A Blockchain-Based Protocol For Tracking User Access To Shared Medical Imaging
A Blockchain-Based Protocol For Tracking User Access To Shared Medical Imaging
article info a b s t r a c t
Article history: Modern healthcare systems are complex and regularly share sensitive data among multiple stake-
Received 15 November 2021 holders, such as doctors, patients, and pharmacists. Patients’ data has increased and requires safe
Received in revised form 22 March 2022 methods for its management. Research works related to blockchain, such as MIT MedRec, have strived
Accepted 16 April 2022
to draft trustworthy and immutable systems to share data. However, blockchain may be challenging
Available online 21 April 2022
in healthcare scenarios due to issues about privacy and control of data sharing destinations. This
Keywords: paper presents a protocol for tracking shared medical data, which includes images, and controlling
Blockchain the medical data access by multiple conflicting stakeholders. Several efforts rely on blockchain for
Privacy healthcare, but just a few are concerned about malicious data leakage in blockchain-based healthcare
Medical imaging systems. We implement a token mechanism stored in DICOM files and managed by Hyperledger Fabric
Data access Blockchain. Our findings and evaluations revealed low chances of a hash collision, such as employing
a fitting-resistance birthday attack. Although our solution was devised for healthcare, it can inspire
and be easily ported to other blockchain-based application scenarios, such as Ethereum or Hyperledger
Besu for business networks.
© 2022 Elsevier B.V. All rights reserved.
https://doi.org/10.1016/j.future.2022.04.017
0167-739X/© 2022 Elsevier B.V. All rights reserved.
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
Jin et al. (2019) [10] discuss privacy concerns in healthcare • A method of transferring responsibility to those who access
and methods to mitigate privacy issues by combining blockchain images, thus providing data accountability;
with other techniques. According to Jin et al. (2019) [10], the • An enhancement of privacy in blockchain-based healthcare
cryptographic and anonymization methods have increased the systems through robust verifiable data sharing, thus en-
ability of blockchain-based healthcare systems to protect pa- abling our system to comply with new privacy laws, such
tients’ privacy. For instance, to encrypt information, they might as the General Data Protection Regulation (GDPR) [13].
use Attribute-Based Encryption and Homomorphic Encryption. Jin
et al. (2019) [10] address K-anonymity, L-diversity, and Differen- In evaluating our prototype, our results show that the cost for
tial Privacy as anonymization methods. However, this approach applying blockchain in healthcare system networks is suitable for
views accountability as a technique to follow GDPR rules and building in a Cloud environment. We evaluated security analysis,
guarantee patients’ privacy. Our proposal manages shared tokens including the tracking token, which proved that the generated
and audits immutable logs to make the system accountable and hash is hard to collide with using the cryptography birthday
tamper-proof-free. attack1 or by brute force. The theoretical analysis revealed a low
Medical data-sharing solutions fail to address data-leakage probability of tampering with the token by a similar one. Hence,
auditing by default. A few works exploit auditing approaches we demonstrated that the blockchain cost of healthcare systems
for discovering leakages while sharing data, including medical with the tracking token is well suited to meet the new privacy
imaging. Patel (2018) [11] proposes a framework that shares laws, including the GDPR.2 Lastly, as proof of concept, we made
medical imaging through a blockchain-based architecture that evaluations with our protocol using radiology DICOM images in
is free from a trusty third party. However, we argue that this the dataset available at The Cancer Imaging Archive (TCIA) from
proposed framework is over-simplistic to ((i)) tracking medical the National Cancer Institute’s Clinical Proteomic Tumor Analysis
shared images and ((ii)) auditing data leaks. The approach still Consortium.3
misses following privacy requirements to ensure data leakage The remainder of this paper is organized as follows. Section 2
accountability. Besides, in conventional systems, the audit log contextualizes the problem that is tackled in this work. Section 3
files can maliciously become corrupted as they are mutable. describes the recent, relevant works in the field. Section 4 intro-
Medical images accumulate into a high amount of information duces the protocol and describes the methods employed to design
stored in healthcare systems, and they enable powerful features it. Section 5 reports the experimental analyses and results re-
to be used by machine learning models to extract knowledge [12]. lated to two aspects, namely network performance and security.
McBee et al. (2018) [6] surveyed the blockchain applications for Section 6 discusses the results and the key contributions of this
medical imaging, and they pointed out challenging open issues research. Finally, Section 7 concludes by providing a summary of
to be explored by researchers. They claim issues related to pri- the work, briefing its contributions, and suggesting future work
vacy, scalability, sharing, and tracking. Consequently, such claims directions.
motivated us to focus our efforts on mitigating issues related to
medical imaging privacy, tracking, and sharing. 2. Problem statement
This work sets out a protocol for sharing medical data, in-
cluding images, based on a blockchain architecture. Our protocol Across the great diversity of current intelligent and data-
allows for access tracking and a sharing of the medical imaging oriented systems, especially smart health systems, we could ob-
needed by researchers and practitioners. Unlike other previous serve there is an urgent need to track time-lined access to patient
research endeavours in this field, our work establishes a protocol data. Patient data, such as home phone numbers, are read from
for sharing and tracking images reliably while complying with digital medical records. Such record accesses are common in
privacy policies and is thus able to hold organizations accountable Brazil, where some are part of scams; they are then used to
for leaks coming from ineffective data handling. The benefits of make calls asking for cash deposits. Usually, scammers state that
our system are tracking and auditability based on blockchain be- they are calling on behalf of the hospital, purposely and wrongly
cause if we use a log register and token, they are not immutable. informing that cash is needed for the surgery costs of a family
When logs are not immutable, malicious nodes are able to tamper member. Hence, there is an urgent need to track access to pa-
with them. tients’ data and involved parts, enabling to detect and limiting
Unlike previous works, in this study the notion of a unique improper uses.
