International Knowledge Platform
Serving Researchers Since 2012

Electronic Health Record Using Blockchain with Data Security Approach

DOI : 10.17577/IJERTCONV14IS050044
Download Full-Text PDF Cite this Publication

Text Only Version

Electronic Health Record Using Blockchain with Data Security Approach

*Dr. Mohd Tajammul1, Bishnu2, Abhishek3, Amar4

1Professor, Department of Computer Science and Applications, School of Engineering and Technology, Sharda University, Greater Noida 201310, India. Email: mohd.tajammul@sharda.ac.in

2,3,4UnderGraduate Student, Department of Information Technology, School of Engineering and Technology, Sharda University, Greater Noida 201310, India

*Corresponding Author: mohd.tajammul@sharda.ac.in

ABSTRACT:

Electronic health records (EHRs) have revolutioni zed healthcare by enabling patient information to be stored and managed digitally. This project expl ores the important role of electronic medical recor ds in health research and evidence-

based clinical practice.

Blockchain technology is one of the most important developments and innovations in the information technology sector. It has an important place in the digital age we live in and has made a great impact on people's lives. Additionally, blockchain technology is expected to improve existing IT infrastructure in many areas in the coming years. Recent technological developments have led to significant advances in healthcare. When sharing private health information, information security and accessibility are critical to integrating and communicating with electronic health records (EHR). In this context, choosing the best blockchain model for secure and reliable EHRs in healthcare requires an accurate method to evaluate the impact of different blockchain models on their work. This study uses empirical studies to evaluate the impact of blockchain technology and provides new ideas and methods for future researchers. This research study collected feedback from 56 experts in healthcare management to evaluate the impact of different

empirical research will serve as a tool in selecting the most appropriate blockchain model to maintain the absence of EHR breaches.

Keywords: Integration, Blockchain, Data Security, Cryptographic Security, Healthcare

  1. INTRODUCTION

    Today, some countries are facing a growing numb er of health problems, even as access to junior doc tors or doctors makes it difficult for patients. Cons idering the word blockchain, it becomes clear th at this technology is not only important, but also i mportant in the age of the World Wide Web [1]. I n general terms, blockchain is considered a databa se that stores or distributes information regarding all transactions or electronic products made and e xchanged between participants. Blockchain contai ns a clear record and proof of every transaction m ade [2], [3]. Trading can be done as a transaction management system using blockchain technology. Thus, blockchain can reduce costs and increase ef ficiency [4].

    Modern innovation based on Blockchain technology has revolutionized almost every field, such as energy [5],[6], e-commerce [7], banking [8], government administration

    [9], medical services [10],[11], education [12], agricultural development

    blockchain models. In addition to many ideas of these

    [1 ]

    nd many other businesses. Gartner, well- known

    experts, a decision-making model is used in the study to eliminate confusion arising from external studies and organize information regarding the content of the chosen blockchain model. Fuzzy analytical network analysis (F-ANP) is used to calculate the weight of the model, and the same method as fuzzy preference sequence (TOPSIS)medical ideal is used to evaluate the results of other methods. problem solving. Additionally, the results from this

    research and marketing company, that predicts the value of investments decisions in blockchain technology will reach $3.1 trillion by 2030[14]. Fig 1 below shows Gartners forecast for blockchain investment growth. The transformative potential of blockchain technology is rapidly being recognized by leading companies, and the technology is seen as a game changer in many business use cases, including the healthcare industry. Since the commercials use of blockchain

    technology is huge, a lot of work is being done in this area. According to HPAA Magazines report, there were 3,054 data breaches affecting more than 500 documents in the healthcare industry between 2009 and 2019. These breaches resulted in the destruction, theft, disclosure, or unauthorized publication of 230,954,151 records in the medical industry. This equates more than 69.78% of the American population. In 2019, Medical data breach cases were 1.4 cases per day.

    The healthcare industry alone has recently begun t o show more interest in blockchain-

    enabled applications [15] [20]

    Blockchain is an emerging technology currently g enerating significant interest in healthcare. Howev er, 40% of healthcare executives rank blockchain among their top 5 priorities. Additionally, global a doption of blockchain technology in healthcare is expected to reach $5.61 billion by 2025, accordin g to a study by BIS Research. According to the re port, by 2025, the use of blockchain technology could save up to $10-150 billions in annual costs, including data loss, it costs, operating costs, service fees and ad, as well as fraud and fraud in business products. Medical industry [21]. Adoption of EM Rs (electronic medical records) is now viewed as a key step in improving health information, efficie ncy, user experience, products, and associated cos ts. Kemkar et al. It is estimated that EMR program s can save thousands of dollars annually [22]. Co mmunicating health information will provide us w ith more information; for example, better understa nding of behavior in the health and disease comm unity to ensure effective treatment again [23] and good implementation of physician recommendatio ns [24]. However, it is also susceptible to various security and privacy risks due to its functionality a nd design [25], [27]. A major challenge in advanc ed medical information is how to capture, manage

    , and interpret patient medical information without violating privacy [ 26].

