<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">60143</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2025.060143</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data</article-title>
<alt-title alt-title-type="left-running-head">A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data</alt-title>
<alt-title alt-title-type="right-running-head">A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Ghani</surname><given-names>Ayoub</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>Ayoub.ghani@usmba.ac.ma</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Zinedine</surname><given-names>Ahmed</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Mohajir</surname><given-names>Mohammed El</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Faculty of Sciences, Sidi Mohammed Ben Abdellah University</institution>, <addr-line>Fez, 30000</addr-line>, <country>Morocco</country></aff>
<aff id="aff-2"><label>2</label><institution>Faculty of Sciences, Abdelmalek Essaadi University</institution>, <addr-line>Tetouan, 93030</addr-line>, <country>Morocco</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Ayoub Ghani. Email: <email>Ayoub.ghani@usmba.ac.ma</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>23</day><month>1</month><year>2025</year>
</pub-date>
<volume>40</volume>
<issue>1</issue>
<fpage>75</fpage>
<lpage>98</lpage>
<history>
<date date-type="received">
<day>25</day>
<month>10</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>23</day>
<month>12</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_60143.pdf"></self-uri>
<abstract>
<p>The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data. The paper seeks to contribute in two significant ways to the enhancement of patient privacy and security: firstly, by defining a patient-centric access mechanism that adheres to the General Data Protection Regulation (GDPR) and our security requirements, as well as describing architecture, all pertinent access management actions, and proposed smart contracts including their design goals; secondly, by formalizing and validating the security properties through the application of the SeMF security modeling framework as well as, performing the cost analysis. As a result, the SeMF has assessed the satisfaction of our security requirements, including data integrity, data authenticity, data confidentiality, and authentication. As a result, the system has proven alignment with defined security requirements. Furthermore, the implementation has demonstrated the cost savings of our system. Finally, the system has been compared to other solutions based on design goals and GDPR compliance. Thus, the system is suitable for enhancing patient security and privacy through a patient-centric approach.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Blockchain</kwd>
<kwd>IoT</kwd>
<kwd>SeMF</kwd>
<kwd>telemedicine</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Telehealth and telemedicine services have advanced as a result of the significant transformation of healthcare systems facilitated by the rise of connected devices supplied with biosensors (worn or incorporated) [<xref ref-type="bibr" rid="ref-1">1</xref>]. These devices can track various health metrics, such as glucose levels, blood pressure, pulse rate, respiratory rate and patterns.</p>
<p>Additionally, a categorization of these devices has been proposed in [<xref ref-type="bibr" rid="ref-2">2</xref>]: (cat. 1) Stationary Devices, utilized in hospitals; (cat. 2) Medical Embedded Devices, used and embedded inside the body; (cat. 3) Medical Wearable Devices, prescribed by doctors; and (cat. 4) Wearable Health Monitoring Devices, worn on the body. In addition, Telehealth and telemedicine advance treatment outcomes, care coordination, and accessibility to healthcare through the use of Internet of Things (IoT) technology. However, security and privacy are the main concerns of IoT devices due to their continuous internet connectivity and limited storage capacity. Consequently, patient data is at risk of privacy breaches, as evidenced by more than 40 major security breaches and privacy leakages worldwide three years ago, affecting well-known companies, including Microsoft as well as governmental institutions [<xref ref-type="bibr" rid="ref-3">3</xref>].</p>
<p>Current telehealth systems store data in centralized databases owned by healthcare providers, which results in significant privacy concerns, including unauthorized data access. Furthermore, centralized systems are prone to Single Point of Failure (SPoF), risking data loss due to hardware or system malfunctions. In the event of malicious attacks, alterations to patient data may go undetected and unrecoverable [<xref ref-type="bibr" rid="ref-4">4</xref>]. Access management also suffers from several drawbacks, including indefinite data access by third parties, limited trust in third parties, and challenges in conducting audit trails. Additionally, there is often a misunderstanding of access granted by users and additional data usage, highlighting the need for a human-centric approach that clarifies the objective for data usage [<xref ref-type="bibr" rid="ref-5">5</xref>].</p>
<p>The General Data Protection Regulation (GDPR), established by the European Union, provides a legal framework that enforces data protection guidelines and enhances consumer control over their personal data [<xref ref-type="bibr" rid="ref-6">6</xref>]. Security and privacy concerns require a patient-centric approach to improve the protection of patient data storage and sharing. This approach must also comply with GDPR regulations for access management and data-sharing processes.</p>
<p>Therefore, Blockchain technology can mitigate the security and privacy challenges facing telehealth and telemedicine. Additionally, Blockchain is a decentralized system where peer-to-peer transactions occur between parties that may not be trusted without the need for intermediaries. Users are involved in the verification and validation processes. Additionally, Blockchain offers strong security through cryptographic encryption, which ensures data confidentiality. It functions as a tamper-resistant distributed ledger made up of sequential blocks linked by hash values, recording transactions from public or private peer-to-peer networks [<xref ref-type="bibr" rid="ref-7">7</xref>]. Transaction data is hashed using Merkle trees to manage storage and access [<xref ref-type="bibr" rid="ref-8">8</xref>]. Consequently, blockchain data cannot be altered without affecting all subsequent blocks in the ledger [<xref ref-type="bibr" rid="ref-9">9</xref>]. Consensus algorithms are used to maintain data consistency across the distributed network.</p>
<p>Here are the main features that define blockchain technology:
<list list-type="bullet">
<list-item>
<p><bold>Decentralization.</bold> Seeks to end the need for a central authority to own and control the network.</p></list-item>
<list-item>
<p><bold>Transparency.</bold> Ensures that every record is visible to every node (This can be applicable to public Blockchain)</p></list-item>
<list-item>
<p><bold>Persistency.</bold> Validates transactions within minutes and instantly identifies invalid transactions, with no possibility of deleting or rolling back recorded ones.</p></list-item>
<list-item>
<p><bold>Immutability.</bold> Stores every recorded data permanently unless malicious users control the blockchain network.</p></list-item>
<list-item>
<p><bold>Anonymity.</bold> To conceal their identities, users interact using generated addresses in a public blockchain. Conversely, private blockchains require restricted user identification.</p></list-item>
</list></p>
<p>Additionally, the Ethereum blockchain [<xref ref-type="bibr" rid="ref-10">10</xref>] introduces the concept of Smart Contracts, which aims to enhance efficiency and lower costs. A Smart Contract serves the purpose of setting up the basic logic over a decentralized application that allows people to send money, goods, or services to one another without trusting one another. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates the smart contract lifecycle, which includes four stages: establishing predefined contract rules, triggering events, self-execution, and settlement. Furthermore, the Inter-Planetary File System (IPFS) [<xref ref-type="bibr" rid="ref-11">11</xref>] is a peer-to-peer distributed file system that connects all computers using a single file system. It offers decentralized storage. IPFS has a block store model with high throughput and content-addressed hyperlinks. Each file is given a distinctive hash that can be accessed by all network peers. Any modifications to the file lead to a corresponding change in the hash.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Smart contract lifecycle</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_60143-fig-1.tif"/>
</fig>
<p>In view of this, the paper proposes a blockchain-based access management system for telehealth and telemedicine. This system aims to enhance patient privacy and data security by recording every access to data on Blockchain. To evaluate the system&#x2019;s effectiveness in addressing privacy and security concerns, we plan to use a formal security modeling framework (SeMF).</p>
<p>The paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> discusses related works and contributions. <xref ref-type="sec" rid="s3">Section 3</xref> provides an overview of blockchain technology. <xref ref-type="sec" rid="s4">Section 4</xref> defines the system requirements. <xref ref-type="sec" rid="s5">Section 5</xref> describes the proposed system, detailing its design and architecture, and includes all related actions presented in sequence diagrams and algorithms that automate the access process based on key characteristics of Blockchain. <xref ref-type="sec" rid="s6">Section 6</xref> covers the formalization and validation of the system&#x2019;s security properties. Finally, <xref ref-type="sec" rid="s7">Section 7</xref> presents the conclusion.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works &#x0026; Contributions</title>
<sec id="s2_1">
<label>2.1</label>
<title>Related Works</title>
<p>Bawany et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] conducted an in-depth analysis of the potential benefits and adaptability challenges associated with integrating blockchain technology into the telehealth sector. Their research aims to develop a comprehensive telehealth framework called BlockHeal that integrates essential healthcare services using Blockchain to ensure privacy, security, and trust. By leveraging smart contracts, BlockHeal includes decentralized storage, secure data exchange, and various services like digital prescriptions, drug supply chain management, health insurance, and emergency services. Furthermore, Zhuang et al. [<xref ref-type="bibr" rid="ref-13">13</xref>] presented a thorough analysis of the significant enhancements that Blockchain brings to the exchange of healthcare data. They use Blockchain and smart contracts to ensure data security and data provenance and provide patients with control over their health records. They demonstrate the feasibility, stability, security, and robustness of the proposed model through a large-scale simulation, highlighting its potential to improve patient-centric data exchange. Furthermore, Sheela et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] examined the significant effect of blockchain technology on the healthcare sector, especially regarding security and privacy. Their outcomes suggest that Blockchain can significantly improve data integrity by guaranteeing that health records remain accurate and unaltered. This technology ensures nonrepudiation, meaning when data is recorded, it cannot be denied, hence increasing trust in the system. At this level, Puneeth et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] proposed a blockchain-based framework to secure Electronic Health Records (EHR) with patient-centric access control using smart contracts, integrating Blockchain&#x2019;s immutability and decentralization features with advanced cryptographic techniques. The framework uses a hybrid cryptographic algorithm for encryption and stores EHR data using off-chain storage known as InterPlanetary File System (IPFS). Furthermore, Boumezbeur et al. [<xref ref-type="bibr" rid="ref-16">16</xref>] proposed a blockchain-based framework for secure EHR sharing. The framework uses cryptographic techniques and smart contracts to manage access control and ensure data privacy. The framework shows efficient encryption and decryption times. It also ensures flexible access control by allowing patients to manage access to their health records. Nevertheless, the process for revoking access permissions might not be straightforward, potentially leading to unauthorized access if permissions are not updated. In addition, Tahir et al. [<xref ref-type="bibr" rid="ref-17">17</xref>] proposed a