token is embedded into the DICOM files. By means of auditing, the A distributed privacy-enforcing approach avoids untrusted cen-
network administrator can promptly spot the leakages through tralized control, which might represent a single point of failure in
the logs and unique tokens through this token. In our approach, the whole healthcare system. The tracking is needed as central-
a token is a hash value embedded in the image metadata and acts ized control cannot be fully trusted. A hospital acts as a central-
as a key to audit leaked images with the support of blockchain. ized organization whose staff members might have inappropriate
In order to achieve the goals of this work, we have defined the intentions while accessing data.
following hypothesis: Governments and institutions are adapting to new standards
to enforce privacy more strictly through privacy laws and reg-
‘‘A blockchain-based protocol can ensure accountability and ulations. The General Law for Data Protection (GDPR) has been
auditability for healthcare record leakages using immutable introduced to guarantee citizens’ rights about their data [2,13].
logs and a unique token inserted in the metadata of DICOM Likewise, healthcare providers have concerns about sharing med-
file images’’. ical imaging because it contains sensitive information. For in-
stance, DICOM imaging related to X-rays contains metadata that
In summary, the main contributions and benefits of this re- can re-identify patients associated with the exam. Medical images
search work are the following: can show parts of one’s body before and after the surgery, such as
• A novel protocol that provides traceability and auditability the face and head. Those digital images should not be leaked, even
for shared medical imaging;
• A blockchain-based system that ensures that multiple stake- 1 https://www.sciencedirect.com/topics/computer-science/birthday-attack.
holders with conflicting interests are able to share medical 2 Also, in Brazil, we have the General Personal Data Protection Act (LGPD).
imaging; 3 Cancer Imaging Archive - Link.
349
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
accidentally; thus, we argue that mechanisms that help audit features depending on the texture of each image. Liao et al.
should be devised. (2020c) [20] employed a steganography method based on color
Therefore, the sharing of sensitive data, medical records, must channels to create a new color by including a channel-dependent
completely support privacy in a decentralized manner where payload partition strategy to amplify the channel. The aim of
accesses are tracked and verified. The sharing of data can only this method is to reduce the likelihood of finding embedded
be consistently implemented through a protocol that enables content in RGB (Red, Green, and Blue) channels, and it could
auditing of accesses to private data, including images. Constraints lead to distortions in textural regions to improve security. Our
to accessing and a trace mechanism can hinder data access for system focuses on medical imaging and address issues related
malicious purposes while sharing the database among several to traceability and privacy in the blockchain network to improve
stakeholders. security, performance and the ability to trace shared images.
This work focuses on medical imaging because of its critical
3. Background and related works importance in medical diagnosis as a type of media; however,
our new approach is designed to adapt to other types of files,
This section provides an overview of blockchain applied to such as electronic health records. Medical imaging incorporates
healthcare systems and research related to blockchain-based sys- valuable features from which knowledge can be obtained through
tems to track shared assets in healthcare. an analysis. Although medical imaging increases the overhead
of network resources, this type of media is rich and complex
3.1. Medical imaging – a DICOM file consists of multiple images as layers. Hence,
DICOM databases quickly reach 100 GB storage; when joined to a
Electronic healthcare systems use several data types, such blockchain network, they have significant overhead that delays
as register records, images, and video, to represent patient in- the processing of requests. In this paper, a number of issues
formation. Images are essential since they assist diagnosis and related to security in medical imaging were investigated and
contribute to physicians’ decision-making [14]. In information shared for research and advanced science.
transfer, healthcare providers use a scheme called Digital images
and Communications in Medicine (DICOM) for storing, transmit- 3.2. Blockchain in healthcare systems
ting, retrieving, processing, and displaying medical imaging infor-
mation. DICOM protocol can communicate with other physicians Blockchain and cryptocurrencies have been used for different
or researchers following similar attributes and pixels features [4]. applications in the healthcare field since they enable a system to
DICOM images have attributes, such as patient identifier, machine be decentralized, distributed, immutable, free tamper-proof, and
model, matrix of slices in grayscale, and others [4]. smart contracts-oriented (blockchain 3.0) [9]. Blockchain con-
Research on the healthcare system has investigated medical tributes to storing data in a secure shared-ledger, replicated be-
imaging to study and extract useful information to support the tween nodes by a Peer-to-Peer (P2P) network [21], and has led to
decision-making of the physician [4]. Security concerns in medi- more reliable systems for data handling. According to Chukwu and
cal imaging need to improve, and approaches are proposed, such Garg (2020) [21] the most used application is the management
as watermarking embedded in images [15]. Watermarking is a of electronic health records (EHR), which involves blockchain for
technique to improve security to sharing medical images through healthcare. The authors used a framework, such as Hyperledger
tamper detection and became image unique [16]. Qasim et al. Fabric or Ethereum, to build a network — the former is an alter-
(2019) [15] ensured both integrity and authenticity of medical native for constructing a private blockchain network customized
imaging through watermarking. The approach inserts a water- and smart contracts-oriented in Golang, JavaScript, or Java. In
mark in a smoother Region of Interest (ROI) towards authentica- contrast, Ethereum enables the building of smart contracts based
tion based on image content. It also allows integrity verification on Ether network [8].