    Blockchain technology can combine patient medic al and medication information from different webs ites and data providers to create a single, up-to- date medical record that doctors can share when tr eating patients. There are also significant barriers t

    o blockchain adoption in healthcare [29], [30]. Th erefore, evaluating the impact of different blockch ain technology models on the protection of web- based medical information is an important and dif ficult task. It is important to evaluate the impact of blockchain technology on the growth of the healt hcare sector because it is a prerequisite for the im plementation of effective healthcare policies. In th is research paper, we model the impact of differen t blockchain models on healthcare applications ba sed on multidimensional decision making (MCD M) technology.

    There are many MCDM methods that can be used to solve these problems [31]. Moreover, the main challenge is to determine the impact of blockchain technology in healthcare. In this work, researchers used the Anomalous Networking Process (ANP) and preference Ranking by Similarity to Good Structure (TOPSIS) method [32]. AHP focuses on hierarchical models, while ANP focuses on network models. Although many authors have used AHP-TOPSIS for such evaluations, ANP is another Analytical Process (AHP) tool widely used in MCDM-based problems [33]. Many authors have presented their work on fuzzy ANP-TOPSIS multiple decision making such choices. However, no one has conducted research to evaluate the impact of blockchain technology in protecting medical information in web-based electronics with the help of fuzzy-based decision-making.

  2. LITERATURE URVEY

    Bates et al. (2003) laid the foundation for understa nding the potential of EHRs in clinical decision su pport. Their research highlighted the integration o f clinical decision support systems within EHRs a s a powerful tool to enhance healthcare providers' decision-making processes. By providing real- time information and recommendations, these syst ems help reduce errors and improve patient care q uality. Amarasingham et al. (2009) investigated the impact of the use of electronic health records on healthcare and patient outcomes. Their findings showed that hospitals with electronic medical records made significant improvements. Reduced mortality rates and shorter length of stay indicate that electronic medical records make a significant

    contribution to improving the quality of overall medical care. Sittig and Singh (2011) emphasized the importance of addressing privacy and security issues in electronic health records. Their research underscores the need for effective security and ethical procedures to protect patient information. Establishing and maintaining trust in the EHR system is important to ensuring the confidentiality and integrity of patient information. Interoperability challenges in EHR systems are addressed by Dixon et al. (2016). They cited challenges in sharing data between EHR systems. Lack of appropriate data structures and communication processes can lead to inadequate care and delays in treatment. Dixon et al. underlines the urgent need for industry-wide standards and coordination to address these issues.

    Hripcsak and Albers (2013) provide an in-depth study of the potential of EHRs for longitudinal analysis. This approach involves monitoring the patient's health over time, providing information about disease progression and effective treatment. EHRs are an important resource for clinical research and evidence-based medicine, allowing doctors to better understand and manage chronic diseases. Kass et al. (2016) explored ethical issues in EHR use. Their research highlights the importance of consent and ethical responsibilities in handling patient information. EHRs contain large amounts of personal and health information; It requires clear guidelines to protect patient privacy and promote ethical standards in healthcare. The transformative power of data analysis in EHRs is the focus of Topol's (2015) research. He examined how comprehensive data analysis can uncover hidden patterns and insights in EHR data. The vast amount of information captured by EHRs can be leveraged to advance healthcare through predictive analytics, personalized medicine, and best practice identification. Adler-Milstein and Jha (2017) addressed the legal and regulatory challenges associated with EHRs. They highlighted issues related to data ownership and the complex landscape of healthcare regulations. Navigating these legal and regulatory aspects is crucial to ensure responsible and compliant EHR

    usage. Gheorghiu et al. (2020) emphasized EHRs' role in patient empowerment. They highlighted how EHRs enable patients to access their health information and participate in decision-making. This shift toward patient-centered care fosters collaboration between patients and healthcare providers, ultimately improving the overall healthcare experience. Greenhalgh et al. (2018) explores the challenges that arise when using electronic medical records. Issues such as preventing change and disrupting business processes were discussed. The transition from paper to electronic medical records can be a hurdle and a temporary inconvenience. Effective change management and careful planning are crucial to overcoming these challenges.

  3. DIFFERENT BLOCKCHAIN MODELS

    The different blockchain models in this group include: private blockchains, public blockchains, hybrid blockchains, permissioned blockchains, participatory chains, and decentralized applications; these are discussed in detail in the following subsections.

    1. Private Blockchain

      A private blockchain is a decentralized ledger that operates as a closed, secure repository based on cryptographic standards. It is a blockchain with restrictions or permissions that only works in a closed network. Private blockchains are mostly used by businesses or companies where users are only selected participants in the blockchain network. Write permissions are tracked in a completely private directory via the root vector of the decision, while read permissions can be public or restricted [35]. It allows only certain individuals or organizations to access the directory, access and view information. In this case, some people will check most users' accounts before making transactions. One version of private blockchain is the concept of a decentralized system or collaboration in which the blockchain operates under community control. This type of blockchain is a private network that stores public records of transactions that can only be accessed by

      authorized individuals [36]. Each of the two participants can be anonymous or completely anonymous; for example, in the previous exchange participants of the exchange could not do this. they know each other [37].