privacy-preserving and secure framework for sharing Electronic Health Records (EHRs) using blockchain technology. The framework leverages cryptographic techniques and smart contracts on the Ethereum blockchain to ensure secure storage and access control of EHRs. The system architecture includes three layers: data collecting, data storing, and data sharing, involving entities such as EHR owners, EHR users, cloud storage, and Blockchain. The framework aims to enhance data privacy, authenticity, integrity, confidentiality, flexible access control, and user authentication. However, the framework presents some limitations: access to data with unlimited time, automated user authentication without control from a legitimate authority, and no option to revoke authentication. Moreover, Shah et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] proposed an e-healthcare management system using the Internet of Things (IoT) and blockchain technologies. This aims to provide comprehensive, reliable, and secure services for patients. It also tries to address the challenges of providing low-cost and high-quality medical services, especially in the context of global aging. However, as patients store EHR data in the system, there is a risk of data loss, which challenges data integrity. Further, Li et al. [<xref ref-type="bibr" rid="ref-19">19</xref>] proposed a secure data-sharing system for electronic health (eHealth) systems. The framework, named TrustHealth, leverages blockchain technology and Trusted Execution Environments (TEEs) to improve eHealth security by ensuring data privacy, authenticity, integrity, and confidentiality. While it provides robust user authentication and access control through smart contracts and cryptographic techniques, it faces challenges such as the complexity of key management and potential vulnerabilities in smart contract design. Moreover, Mao et al. [<xref ref-type="bibr" rid="ref-20">20</xref>] presented a blockchain-based platform designed to enhance the management and sharing of medical data. The platform aims to address the challenges of data authenticity, security, and traceability in the medical field. Smart contracts are used for trusted storage and data authenticity verification. They manage user access control with predefined rules. Although the paper emphasizes data security, it could benefit from the integration of advanced privacy-preserving techniques, such as homomorphic encryption or differential privacy.</p>
<p>Furthermore, numerous studies have explored the integration of blockchain technology with the Internet of Things (IoT) [<xref ref-type="bibr" rid="ref-21">21</xref>&#x2013;<xref ref-type="bibr" rid="ref-25">25</xref>]. While these works highlight significant advancements and potential applications, they also reveal several limitations in terms of access control management, user authentication, data authenticity, and data ownership.</p>
<p>Furthermore, numerous research efforts have been undertaken to mitigate and address security and privacy-related issues within an Internet of Things environment through the application of blockchain technology, often referred to as Blockchain 4.0. For instance, Hameed et al. [<xref ref-type="bibr" rid="ref-26">26</xref>] present a comprehensive taxonomy of privacy and security requirements specifically adapted to Blockchain-based Industry 4.0 applications. They categorize these requirements into three distinct types: first, <bold>Confidentiality, Integrity, and Availability Triad.</bold> This one focuses on ensuring that data is kept confidential, remains unaltered, and is accessible when needed. Second, <bold>the Authentication, Authorization, and Accounting Triad</bold> is crucial for verifying the identities of users (authentication), determining their access rights (authorization), and keeping track of their activities (accounting). Third, <bold>securing smart contracts</bold> involves ensuring that they are free from vulnerabilities, function as intended, and cannot be tampered with. The integration of blockchain technology in IoT environments, as outlined in these categories, aims to create a more secure and trustworthy system. By addressing the CIA and AAA triads, along with securing smart contracts, Blockchain can significantly enhance the security and privacy of IoT applications. This approach not only protects data and ensures its integrity but also provides a transparent and accountable framework for managing access and interactions within the IoT ecosystem. Furthermore, our system will consider the above requirements to mitigate the aforementioned limitations in the literature. By incorporating advanced security measures, ensuring compliance with GDPR regulations, and leveraging Blockchain, we aim to enhance the privacy and security of patient data.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Contributions</title>
<p>This paper proposes an access management system that leverages blockchain technology. It aims to improve patient privacy and secure data within the telehealth and telemedicine sectors. The system seeks to record every single access to data in Blockchain, thereby providing patients with full control over their data and increased transparency regarding data sharing. With the General Data Protection Regulation (GDPR) in mind, this study aims to establish a patient-oriented system for access management. Moreover, the potential contributions of blockchain technology to the telehealth and telemedicine sectors motivate its application for dynamic access management. The characteristics of blockchain technology mitigate challenges in the existing systems. This suggested approach employs smart contracts for automating activities such as controlling access, identifying unallowed use, and adding or removing nodes from the system network based on their trustworthiness. The following section outlines the key enhancements that blockchain technology brings to our system:
<list list-type="bullet">
<list-item>
<p><bold>Security.</bold> Blockchain can guarantee patient data confidentiality and integrity, it also offers authenticity to data requestors.</p></list-item>
<list-item>
<p><bold>Persistency.</bold> Once access-related transactions are added to the Blockchain, they cannot be deleted or altered. Any blocks containing invalid access-related transactions can be instantly identified.</p></list-item>
<list-item>
<p><bold>Immutability.</bold> One of the most important aspects of blockchain technology is that it provides a record that cannot be altered and is time-stamped.</p></list-item>
<list-item>
<p><bold>Transparency.</bold> All access-related transactions are visible and auditable.</p></list-item>
<list-item>
<p><bold>Smart contract.</bold> It ensures the automatization of the access management process.</p></list-item>
</list></p>
<p>To ensure that our system solves the privacy and security issues, we proceed an evaluation process using formal security modeling framework (SeMF) [<xref ref-type="bibr" rid="ref-27">27</xref>], which is based on formal language theory. SeMF aims to validate the usability of our system to effectively address privacy and security issues. Moreover, SeMF stands for two main processes the formalization and the validation of the system&#x2019;s privacy and security properties.</p>
<p>Consequently, our work aims to provide two substantial contributions to the improvement of patient security and privacy, as follows:</p>
<p>1. This involves defining the proposed patient-centric access mechanism that satisfies the GDPR regulations and our security requirements, detailing the system&#x2019;s design and architecture, outlining all potential actions related to access management, and describing the proposed smart contracts, including their design goals.</p>
<p>2. This involves the formalization and validation of the system&#x2019;s privacy and security properties by applying the formal security modeling framework SeMF, performing the cost analysis, and comparing it with existing solutions.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Blockchain Overview</title>
<p>Blockchain consists of a series of blocks linked using unique hash values. Because of its decentralization, the system is not owned or controlled by a single entity. The key characteristics of blockchain technology include decentralization, transparency, persistence, immutability, and anonymity. Additionally, there are three types of Blockchain: permissionless, permissioned, and consortium. Permissionless enables anyone to join the network and have full access to stored records, while permissioned restricts access to data. The consortium is a hybrid solution between permissioned and permissionless, trusted and trustless networks. In a distributed system, a network of nodes uses consensus to validate and verify transactions in a conflict-free environment. In addition, the consensus is implemented using Lottery-based algorithms like Proof of Work (PoW) or Voted-based algorithms like Practical Byzantine Fault Tolerance (PBFT) [<xref ref-type="bibr" rid="ref-28">28</xref>]. Each approach is suitable for specific network dependencies. Lottery-based approaches involve lottery winners or miners broadcasting valid blocks to the network. This approach occasionally results in an unusual scenario if two lottery winners broadcast two valid blocks. The network will validate the longest chain [<xref ref-type="bibr" rid="ref-29">29</xref>]. On the other hand, voting-based approaches require the majority of nodes to validate transactions or blocks, providing low-latency finality but potentially compromising scalability and speed.</p>
</sec>
<sec id="s4">
<label>4</label>
<title>System Requirements</title>
<p>There are some security risks that come with telemedicine and telehealth systems. Our main concern is about how to manage access. In order to address this, the system needs to follow GDPR standards for managing access and data protection. Below, we provide a detailed explanation of the system requirements. Additionally, <xref ref-type="table" rid="table-1">Table 1</xref> presents the key notations used in this paper.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Notations and decripription</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Notation</th>
<th>Meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td>Di</td>
<td>Health-related data.</td>
</tr>
<tr>
<td>Ui</td>
<td>Patient who owns data.</td>
</tr>
<tr>
<td>ReFi</td>
<td>A unique number that refers to access.</td>
</tr>
<tr>
<td>Ri</td>
<td>Data requestor (i.e., Doctors, Hospitals, or Labs) who request access to access patient&#x2019;s data.</td>
</tr>
<tr>
<td>Pi</td>
<td>Purpose to accessing data Di.</td>
</tr>
<tr>
<td>Ni</td>
<td>Nature of data Di.</td>
</tr>
<tr>
<td>RA</td>
<td>The Regulatory Authority is known as the network governor (i.e., Healthcare Ministry).</td>
</tr>
<tr>
<td>Pki</td>
<td>User&#x2019;s public key.</td>
</tr>
<tr>
<td>Ski</td>
<td>User&#x2019;s private key.</td>
</tr>
<tr>
<td>Ai</td>
<td>The transaction performed by a user includes Di, as i refers to the index.</td>
</tr>
<tr>
<td>t</td>
<td>The period of time in which the access is valid.</td>
</tr>
<tr>
<td>&#x03BB;</td>
<td>User&#x2019;s local view.</td>
</tr>
<tr>
<td>&#x03C9;</td>
<td>A series of actions.</td>
</tr>
<tr>
<td>&#x0393;</td>
<td>A list of actions.</td>
</tr>
<tr>
<td>P</td>
<td>All users in the system.</td>
</tr>
<tr>
<td>L</td>
<td>Set of banned users by RA.</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s4_1">
<label>4.1</label>
<title>Security</title>
<p>Ensuring security is a fundamental aspect of our system, as it is paramount for establishing and maintaining trustworthiness in the system. According to [<xref ref-type="bibr" rid="ref-26">26</xref>], the security requirements can be outlined here:
<list list-type="bullet">
<list-item>
<p><bold>Confidentiality.</bold> This is the key security requirement of any application or system designed to protect patient data Di from unauthorized access or potentially malicious users. In other respects, there is a potential risk of compromising patient privacy. Di may include identifiers, which are considered as sensitive information.</p></list-item>
<list-item>
<p><bold>Integrity.</bold> This feature guarantees the authenticity and reliability of Di, effectively preventing malicious users from tampering with stored Di in databases or communicating Di over the network. Furthermore, any Di received by a healthcare provider is equal to the Di provided by the patient.</p></list-item>
<list-item>
<p><bold>Availability.</bold> For instance, even in the case of a network attack, the system should sustain operation at the system level, and Di access at the transaction level can be made available to authorized users without failing, being inaccurate, or being distorted. In other words, the system should guarantee to users P access to resources, as well as Di involved in the process of performing actions A1,&#x2026;, An.</p></list-item>