of the shared image and protection against image-tampering [15]. The Hyperledger Fabric architecture, which follows the main
Motta et al. (2020) [17] examined a decentralized and dis- components, such as Ordering Service Nodes (OSN), Certificate
tributed information infrastructure following the standard Picture Authority (CA), world state database, and peers, applies an al-
Archive and Communication Systems (PCAS) for sharing medi- lowed blockchain. The network’s administrator defines limited
cal imaging among healthcare providers in DICOM format. They access for users. OSN is a service that obtains sorted messages
propose a method called DICOMFlow draws on infrastructure and delivers them to nodes. CA authenticates nodes of a network
for secure sharing of medical images and improve the system’s and generates private and public keys. World state database
security. DICOMFlow shares radiological exams through an In- uses Apache CouchDB4 for storing records from assets exchanged
ternet email structure and defines a global workflow for safe among nodes. Finally, peers execute and validate transactions
access to images. Different from other approaches, they propose associated with the replicated ledger. The architecture also de-
an adaptive infrastructure to manage DICOM images shared using velops smart contracts in different programming languages and
a PCAS system in diverse contexts. customizes assets structures. Among the applications that employ
Works in the literature have adopted approaches to improve Hyperledger Fabric is our proposal, which sets tools to build a
the security of the images, such as Liao et al. (2020a) [18], Liao network and smart contracts quickly [22].
et al. (2020b) [19], and Liao et al. (2020c) [20]. Liao et al. (2020a) Liu et al. (2018) [23] proposed a blockchain network for the
[18] established a framework for a forensics analysis of the han- sharing of EHRs among healthcare providers using Delegated
dling of images using a convolutional neural network (CNN). The Proof-of-stake (DPoS) to ensure patient’s privacy. The network
CNN extracted features that could detect the handling of images uses the Proof-of-stake protocol and scheme base-layers, con-
and achieved an average rate of accuracy of between 85.96% and sisted of Data Acquirement, Data Storage, and Data sharing. The
86.12%. Although the CNN achieved a good rate of accuracy, the authors enhanced privacy through a mechanism called attributed-
network has to be trained to obtain features and detect manipula- based encryption for establishing multi-level access. Each at-
tions. Liao et al. (2020b) [19] proposed a steganography strategy tribute applies a different access level Shahnaz, Qamar, and Khalid
based on image texture to determine two payload distributions (2019) [5] described a framework composed of three layers,
with the aim of improving security. The framework uses multiple
images on the cloud. The steganography image can have adaptive 4 https://couchdb.apache.org/.
350
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
Table 1
Summary of related works.
Work Features
Asset Off-chain Blockchain platform Consensus algorithm Network type Provenance Tracking Privacy policy
[23] EHR No Unknown DPoS Unknown No No Yes
[5] EHR IPFS Ethereum PoW Permissionless No No No
[24] Anyone No Unknown Own Own No No No
[25] EHR No Ethereum PoW Permissionless No No No
[26] EHR No Unknow BFT Permissioned No No No
[11] DICOM No Unknown PoS Own No No Yes
This DICOM No Hyperledger fabric PBFT Permissioned Yes Yes Yes
Fig. 1. Proof of concept of the system designed for the tracking and auditing of shared DICOM images from a unique token.
• Researchers. They request data from providers and holders through its authentication method by Cryptography of Elliptic
to conduct research work and studies. They collect findings Curves. The requester sends a message to healthcare providers,
to advance science and a research field. Besides, they gener- and waiting for a positive or negative response (lines 6–9). If the
ally are joined to universities or institutes, and they can be data holder accepts the request, the stakeholder can access and
doctors. query their medical imaging (lines 8–9). The following algorithms
complement the protocol design, and the algorithm comprehends
The main component of our proposal comprehends a protocol the whole protocol for sharing medical imaging.
for sharing medical imaging through a blockchain structure to
Algorithm 2 aims to share images data from holder to re-
store the images files, references, and audit logs. The DICOM
searcher or doctor, so patients wait for requests. When it receives
files are stored in a server using the SSH File Transfer Protocol
a request rc ∈ RC , the system extracts the message header
(SFTP)5 to access and recover files. The protocol is composed of
and obtains the image identifier (lines 2–3). Then, the system
the following algorithms. (i) Algorithm 1 comprise the functional-
collects the image id from request aim to get images from the
ities that allow researchers and practitioners to request data for
Healthcare provider repository (line 4). The system verifies if the
studies. (ii) Algorithm 2 enables the data holder tasks to check
search returned valid images (lines 5–6), and it inserts a different
and accept a request to access its images stored on the provider.
