikouei, S. and Chen, Y., A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. arXiv e-prints, p. arXiv:1807.07487, 7, 2018. https://doi.org/10.1109/ISC2.2018.8656968.

  73. Shen, C., and Pena-Mora, F., Blockchain for Cities - A Systematic Literature Review. IEEE Access, 1-1, 2018. https://doi.org/10.1109/ACCESS.2018.2880744.

  74. Ethereum Foundation. Ether, 2020 https://ethereum.org/en/foundation/. Accessed in 15 September 2020.

  75. Vogelsteller, F., and Buterin, V. ERC-20 Token Standard. RFC 20, Ethereum, 2015 https://eips.ethereum.org/EIPS/eip-20. Accessed in 15 September 2020.

  76. Buterin, V., White Paper: A Next-Generation Smart Contract and Decentralized Application Platform, 2013. https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf. Accessed in 15 September 2020.

  77. Wood, G., White Paper: Ethereum: A secure decentralized generalized transaction ledger, 2014. https://gavwood.com/paper.pdf. Accessed in 15 September 2020.

  78. Tezos Foundation. Tezos, 2020. https://tezos.foundation. Accessed in 15 September 2020.

  79. Goodman, L. M., White Paper: Tezos: a self-amending crypto-ledger, 2014. https://tezos.com/static/white_paper-2dc8c02267a8fb86bd67a108199441bf.pdf. Accessed in 15 September 2020.

  80. DeepBrainChain. White paper: Deepbrain chain artificial intelligence computing platform driven by blockchain, 2017. https://www.deepbrainchain.org/assets/pdf/ DeepBrainChainWhitepaper_en.pdf. Accessed in 15 September 2020.

  81. Lopes, V., and Alexandre, L. A., An Overview of Blockchain Integration with Robotics and Artificial Intelligence. arXiv e-prints, p. arXiv:1810.00329, 9, 2018.

  82. Marwala, T., and Xing, B., The Synergy of Blockchain and Artificial Intelligence. 2018. https://doi.org/10.2139/ssrn.3225357.

  83. Omohundro, S., Cryptocurrencies, Smart Contracts, and Artificial Intelligence. AI Matters, 1(12):19–21, 2014. https://doi.org/10.1145/2685328.2685334.

  84. N. A. M. Inc., White paper: Nam Coin - revolution in medical care with AI and blockchain, 2018. https://namchain.net/whitepaper/EN_whitepaper_20180728134338.pdf. Accessed in 15 September 2020.

  85. Conoscenti, M., Vetrò, A., and Martin, J. C. D., Blockchain for the Internet of Things: A systematic literature review. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), 2016.

  86. T. M. Fernández-Caramés and P. Fraga-Lamas, "A Review on the Use of Blockchain for the Internet of Things," IEEE Access, vol. 6, pp. 32979-33001, 2018. https://doi.org/10.1109/ACCESS.2018.2842685.

    Article  Google Scholar 

  87. K. Christidis and M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," IEEE Access, vol. 4, pp. 2292-2303, 2016. https://doi.org/10.1109/ACCESS.2016.2566339.

    Article  Google Scholar 

  88. Consensys, Consensys Quorum, 2020. https://docs.goquorum.consensys.net/en/latest/. Accessed in 15 September 2020.

  89. Saltini, R., and Hyland-Wood, D., Correctness Analysis of IBFT, 2019. https://arxiv.org/abs/1901.07160. Accessed in 15 September 2020.

  90. Ongaro, D., and Ousterhout, J., RAFT Consensus, 2020. https://raft.github.io/. Accessed in 15 September 2020.

  91. The Linux Foundation, Hyperledger, 2020. https://www.hyperledger.org/. Accessed in 15 September 2020.

  92. Nathan, S., Thakkar, P., and Vishwanathan, B., Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform," in IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). Milwaukee, WI, USA, 25-28. 2018. https://doi.org/10.1109/MASCOTS.2018.00034.

  93. Castro, M., and Liskov, B.. Practical Byzantine Fault Tolerance. 1999. http://pmg.csail.mit.edu/papers/osdi99.pdf. Accessed in 15 September 2020.

  94. Sukhwani, H., Martínez, J. M., Chang, X., Trivedi, K. S., and Rindos, A., Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 2017.

  95. Sousa, J., Bessani, A., and Vukolic, M., A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.

  96. Lei, K., Zhang, Q., Xu, L., and Qi, Z., Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), 2018.

  97. Kiyomoto, S., Rahman, M. S., and Basu, A., On blockchain-based anonymized dataset distribution platform. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), 2017.