<list-item>
<p><bold>Authentication.</bold> This constitutes an initial security layer, as it prevents the identification of users P. Thus, each time a user1 performs an action A1, the sender&#x2019;s identity must be verified for user2 in order to safely receive A1 and other related D1.</p></list-item>
<list-item>
<p><bold>Authorization.</bold> This denotes that only authorized users are able to perform actions A1, &#x2026;, An in the system. Moreover, it prevents unauthorized ones to perform actions A1, &#x2026;, An or access Di which improves system security.</p></list-item>
<list-item>
<p><bold>Nonrepudiation.</bold> This requirement is essential for the system, ensuring that all users P cannot repudiate the sending or receiving of any action Ai.</p></list-item>
<list-item>
<p><bold>Accountability.</bold> This is a critical requirement for most blockchain-based systems because users can act as adversaries in the network and engage in fraudulent activities such as unauthorized access to critical data Di. Moreover, accountability enables Ui to monitor Ri, who accessed data Di unlawfully and reports it back to the Regulatory Authority RA. The authenticity and nonrepudiation can thus be proven through accountability.</p></list-item>
</list></p>
<p>In the upcoming section, the SeMF will formalize these security requirements in detail.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Privacy</title>
<p>To ensure compliance with the General Data Protection Regulation [<xref ref-type="bibr" rid="ref-6">6</xref>], our proposed system must satisfy the following access management requirements:
<list list-type="bullet">
<list-item>
<p><bold>Unambiguous.</bold> Access must be granted through clear and affirmative action to prevent any ambiguity.</p></list-item>
<list-item>
<p><bold>Informed.</bold> The data owner must provide comprehensive information regarding the use of their data.</p></list-item>
<list-item>
<p><bold>Freely given.</bold> Individuals must freely and voluntarily give their consent. It is necessary that data owners remain informed of all potential consequences of their access.</p></list-item>
<list-item>
<p><bold>Specific.</bold> Requests for access must have an explicit objective and be specific. As a result, the person whose data is being processed must be notified of why and how their data is used.</p></list-item>
<list-item>
<p><bold>Auditable.</bold> The recording of all access data is required to facilitate further audits and to provide legal evidence if necessary.</p></list-item>
<list-item>
<p><bold>Withdrawable.</bold> The data owner must have the ability to revoke or withdraw previously granted access.</p></list-item>
<list-item>
<p><bold>Explicit.</bold> Access requests should be clear and informative, specifying the purpose of the request and the data being requested.</p></list-item>
</list></p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Transparency</title>
<p>Transparency is a fundamental requirement for any system designed to ensure lawful actions and prevent non declared activities that could compromise patient privacy. It is imperative that patients are informed about all actions related to the access of their data once they have granted permission to healthcare providers (Ri). To ensure transparency, the system permanently records every activity, making it accessible at any time.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>System Architecture</title>
<p>The current section presents our proposed patient-centric access mechanism, as well as the design and architecture of the system, all possible actions related to access management, and proposed algorithms that enable the decision-making mechanism. In this system, three types of participants are considered: Regulatory Authority (RA), Data Requestor (Ri), and Patient (Ui). Furthermore, <xref ref-type="fig" rid="fig-2">Fig. 2</xref> illustrates an ideal scenario of the system where we assume that all participants are authenticated. From Steps 1.1 to 1.3, Ri requests access to data through SC1. SC1 checks Ri&#x2019;s legitimacy to access the system. Once legitimacy is checked, SC3 sends an access request to Ui through the blockchain network with sufficient information about the data requestor and usage. In Step 2, SC2 is triggered to transfer measured data to decentralized storage such as IPFS. From Steps 3.1 to 3.3, Ui grants access to data with a limited time t for usage. From Steps 4.1 to 4.5, the Data requestor accesses patient data. SC4 checks access validity and sends all access activities to Ui. SC4 triggers SC3 to change access status from granted to revoked once t expires. In Step 5, RA bans a Data requestor. Moreover, we define the local views &#x03BB; (send and receive actions) of every participant which will use them later for security proof.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>System architecture</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_60143-fig-2.tif"/>
</fig>
<p><list list-type="bullet">
<list-item>
<p><bold>Regulatory Authority (RA).</bold> RA could be a public healthcare organization (Healthcare Ministry) that has a neutral position and acts in the public interest. In our system, RA is responsible for checking the user&#x2019;s identity and providing a node that performs authenticated actions in the system. The system incorporates multiple security layers, with RA serving as the initial layer. Further, unauthorized nodes are not eligible to request access or perform transactions. Hence, they could not attack the network or attack smart contracts. RA has two sending actions: add authorized nodes or ban existing nodes, and one receiving action from Ui that reclaims unlawful access from Ri.</p></list-item>
<list-item>
<p><bold>Data Requestor (Ri).</bold> This stands for the healthcare provider, which could be a hospital, a doctor, etc. Ri can request access to the patient&#x2019;s data Di. In our system, Ri has one sending action: access request to access patient&#x2019;s data Di (Note: Ri is able to access stored data or request measuring new data by means of wearable devices). In addition, Ri has two receiving actions: the decision made by the patient to access data Di (grant/Revoke) and notification related to withdrawn access ReFi (A unique number that refers to access).</p></list-item>
<list-item>
<p><bold>Patient (Ui).</bold> Patient is the data owner who can control and manage access to their data Di (Access manager). In our system, the patient has two sending actions: grant/Revoke access request to access data and revoke/withdraw a current access ReFi. Additionally, Ui has one receiving action access request made by Ri. <xref ref-type="table" rid="table-2">Table 2</xref> summarizes the actions of every participant in the send and receive.</p>
</list-item>
</list></p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Local view summary</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Participants</th>
<th>Send actions</th>
<th>Receive actions</th>
</tr>
</thead>
<tbody>
<tr>
<td>Patient (Ui)</td>
<td>Grant/Revoke access request; Withdraw a current access ReFi.</td>
<td>Access request made by Ri.</td>
</tr>
<tr>
<td>Data Requestor (Ri)</td>
<td>Access request to access patient&#x2019;s data Di.</td>
<td>Patient&#x2019;s decision; Withdrawn access to ReFi.</td>
</tr>
<tr>
<td>Regulatory Authority (RA)</td>
<td>Add authorized nodes; Ban existing nodes.</td>
<td>Ui claims unlawful access from Ri.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Note:</bold> These actions will be recorded in an immutable ledger (Blockchain) to ensure trust among users (Transparency and accountability).</p>
<sec id="s5_1">
<label>5.1</label>
<title>Formalizing the Possible Actions</title>
<p>The blockchain built-in features record all performed actions A1, &#x2026;, An in an immutable ledger and make them viewable and auditable to all authentic users P. Therefore, this feature makes the system more reliable and transparent to all acting users. Moreover, the users will be more informed about what happens in the system based on their own local. In addition, <xref ref-type="table" rid="table-3">Table 3</xref> summarizes all the possible access-related actions A1, &#x2026;, An. Hence, all these actions can be formalized as it consists of three main parts: <underline>Action</underline>, Entity (Ui, Ri), and Parameters.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Possible access-related actions</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Actions (Ai)</th>
<th>Meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td>Access request</td>
<td rowspan="2"><inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> Sends access requests to access patients&#x2019; data or measure new data.</td>
</tr>
<tr>
<td>(<underline>SendAccessRequest</underline>, <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (AccessToAccess/AccessToMeasure, ReFi))</td>
</tr>
<tr>
<td>(<underline>ReceivedDecision</underline>,<inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (<inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, AccessToAccess/AccessToMeasure, ReFi))</td>
<td>On the other hand, <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> receives the access request and makes the access decision.</td>
</tr>
<tr>
<td>Access response</td>
<td><inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> Sends access response to <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>(<underline>SendAccessResponse</underline>, <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (AccessDecision ReFi))</td>
<td rowspan="2">On the other hand, <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> receives access response and processes the access decision made by <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>(<underline>ReceivedResponse</underline>, <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (<inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, AccessDecision, <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mrow><mml:mtext>ReFi</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>))</td>
</tr>
<tr>
<td>Access-Report</td>
<td rowspan="3">Once <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is granted access to the patient&#x2019;s data, BC/<inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> sends all activities related to access <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> to <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>(<underline>SendDataAccessRepor</underline>t, <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (AccessActivitiesUpdates, ReFi))</td>
</tr>
<tr>
<td>(<underline>ReceiveDataAccessReport</underline>, <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (<inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, AccessActivitiesUpdates, <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mrow><mml:mtext>ReFi</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>))</td>
</tr>
<tr>
<td>Withdraw access</td>
<td rowspan="3">Once <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> sends a revoke/withdraw decision of access with ReFi. Then, <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> gets notified of the access withdrawal decision made by <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>(<underline>SendRevokeAccess</underline>, <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (RevokeAccess, ReFi))</td>
</tr>
<tr>
<td>(<underline>ReceivedRevokeAccess</underline>, <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, (<inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, RevokeAccess, ReFi))</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Smart Contract Design for System Functioning</title>
<p>This section covers the suggested smart contract SCi, which initially consists of verifying the data requestor&#x2019;s authenticity and the legitimacy of the accessing activities. Additionally, it is for the purpose of automatically switching access status based on a withdrawal decision made by the patient or expiration of the defined period of time t. Furthermore, it is used to transfer measured data Di to decentralized storage. The system design includes the following four smart contracts to accomplish this objective:
<list list-type="bullet">
<list-item>
<p><bold>Smart Contract 1 (SC1).</bold> It first verifies the identity of users, particularly healthcare providers (Ri). Additionally, the Regulatory Authority (e.g., the Healthcare Ministry) acts as the smart contract owner. The RA has the ability to add new users or ban existing ones. The output is recorded in the Blockchain to identify the trusted and banned users. Therefore, based on the SC1 property that provides trustworthiness and authenticity to users, the design goal can be formalized as follows:</p></list-item>
</list></p>
<p><bold>Design Goal 1.</bold> <italic>It is authentic for Ui that actions Ai...An are performed by authentic and trustful users (Authentication)</italic>.
