Conference Paper

UIT-ODSMS: Hệ thống quản lý hỗ trợ hiến và nhận mô tạng sử dụng công nghệ Blockchain

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Trong bài báo này, chúng tôi đề xuất mô hình hệ thống quản lý hỗ trợ hiến và nhận mô tạng dựa trên nền tảng Blockchain. Với hệ thống này, chúng tôi đã giải quyết được nhiều vấn đề khó khăn trong việc hiến và nhận mô tạng như giải quyết được sự bất cập trong quá trình quản lý tại các cơ sở hiến và nhận tạng, sai sót về quy trình, thao tác xử lý mất nhiều thời gian hay việc khó tiếp cận của người dùng. Hệ thống này có tên là UIT-ODSMS (Organ Donation Support Management System) nó giúp hỗ trợ cho người có nhu cầu hiến và nhận mô tạng, giúp họ chủ động giải quyết các vấn đề của quá trình này thông qua hệ thống. Ngoài ra, hệ thống của chúng tôi còn hỗ trợ liên kết giữa các cơ sở y khoa, bệnh viện nhằm giải quyết các vấn đề về nguồn gốc của mô tạng một cách nhanh chóng và an toàn. Hơn nữa, dữ liệu trên UIT-ODSMS được lưu trữ trong các máy chủ phân tán của Blockchain, vì vậy hệ thống này thực hiện việc ngăn chặn thao túng dữ liệu, đảm bảo tính bảo an toàn trong dữ liệu y khoa.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Full-text available
Article
Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies.
Full-text available
Article
The scientific credibility of findings from clinical trials can be undermined by a range of problems including missing data, endpoint switching, data dredging, and selective publication. Together, these issues have contributed to systematically distorted perceptions regarding the benefits and risks of treatments. While these issues have been well documented and widely discussed within the profession, legislative intervention has seen limited success. Recently, a method was described for using a blockchain to prove the existence of documents describing pre-specified endpoints in clinical trials. Here, we extend the idea by using smart contracts - code, and data, that resides at a specific address in a blockchain, and whose execution is cryptographically validated by the network - to demonstrate how trust in clinical trials can be enforced and data manipulation eliminated. We show that blockchain smart contracts provide a novel technological solution to the data manipulation problem, by acting as trusted administrators and providing an immutable record of trial history.
Full-text available
Article
Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.
Full-text available
Article
With the development of cloud computing, electronic health record (EHR) system has appeared in the form of patient-centric, in which patients store their personal health records (PHRs) at a remote cloud server and selectively share them with physicians for convenient medical care. Although the newly emerged form has many advantages over traditional client-server model, it inevitably introduces patients’ concerns on the privacy of their PHRs due to the fact that cloud servers are very likely to be in a different trusted domain from that of the patients. In this paper, aiming at allowing for efficient storing and sharing PHRs and also eliminating patients’ worries about PHR privacy, we design a secure cloud-based EHR system, which guarantees security and privacy of medical data stored in the cloud, relying on cryptographic primitive but not the full trust over cloud servers. Based on our proposed basic EHR system, we provide several extensions including adding searchability, supporting revocation functionality and enabling efficient local decryption, which fills the gap between theoretical proposal and practical application.
Article
Software in networks, which is a special kind of applications in service-oriented computing and ultra-large-scale systems, is a complex software system deploying on network environment. Requirements of networked software pose many security problems owing to the dynamic topology structure and users' uncertainty. How to evaluate the degree of software security in networks is a challenging problem. In this paper, we present a framework for flexible assessing software to determine how well it can satisfy intended security requirements. On the basis of analyzing the threats which software in network facing, a security evaluation method based on STRIDE model is proposed. According to its own features of networked software and threat classification method of STRIDE model, we design a SN-Security Evaluation Model, in which the dependability-based, vulnerability-based and risk-based approaches are incorporated for the software security estimation. It provides a valuable way to help users to create the threat modeling and evaluating the safety degree for software security. A case study is conducted to verify the framework proposed in the paper.
Article
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Article
Compounding the confusion is the use of the broad term cognitive radio as a synonym for dynamic spectrum access. As an initial attempt at unifying the terminology, the taxonomy of dynamic spectrum access is provided. In this article, an overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access (OSA). The three basic components of OSA are discussed. Spectrum opportunity identification is crucial to OSA in order to achieve nonintrusive communication. The basic functions of the opportunity identification module are identified
Blockchain: opportunities for health care. ONC/NIST Use of Blockchain for Healthcare and Research Workshop
  • R Krawiec
  • D Barr
  • J Killmeyer
Krawiec R, Barr D, Killmeyer J. et al. Blockchain: opportunities for health care. ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST; 2016.
Guardtime Industrial Blockchain
  • Guardtime
Guardtime. Guardtime Industrial Blockchain. Accessed December 20, 2016.
Estonia is Using the Technology Behind Bitcoin to Secure 1 Million Health Records
  • O Williams-Grut
Williams-Grut O. Estonia is Using the Technology Behind Bitcoin to Secure 1 Million Health Records. Accessed December 20, 2016.
Moving Toward a Blockchain-based Method for the Secure Storage of Patient Records. or Healthcare and Research Workshop
  • D Ivan
Ivan D. Moving Toward a Blockchain-based Method for the Secure Storage of Patient Records. or Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST; 2016.
Ensuring security and privacy for electronic medical records
  • D Blough
  • M Ahamad
  • L Liu
  • Chopra P Medvault
Blough D, Ahamad M, Liu L, Chopra P. MedVault: Ensuring security and privacy for electronic medical records. NSF CyberTrust Principal Investigators Meeting. Accessed December 20, 2016.
Blockchain Technologies: A whitepaper discussing how the claims process can be improved. ONC/NIST Use of Blockchain for Healthcare and Research Workshop
  • K Culver
Culver K. Blockchain Technologies: A whitepaper discussing how the claims process can be improved. ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST; 2016.
Blockchain: the chain of trust and its potential to transform healthcare -our point of view
  • S Attili
  • S K Ladwa
  • U Sharma
  • A F Trenkle
Attili S, Ladwa SK, Sharma U, Trenkle AF. Blockchain: the chain of trust and its potential to transform healthcare -our point of view.
A blockchain profile for medicaid applicants and recipients. ONC/NIST Use of Blockchain for Healthcare and Research Workshop
  • K Vian
  • A Voto
  • K Haynes-Sanstead
Vian K, Voto A, Haynes-Sanstead K. A blockchain profile for medicaid applicants and recipients. ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST; 2016.
Ethereum: A Secure Decentralised Generalised Transaction Ledger
  • G Wood
Wood G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Accessed October 11, 2016. 2014.