Leveraging Blockchain Technology for Auditable and Privacy-Friendly Data Exchange in Teleradiology Networks   

Abdulelah Hassan Alhathiq (1), Abdullah Ahmed Rayyani (1), Mohammed Nasser Khawaji (2), Jebril Mohammed Mabuj (2), Akram Hadi Radwan (2), Lama Nasser Aloraini (3), Amjad Rashed Alorf (2), Heba Saad Alarifi (4), Sami Abdulaziz Alhuwaimel (5), Lina Abdulaziz Alrashed (6)
(1) Sabya General Hospital,Ministry of Health, Saudi Arabia,
(2) Ministry Of Health, Saudi Arabia,
(3) Primary health care Hijrat Se'ed, health security, Ministry Of Health, Saudi Arabia,
(4) Huraymla General Hospital, Health Security, Ministry of Health, Saudi Arabia,
(5) Third Health Cluster Health Security, Ministry of Health, Saudi Arabia,
(6) Huraymila General Hospital, Health Security- Ministry Of Health, Saudi Arabia

Abstract

Background: Teleradiology, distant transmission and interpretation of medical images, has revolutionized healthcare by increasing diagnostic availability, particularly in underserved communities. However, its digital platform is vulnerable to threats of data breaches and invasions of privacy, with healthcare data breaches costing $2.1 million per breach in 2015. Aim: This review aims to address the history of safe data transmission and privacy protection in teleradiology, particularly through technological advancements, regulatory settings, ethical considerations, and challenges. Methods: A systematic review was conducted, and articles were fetched from PubMed, Scopus, IEEE, and ACM Digital Library. Keywords used were "teleradiology," "secure data exchange," and "privacy." Two tables of principal technologies and regulatory frameworks are given. Results: Advances in encryption, blockchain, AI, and IoMT provide security, but scalability, computational complexity, and regulation gaps pose obstacles. Ethical issues, including patient autonomy and trust, remain paramount. Case studies demonstrate that blockchain and AI are reducing tampering and data breaches. Conclusion: Security in teleradiology requires hybrid models, global regulatory harmonization, and patient-centric privacy frameworks to serve the requirements of access and protection. Scalability and equity must be tackled in future studies.

Full text article

Generated from XML file

References

Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur), 51(4), 1-35. https://doi.org/10.1145/3214303

Alhammad, N., Alajlani, M., Abd-Alrazaq, A., Epiphaniou, G., & Arvanitis, T. (2024). Patients’ perspectives on the data confidentiality, privacy, and security of mHealth apps: systematic review. Journal of Medical Internet Research, 26, e50715. doi: 10.2196/50715

Amatayakul, M. (2000). Security measures required for HIPAA privacy. Journal of Healthcare Information Management: JHIM, 14(4), 5-12. PMID: 11190262.

Bigini, G., & Lattanzi, E. (2022). Toward the interplanetary health layer for the internet of medical things with distributed ledgers and storages. IEEE Access, 10, 82883-82895. doi: 10.1109/ACCESS.2022.3196933.

Burghard, C. (2012). Big data and analytics key to accountable care success. IDC health insights, 1, 1-9.

El Majdoubi, D., El Bakkali, H., Sadki, S., Maqour, Z., & Leghmid, A. (2022). The systematic literature review of privacy‐preserving solutions in smart healthcare environment. Security and Communication Networks, 2022(1), 5642026. https://doi.org/10.1155/2022/5642026

Esposito, C., De Santis, A., Tortora, G., Chang, H., & Choo, K. K. R. (2018). Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE cloud computing, 5(1), 31-37. doi: 10.1109/MCC.2018.011791712

Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., ... & Steinhubl, S. R. (2016). Privacy and security in the era of digital health: what should translational researchers know and do about it?. American journal of translational research, 8(3), 1560. PMID: 27186282; PMCID: PMC4859641

Gentry, C. (2019). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st ACM Symposium on Theory of Computing, 169–178. https://doi.org/10.1145/1536414.1536440

Goelz, L., Arndt, H., Hausmann, J., Madeja, C., & Mutze, S. (2021, December). Obstacles and solutions driving the development of a national teleradiology network. In Healthcare (Vol. 9, No. 12, p. 1684). MDPI. https://doi.org/10.3390/healthcare9121684

Hameed, S. S., Hassan, W. H., Latiff, L. A., & Ghabban, F. (2021). A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Computer Science, 7, e414. DOI: 10.7717/peerj-cs.414

Hossain, M., Islam, S. R., & Ali, M. (2020). Blockchain-based secure data sharing in healthcare systems. Journal of Medical Systems, 44(12), 1–12. https://doi.org/10.1007/s10916-020-01634-6

Hsu, W. W. Q., Chan, E. W. Y., Zhang, Z. J., Lin, Z. X., Bian, Z. X., & Wong, I. C. K. (2015). Chinese medicine students’ views on electronic prescribing: A survey in Hong Kong. European Journal of Integrative Medicine, 7(1), 47-54. https://doi.org/10.1016/j.eujim.2014.09.134