<list list-type="bullet">
<list-item>
<p><bold>Smart Contract 2 (SC2).</bold> It takes the data hash, the date and time of data measurement, and other relevant details as input parameters. The output is stored in the Blockchain. Then, the measured data is stored off-chain. As a result, the data&#x2019;s authenticity is verified through blockchain. Therefore, the design goal can be formalized as follows:</p></list-item>
</list></p>
<p><bold>Design Goal 2.</bold> <italic>It is authentic for Ui that the measured data by the wearable health-based devices remain the same when transferred to the decentralized storage (Data integrity)</italic>.</p>
<p><bold>Design Goal 3.</bold> <italic>It must be authentic for Ri that the received data is the data that Ui transferred to the decentralized storage and was measured using Ui&#x2019;s health-based devices (Data authenticity)</italic>.
<list list-type="bullet">
<list-item>
<p><bold>Smart Contract 3 (SC3).</bold> It allows healthcare providers to request permission to access data. Additionally, it enables patients Ui to grant access by setting a time limit <italic>t</italic> or to revoke/withdraw current access to ReFi. The smart contract SC3 can automatically revoke access once the specified period t has expired. Therefore, access will be unlawful. Once the healthcare provider requests access, SC3 triggers SC1 to ensure that Ri is not a banned user, and then Ui receives the request. The output is stored in the Blockchain. Therefore, the design goal is as follows.</p></list-item>
</list></p>
<p><bold>Design Goal 4.</bold> <italic>Each granted access is authentic for all users &#x2208; P, and remains valid until t is expired or Ui revokes access ReFi (Access authenticity)</italic>.
<list list-type="bullet">
<list-item>
<p><bold>Smart Contract (SC4).</bold> It checks the validity of accessing Di by Ri based on access ReFi. It enables the system to detect unlawful access. SC4 is triggered, once Ri initiates an action Ai to access data. SC4 takes SC1&#x2019;s output as an input, and the access ReFi.</p></list-item>
</list></p>
<p><bold>Design Goal 5.</bold> <italic>It must be authentic for Ui that Ri can access data uniquely based upon the access ReFi (Data confidentiality)</italic>.</p>
<p>Note: Ri is authenticated by the Regulatory Authority (RA), once joining the system. Hence, Ri can perform transactions by sending access request through blockchain account to user Ui (Patient) who is the owner of data Di. Further, Ui receives access request and sends back access decision (Grant/Revoke) to data requestor Ri via blockchain account.</p>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>System Process</title>
<p>The sequence diagram provided in <xref ref-type="fig" rid="fig-3">Fig. 3</xref> highlights the step-by-step access request process. In addition, before Ri performs any transaction, SC1 is automatically executed to report if Ri is a trusted or banned user. If Ri is banned, action Ai becomes invalid. On the other hand, if Ri is a trusted user, action Ai becomes valid, and Ri is allowed to request access such as follows:</p>
<p><list list-type="bullet">
<list-item>
<p><bold>Step 1.1:</bold> Healthcare provider Ri performs and signs a transaction (Ai action or a set of actions A1&#x2026;An) through blockchain account to request access to Ui&#x2019;s data Di or start measuring new data Di. The transaction contains many input parameters, such as Pi purpose to access Di, data type, Ni nature (Old or new data Di), and time t required to access data.</p></list-item>
<list-item>
<p><bold>Step 1.2:</bold> After the transaction is being signed by Ri, it will be propagated through the network for validation. Then, it is recorded on the Blockchain within a new block after reaching consensus among nodes.</p></list-item>
<list-item>
<p><bold>Step 1.3:</bold> The patient Ui checks the access request after it is received and verified by their Ui blockchain account.</p></list-item>
<list-item>
<p><bold>Step 2:</bold> Ui decides whether to grant or Revoke the request based on inputs delivered by Ri.</p></list-item>
<list-item>
<p><bold>Steps 3.1 and 3.2:</bold> The decision made by Ui is sent to Ri for notification, and stored within a block in the ledger (If Ui grants access, a reference number ReFi is automatically generated in order to be used by Ri as input in SC4.)</p></list-item>
<list-item>
<p><bold>Step 3.3:</bold> Ri receives the decision through a transaction Ai performed by Ui via blockchain network. The Ri&#x2019;s blockchain account receives and verifies it in order to be presented to Ri.</p></list-item>
</list></p>

<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Step-by-step access process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_60143-fig-3.tif"/>
</fig>
<p>Furthermore, following to Step 3.3, <xref ref-type="fig" rid="fig-4">Fig. 4</xref> illustrates the process by which the validity of accessing data is checked according to patient Ui&#x2019;s decision (Grant/Revoke). SC4 ensures the enrolment of this process. As a result, it satisfies DG5.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Access activity process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_60143-fig-4.tif"/>
</fig>
<p><list list-type="bullet">
<list-item>
<p><bold>Step 4.1:</bold> Once Ri receives the Ui&#x2019;s decision with valid access ReFi, Ri can access measured data Di or measure new data using Ui&#x2019;s devices for a predefined period of time t. Furthermore, Ui is informed of all access activities, with sufficient details of what actions performed by Ri.</p></list-item>
</list></p>
<p>Note: Ri can only access newly measured data Di until it is stored in the decentralized storage database.