      Fig:1 Blockchain investment growth rate forecast (2018-

      2030).

    2. Public Blockchain

      Public blockchains allow anyone to participate. It is a truly decentralized, borderless and permissioned ledger platform. Anyone with an internet connection can log in to the blockchain platform and reach consensus, thus becoming an integral part of the blockchain technology network. Nodes or users that are members of the public blockchain can view current and old data, check for changes or verify transactions and mine operations for future chains. Public blockchain technology allows anyone to communicate with other participants in the transaction. It keeps the transaction history unchanged. Anyone can post a job by following the established process and joining the network. The identity of the two participants may be anonymous or completely anonymous, meaning that the participants of the exchange may not have known each other before the exchange [37].

    3. Hybrid Blockchain

      Hybrid blockchain is based on the combination of private blockchain and public blockchain. This includes the operation of both blockchains; that is,

      it can have a network that relies on private permission or a network that does not require public approval. In this decentralized network, users can monitor who has access to information held by the blockchain. Additionally, a selected portion of blockchain data or information can be made public while the remaining data can be kept as private as possible on a private network. Blockchain hybrid networks are versatile and allow users to access multiple public blockchains as well as private blockchains. Business and government regulations may support hybrid blockchains. It provides consistency and flexibility, including what information is kept private or shared in a public directory. Many applications of hybrid blockchains exist in the real world. For example, XinFin is a hybrid blockchain consisting of Ethereum (public blockchain) and Quorum (private blockchain). XinFin has successfully completed many pilots by providing chain logistics, transportation, foreign trade agreements and financial services [38]. Hybrid blockchains are also being used as a way to maintain security while providing better performance. It usually takes the form of a public keychain that connects the keychain to a private or authorized external chain [39].

    4. Permissioned Blockchain

      Other parties involved in business analysis or accessing network data must be authorized by the central authority. This is a real advantage for businesses, financial institutions and organizations that are confident in complying with most restrictions and diligent about data protection management [ 34]. Blockchain permission can be viewed as an advanced blockchain protection mechanism as it maintains an authentication process that only allows certain transactions to be executed by certain interested parties. Permissioned blockchains work differently between private and public blockchains. It is designed to reap the benefits of blockchain without compromising the regulatory authority of the central authority. Ripple is a good example of permissioned blockchain.

    5. Consortium Blockchain

      The organization's chain is based on a semi- decentralized model where the blockchain network consists of many businesses. This is not compatible with a private directory managed by a single organization. In this type of blockchain, many businesses can become nodes and share information or mine. Alliance chains combine elements of private and public chains. Once the point of agreement is reached, the most important differences between the two systems can be identified. The chain is not an open platform where anyone can control blocks, nor is it a closed platform where only one party can choose the block sender, but powerful organizations that serve as proofs have a similar process [40, 56-57].

    6. Decentralized Blockchain

      Decentralized applications (dApps) are software applications or systems that are not influenced by any organization and operate on blockchains and P2P database networks rather than on a single device. BitTorrent, Popcorn Time, and Tor are examples of software applications that run on different computers that are members of P2P networks that have many members on both sides, some downloading files, papers, others providing information and perhaps even facility information. while other members perform both functions simultaneously. dApps run and run on blockchain platforms in a public, open-source, decentralized ecosystem in cryptocurrency decision- making and are independent of the control and influence of a single authority [41]. DApps provide serverless features that can be used for clients and through blockchain-based decentralization.

  4. DESIGN AND ANALYSIS

    The research methodology included in this analysis was designed to evaluate the impact of blockchain technology on the preservation of electronic web- based medical records. Figure 2 shows the hierarchy of challenges for assessing the impact of blockchain technology on the security of web- based medical information.

    Fig: 2 ANP Structure for the evaluation of healthcare blockchain technology models.

    It aims to analyze the impact of different blockchain models on different digital medical services and use MCDM technology in a fuzzy environment to choose the best solution. To achieve the stated goals, the researchers of this study used Fuzzy-ANP to calculate the weight of the factors and their interactions. We also use the TOPSIS method to evaluate other methods. The following subsections provide a general description of this process.

    1. Fuzzy Analytics Network Process

      Saaty [43] introduced ANP as a cross-variable decision method. Saaty [44] created the name Analytic Hierarchy Process (AHP) due to its advantages over the previous method in analyzing various tasks. This study chose ANP to solve this problem. AHP evaluates the relationship between different decision levels but does not consider the interaction between models or other methods; whereas ANP uses network connectivity to evaluate the interaction between models involving decision-making levels. In some cases, ANP has also been recognized. ANP also uses circles to represent interactions and feedback between elements of the same group and with other groups in the same network [23], [45]. Fuzzy ANP method is the combination of fuzzy logic and ANP method used to manage data errors, thus helping to increase reliability and consistency.

