Aldhyani, Theyazn H. H., Ghanem, Mohamed Chahine and Almaayah, Mohammed (2025) Secure blockchain-based tracking storage and permission verification of electronic health records. Journal of Cyber Security and Risk Auditing, 2025 (3). pp. 103-122. ISSN 3079-5354
Blockchains provide a unique approach to storing healthcare data, conducting healthcare transactions, and proving the trustworthiness of healthcare data in the context of a decentralized and open healthcare network ecosystem. Blockchain technology for healthcare businesses, whether for internal operations or collaborative research, is causing continuing debate regarding the potential risks to user data security and privacy. Despite considerable interest and attention from the corporate, government, and academic sectors, blockchain technology deployment in the healthcare business is still in its early stages. Blockchain technology has the potential to greatly boost patient data security in the healthcare industry. We not only understand the problems and expectations associated with security and privacy, but we also provide effective ways and procedures for overcoming these concerns via the use of technology. The first stage in using blockchains in the healthcare business is determining what features and standards are required to ensure the secure and effective transfer of electronic health information. Then we look at the technologies that may be utilized to offer the essential security and privacy aspects for each of the three potential blockchain uses in the healthcare business. In terms of the sharing of electronic medical records, blockchain technology has three potential uses blockchain technology to validate a patient's identity is standard. The previous work highlighted numerous potential uses of blockchain technology in healthcare. Many various types of information will be exchanged, including ideas, risks, requirements, development tools, system designs, and deployment strategies. Based on the findings of our poll, we were able to make some plausible assumptions regarding the problem.
Available under License Creative Commons Attribution 4.0.
Download (1MB) | Preview
![]() |
View Item |
Lists
Lists