<list list-type="bullet">
<list-item>
<p><bold>Steps 4.2 and 4.3:</bold> Once Ri performs a transaction, Ai through the network in order to access Di. Ui receives an access report to their blockchain account.</p></list-item>
<list-item>
<p><bold>Steps 5.1 and 5.2:</bold> At this stage, SC4 is automatically executed to check access validity or inappropriate behavior by Ri. SC4 output is recorded in the chain. To this end, SC4 ensures that DG4 is held in the system.</p></list-item>
<list-item>
<p><bold>Steps 6.1 and 6.2:</bold> If SC4 &#x2018;s output is invalid, RA initiates a transaction Ai to execute SC1 to ban Ri from the system. SC1 output is recorded in the chain. To this end, SC1 ensures that DG1 &#x0026; DG5 are held in the system.</p></list-item>
</list></p>
<p>In addition, according to GDPR, Patient Ui is able to revoke/withdraw granted access ReFi at any time. Then, Ri will automatically get notified of the patient&#x2019;s new decision following the steps below:
<list list-type="bullet">
<list-item>
<p><bold>Step 1.1 Revoke:</bold> Ui revokes the granted access ReFi to Ri.</p></list-item>
<list-item>
<p><bold>Step 1.2 Revoke and 1.3 Revoke:</bold> Ui initiates a withdrawal transaction Ai and sends it back to Ri via the blockchain account.</p></list-item>
<list-item>
<p><bold>Steps 1.4 Revoke:</bold> Ri gets notified of the decision to revoke the access via blockchain account after being received and verified.</p></list-item>
<list-item>
<p><bold>Steps 2.1 Revoke and 2.2 Revoke:</bold> At this stage, SC3 is automatically executed if t is expired. SC3 changes access status to invalid. Hence, these steps enable DG4 to be held in the system.</p></list-item>
<list-item>
<p><bold>Step 2.3 Revoke:</bold> The new access status is recorded within a block in the ledger for a later audit trail.</p></list-item>
</list></p>
</sec>
<sec id="s5_4">
<label>5.4</label>
<title>The System Trustworthiness</title>
<p>This section discusses the trustworthiness of the system through the trust assumptions made based on blockchain technology properties, which can be utilized for the formalization and validation of the system&#x2019;s security properties by applying the security modeling framework SeMF. Further, the term trustworthiness expresses the degree to which a particular trust assumption is achieved through the system properties [<xref ref-type="bibr" rid="ref-26">26</xref>]. As discussed earlier, the system design includes three main users P: Ui, Ri, and RA, with a unique local view &#x03BB; by which users interact with the system. Further, the patient is the data Di owner and can share their health-related data with only trusted users Ri. For example, the patient has full trust in the system&#x2019;s properties, their data Di cannot be shared with unreliable users, and the patient is able to revoke access at any time. Hence, the system&#x2019;s trustworthiness proves the authenticity of all access-related actions that are performed by an authentic user, and all access-related data is permanently stored. To this end, the built-in blockchain features can contribute effectively to ensure our system&#x2019;s trustworthiness. These features include authenticity, integrity, availability, nonrepudiation, ledger immutability, auditability, etc. Therefore, Blockchain provides an immutable and transparent record of all access-related transactions that occur. Hence, it ensures trust in results shown to the users even after a series of actions &#x03C9;.</p>
<p>However, in a public blockchain, all data and transactions that are recorded within blocks can be visible to all nodes in the network, which presents some privacy issues. As a result, health-related data or any sensitive data cannot be recorded in the ledger. This issue was addressed in the proposed system, to store all health-related data or other sensitive data in a decentralized storage database such as IPFS [<xref ref-type="bibr" rid="ref-11">11</xref>] in an encrypted form with the use of encryption methods such as the homomorphic encryption approach [<xref ref-type="bibr" rid="ref-30">30</xref>] or Advanced Encryption Standard same as implemented in [<xref ref-type="bibr" rid="ref-31">31</xref>]. Furthermore, other ways of storage can be explored such as introduced in [<xref ref-type="bibr" rid="ref-32">32</xref>] Blockchain-based medical health record access control scheme with efficient protection mechanism and patient control. That relies on a server cloud with the use of a proxy re-encryption scheme to enhance data security. In our system, only access-related transactions are stored in the ledger. Further, to strengthen the security of the system, RA, by means of SC1, works as the first security layer to add only trusted nodes and ban untrusted ones.</p>
<p>Moreover, the key characteristics of Blockchain especially those based on cryptography can contribute positively to enhance the system&#x2019;s security and ensure privacy. The trust assumptions relaying on Blockchain&#x2019;s security properties.</p>
<p><bold>Trust assumption 1.</bold> <italic>All received actions A1&#x2026;An from Blockchain are whether previously performed and signed by authentic users P or by triggered SCi once a set of conditions are met (Authenticity/Digital signature/Smart contract)</italic>.</p>
<p><bold>Trust assumption 2.</bold> <italic>All added actions A1&#x2026;An to the chain must be authentic (Authenticity)</italic>.</p>
<p><bold>Trust assumption 3.</bold> <italic>Any measured data by the wearable health-based devices remains the same when transferred to the decentralized storage. It is achieved by the mean of hash value stored in the Blockchain (Data Integrity)</italic>.</p>
<p><bold>Trust assumption 4.</bold> <italic>Any transaction-related data shown on the user&#x2019;s blockchain account must be previously transferred to Blockchain and signed by an authentic user or a smart contract (Authenticity/Digital signature)</italic>.</p>
<p><bold>Trust assumption 5.</bold> <italic>Once a user &#x2208; P performs a transaction and sends it through the network, the transaction-related data remains unchangeable once added to the chain within a new block (Authenticity/Integrity)</italic>.</p>
<p><bold>Trust assumption 6.</bold> <italic>SCi can be automatically executed once certain conditions are met (Automation/Smart contract)</italic>.</p>
<p><bold>Trust assumption 7.</bold> <italic>All performed A1&#x2026;An are timestamped and permanently added to a chain within a block following a certain order. The block is validated and linked to the last block in the chain by the mean of a consensus algorithm (Timestamp/Order proof)</italic>.</p>
<p><bold>Trust assumption 8.</bold> <italic>Every node in the network keeps a copy of the whole ledger (Distribution/Immutability/Proof of evidence)</italic>.</p>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>The Security Properties &#x0026; GDPR Compliance</title>
<p>As stated previously in <xref ref-type="sec" rid="s5">Section 5</xref>, the security modelling framework SeMF [<xref ref-type="bibr" rid="ref-27">27</xref>] is primarily targeting the modelling and validating the security properties. This framework uses formal languages and is independent of specific representations of the system [<xref ref-type="bibr" rid="ref-27">27</xref>]. Further, SeMF has introduced a variety of formal definitions regarding the security properties among others Authentication and Proof of authenticity. Those definitions are used alongside this section to formally prove that the defined design goals are held.</p>
<sec id="s6_1">
<label>6.1</label>
<title>Authentication</title>
<p>The purpose of authentication is to verify users&#x2019; identities within the system and to guarantee that actions A1, &#x2026;, An are authentic. The authentication property is formalized and validated using the following two definitions:</p>
<p>1-A set of actions &#x0393; &#x2286; 
<inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mo>&#x2211;</mml:mo></mml:math></inline-formula> is authentic for P &#x2208; &#x2119; after a sequence of actions &#x03C9; &#x2208; B with respect to WP if alph(x) &#x2229; &#x0393; &#x003D; &#x2205; for all x &#x2208; &#x03BB; &#x2212; 1 P (&#x03BB;P(&#x03C9;)) &#x2229; WP.</p>
<p>2-For a system S with behaviour B &#x2286; 
<inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mo>&#x2211;</mml:mo></mml:math></inline-formula>&#x2217;, user P &#x2286; &#x2119;, and actions a, b &#x2208; 6, auth(a, b, P) holds in B if for all &#x03C9; &#x2208; B, whenever b &#x2208; alph(&#x03C9;), the action a is authentic for P.</p>
<sec id="s6_1_1">
<label>6.1.1</label>
<title>Formalization</title>
<p>The defined smart contract SC1 works as the first security layer of the system, which helps the Regulatory Authority RA to establish an identity verification before adding new users to the system. By doing so, any blockchain type, public or private, can be implemented in the system. Further, in our proposed system, all users &#x2208; P are verified by RA. Hence, every user &#x2208; P and SCi has a blockchain account, which works as a middle interface between the user and the system. Every user &#x2208; P needs to acquire a blockchain account that holds (Ski, Pki) pairs [<xref ref-type="bibr" rid="ref-28">28</xref>]. The account enables the user to perform new transactions and sign them using the secret key Ski. Further, the performed transaction is validated by the blockchain network using the user&#x2019;s public key Pki (Authentication verification). Then, the transaction is added to the Blockchain within a block and linked to the last block once consensus is reached (Trust assumptions 7 and 8).</p>
</sec>
<sec id="s6_1_2">
<label>6.1.2</label>
<title>Validation of Authentication</title>
<p>As stated above, every user &#x2208; P has a blockchain account, which enables the user to perform the validation process of the digital signature. As a result, the user&#x2019;s blockchain account validates the authenticity. Further, the blockchain network checks the origin of the transaction and adds only digitally signed transactions with the user&#x2019;s secret key Ski (Trust assumption 4). Further, every user in the system can hold only one blockchain account. Users can claim ownership of an account through Ski. Further, every blockchain account has an address created using Pki, which is used to identify the users P in the system [<xref ref-type="bibr" rid="ref-28">28</xref>]. Further, once Ri performs an action Ai, it is necessary to be signed only with Ri&#x2019;s secret key (It needs to be kept secret and not shared with anyone). Then, it will be verified by SCi&#x2019;s blockchain account using Ri&#x2019;s public key and presented to the patient. Hence, from the blockchain perspective, it is necessary to ensure that the performed action Ai is authentic and originated from an authentic user.</p>
<p>The proposed system&#x2019;s design goals DG1 and DG4 are ensured by built-in features of the Blockchain, among others, the digital signature (<bold>Trust assumptions 1 and 4</bold>). Further, the same applies to DG1 and DG 3, where the authenticity of all sets of action trust is assumed (<bold>Trust assumptions 2, 5, and 7</bold>).</p>
</sec>
<sec id="s6_1_3">
<label>6.1.3</label>
<title>Authentic Actions</title>
<p>As stated above, every user &#x2208; P has a local view &#x03BB;. Further, the user can check only his own sent and received actions A1&#x2026;An. Hence, their authenticity is equivalent to <bold>Auth(Send, Receive, user).</bold> Stated otherwise, if an action occurs in a sequence of actions &#x03C9;, then the user can legitimately claim that action Send occurred before action Receive. Therefore, the authenticity of the aforementioned actions is verified using Definitions 1 and 2 of the SeMF.</p>
<p><bold>Note:</bold> user1 is denoted as the sender, while user2 is the receiver.</p>
<p><bold>Proposition 1.</bold> <italic>User1&#x2019;s matching sent action Send is authentic if user2 executes the received action Receive</italic>.</p>
<p><bold>Proof of Proposition 1.</bold> The authenticity of the actions can be verified using the trust assumptions 1, 2, 5, and 7. In this part, only one received action example is used for proof of concept, as the same can be applied to the rest of the actions. Moreover, whenever user1 (Ri) sends access request action Send, the user1 authenticity is verified to user2 (Ui) via SC1 before Ui performs the received action Receive (ReceivedDecision, Ui, (Ri, AccessToAccess/AccessToMeasure, ReFi)). As a result, the authentic send action Send for Ui is (SendAccessRequest, Ri, (AccessToAccess/AccessToMeasure, ReFi)), which is denoted as a set of actions &#x0393; in this case. In other words, it must be authentic for all series of actions &#x03C9; that include action Receive. As a result, Proposition 1 can be validated as follows:
<list list-type="bullet">
<list-item>
<p>Once user2 receives action Receive then the matching action Send performed by user1 was already recorded in the Blockchain (<bold>Trust assumptions 1 and 7</bold>).</p></list-item>
<list-item>
<p>When user1 adds the action Send, then it is authentic (<bold>Trust assumption 2</bold>).</p></list-item>
<list-item>
<p>When an action is authentic, the data that is transmitted and received are identical (<bold>Trust assumption 5</bold>).</p></list-item>
</list></p>
<p>Moreover, DG3 is achieved. Below is how to formalize this:</p>
<p>Auth(SendAccessRequest(AccessToAccess/AccessToMeasure, ReFi), ReceivedDecision(Access ToAccess/AccessToMeasure, ReFi), Ui)</p>
<p><bold>Note:</bold> Proof 1 can apply to all potential sent and received actions in the system.</p>
<p>Moreover, trust assumptions 6, 7, and 8 can guarantee that DG1, DG4, and DG5 hold in the system. They allow all performed actions in the system to be recorded on a distributed ledger in the form of linked blocks. Hence, the trust assumptions provide secure and reliable data storage and make all actions transparent and auditable to all users &#x2208; P. As a result, every user &#x2208; P can have an expandable knowledge of the system&#x2019;s actions denoted as &#x03B5; beyond the user&#x2019;s local view &#x03BB;. Moreover, according to trust assumption 6, the smart contract&#x2019;s characteristics of reliability and inevitability proved that DG1, DG4, and DG5 are held in the system.</p>
<p><bold>Proposition 2.</bold> <italic>The action Send associated with the smart contract is authentic if user B executes the action Receive</italic>.</p>
<p><bold>Proof of Proposition 2.</bold> Proposition 2 is validated the same way as Proposition 1 was validated. Hence, the trust assumptions 1, 3, 5, 6, and 7 are best describing user2&#x2019;s initial knowledge W2.