hash token into each medical images’ metadata from the search
(iii) Algorithm 3 introduces and manages audit logs through hash
tokens stored into medical imaging; it also assists the network results (line 8). The system creates the token based on a 256-bit
admin to identify data requesters. hash value that is obtained from joining the respective patient
In Algorithm 1, researchers or doctors send requests to the identifier and access timestamps (line 7). The timestamps follow
healthcare provider that forward to the data holder to accept RFC3339,6 which considers the system’s local time to generate a
or decline to share its medical imaging. Each requester Si can large number. Finally, the system generates access logs to identify
request several images of Im that they can use in research (line 2). requesters (line 9). These logs are stored in the blockchain ledger
Before proceeding with a request, the blockchain network verifies because they are immutable, accessible, and free of tampering
whether the requester is valid, and thus it is enabled to make a (line 10). Previous works have employed different methods to
call to the system (lines 3–4). We assume that the Hyperledger prevent tampering with sensitive data. Qasim et al. (2019) [15]
Fabric framework allows organizations to ingress the network presented a method to protect images by watermarking through
5 https://datatracker.ietf.org/doc/html/rfc913. 6 https://datatracker.ietf.org/doc/html/rfc3339.
352
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
tamper-proof and audit logs [32]. A smart contract implementa- logic apps, logs, distributed ledger technology, and cryptography
tion was defined for auditing the logs stored in the blockchain and hash. The POC implementation of our system design comprises a
comprises the following attributes: token identification, times- Python8 interface for clients to communicate with the blockchain
tamp access, and access level. It also includes the stakeholders network and connect to a query API in Nodejs.9
and organization that sent images and the stakeholders and or- Fig. 2 shows the process before a request is sent to obtain
ganization that requested them. The attributes defined in smart DICOM images. The Certificate Authority of blockchain checks
contracts are stored in the blockchain towards helping the admin whether the stakeholder (any role of network) is valid, and
network identify leakage. The smart contract establishes rules they can join the blockchain. After validating the stakeholder,
for transactions and receives assets, such as DICOM images [33]. the system can determine their identification and control their
The network was built in a Hyperledger Fabric structure with 10 access level to the assets. Query API requests image data from
Dockers peers, two organizations, two certificate authorities(CA)
the Blockchain, which also obtains them, but from a health-
for each organization, and one orderer.
care provider. In our POC implementation, we select DICOM
The module (Module 5, yellow) healthcare provider is an im-
images from a public dataset.10 The requester (doctor or re-
age repository from healthcare organizations. It comprises hos-
pital systems of image databases, which register file references searcher) that interacts with the system can demand images
in a blockchain network so that they can be shared with other DICOM, which were previously downloaded and stored in the
entities within a healthcare research network. The hospital uses healthcare provider of our POC system. A token is then inserted
a connector to register images in the blockchain to make them in each DICOM file when a requester demand an image and
available for researchers and doctors. the request is allowed. Next, the system sends images to the
The tracking token mechanism is the system’s main feature. healthcare provider (where images are in its database), which
It creates a hash value that, together with metadata, is inserted uses a service based on the SFTP to send the images to the query
in DICOM. This value, called ‘‘token’’, is associated with the API and make them available in the interface application.
log structure, such as the stakeholder’s identifier, and stored in The workflow implemented adopts a smart contract in
the immutable ledger in the blockchain. The following format Golang,11 the blockchain network configured with Hyperledger
was defined from algorithm SHA-256 with 256-bit message size Fabric12 in the Docker containers. In the setup of the Fabric
digest and 32-bit word [29]: token = sha256(‘‘PATIENTID ’’ + network, a bash script serves as the interface for customized
‘‘TIMESTAMPACCESS ’’). The token design is a hash value with a access to peers, channels, organizations, and orderers. Ordering
unique property that can produce traceable images in case of nodes are responsible for managing and ordering transactions
leakage or improper management. After the token generation and of organizations that can be part of the blockchain. Our POC
storage in the blockchain, the images are sent to the API interface implementation comprises a stakeholder interface and a module
to query results. healthcare provider service, which sends files and connects to
The blockchain network aims to store immutable logs and
logs stored in the Blockchain. The logs are sent as a JSON file
check image leakage, which can be audited by the token in-
and help audit images leakage using the token that links to a
serted in DICOM and metadata. Only a single stakeholder can
blockchain stakeholder.
access the image. Therefore, organizations can detect the entity
The source code of our POC implementation is available at
or stakeholder who has made the image available, analyze the
open repository blockchain token Dicom.13 This code enables
data provenance, and, by following privacy regulations, decide on
actions to be taken. researchers to replicate experiments and extend the system and
The last module incorporates the application and stakeholders protocol. It splits as a Hyperledger network representing the
(doctors, researchers, and healthcare providers). The module is blockchain configuration with docker files, certificates, and bash
designed to enable the developer to create an adaptive system scripts. Besides other folders, such as an API for direct com-
for healthcare image sharing as a friendly interface (Module 6, munication with blockchain, the shared Dicom folder contains
purple). the python scripts Server and Client to exchange files between
Ideally, any other developer using the proposed system can stakeholders and blockchain.
integrate its application seamlessly. Stakeholders use the appli- Finally, Hyperledger Fabric architecture manage keys, storing,
cation to obtain assets. At this point, the access level is defined sharing, and checking stakeholders’ credentials to access medical
with researchers and doctors through the reading of permis- imaging. According to Fabric’s documentations,14 elliptic curves
sions, where healthcare providers read and write the permission cryptography, based on algorithms of curve prime256v115 and
document. On the other hand, the healthcare provider can be a SHA256, are employed to generate public and private keys aimed
hospital that owns the data. The researcher is an individual or an at stakeholder joining the network. Each stakeholder on the net-
organization dedicated to the extraction of knowledge on health work has a role, and they can be providers, requesters, or data
data. holders. Thus, the blockchain creates digital certificates for user
login to a hospital or its wallet. All credentials are management
4.3. Protocol in the proposed system to a blockchain Certificate Authority (CA). Thus, the peer CA
manages credentials and stores on blockchain if entries are valid.