Jaiman, V., Pernice, L., & Urovi, V. (2022). User incentives for blockchain-based data sharing platforms. Plos one, 17(4), e0266624. https://doi.org/10.1371/journal.pone.0266624

Kruse, C. S., Argueta, D. A., Lopez, L., & Nair, A. (2015). Patient and provider attitudes toward the use of patient portals for the management of chronic disease: a systematic review. Journal of medical Internet research, 17(2), e40. doi: 10.2196/jmir.3703

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263

Kumar, M., Kumar, A., Verma, S., Bhattacharya, P., Ghimire, D., Kim, S. H., & Hosen, A. S. (2023). Healthcare Internet of Things (H-IoT): Current trends, future prospects, applications, challenges, and security issues. Electronics, 12(9), 2050. https://doi.org/10.3390/electronics12092050

Lakhan, A., Mohammed, M. A., Nedoma, J., Martinek, R., Tiwari, P., Vidyarthi, A., ... & Wang, W. (2022). Federated-learning based privacy preservation and fraud-enabled blockchain IoMT system for healthcare. IEEE journal of biomedical and health informatics, 27(2), 664-672. doi: 10.1109/JBHI.2022.3165945

Meisner, M. (2017). Financial consequences of cyber attacks leading to data breaches in healthcare sector. Copernican Journal of Finance & Accounting, 6(3), 63-73. https://doi.org/10.12775/CJFA.2017.017

Newaz, A. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2021). A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions on Computing for Healthcare, 2(3), 1-44. https://doi.org/10.1145/3453176

Nifakos, S., Chandramouli, K., Nikolaou, C. K., Papachristou, P., Koch, S., Panaousis, E., & Bonacina, S. (2021). Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors, 21(15), 5119. https://doi.org/10.3390/s21155119

OECD. (2013). Data-driven healthcare innovation, management and policy, DELSA/HEA (2013) 13.

Razaque, A., Amsaad, F., Abdulgader, M., Alotaibi, B., Alsolami, F., Gulsezim, D., ... & Hariri, S. (2022). A mobility-aware human-centric cyber–physical system for efficient and secure smart healthcare. IEEE Internet of Things Journal, 9(22), 22434-22452. doi: 10.1109/JIOT.2021.3140090

Shrivastava, U., Song, J., Han, B. T., & Dietzman, D. (2021). Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. International Journal of Medical Informatics, 148, 104401. https://doi.org/10.1016/j.ijmedinf.2021.104401

Simplicio, M. A., Iwaya, L. H., Barros, B. M., Carvalho, T. C., & Näslund, M. (2014). SecourHealth: a delay-tolerant security framework for mobile health data collection. IEEE journal of biomedical and health informatics, 19(2), 761-772. doi: 10.1109/JBHI.2014.2320444

Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017, July). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In 2017 International Conference on Signal Processing and Communication (ICSPC) (pp. 288-293). IEEE. doi: 10.1109/CSPC.2017.8305855

Strehle, E. M., & Shabde, N. (2006). One hundred years of telemedicine: does this new technology have a place in paediatrics?. Archives of disease in childhood, 91(12), 956-959. https://doi.org/10.1136/adc.2006.099622

Tong, Y., Sun, J., Chow, S. S., & Li, P. (2013). Cloud-assisted mobile-access of health data with privacy and auditability. IEEE Journal of biomedical and health Informatics, 18(2), 419-429. doi: 10.1109/JBHI.2013.2294932

White, P. (2002). Legal issues in teleradiology—distant thoughts!. The British Journal of radiology, 75(891), 201-206. https://doi.org/10.1259/bjr.75.891.750201

Williamson, S. M., & Prybutok, V. (2024). Balancing privacy and progress: a review of privacy challenges, systemic oversight, and patient perceptions in AI-driven healthcare. Applied Sciences, 14(2), 675. https://doi.org/10.3390/app14020675

Xie, Y., Zhang, K., Kou, H., & Mokarram, M. J. (2022). Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing. Journal of Cloud Computing, 11(1), 38. https://doi.org/10.1186/s13677-022-00300-x

Zhang, P., Schmidt, D. C., White, J., & Lenz, G. (2018). Blockchain technology use cases in healthcare. In Advances in computers (Vol. 111, pp. 1-41). Elsevier. https://doi.org/10.1016/bs.adcom.2018.03.006

Authors

Abdulelah Hassan Alhathiq
abady2012_6@hotmail.com (Primary Contact)
Abdullah Ahmed Rayyani
Mohammed Nasser Khawaji
Jebril Mohammed Mabuj
Akram Hadi Radwan
Lama Nasser Aloraini
Amjad Rashed Alorf
Heba Saad Alarifi
Sami Abdulaziz Alhuwaimel
Lina Abdulaziz Alrashed
Alhathiq, A. H., Rayyani, A. A., Khawaji, M. N., Mabuj , J. M., Radwan, A. H., Aloraini, L. N., … Alrashed, L. A. (2025). Leveraging Blockchain Technology for Auditable and Privacy-Friendly Data Exchange in Teleradiology Networks   . Saudi Journal of Medicine and Public Health, 2(2), 470–477. https://doi.org/10.64483/jmph-137

Article Details

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)