<list list-type="bullet">
<list-item>
<p>When user2 performs action Receive, the corresponding action Send is recorded in the distributed ledger which is sent by smart contract in form of a transaction (<bold>Trust assumptions 1 and 7</bold>).</p></list-item>
<list-item>
<p>When smart contract adds the action Send, then it is authentic (<bold>Trust assumptions 3 and 6</bold>).</p></list-item>
<list-item>
<p>When an action is authentic, the data that is transmitted and received are identical (<bold>Trust assumption 5</bold>).</p></list-item>
</list></p>
<p>To this end, since DG4 and DG5 are held in the system, SC3 and SC4 are used.</p>
</sec>
</sec>
<sec id="s6_2">
<label>6.2</label>
<title>Proof of Authenticity</title>
<p>To formalize and validate the proof of authenticity in order to prove the system&#x2019;s authorization, nonrepudiation, and integrity properties. The SeMF&#x2019;s Definition 3 is used as follows:</p>
<p><bold>Definition 3 (Proof of authenticity).</bold> For a system S with behavior B &#x2286; &#x03A3;&#x2217; and actions a, b &#x2208; &#x03A3;, precede(a, b) holds in S if for all &#x03C9; &#x2208; B with b &#x2208; alph(&#x03C9;), it follows that a &#x2208; alph(&#x03C9;).</p>
<p><bold>Proposition 3.</bold> <italic>If user2 performs the action Receive, user2 must have access to proof in order to show other users that the matching sent action Send occurred prior to the received action Receive</italic>.</p>
<p><italic>Blockchain functions as a proof of evidence, by ensuring that all associated data and transactions are permanently recorded in a distributed ledger. Due to its design, Blockchain is immutable and cannot be altered without affecting all subsequent blocks in the network. It offers also timestamped records. These inherent features of Blockchain, such as immutability and nonrepudiation, enable us to leverage assumptions 7 and 8 for proof of authenticity</italic>.</p>
<p><bold>Proof of Proposition 3.</bold> Proposition 3 is validated the same way as Proposition 1 was validated. Hence, the aforementioned assumptions 7 and 8 are best describing user2&#x2019;s initial knowledge W2.
<list list-type="bullet">
<list-item>
<p>User2 can retrieve the recorded transaction-related data associated with the action Receive after receiving the action (<bold>Trust assumption 8</bold>).</p></list-item>
<list-item>
<p>Once user2 can access the recorded transaction-related data associated with the action Receive then user2 can prove the action Send has occurred before the action Receive (<bold>Trust assumption 7</bold>).</p></list-item>
</list></p>
<p>Consequently, the properties of nonrepudiation, integrity, and authority are proven by formalizing and verifying the proof of authenticity.</p>
</sec>
<sec id="s6_3">
<label>6.3</label>
<title>Implementation</title>
<p>In our implementation, we used the Ethereum development tool Remix IDE. Additionally, smart contracts code is written in the Ethereum programming language Solidity. The smart contracts code has passed the security analysis with the help of Remix IDE built-in security tool and Mythril tool. In our testing case, we consider that all system participants have their own Ethereum addresses, and the smart contracts are deployed and owned by the Regularity Authority. The performance was tested on the Sepolia testnet, which has an average transaction time of 13 s. The following table summarizes the gas consumption of each function call. Thus, the experimental results have demonstrated the efficiency of the system in terms of time and cost savings, as shown in <xref ref-type="table" rid="table-4">Table 4</xref>.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Gas consumption analysis</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Function</th>
<th>Gas consumption</th>
</tr>
</thead>
<tbody>
<tr>
<td>SC1: Add_user()</td>
<td>123,005</td>
</tr>
<tr>
<td>SC1: Ban_user()</td>
<td>40,568</td>
</tr>
<tr>
<td>SC2: Add_file()</td>
<td>141,456</td>
</tr>
<tr>
<td>SC3: Send_access_request()</td>
<td>131,890</td>
</tr>
<tr>
<td>SC3: Send_access_decision()</td>
<td>119,012</td>
</tr>
<tr>
<td>SC3: Revoke_access()</td>
<td>59,836</td>
</tr>
<tr>
<td>SC4: Check_access_validity()</td>
<td>70,698</td>
</tr>
<tr>
<td>SC4: Send_access_activity()</td>
<td>83,461</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_4">
<label>6.4</label>
<title>GDPR Compliance</title>
<p>Having established the necessity of employing SC3 and SC4 based on the formal definition of SeMF, including authentication, the following section delves into the compliance of our proposed solution with the General Data Protection Regulation (GDPR) as outlined in <xref ref-type="sec" rid="s5">Section 5</xref>. By using SC3 and SC4, we ensure that our system meets the standards of the GDPR. This compliance is crucial for establishing trust and confidence among users.</p>
<p>In the following subsections, we will explore in detail how our system adheres to GDPR regulations of data protection and privacy:
<list list-type="bullet">
<list-item>
<p><bold>Unambiguous:</bold> By eliminating any ambiguity regarding the period of access SC3 guarantees that access is granted for a specified duration t. This precise time-bound access control is crucial for maintaining data security and user trust.</p></list-item>
<list-item>
<p><bold>Informed:</bold> By using SC3, it guarantees to the patient a comprehensive information regarding the purpose for which their data is being utilized and the identity of the individual or entity requesting access. This transparency empowers patients to make well-informed decisions about their personal data.</p></list-item>
<list-item>
<p><bold>Freely given:</bold> In order to guarantee that access is granted voluntarily and without any kind of force, the patient has the entirety of right for denying the request. This aspect is guaranteed by SC3.</p></list-item>
<list-item>
<p><bold>Specific:</bold> The use of SC3 allows the patient to be informed about the specific nature of the data being requested and the precise purpose for which it is needed. Additionally, SC4 facilitates the patient&#x2019;s awareness of when their data is accessed and by whom, thereby enhancing accountability and trust.</p></list-item>
<list-item>
<p><bold>Auditable:</bold> The Blockchain is used to systematically record all transactions, making it possible to retrieve them at any given moment for the purpose of eventual verification. This feature guarantees complete traceability and transparency, which are crucial for regulatory compliance and building trust among stakeholders. The immutable nature of blockchain technology provides an indelible record of all activities, facilitating audits and investigations with ease and precision. This capability not only enhances accountability but also supports the integrity of the data management process, ensuring that all actions can be traced back to their origin.</p></list-item>
<list-item>
<p><bold>Withdrawable:</bold> The implementation of SC3 empowers patients with the ability to withdraw or revoke access to their data at any time. This mechanism also guarantees valid access for the predetermined period (t), thereby offering flexibility and control over personal data. Such a feature is vital for adapting to changing circumstances and maintaining the autonomy of patients over their own data. It also underscores the importance of dynamic consent management, by allowing patients to modify their consent preferences as needed, SC3 supports a responsive and patient-centric approach to data privacy.</p></list-item>
<list-item>
<p><bold>Explicit:</bold> SC3 guarantees that patients are explicitly informed about the data being requested, thereby eliminating any potential for confusion or misinterpretation. This clarity is essential for fostering informed consent and trust. By providing detailed and clear information about data requests, SC3 helps patients understand the implications of their consent, thereby enhancing their confidence in the system and ensuring that their rights are respected.</p></list-item>
</list></p>
</sec>
<sec id="s6_5">
<label>6.5</label>
<title>Comparison with Existing Works</title>
<p><xref ref-type="table" rid="table-5">Table 5</xref> highlights a comparison of our system with existing solutions. All systems, including ours, support patient-centric access control. In addition, only reference [<xref ref-type="bibr" rid="ref-16">16</xref>] and our system provides authentication. All systems claim to ensure data integrity, but reference [<xref ref-type="bibr" rid="ref-18">18</xref>] notes a risk when patients are involved in the data upload process. Thus, our system ensures data integrity. All systems, including ours, ensure data authenticity. Further, solutions [<xref ref-type="bibr" rid="ref-15">15</xref>&#x2013;<xref ref-type="bibr" rid="ref-18">18</xref>] have conditional access authenticity, with access granted for an unlimited period and revoked by the patient. Our system grants access for a limited period, with the patient able to revoke access before the period ends. All systems, including ours, ensure data confidentiality. Only reference [<xref ref-type="bibr" rid="ref-16">16</xref>] and our system are GDPR compliant.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Comparison with existing solutions</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th></th>
<th>[<xref ref-type="bibr" rid="ref-15">15</xref>]</th>
<th>[<xref ref-type="bibr" rid="ref-16">16</xref>]</th>
<th>[<xref ref-type="bibr" rid="ref-17">17</xref>]</th>
<th>[<xref ref-type="bibr" rid="ref-18">18</xref>]</th>
<th>Our system</th>
</tr>
</thead>
<tbody>
<tr>
<td>Patient-centric access control</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>DG 1 Authentication</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>No</td>
<td>Yes</td>
</tr>
<tr>
<td>DG 2 Data integrity</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes/No, involving patients in the data upload process poses a risk to data integrity.</td>
<td>Yes</td>
</tr>
<tr>
<td>DG 3 Data authenticity</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>DG 4 Access authenticity</td>
<td>Yes/No, access is granted for an unlimited period of time. The access is revoked by the patient</td>
<td>Yes/No</td>
<td>Yes/No</td>
<td>Yes/No</td>
<td>Yes, access is granted for a limited period of time. The patient can revoke access before the period ends</td>
</tr>
<tr>
<td>DG 5 Data confidentiality</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>GDPR compliance</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>No</td>
<td>Yes</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion</title>