Fig. 2 shows the flow of the protocol together to algorithms
for requesting images, sharing images, and auditing logs through
the blockchain structure, as well as healthcare provider medical 8 https://www.python.org/.
imaging repository. 9 https://nodejs.org/en/.
In the sequence diagram built based on Unified Modeling Lan- 10 Cancer Imaging Archive - Link.
guage (UML), the doctors, researchers, and healthcare providers 11 https://golang.org/.
also are called stakeholders. Stakeholders query data from an 12 https://github.com/hyperledger/fabric.
interface that connects to the control line query API for request- 13 Github - https://github.com/eriksonJAguiar/Blockchain-Token-DICOM.
ing images. Query API interprets events that occurred in object 14 https://hyperledger-fabric.readthedocs.io/en/release-2.2/identity/identity.
≪: interface ≫ and relays them to the Blockchain, responsible html.
for data management, storage, devices, message broker, flow, 15 https://datatracker.ietf.org/doc/html/rfc8422.
354
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
Fig. 2. Sequence diagram describing the proposed protocol (Algorithms 1, 2, and 3): requesting, sharing, and auditing assets in the blockchain.
5. Experiments and results We set up our experiments in a server Linux, where the
POC system process the transactions is separate in Docker’s con-
We have conducted experimental analyses to demonstrate tainers to simulate the valuable components. We use the TCIA
and validate our proposal using the Hyperleger Fabric platform. dataset accessed from the SSD of the local server to create an
The platform has been set up over a Python script regarding image repository. The image repository was configured as a con-
two aspects, namely blockchain network performance and secu- tainer simulated in a local server to communicate between other
containers such as Healthcare providers, Data holders, and Re-
rity requirements quality. The evaluated security requirements
quester. In simulations, we built ten nodes as dockers containers
followed the quality of a token-generating script based on Python.
to compose a blockchain network, and each stakeholder node
communicates with Certificate Authority, Database, Orderer, and
5.1. Experimental setup API to register transactions. We simulate all nodes in a decentral-
ized network, with nodes communicating without a third party to
The experimental platform consisted of the Blockchain frame- manage transactions and share images. Finally, our simulations
work Hyperledger Fabric running on 10 Docker containers, which have actors nodes, such as Requester, Healthcare Providers, and
represented the full nodes of the network for the performance Data holder. A Requester demands an image from a Health-
evaluation. The server’s hardware comprehends an AMD Ryzen care provider that stores images in a repository and the Data
7 CPU of 32 GB Ram and Solid-state drive (SSD) for high-speed holder that allows/declines access to its data. The healthcare
data persistence in the blockchain world state database. The provider is a container that communicates with the data holder,
database used in the experiments had around 7.5 GB of DICOM requests access to data, and forwards images to the Requester af-
ter the owner is allowed. In summary, we simulate the blockchain
files from the National Cancer Institute’s dataset [34,35]. We
network and collect metrics using the Hyperledger Caliper.
sent the images from the database emulated locally, resulting
The security features validate the hypothesis based on the
in low latency to query. However, when the dataset joins with
evaluation of hash security quality. The properties of the to-
blockchain, the latency grows. We ran experiments 30 times,
ken were evaluated by Levenstein’s similarity and Shannon en-
considering results with a 95% confidence interval. We conducted tropy [36]. Token properties are essential to validate that the hash
our experiments in a single machine by simulating a distributed is collision-resistant and can be a component to help the system
environment composed of peers, healthcare providers, patients, to be tamper-proof-free.
and requesters (doctors and researchers). Likewise, we employed
the Hyperledger Caliper to organize simulations and configure 5.2. Network performance analysis
nodes, distributed machines, on the network.
Furthermore, we configure a single machine with Hyperledger The analysis of the blockchain network’s performance aimed
fabric blockchain, our API, providers, and requesters to execute at ensuring a low cost of Hyperledger Fabric network for the ex-
these algorithms. Although we used a single machine, we built change of assets, differently from Bitcoin and Ethereum. Figs. 3(a)
a simulation environment for distributed systems from Hyper- and 3(b) show the growth in CPU and memory usage, respec-
ledger Caliper.16 The environment was composed of blockchain tively. Regarding the testing execution, a significant amount of
peers, healthcare providers that store images, and requesters who transactions were submitted to transfer images between network
want to get imaging to study. peers.
The network latency was checked, as displayed in Fig. 3(c),
towards faster and more suitable transactions for healthcare sys-
16 https://github.com/hyperledger/caliper. tems. The boxplot related to each network part illustrates (i)
355
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
Fig. 3. Performance analyses of the proposed proof of concept in terms of consumption of system resources.
Table 2
Performance analysis of components in the blockchain network.