    2. Fuzzy Topsis

      Yoon and Hwang [46] originally proposed the TOPSIS method. They developed TOPSIS with the

      idea that the choice should be the shortest choice between the best solution and the longest choice between the worst solution. The TOPSIS system is one of the most popular decision-making techniques for solving complex problems in the world. It supports Zelany's [47] permutational ideal solution concept [48]. This is one of the most powerful MCDM methods for solving the regression problem where the variables change when a negative option is used. This approach is often used in some existing projects. Additionally, the TOPSIS method was developed to solve the fuzzy MCDM problem [32].

      In this work, researchers used a combination of fuzzy ANP and TOPSIS to evaluate the impact of blockchain-focused technologies on the preservation of web-based electronic medical records. According to Figure 3, the weight and importance determination order with the help of fuzzy ANP-TOPSIS is defined as follows:

      Fig 3: flowchart diagram of architecture

      Step 1: English words are first converted directly into numerical values and then into three fuzzy numbers (TFN). In this study, TFN can be defined as (c1, c2, c3), where (c1 c2 = c3) and c1, c2, c3 are variables representing the minimum, average

      and maximum in TFN. Let's assume that A is a number that can be expressed as equation (1-2), which can be found in [48].

      First, 56 academics and blockchain industry experts presented different opinions as well as different blockchain development and research knowledge for each character and related information. Experts are asked to write and analyze their thoughts in a virtual meeting environment and gain insight into various aspects of group-wide behavior and the impact of messages.

      Then, with the help of the collected data, the researchers obtained a network model to evaluate the severity of certain features of the impact of blockchain technology. Experts and experts in the field of Blockchain R&D arrived at the answer by evaluating the observable characteristics associated with each other on the scale shown in Table 2. The figure is derived with the help of three-dimensional fuzzy number (TFN), real equation. numbers are calculated using equations (3-6) and a system represented as (c1ij, c2ij, c3ij); where c1ij represents the low value, c2ij represents the medium value, and c3ij represents the high value. For comparison, the concept of TFN[ij] is as follows:

      Jijk explains the relative impact of the importance of the two factors listed in the above equation; and provided according to expert opinion. Among them, i and j represent a pair of features determined by experts. TFN (ij) is calculated as a geometric measure of expert opinion for a given comparison. Therefore, equations 7 through 9 allow combinations of TFN values. The two TFNs are A1 and A2, A1 = (c11, c21, c31), A2 = (c12, c22, c32).

      Working models are as follows

      Step 2: A comparison matrix was created with the help of feedback from decision makers. Perform a correlation coefficient (CI) analysis as follows using the formula in Equation 10

      Among them, CI represents the consistency index and t represents the number of samples. Then the rate ratio (CR) of the index rate (RI) is calculated below.

      If CR < 0.1, the result matrix is similar. Of these, RI determines the stochastic index from the Saaty stochastic index [49]. Step 3: After a very good matrix is obtained with the help of the defuzzification process, the TFN value is converted into a value index. The defuzzification method

      used in this research is taken from [50] as shown in Equation (12-14) and is often called alpha cut. ,(ij) = [·(c1ij) + (1 )·(c3ij)] (12) where

      0 1 and 0 1 i.e.

      In the mathematical model previously selected by registered experts, and were used, and and are also different from 0 and 1. Step 4: Deploy ANP's dependency management system into the crowd and nstall half of the crowd. The purpose of this step is to identify the target, factor, sub-factor, etc. created by the preference vectors. is to create a super matrix by comparing groups. Step 5: Evaluating the outputs of others according to the TOPSIS problem should have this equation to model the entire decision matrix.

      In this equation i = 1, 2,. . . and j = 1,2, .. . noun Now calculate the normalized weighted decision matrix

      These include i = 1, 2, .. .m and j = 1,2, .. . Name Step 6: Predict the best solution of matrix I+ and the worst solution of matrix I

      In this equation, if j is better, z + j is Max zij; If j is a value z + j Max is zij; if j is the best then z j Min zij; If j is the cost factor, is z j Min zij? Step 7: The next step is to determine how each value differs from the good solution and the bad solution: good solution:

      The Negative-ideal solution

      where DC j defines the best solution distance according to choose i and D i is the distance to the ideal, non- ideal path. Calculate the critical

      output (Pi) of each option

      The interim evaluation process described above will be conducted using the Fuzzy-ANP TOPSIS system and a proprietary option to evaluate the impact of blockchain technology on EHRs. The next section presents a case study that provides a suitable model for the implementation of the blockchain technology concept. The written record identifying large files stored in free storage facilities must identify the location of storage and include the appropriate number. It should be clearly stated that if the access code is not received during the application, the access code will be reviewed. The same will be available before release. Experiments involving animals or humans and other studies requiring ethical approval must be submitted to the authority with a statement of acceptance.