<p>In this paper, we proposed a blockchain-based access management system designed to enhance patient privacy and secure telehealth and telemedicine data. The solution we propose attempts to be compliant with the General Data Protection Regulation (GDPR) by establishing a patient-centric access mechanism. We detail the design goals and system architecture, outline all potential access-related actions, and present algorithms of the automated decision-making process.</p>
<p>Furthermore, the system design incorporated four smart contracts to ensure our predefined design goals, including data integrity, data authenticity, data confidentiality, access authenticity, and authentication. Smart Contract 1 (SC1) verifies user identities and manages user trustworthiness, ensuring that actions are performed by authentic users. Smart Contract 2 (SC2) verifies the authenticity and integrity of data measured by wearable health devices when transferred to decentralized storage. Smart Contract 3 (SC3) manages data access permissions, allowing patients to grant or revoke access within a specified time limit, ensuring access authenticity. Smart Contract 4 (SC4) checks the validity of data access requests, ensuring that only authorized data requestors can access data based on granted permissions. Thus, these smart contracts provide a robust framework for secure and trustworthy medical data management.</p>
<p>In addition, to ensure the robustness of our system, we formalized and validated its security properties using the Security Modelling Framework (SeMF). This rigorous approach has demonstrated the alignment with the predefined security requirements, including data integrity, data authenticity, data confidentiality, access authenticity, and authentication. Additionally, the system has been compared to other solutions based on design goals and GDPR compliance. As a result, it has proven its efficiency in enhancing patient security and privacy among the existing solutions. Furthermore, the implementation of the smart contracts has demonstrated the cost savings of our system. In the test environment, the average gas consumption ranges between 40,568 and 141,456. Additionally, the high gas consumption of some functions is linked to the additional information in the input.</p>
<p>In conclusion, our blockchain-based access management system not only enhances patient privacy and security but also ensures compliance with GDPR through a patient-centric approach. The combination of decentralized technology and restricted design goals provided a robust and transparent solution for managing patient data, that is mitigating the security and privacy issues of telehealth and telemedicine services.</p>
<p>However, our system demonstrates efficiency in enhancing patient privacy and security, there are several key limitations that need to be addressed in future research:
<list list-type="order">
<list-item>
<p><bold>Scalability:</bold> As the number of users and transactions increases, the Blockchain could be challenged to handle large-scale transactions in terms of latency and computational costs.</p></list-item>
<list-item>
<p><bold>Interoperability:</bold> Integrating the Blockchain with existing healthcare systems might be challenging. As a result, to provide data flow between different systems, standardization and compatibility activities are required.</p></list-item>
<list-item>
<p><bold>User Adoption:</bold> Promoting widespread adoption of the blockchain architecture among healthcare professionals, patients, and other stakeholders can be challenging. Users may be concerned about the security and privacy of their data.</p></list-item>
</list></p>
</sec>
</body>
<back>
<ack><p>Not applicable.</p>
</ack>
<sec><title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec><title>Author Contributions</title>
<p>The authors confirm their contributions to the paper as follows: study conception and design: Ayoub Ghani; data collection: Ayoub Ghani; analysis and interpretation of results: Ayoub Ghani; draft manuscript preparation: Ayoub Ghani, Ahmed Zinedine, and Mohammed El Mohajir. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec><title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. E. B.</given-names> <surname>Tomaz</surname></string-name>, <string-name><given-names>J. C. D.</given-names> <surname>Nascimento</surname></string-name>, <string-name><given-names>A. S.</given-names> <surname>Hafid</surname></string-name>, and <string-name><given-names>J. N. De</given-names> <surname>Souza</surname></string-name></person-group>, &#x201C;<article-title>Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>204441</fpage>&#x2013;<lpage>204458</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3036811</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Ratta</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kaur</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shabaz</surname></string-name>, and <string-name><given-names>G.</given-names> <surname>Dhiman</surname></string-name></person-group>, &#x201C;<article-title>Application of blockchain and internet of things in healthcare and medical sector: Applications, challenges, and future perspectives</article-title>,&#x201D; <source>J. Food Qual.</source>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1155/2021/7608296</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>S. B.</given-names> <surname>Goyal</surname></string-name>, and <string-name><given-names>K.</given-names> <surname>Ramaswamy</surname></string-name></person-group>, &#x201C;<article-title>BSPPF blockchain-based security and privacy preventing framework for data middle platform in the era of IR 4. 0</article-title>,&#x201D; <source>J. Nanomat.</source>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1155/2022/2219006</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Houtan</surname></string-name>, <string-name><given-names>A. S.</given-names> <surname>Hafid</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>D.Makrakis</surname></string-name></person-group>, &#x201C;<article-title>A survey on blockchain-based self-sovereign patient identity in healthcare</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>90478</fpage>&#x2013;<lpage>90494</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2994090</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Hutton</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Assessing the privacy of mHealth apps for self-tracking: Heuristic evaluation approach</article-title>,&#x201D; <source>JMIR Mhealth Uhealth</source>, vol. <volume>6</volume>, no. <issue>10</issue>, <year>2018</year>, Art. no. e9217. doi: <pub-id pub-id-type="doi">10.2196/mhealth.9217</pub-id>; <pub-id pub-id-type="pmid">30348623</pub-id></mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. B.</given-names> <surname>Truong</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>G. M.</given-names> <surname>Lee</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Guo</surname></string-name></person-group>, &#x201C;<article-title>GDPR-compliant personal data management: A blockchain-Based solution</article-title>,&#x201D; <source>IEEE Trans. Inf. Forensics Secur.</source>, vol. <volume>15</volume>, pp. <fpage>1746</fpage>&#x2013;<lpage>1761</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/TIFS.2019.2948287</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Saghiri</surname></string-name></person-group>, &#x201C;<article-title>Blockchain architecture</article-title>,&#x201D; <source>in Applications of Blockchain Technology. Studies in Big Data</source>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>2020</year>, vol. <volume>60</volume>, pp. <fpage>161</fpage>&#x2013;<lpage>176</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-981-13-8775-3_8</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Zaghloul</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Bitcoin and blockchain: Security and privacy</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>7</volume>, no. <issue>10</issue>, pp. <fpage>10288</fpage>&#x2013;<lpage>10313</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.3004273</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. K.</given-names> <surname>Nanda</surname></string-name>, <string-name><given-names>S. K.</given-names> <surname>Panda</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Dash</surname></string-name></person-group>, &#x201C;<article-title>Medical supply chain integrated with blockchain and IoT to track the logistics of medical products</article-title>,&#x201D; <source>Multimed. Tools Appl. J.</source>, vol. <volume>82</volume>, pp. <fpage>32917</fpage>&#x2013;<lpage>32939</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-023-14846-8</pub-id>; <pub-id pub-id-type="pmid">37362711</pub-id></mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Namasudra</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Gonzalez Crespo</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Parra-Fuente</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Chandra Trivedi</surname></string-name></person-group>, &#x201C;<article-title>EHDHE Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain</article-title>,&#x201D; <source>Inf. Sci.</source>, vol. <volume>629</volume>, pp. <fpage>703</fpage>&#x2013;<lpage>718</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.ins.2023.01.148</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Bisht</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Das</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Niyato</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>Efficient personal-health-records sharing in internet of medical things using searchable symmetric encryption, blockchain, and IPFS</article-title>,&#x201D; <source>IEEE Open J. Commun. Society</source>, vol. <volume>4</volume>, pp. <fpage>2225</fpage>&#x2013;<lpage>2244</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/OJCOMS.2023.3316922</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. Z.</given-names> <surname>Bawany</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Qamar</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Tariq</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Adnan</surname></string-name></person-group>, &#x201C;<article-title>Integrating healthcare services using blockchain-based telehealth framework</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>10</volume>, pp. <fpage>36505</fpage>&#x2013;<lpage>36517</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2022.3161944</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhuang</surname></string-name>, <string-name><given-names>L. R.</given-names> <surname>Sheets</surname></string-name>, <string-name><given-names>Y. -W.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>Z. -Y.</given-names> <surname>Shae</surname></string-name>, <string-name><given-names>J. J. P.</given-names> <surname>Tsai</surname></string-name> and <string-name><given-names>C. -R.