Metric Mean Median Standard deviation Maximum Minimum
CPU % 7.33 7 2.94 20 1
Hardware usage
Memory (%) 4.43 5 0.96 7 1
Storage (s) 49.96 50.50 24.84 93 1
API BC (s) 37.34 38 21.72 74 1
Network latency Orderer (s) 36.77 36 21.55 74 1
Peers (s) 45.45 46 25.21 88 1
CouchDB (s) 20.22 18 13.52 55 1
latency in image files transferred from the healthcare provider to values, namely tokens. It trailed the birthday attack model to
the requester, (ii) latency in interaction with blockchain external check possible hash collisions from similarities in the hash found
user, (iii) latency of the orderer (orderer are nodes responsible for in DICOM files [37]. The birthday paradox enabled the proba-
managing and ordering transactions of organizations) that com- bility of users of the same birthday date being in the room.
municates with all peers, (iv) latency in peers interaction with the The method can also map the hash collisions probability using
smart contract installed, and (v) latency of CouchDB Hyperledger bit numbers, such as in SHA-256 algorithm, for the counting of
Fabric database. The blockchain performance evaluation repre- collision values [38].
sents the exchange of information in a healthcare scenario. For We quantify the similarity among generated tokens, aiming to
such a use case, the network shows increasing peaks of memory analyze their properties by calculating the Levenstein distance of
and CPU. Our hardware evaluations consisted of receive trans- each token. This process represents the probability of generation
actions in blockchain from requesters to healthcare providers. of a new hash token similar to the one contained in the DICOM
The communication interval outlined for a distinct part of the file [36]. The token describes a key for auditing stakeholder access
network identified the highest latency in connection with the to DICOM images. Levenstein distance defines closer to zero, more
image files stored and peers since storage has sizeable amounts similar two values are; therefore, a token is close to another
of DICOM files and peers interact directly with blockchain, thus new one in case of a small Levenstein distance. Malicious users
causing delays. might try to generate equal hash values for tampering access and
Regarding overhead from statistical metrics, we measured a performing image leakage. Shannon’s entropy, given by Eq. (1),
central position and dispersion of the values found. Table 2 lists where each value for x1 , x2 , . . . , xn ∈ a random variable X, com-
such metrics for a summary of samples, describing the character-
pares the randomness level of the token generated. Therefore,
istics of the variables. The hardware metrics display low machine
collision attacks by brute-forcing hash values are non-feasible to
resource usage, resulting in average values of 7% CPU usage and
tamper since the probability of an attacker inferring with the
5% memory usage. The hardware quantities analyzed revealed
actual hash from a distribution pattern is very low [39].
a low variance of CPU and memory. Therefore, their values are ∑
close to the expected one — the mean value. The results also Et (X ) = − p(x)log2 p(x). (1)
showed that the hardware is suitable for applications to medical x∈X
systems since it consumes limited resources of the machines, and
it is scalable for a large number of peers using the Hyperledger Our solution requirements were validated to combine
Fabric framework. [22]. The network evaluation considered the blockchain for auditing and token hash to create unique DICOM
latency values for each part of the network. Each part of the images. The validation step analyzed the probability of the sys-
network required a longer time, around 50.50seconds on average, tem resisting attacks for hash invalidation or collision through
for sending assets to storage in the blockchain due to the large experiments.
size of the DICOM files. The blockchain network also showed high The first set of analyses investigated entropy and similarity re-
latency due to consensus mechanisms and the necessity of node garding token quality, as summarized in Table 3. Such quantities
response for validating transactions. However, Hyperledger Fabric are essential for studies on typical and variable values, obtaining
blockchain is light for sharing medical imaging compared to other a string similar to one of the tokens was generated in previous
alternatives, such as Bitcoin and Ethereum [22]. iterations.
Table 3 shows the entropy and similarity values to describe the
5.3. Security performance analysis low probability of the malicious node getting a similar tracking
token, which aims to tamper with the network. Thus, a low
We checked the quality of our proposal’s security require- probability increases the complexity of finding a valid token for
ments from the similarity and entropy of the generated hash tampering. This difficulty in tampering allows for security and
356
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
• Privacy policy. Our approach provides a more reliable sys- The experimental results clearly answered our hypothesis,
tem for complying with privacy regulations; it addresses revealing that the applied system has large entropy. Similarity
the question of accountability with regard to data leakage implied a tracking token of hard breakage, since an attacker must
detection when the sharing is poorly handled. This process is have a more profound knowledge of the network for inferring a
based on immutable audit blockchain to find the stakeholder valid token. Besides, the system offers an interface for auditing
(who has a requester role) who requested the leakage image logs by the auditing entity to identify DICOM imaging leakages
through a token stored in the metadata. and transfer leakage accountability to the stakeholder that re-
quested the images. Therefore, stakeholders obtain images based
According to our findings, we believe the blockchain-based
on logs stored in the blockchain and use the token as the recovery
protocol for tracking shared DICOM images can contribute to
key.
auditing, provenance, and protection of healthcare systems and
provide accountability of stakeholder requests for sharing data. Experimental results also allowed to characterize the proto-
Moreover, it has responded to our following hypothesis: col’s behavior in sharing medical images based on PDF and CDF
analyses. Even though it shows a token, the behavior appears to
‘‘A protocol blockchain-base can ensure accountability and have a low probability of a malicious user getting a similar value.