  5. DATA ANALYSIS AND RESULT:

    It is a good measure to objectively measure the impact of blockchain technology. For the purpose of analysis, the six aspects of the first level of blockchain technology are; They are determined as T1, T2, T3, T4, T5 and T6, including patient identity, data security, data monitoring, immutability, approval and value. Regarding the analysis of the impact of blockchain technology on secondary electronic medical records: the characteristics of the patient's identity are recognition and consent, represented as T11 and

    T12, respectively. The characteristics of data security are data privacy, data management, and authorization, represented by T21, T22, and T23, respectively. The attributes of data management are synchronization and control, represented by T31 and T32 respectively. The products of immutability are cryptography and hashing, represented as T41 and T42, respectively. The features of the agreement are Proof-of-Stake and Proof-of- Work, represented by T51 and T52 respectively. The useful character is practical, easy and desirable, represented by T61, T62 and T63 respectively as shown in the table below. Evaluation of the security of electronic medical records using blockchain technology with the help of fuzzy ANP-TOPSIS is evaluated using equations (1)-(20) as shown below: Additionally use the Saaty formula shown in Table 1. We transform the word content into multivalued using equation (1)-(9) and then collect the triangular fuzzy number (TFN) values. Then, the consistency index and stochastic index are determined using equations (10) and (11). The random index of the pairwise comparison matrix is less than 0.1, which means our matrix is consistent across binary matrices. Then proceed to determine the correlation matrix of Level-1 parameters. With the help of Equations (12) (14), the pairwise comparison matrix is defuzzied using the alpha cut method, so that the integration of all sub-attributes with the defuzzied local part weight is shown in Table 4 respectively. The methods used in the hierarchy are followed exactly and the ratio of the matrices and local weights are measured accordingly.

    Values from multiple comparisons are used to obtain the unweighted super matrix. After the initial estimation of the weight super matrix (shown in Table 5), the constraint super matrix is also estimated. Using the local weight, weight super matrix, and limit super matrix, the global weight and ranking of attributes are calculated hierarchically as shown in Table 6. The researchers used the opinions of 56 professors enrolled in six elective courses. These options include: private blockchains, public blockchains, hybrid blockchains, permissioned blockchains, shared blockchains, and business applications, denoted as A1, A2, A3, A4, A5, and A6, respectively [ 54]. The Fuzzy-TOPSIS method is to provide as input the global weights of different conditions created by the fuzzy ANP to create a priority for each option. The results obtained with the help of Fuzzy-

    ANP-TOPSIS are analyzed using Equations (15)-

    (20) as follows: With the help of Equations (1)-(9) and Equation (15). For this purpose, equation (16) was used and a hierarchical decision matrix was created. Then the decision matrix unit score of each model (also called the performance value of the model) is derived from the weight of each measurement, and the fuzzy weighted standardized decision matrix is produced by Equation 16 and can be seen in Table 7. The solution (FPIS) and the worst solution (FNIS) are calculated by completing the product (17). The distance between each value selected by FPIS and FNIS is then calculated by Equations (18) and (19) and can be found in columns D+I and D-I in Table 8-9. Then the output value of each parameter is determined by mathematical equation (20). Other measures were taken according to the evaluation results shown in Table 10. The six blockchain technology changes define the results as A1, A4, A2, A5, A3, and A6. According to the research results, A1 (private chain model) are blockchains that are at risk of being exposed to more serious changes compared to other blockchain models that demonstrate their performance in the public sector, hybrid blockchains, permissioned blockchains, chain participation and distributed applications. It is designed to provide safe and effective EHR services to healthcare organizations.

    1. SENSITIVE ANALYSIS:

      A sensitivity test is performed by adjusting variables to determine the accuracy of the results obtained [51]. During the evaluation of these data, sensitivity analysis of the result weights (variables) was performed. Throughout this study, 15 variables were used to test sensitivity with the help of 14 experiments in the final stage (second). In each experiment, the high level (CC- i) was determined by adjusting the weight of each factor, while the weight of other factors was kept constant by the Fuzzy-ANP-TOPSIS method. Table 11 and Figure 4 show impact estimates. According to the actual performance, the other (A1) has a satisfactory level of satisfaction (CC-i). Fifteen attempts were made. The results show that alternative 1 (A1) still maintains a high level of satisfaction (CC-i) across 15 trials. In the other 13 experiments, the lowest change in two different experiments was A3 and

      A6. Comparison of performance with Table 9. Weighted normalized fuzzy decision matrix. Each indicates the weighting of the scores of the options.