</given-names> <surname>Shyu</surname></string-name></person-group>, &#x201C;<article-title>A patient-centric health information exchange framework using blockchain technology</article-title>,&#x201D; <source>IEEE J. Biomed. Health Inform.</source>, vol. <volume>24</volume>, no. <issue>8</issue>, pp. <fpage>2169</fpage>&#x2013;<lpage>2176</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JBHI.2020.2993072</pub-id>; <pub-id pub-id-type="pmid">32396110</pub-id></mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sheela</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Priya</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-based security &#x0026; privacy for biomedical and healthcare information exchange systems</article-title>,&#x201D; <source>Mater. Today: Proc.</source>, vol. <volume>81</volume>, pp. <fpage>641</fpage>&#x2013;<lpage>645</lpage>, <year>2023</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R. P.</given-names> <surname>Puneeth</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Parthasarathy</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-based framework for privacy preservation and securing ehr with patient-centric access control</article-title>,&#x201D; <source>Acta Inform. Prag.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>23</lpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.18267/j.aip.225</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Boumezbeur</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Zarour</surname></string-name></person-group>, &#x201C;<article-title>Privacy preservation and access control for sharing electronic health records using blockchain technology</article-title>,&#x201D; <source>Acta Inform. Prag.</source>, vol. <volume>11</volume>, no. <issue>1</issue>, pp. <fpage>105</fpage>&#x2013;<lpage>122</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.18267/j.aip.176</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. U. A.</given-names> <surname>Tahir</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Blockchain-based healthcare records management framework: Enhancing security, privacy, and interoperability</article-title>,&#x201D; <source>Technologies</source>, vol. <volume>12</volume>, no. <issue>9</issue>, <year>2024</year>, Art. no. 168. doi: <pub-id pub-id-type="doi">10.3390/technologies12090168</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Shah</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Blockchain factors in the design of smart-media for e-healthcare management</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>24</volume>, no. <issue>21</issue>, <year>2024</year>, Art. no. 6835. doi: <pub-id pub-id-type="doi">10.3390/s24216835</pub-id>; <pub-id pub-id-type="pmid">39517732</pub-id></mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Luo</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Lei</surname></string-name></person-group>, &#x201C;<article-title>TrustHealth: Enhancing eHealth security with blockchain and trusted execution environments</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>13</volume>, no. <issue>12</issue>, <year>2024</year>, Art. no. 2425. doi: <pub-id pub-id-type="doi">10.3390/electronics13122425</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Mao</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Zhang</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Xing</surname></string-name></person-group>, &#x201C;<article-title>Efficient and secure management of medical data sharing based on blockchain technology</article-title>,&#x201D; <source>Appl. Sci.</source>, vol. <volume>14</volume>, no. <issue>15</issue>, <year>2024</year>, Art. no. 6816. doi: <pub-id pub-id-type="doi">10.3390/app14156816</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>E. Abed</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Jaffal</surname></string-name>, and <string-name><given-names>B. J.</given-names> <surname>Mohd</surname></string-name></person-group>, &#x201C;<article-title>A review on blockchain and IoT integration from energy, security and hardware perspectives</article-title>,&#x201D; <source>Wirel. Pers. Commun.</source>, vol. <volume>129</volume>, no. <issue>3</issue>, pp. <fpage>2079</fpage>&#x2013;<lpage>2122</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11277-023-10226-5</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. -N.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Imran</surname></string-name>, and <string-name><given-names>N.</given-names> <surname>Haider</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-enabled internet of medical things to combat COVID-19</article-title>,&#x201D; <source>IEEE Internet Things Mag.</source>, vol. <volume>3</volume>, pp. <fpage>52</fpage>&#x2013;<lpage>57</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/IOTM.0001.2000087</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. S.</given-names> <surname>Egala</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Pradhan</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Badarla</surname></string-name>, and <string-name><given-names>S. P.</given-names> <surname>Mohanty</surname></string-name></person-group>, &#x201C;<article-title>Fortified-chain: A block-chain-based framework for security and privacy-assured Internet of Medical Things with effective access control</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>8</volume>, pp. <fpage>11717</fpage>&#x2013;<lpage>11731</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2021.3058946</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. A.</given-names> <surname>Alqaralleh</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Vaiyapuri</surname></string-name>, <string-name><given-names>V. S.</given-names> <surname>Parvathy</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Gupta</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Khanna</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Shankar</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment</article-title>,&#x201D; <source>Pers. Ubiquitous Comput.</source>, vol. <volume>28</volume>, no. <issue>1</issue>, pp. <fpage>17</fpage>&#x2013;<lpage>27</lpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.1007/s00779-021-01543-2</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D. K. J. B.</given-names> <surname>Saini</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Bhatt</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Gupta</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Joshi</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Siddharth</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-based IoT applications, platforms, systems and framework</article-title>,&#x201D; in <conf-name>14th Int. Conf. Comput. Commun. Network. Technol. (ICCCNT)</conf-name>, <year>2023</year>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ICCCNT56998.2023.10306953</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Hameed</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Barika</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Garg</surname></string-name>, <string-name><given-names>M. B.</given-names> <surname>Amin</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Kang</surname></string-name></person-group>, &#x201C;<article-title>A taxonomy study on se-curing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issues</article-title>,&#x201D; <source>J. Ind. Inf. Integr.</source>, vol. <volume>26</volume>, no. <issue>1</issue>, <year>2022</year>, Art. no. 100312. doi: <pub-id pub-id-type="doi">10.1016/j.jii.2021.100312</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Fuchs</surname></string-name>, <string-name><given-names>S.</given-names> <surname>G&#x00FC;rgens</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Rudolph</surname></string-name></person-group>, &#x201C;<article-title>A formal notion of trust-enabling reasoning about security properties</article-title>,&#x201D; in <conf-name>Trust Manag. IV: 4th IFIP WG 11.11 Int. Conf., IFIPTM 2010</conf-name>, <publisher-loc>Morioka, Japan</publisher-loc>, <year>2010</year>, pp. <fpage>200</fpage>&#x2013;<lpage>215</lpage>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Liu</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Shi</surname></string-name></person-group>, &#x201C;<article-title>P-PBFT: An improved blockchain algorithm to support large-scale pharmaceutical traceability</article-title>,&#x201D; <source>Comput. Biol. Med.</source>, vol. <volume>154</volume>, no. <issue>3</issue>, <year>2023</year>, Art. no. 106590. doi: <pub-id pub-id-type="doi">10.1016/j.compbiomed.2023.106590</pub-id>; <pub-id pub-id-type="pmid">36736098</pub-id></mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Zheng</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Xie</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>An overview of blockchain tech-nology: Architecture, consensus, and future trends</article-title>,&#x201D; in <conf-name>2017 IEEE Int. Congr. Big Data</conf-name>, <year>2017</year>, pp. <fpage>557</fpage>&#x2013;<lpage>564</lpage>. doi: <pub-id pub-id-type="doi">10.1109/BigDataCongress.2017.85</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N. D. S.</given-names> <surname>Vanin</surname></string-name></person-group>, &#x201C;<article-title>A blockchain-based end-to-end data protection model for personal health records sharing: A fully homomorphic encryption approach</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>23</volume>, no. <issue>1</issue>, <year>2022</year>, Art. no. 14. doi: <pub-id pub-id-type="doi">10.3390/s23010014</pub-id>; <pub-id pub-id-type="pmid">36616613</pub-id></mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Sumathi</surname></string-name>, <string-name><given-names>S. P.</given-names> <surname>Raja</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Vijayaraj</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Rajkamal</surname></string-name></person-group>, &#x201C;<article-title>A decentralized medical net-work for maintaining patient records using blockchain technology</article-title>,&#x201D; <source>Cybern. Inform. Technol.</source>, vol. <volume>22</volume>, no. <issue>4</issue>, pp. <fpage>129</fpage>&#x2013;<lpage>141</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W. -X.</given-names> <surname>Yuan</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Yan</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>L. -Y.</given-names> <surname>Hao</surname></string-name>, and <string-name><given-names>H. -M.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-based medical health record access control scheme with efficient protection mechanism and patient control</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>82</volume>, no. <issue>11</issue>, pp. <fpage>16279</fpage>&#x2013;<lpage>16300</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-022-14023-3</pub-id>; <pub-id pub-id-type="pmid">36404935</pub-id></mixed-citation></ref>
</ref-list>
</back></article>