auditability for healthcare record leakages using immutable The token can enhance the reliability to distribute the images, and
logs and a unique token inserted in metadata of DICOM file it guarantees who access it.
images’’. In terms of this work’s limitations, we can mention that we did
not implement an interactive interface for entity to audit logs and
For characterizing the protocol to sharing medical imaging, our
analyze provenance. Furthermore, only one image format was
research has revealed that an attacker has a low probability of
adopted in our study – DICOM. Nevertheless, we argue that other
discovering a similar token from patterns known by the network.
media formats can be easily included as our implementation
Therefore, the analyses metrics demonstrated that the random-
ness feature of the token hampers collision or birthday attacks is highly modularized. We addressed only one type of attack,
for tampering with the token in DICOM images. and our proposed approach can be tested against other types
The protocol design ensures immutable logs for auditing of attacks, such as Sybil, Distributed denial-of-service, Routing
tamper-free by the Information Technology Manager. The au- attack, and Eclipse attack [42].
diting entity can analyze the provenance of data employing the
blockchain structure, and data holders can consult the purpose 7. Conclusions and future work
of data use. The hardware metrics proved the system’s suitability
for applications to healthcare systems according to its acceptable This research article has outlined the problem statement and
latency values, throughput, CPU usage, and memory usage. The presented a protocol for tracking requesters’ access to shared
system can be added to usual healthcare systems for enhanc- medical data, including images. We have conducted several stud-
ing their security and reliability. Thus, researchers can access ies on the existing gap and identified that tracking medical imag-
traceable data for protection against leakages. ing has not been fully addressed. Hence, our work targeted this
358
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
359
E.J. de Aguiar, A.J. dos Santos, R.I. Meneguette et al. Future Generation Computer Systems 134 (2022) 348–360
[23] J. Liu, X. Li, L. Ye, H. Zhang, X. Du, M. Guizani, BPDS: A blockchain based [42] S. Aggarwal, N. Kumar, Attacks on blockchain, in: Advances in Computers,
privacy-preserving data sharing for electronic medical records, in: 2018 2021, pp. 399–410, http://dx.doi.org/10.1016/bs.adcom.2020.08.020.
IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, [43] N. Peek, M. Sujan, P. Scott, Digital health and care in pandemic times:
2018, pp. 1–6, http://dx.doi.org/10.1109/GLOCOM.2018.8647713. impact of COVID-19, BMJ Health Care Inform. 27 (1) (2020) http://dx.doi.
[24] S. Xuan, L. Zheng, I. Chung, W. Wang, D. Man, X. Du, W. Yang, M. Guizani, org/10.1136/bmjhci-2020-100166.
An incentive mechanism for data sharing based on blockchain with smart
contracts, Comput. Electr. Eng. 83 (2020) 106587, http://dx.doi.org/10. Erikson Júlio de Aguiar is a Ph.D. student in the
1016/j.compeleceng.2020.106587. Institute of Mathematics and Computer Science (ICMC)
[25] A. Al-Omar, M.Z.A. Bhuiyan, A.B. Kiyomoto, Shinsaku, M.S. Rahman, at the University of São Paulo (USP). He received
Privacy-friendly platform for healthcare data in cloud based on blockchain his M.Sc. degree in Computer Science from Univer-
environment, Future Gener. Comput. Syst. 95 (2019) 511–521, http://dx. sity of São Paulo (USP) in 2021. He completed his
doi.org/10.1016/j.future.2018.12.044. B.Sc. in Computer Science at the State University of
[26] B. Shen, J. Guo, Y. Yang, MedChain: Efficient healthcare data sharing Northern Paraná (UENP) in 2017. His main research in-
via blockchain, Appl. Sci. 9 (6) (2019) 1207, http://dx.doi.org/10.3390/ terest includes Blockchain, Security & Privacy, Machine
app9061207. Learning, Deep Learning, and Computer Vision.
[27] C.P. Langlotz, B. Allen, B.J. Erickson, J. Kalpathy-Cramer, K. Bigelow, T.S.
Cook, A.E. Flanders, M.P. Lungren, D.S. Mendelson, J.D. Rudie, G. Wang, K.
Kandarpa, A roadmap for foundational research on artificial intelligence
in medical imaging: From the 2018 NIH/RSNA/ACR/the academy work- Alyson de Jesus dos Santos received his D.Sc. degree
shop, Radiology 291 (3) (2019) 781–791, http://dx.doi.org/10.1148/radiol. in electrical engineering from Federal University of Rio
2019190613. de Janeiro (UFRJ), Brazil, in 2016 and the M.Sc. degree
[28] J.O. Silva, N. Calegari, E.S. Gomes, After Brazil’s general data protection in electrical engineering from Federal University of
law: Authorization in decentralized web applications, in: Companion of Amazonas (UFAM), Brazil, in 2011. Currently, he is a Di-
the World Wide Web Conference, 2019, pp. 819–822, http://dx.doi.org/10. rector of Information Technology at the Department of
1145/3308560.3316461. Administration and Management of Amazonas (SEAD-
[29] G.P. Reddy, A. Narayana, P.K. Keerthan, B. Vineetha, P. Honnavalli, Multiple AM), and an assistant Professor at Instituto Federal de
hashing using SHA-256 and MD5, in: Advances in Computing and Network Ciencia e Tecnologia do Amazonas (IFAM).