      Fig 4 : Bar graph of sensitive analysis

      Fig 5: Radar chart representation of comparision of result

    2. Comparison of the result:

      In this work, we used several different methods to test the accuracy of our results. Researchers used the Fuzzy ANP-TOPSIS method to analyze the accuracy of this research. The data collection and evaluation process for this data in Fuzzy ANP- TOPSIS is very similar to the classical ANP- TPSIS approach. Therefore, blurring and defuzzification are required for Fuzzy-ANP- TOPSIS. Therefore, the data of fuzzy ANP- TOPSIS are written in their original numerical form and then converted into fuzzy numbers. The difference between fuzzy and classical ANP- TOPSIS results is shown in Figure 5. The results of this research are unique, but the point is the same. In this empirical study, the Pearson correlation method was used to measure the correlation between results. Coefficient correlation shows the effect of pairwise correlation. Scale from -1 to +1 [52]. A value close to -1 indicates a low correlation between values, while a value close to +1 indicates a strong correlation between values. The Pearson correlation between fuzzy ANP results and classical ANP results is 0.89176, showing a clear similarity between the results. As can be seen in Table 15, results were produced for different blockchain technology models for the same data, and all these results show the relationship between fuzzy ANP results and classical strong ANP results. The results of our analysis also show that the identified variables and their relationship with the security system are important aspects of security policy. Khan et al.

      [53] particularly adopted the fuzzy ANP-TOPSIS method in their study. This is because the ANP method is different from the AHP method because the ANP method has more linear models than tree models. Therefore, in this study, researchers adopted design as the first stage of being included in the network, which is the main point of production.

      There is no way to evaluate software security in the context of design strategy with the help of the fuzzy ANP-TOPSIS process.

  6. Conclusion and Future works:

The proposed work uses an integrated fuzzy- ANPTOPSIS to find the effect of blockchain technology to get secured electronic healthcare records. The hybrid fuzzy-ANP-TOPSIS method offers an effective way to analyze any MCDM issue with various variables and alternatives, such as blockchain technology assessment. Different factors for the blockchain models impact evaluation are estimated, their weights are measured, alternative rankings are determined and the overall impact of blockchain models for securing EHR is assessed. It has been concluded that alternative- Private Blockchain model is the most acceptable means for offering effective and robust service in healthcare blockchain technology. Private Blockchain technology would offer more secure platforms for sharing health data in the healthcare sector by protecting the data over a distributed peer-to-peer infrastructure, thus transforming the way in which the EHRs of patients are exchanged and maintained. This research study will serve as a model or motivation for future research as well as projects of blockchain technology in healthcare settings. Our discussed methodological approaches and categorization will lead to an infrastructure or models proposal which solves the issues addressed in healthcare blockchain technology. Therefore, a potential path for future research is to assess the implementation of healthcare blockchain technology- based services prioritized on their impact to achieve positive improvements in the healthcare sector.

REFERENCES

  1. M. Gorodnichev, A. Kukharenko, E. Kukharenko, and T. Salutina, Methods of developing systems based on blockchain, in Proc. 24th Conf. Open Innov. Assoc. FRUCT. Helsinki, Finland: FRUCT Oy, Apr. 2019, p. 86.

  2. T. Nugent, D. Upton, and M. Cimpoesu, Improving data transparency in clinical trials using blockchain smart contracts, F1000Research, vol. 5, p. 2541, Oct. 2016.

  3. M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, Blockchain technology: Beyond bitcoin, Appl. Innov., vol. 2, nos. 610, p. 71, 2016.

  4. Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web Grid Services, vol. 14, no. 4, pp. 352375, 2018.

  5. M. Andoni, V. Robu, D. Flynn, S. Abram, D. Geach, D. Jenkins, P. McCallum, and A. Peacock, Blockchain technology in the energy sector: A systematic review of challenges and opportunities, Renew. Sustain. Energy Rev., vol. 100, pp. 143174, Feb. 2019.

  6. B. Teufel, A. Sentic, and M. Barmet, Blockchain energy: Blockchain in future energy systems, J. Electron. Sci. Technol., vol. 17, no. 4, Dec. 2019, Art. no. 100011.

  7. M. Li, S. Shao, Q. Ye, G. Xu, and G. Q. Huang, Blockchain-enabled logistics finance execution platform for capital-constrained E-commerce retail, Robot. Comput.-Integr. Manuf., vol. 65, Oct. 2020, Art. no. 101962.

  8. F. Damico, How technology is reshaping financial services: Blockchain use cases in the banking industry, Ph.D. dissertation, Politecnico di Torino, Turin, Italy, 2020.

  9. S. Ølnes, J. Ubacht, and M. Janssen, Blockchain in government: Benefits and implications of distributed ledger technology for information sharing, Government Inf. Quart., vol. 34, no. 3, pp. 355364, Sep. 2017.

  10. P. Zhang and M. N. K. Boulos, Blockchain solutions for healthcare, in Precision Medicine for Investigators, Practitioners and Providers. New York, NY, USA: Academic, 2020, pp. 519524.