  98. Sharma, P. K., Chen, M., and Park, J. H., A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT. IEEE Access, 6:115-124, 2018. https://doi.org/10.1109/ACCESS.2017.2757955.

  99. Mertz, L., (Block) Chain Reaction: A Blockchain Revolution Sweeps into Health Care, Offering the Possibility for a Much-Needed Data Solution. IEEE Pulse. 9(5):4-7, 2018. https://doi.org/10.1109/MPUL.2018.2814879.

  100. Esposito, C., Santis, A. D., Tortora, G., Chang, H., and Choo, K. R., Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?. IEEE Cloud Computing. 5(1):31-37, 2018. https://doi.org/10.1109/MCC.2018.011791712.

  101. Liang, X., Zhao, J., Shetty, S., Liu, J., and Li, D., Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017.

  102. Chiuchisan, I., Balan, D., Geman, O., and Gordin, I., A security approach for health care information systems. In: 2017 E-Health and Bioengineering Conference (EHB), 2017. https://doi.org/10.1109/EHB.2017.7995525.

  103. Meri, A., Hasan, M. K., Danaee, M., Jaber, M., Safei, N., Dauwed, M., Abd, S. K., Al-bsheish, M., and others, Modelling the Utilization of Cloud Health Information Systems in the Iraqi Public Healthcare Sector. Telematics and Informatics, 2018. https://doi.org/10.1016/j.tele.2018.12.001.

  104. Lorence, D. P., and Churchill, R., Incremental adoption of information security in health-care organizations: implications for document management. IEEE Trans. Inf. Technol. Biomed., 9(6):169-173, 2005. https://doi.org/10.1109/TITB.2005.847137.

  105. Müthing, J., Jäschke, T., and Friedrich, M. C., Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues. JMIR Mhealth Uhealth, 10, 2017. https://doi.org/10.2196/mhealth.7791.

  106. Ichikawa, D., Kashiyama, M., Ueno, T., Tamper-Resistant Mobile Health Using Blockchain Technology. JMIR Mhealth Uhealth, 5(7):e111, 2017. https://doi.org/10.2196/mhealth.7938

  107. Alam, T., mHealth Communication Framework using Blockchain and IoT Technologies (June 30, 2020). International Journal of Scientific & Technology Research. Vol 9(6). 2020. https://doi.org/10.2139/ssrn.3638988.

  108. Clim, A, Zota, RD, Constantinescu, R., Data exchanges based on blockchain in m-Health applications. Proced. Comp. Sci. 160:281-288, 2019 https://doi.org/10.1016/j.procs.2019.11.088.

  109. Das, S., Kolluri, A., Saxena, P., and Yu, H., On the Security of Blockchain Consensus Protocols. In: International Conference on Information Systems Security, 2018.

  110. Baliga, A., Understanding blockchain consensus models. Persistent, 2017.

  111. Wilmoth, J., Bitcoin Gold Hit by Double Spend Attack, Exchanges Lose Millions. 2018, https://www.ccn.com/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions/. Accessed in 15 September 2020.

  112. Teutsch, C. R. J., A scalable verification solution for blockchains, 2018. https://people.cs.uchicago.edu/~teutsch/papers/truebit.pdf. Accessed in 15 September 2020.

  113. Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V., Blockchain-based database to ensure data integrity in cloud computing environments. In: 2020 International Conference on Mainstreaming Block Chain Implementation (ICOMBI). Bengaluru, India. 21-22 Feb, 2020.

  114. Glaser, F., Pervasive Decentralisation of Digital Infrastructures: A Framework for Blockchain Enabled System and Use Case Analysis (January 2017). Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), Waikoloa Village, Hawaii, January 4-7, 2017.

  115. Linn, L. A., and Koo, M. B., Blockchain for health data and its potential use in health it and health care related research. HealthIT, 2017.

Download references

Acknowledgments

This work is funded by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/EEA/50008/2020.

Funding

This work is funded by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/EEA/50008/2020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bruno M. C. Silva.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Code availability

Not applicable.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Santos, J.A., Inácio, P.R.M. & Silva, B.M.C. Towards the Use of Blockchain in Mobile Health Services and Applications. J Med Syst 45, 17 (2021). https://doi.org/10.1007/s10916-020-01680-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-020-01680-w

Keywords