Communications, 2021, pp. 643–655.
[30] D.D.F. Maesa, P. Mori, L. Ricci, A blockchain based approach for the defini-
tion of auditable access control systems, Comput. Secur. 84 (2019) http:// Rodolfo Ipolito Meneguette, Bachelor of Computer Sci-
dx.doi.org/10.1016/j.cose.2019.03.016, URL https://www.sciencedirect.com/ ence from Universidade Paulista (UNIP) in 2006. Master
science/article/pii/S0167404818309398. of Computer Science from Federal University of São
[31] D. Marbouh, T. Abbasi, F. Maasmi, I.A. Omar, M.S. Debe, K. Salah, R. Carlos (UFSCar) in 2009. Doctor of Computer Science
Jayaraman, S. Ellahham, Blockchain for COVID-19: Review, opportunities, from Universidade Estadual de Campinas (UNICAMP)
and a trusted tracking system, Arab. J. Sci. Eng. 45 (12) (2020) 9895–9911, in 2013. Post-doctoral student from the University of
http://dx.doi.org/10.1007/s13369-020-04950-4. Ottawa (UOttawa) in 2017. He is currently a professor
[32] X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, A survey on the security of at the Institute of Mathematical and Computer Sciences
blockchain systems, Future Gener. Comput. Syst. 107 (2017) 1–13, http: (ICMC) at the University of São Paulo (USP). Leader of
//dx.doi.org/10.1016/j.future.2017.08.020. the Internet of Things research group with a focus on
[33] W. Cai, Z. Wang, J.B. Ernst, Z. Hong, C. Feng, V.C.M. Leung, Decentralized urban computing. His line of research is in intelligent
applications: The blockchain-empowered software system, IEEE Access 6 transport systems, vehicular networks, clouds, mobility management.
(2018) 53019–53033, http://dx.doi.org/10.1109/ACCESS.2018.2870644.
[34] National Cancer Institute Clinical Proteomic Tumor Analysis Consortium
(CPTAC), Radiology data from the clinical proteomic tumor analysis consor- Robson E. De Grande is an Associate Professor in the
tium cutaneous melanoma [cptac-cm] collection [data set], in: The Cancer Department of Computer Science at Brock University,
Imaging Archive, 2018, http://dx.doi.org/10.7937/k9/tcia.2018.odu24gze. Canada. He received his Ph.D. degree in Computer
[35] K. Clark, B. Vendt, K. Smith, J. Freymann, J. Kirby, P. Koppel, S. Moore, S. Science from the University of Ottawa, Canada, in 2012.
Phillips, D. Maffitt, M. Pringle, et al., The Cancer Imaging Archive (TCIA): His research interests include large-scale distributed
maintaining and operating a public information repository, J. Digit. Imaging and mobile systems, cloud computing, performance
26 (6) (2013) 1045–1057. modeling and simulation, computer networks, vehic-
[36] L. Metcalf, W. Casey, Cybersecurity and Applied Mathematics, 2016, pp. ular networks, intelligent transportation systems, and
1–189, http://dx.doi.org/10.1016/B978-0-12-804452-0.09992-9. distributed simulation systems, actively contributing in
[37] M.R.K. Soltanian, I.S. Amiri, Chapter 3 - Problem solving, investigating these areas. He has served as technical program and
ideas, and solutions, in: Theoretical and Experimental Methods for De- special session co-chair of several IEEE and ACM spon-
fending Against DDOS Attacks, 2016, pp. 33–45, http://dx.doi.org/10.1016/ sored conferences, including IEEE/ACM DS-RT, ACM MobiWac, ACM DIVANet,
B978-0-12-805391-1.00003-1. and IEEE DCOSS International Workshop on Urban Computing.
[38] S. Su, T. Xie, S. Lü, A provably secure non-iterative hash function resisting
birthday attack, Theoret. Comput. Sci. 654 (2016) 128–142, http://dx.doi.
Jó Ueyama is a Professor of the Institute of Mathe-
org/10.1016/j.tcs.2016.02.023.
matics and Computer Science (ICMC) at the University
[39] I. Wagner, D. Eckhoff, Technical privacy metrics: A systematic survey, ACM
of São Paulo (USP). Prof. Ueyama is also a Brazilian
Comput. Surv. 51 (3) (2018) http://dx.doi.org/10.1145/3168389.
Research Council (CNPq) fellow. He completed his Ph.D.
[40] A.K. Al-Ani, M. Anbar, S. Manickam, A. Al-Ani, DAD-match; security tech-
in computer science at the University of Lancaster
nique to prevent denial of service attack on duplicate address detection
(England) in 2006. Before joining USP, he was a re-
process in IPv6 link-local network, PLOS ONE 14 (4) (2019) 1–20, http:
search fellow at the University of Kent at Canterbury
//dx.doi.org/10.1371/journal.pone.0214518.
(England). Jó has published 53 journal articles and more
[41] D.G. Altman, J.M. Bland, Statistics notes: The normal distribution, BMJ 310
than 100 conference papers. His main research interest
(6975) (1995) http://dx.doi.org/10.1136/bmj.310.6975.298.
includes Computer Networks, Security, and Blockchain.
360