  11. P. P. Ray, D. Dash, K. Salah, and N. Kumar, Blockchain for IoT-based healthcare: Background, consensus, platforms, and use cases, IEEE Syst. J., early access, Jan. 21, 2020, doi: 10.1109/JSYST.2020.2963840.

  12. A. Alammary, S. Alhazmi, M. Almasri, and S. Gillani, Blockchain-based applications in education: A systematic review, Appl. Sci., vol. 9, no. 12, p. 2400, Jun. 2019.

  13. H. Xiong, T. Dalhaus, P. Wang, and J. Huang, Blockchain technology for agriculture: Applications and rationale, Frontiers Blockchain, vol. 3, p. 7, Feb. 2020.

  14. R. Kandaswamy and D. Furlonger. (Mar. 27, 2018). Blockchain-Based Transformation: A Gartner Trend Insight Report. Accessed: May 1, 2020. [Online]. Available: https://www.gartner.com/en/documents/3869696/ blockchain-based-transformation-a-gartner-trend- insight-0

  15. K. D. Mandl, D. Markwell, R. MacDonald, P. Szolovits, and I. S. Kohane, Public standards and patients control: How to keep electronic medical records accessible but private medical information: Access and privacy doctrines for developing electronic medical records desirable characteristics of electronic medical records challenges and limitations for electronic medical records conclusions commentary: Open approaches to electronic patient records commentary: A patients viewpoint, BMJ, vol. 322, no. 7281, pp. 283287, 2001.

  16. C. Sullivan and E. Burger, E-residency and blockchain, Comput. Law Secur. Rev., vol. 33, no. 4, pp. 470481, Aug. 2017.

  17. P. Beninger and M. A. Ibara, Pharmacovigilance and biomedical informatics: A model for future development, Clin. Therapeutics, vol. 38, no. 12, pp. 25142525, Dec. 2016.

  18. N. Kshetri, Blockchains roles in strengthening cybersecurity and protecting privacy, Telecommun. Policy, vol. 41, no. 10, pp. 10271038, Nov. 2017.

  19. M. H. Au, T. H. Yuen, J. K. Liu, W. Susilo, X. Huang, Y. Xiang, and Z. L. Jiang, A general framework for secure sharing of personal health records in cloud system, J. Comput. Syst. Sci., vol. 90, pp. 4662, Dec. 2017.

  20. B. Yüksel, A. Küpçü, and Ö. Özkasap,

    Research issues for privacy and security of

    electronic health services, Future Gener. Comput. Syst., vol. 68, pp. 113, Mar. 2017.

  21. C. Arsene. (Jan. 27, 2020). The Global, Blockchain Healthcare Report: 2020 Ultimate Guide for Every Executive. Accessed: Apr. 21, 2020. [Online]. Available:

  22. O. S. Kemkarl and D. P. B. Dahikar, Can electronic medical record systems transform health care? Potential health benefits, savings, and cost using latest advancements in ICT for bette interactive healthcare learning, Int. J. Comput. Sci. Commun. Netw., vol. 2, nos. 36, pp. 453 455, 2012.

  23. I. Al-Turaiki, M. Alshahrani, and T. Almutairi, Building predictive models for MERS-CoV infections using data mining techniques, J. Infection Public Health, vol. 9, no. 6, pp. 744748, Nov. 2016.

  24. Y. Zhang, M. Chen, D. Huang, D. Wu, and Y. Li, iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization, Future Gener. Comput. Syst., vol. 66, pp. 3035, Jan. 2017.

  25. M. T. J. Ansari and D. Pandey, Risks, security, and privacy for HIV/AIDS data: Big data perspective, in Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications. Hershey, PA, USA: IGI Global, 2019, pp. 5874.

  26. X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control, J. Med. Syst., vol. 40, no. 10, p. 218, Oct. 2016.

  27. M. T. J. Ansari, D. Pandey, and M. Alenezi, STORE: Security threat oriented requirements engineering methodology, J. King Saud Univ.- Comput. Inf. Sci., vol. 12, pp. 5662, Dec. 2018.

  28. D. F. Alsubaei, Blockchain adoption in the gulf states, Policy, Tech. Rep., 2019. Accessed:

    Aug. 2, 2020. [Online]. Available: https:// www.mei.edu/sites/default/files/2019- 12/Blockchain%20in%20the% 20Gulf.pdf

  29. W. J. Gordon and C. Catalini, Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability, Comput. Struct. Biotechnol. J., vol. 16, pp. 224 230, Jan. 2018.

  30. H. F. Atlam, A. Alenezi, M. O. Alassafi, and

    G. B. Wills, Blockchain with Internet of Things: Benefits, challenges, and future directions, Int. J. Intell. Syst. Appl., vol. 10, no. 6, pp. 4048, Jun. 2018.

  31. E. Triantaphyllou, B. Shu, S. N. Sanchez, and

    T. Ray, Multi-criteria decision making: An operations research approach, Encyclopedia Elect. Electron. Eng., vol. 15, no. 1998, pp. 175

    186, 1998.

  32. . Erturul and N. Karakaolu, Comparison of fuzzy AHP and fuzzy TOPSIS methods for facility location selection, Int. J. Adv. Manuf. Technol., vol. 39, nos. 78, pp. 783795, Nov. 2008.

  33. T. L. Saaty and L. G. Vargas, The analytic network process, in Decision Making With the Analytic Network Process. Boston, MA, USA: Springer, 2013, pp. 140.

  34. T. K. Sharma. (Nov. 13, 2019). Permissioned and PermissionlessBlockchains: A. Accessed: May 3, 2020. [Online]. Available: https://www. blockchain-council.org/blockchain/permissioned- and-permissionlessblockchains-a-comprehensive- guide/

  35. V. Buterin. (Aug. 7, 2015). On Public and Private Blockchains. Accessed: May 3, 2020. [Online]. Available: https://blog.ethereum.org/ 2015/08/07/on- public-and-private-blockchains/

  36. V. J. Morkunas, J. Paschen, and E. Boon, How blockchain technologies impact your business model, Bus. Horizons, vol. 62, no. 3, pp. 295306, May 2019.

  37. W. Vaughan. (Jul. 31, 2015). Open vs Closed BlockchainsLets End this Madness. Accessed: May 3, 2020. [Online]. Available:

  38. N. Singh. (Oct. 6, 2018). Hybrid Blockchain- the Best of Both Worlds. Accessed: May 3, 2020. [Online]. Available:

  39. D. Freuden. (Jun. 7, 2018). Hybrid Blockchains: The Best of Both Public and Private. Accessed: May 3, 2020. [Online]. Available:

  40. (Jan. 19, 2020). Private, Public, and Consortium Blockchains Whats the Difference? Accessed: May 7, 2020. [Online]. Available: https://www.binance.vision/blockchain/private- public-and-consortiumblockchains-whats-the- difference

  41. J. Frankenfield. (Jan. 29, 2020). Decentralized ApplicationsdApps. Accessed: May 3, 2020. [Online]. Available: https://www.investopedia. com/terms/d/decentralized-applications-dapps.asp

  42. N. Gill. (Mar. 19, 2020). Decentralized Applications Architecture and Blockchain. Accessed: May 3, 2020. [Online]. Available:

  43. T. L. Saaty and K. Kearns, Analytical Planning; The Organization of Systems. Oxford, U.K.: Pergamon Press, 1985.

  44. T. L. Saaty, The analytic hierarchy process Mcgraw Hill, New York, Agricult. Econ. Rev., vol. 70, no. 7, pp. 857865, 1980.

  45. S. Boran and K. Goztepe, Development of a fuzzy decision support system for commodity acquisition using fuzzy analytic network process, Expert Syst. Appl., vol. 37, no. 3, pp. 19391945, Mar. 2010.

  46. K. Yoon and C.-L. Hwang, Manufacturing plant location analysis by multiple attribute decision making: Part ISingle-plant strategy, Int. J. Prod. Res., vol. 23, no. 2, pp. 345359, Jan. 1985.

  47. M. Zelany, A concept of compromise solutions and the method of the displaced ideal, Comput. Oper. Res., vol. 1, nos. 34, pp. 479496, Dec. 1974.

  48. R. J. Kuo, C. W. Hsu, and Y. L. Chen, Integration of fuzzy ANP and fuzzy TOPSIS for evaluating carbon performance of suppliers, Int.

    J. Environ. Sci. Technol., vol. 12, no. 12, pp. 3863 3876, Dec. 2015.

  49. R. Rekik, I. Kallel, and A. M. Alimi, Ranking criteria based on fuzzy ANP for assessing E-commerce Web sites, in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Oct. 2016, pp. 34693474.

  50. R. Bijoyeta and S. K. Misra, An integrated fuzzy ANP and TOPSIS methodology for software selection under MCDM perspective, Int. J. Innov. Res. Comput. Commun. Eng., vol. 6, no. 1, pp. 492501, 2018.

  51. A. Saltelli, M. Ratto, T. Andres, F. Campolongo, J. Cariboni, D. Gatelli, and S. Tarantola, Global Sensitivity Analysis: The Primer. Hoboken, NJ, USA: Wiley, 2008.

  52. M. Alenezi, A. Agrawal, R. Kumar, and R. A. Khan, Evaluating performance of Web application security through a fuzzy based hybrid multicriteria decision-making approach: Design tactics perspective, IEEE Access, vol. 8, pp. 2554325556, 2020.

  53. S. A. Khan, M. Alenezi, A. Agrawal, R. Kumar, and R. A. Khan, Evaluating performance of software durability through an integrated fuzzybased symmetrical method of ANP and TOPSIS, Symmetry, vol. 12, no. 4, p. 493, Mar. 2020.

  54. L. Pawczuk, R. Massey, and J. Holdowsky. (May 6, 2019). Deloittes 2019 Global Blockchain.