ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks

Size: px
Start display at page:

Download "ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks"

Transcription

1 ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks Tsung-Ting Kuo, Chun-Nan Hsu, and Lucila Ohno-Machado pscanner Face-to-Face Meeting October 13, 2016 Office of the National Coordinator for Health IT Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

2 Predictive Modeling Healthcare predictive modeling Machine learning from healthcare data to predict outcomes Cross-institutional healthcare predictive modeling More generalizable models Comparative effectiveness research, biomedical discovery, patient-care, etc. Especially for large research network like pscanner Site 1 Hard to predict outcomes Records = 10 Records = 1,500 Feasible to predict outcome Patient Records = 10 Patients Patients Records = 760 Records = 380 Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

3 Protecting Privacy of Individuals Challenge of cross-institutional predictive modeling Improper disclosure of protected heath information (PHI) Privacy-preserving algorithms transfer models but not PHI Many methods exist [Wu et al. 2012] [Li et al. 2015] [Wang et al. 2013] [Yan et al. 2013] Share observation-level patient healthcare data Privacy-preserving predictive modeling algorithms Share partially-trained machine learning models Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

4 Risk for Existing Algorithms Centralized architecture Institutional policies Single-point-of-failure/breach Sites cannot join/leave at any time Mutable data and records Consensus/synchronization issues Central Server Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

5 The Blockchain Technology Desirable features Decentralized architecture» Peer-to-peer» Sites keep full control of resources» No risk of single-point-of-failure Sites can join/leave freely» No central server overhead» No disruption of learning process Immutable audit trail» Tampering is difficult Block B1 Block B2 Hash of Block B0 Nonce N1 Hash of Block B1 Nonce N2 Transaction T1 1 Transaction T1 2 Transaction T2 1 Transaction T2 2 Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

6 ModelChain 1. Privacy-preserving online machine learning on blockchains 2. Transaction metadata to transfer partial models and info 3. Proof-of-information algorithm to decide order of learning Site 1 Model M1 1 Site 2 Block B1 Hash of Block B0 Nonce N1 Block B2 Hash of Block B1 Nonce N2 Model M1 1 Model NULL Transaction T1 12 Flag TRANSFER Hash HASH (M1 1 ) Error E1 2 Model M2 2 Transaction T2 22 Flag UPDATE Hash HASH (M2 2 ) Error E2 2 Model M2 2 Model M1 1 Site 3 Model M2 2 Site 4 Model M3 3 Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

7 Summary Blockchain infrastructure as in Bitcoin ModelChain: distributed predictive models across institutes Privacy protection by exchange of model, not patient data No single-point-of-failure Verified data provenance Secure record of transactions Improved interoperability White paper and full slides: Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

8 Acknowledgement The authors would like to thank Xiaoqian Jiang, PhD, and Shuang Wang, PhD for very helpful discussions All authors are funded by PCORI CDRN LO-M is funded by NIH U54HL108460, UL1TR001442, and VA I01HX Tsung-Ting Kuo PhD Chun-Nan Hsu PhD Lucila Ohno-Machado MD, PhD Xiaoqian Jiang PhD Shuang Wang PhD Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

9 Thank you! Questions? Supported by the Patient-Centered Outcomes Research Institute (PCORI) Contract CDRN

Statistical and Synthetic Data Sharing with Differential Privacy

Statistical and Synthetic Data Sharing with Differential Privacy pscanner and idash Data Sharing Symposium UCSD, Sept 30 Oct 2, 2015 Statistical and Synthetic Data Sharing with Differential Privacy Li Xiong Department of Mathematics and Computer Science Department of

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks

ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks Tsung-Ting Kuo, PhD 1 and Lucila Ohno-Machado, MD, PhD 1,2 1 UCSD Health System Department

More information

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx Health Data & Blockchain: The New Sharing Frontier Michael Dillhyon, CCO, Graftworx Twitter: @SwissGator Overview Who? Background Why? Enterprise & Consumer Benefit What? (Blockchain of course) Value Prop

More information

Physical Access Control Management System Based on Permissioned Blockchain

Physical Access Control Management System Based on Permissioned Blockchain Physical Access Control Management System Based on Permissioned Blockchain Sara Rouhani Department of Computer Science University of Saskatchewan Saskatoon, Canada sara.rouhani@usask.ca Vahid Pourheidari

More information

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets Jeffrey Brown, Lesley Curtis, and Rich Platt June 13, 2014 Previously The NIH Collaboratory:

More information

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw REPRINT H03I15 PUBLISHED ON HBR.ORG MARCH 03, 2017 ARTICLE TECHNOLOGY The Potential for Blockchain to Transform Electronic Health Records by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw This article

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health

More information

On the design of a Blockchain-based system to facilitate Healthcare Data Sharing

On the design of a Blockchain-based system to facilitate Healthcare Data Sharing On the design of a Blockchain-based system to facilitate Healthcare Data Sharing Anastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras CERTH / ITI Thessaloniki,

More information

January 16, Re: Request for Comment: Data Access and Data Sharing Policy. Dear Dr. Selby:

January 16, Re: Request for Comment: Data Access and Data Sharing Policy. Dear Dr. Selby: Dr. Joe V. Selby, MD, MPH Executive Director Patient-Centered Outcomes Research Institute 1828 L Street, NW, Suite 900 Washington, DC 20036 Submitted electronically at: http://www.pcori.org/webform/data-access-and-data-sharing-policypublic-comment

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

Steering Committee Meeting

Steering Committee Meeting Steering Committee Meeting To hear the meeting, you must call in Toll-free phone number: 1-866-740-1260 Access Code: 2201876 For international call in numbers, please visit: https://www.readytalk.com/account-administration/international-numbers

More information

Blockchain and Additive Manufacturing

Blockchain and Additive Manufacturing Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo

More information

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain.

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. 1 The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. This document provides and explains in detail the technical

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali Blockstack, a New Internet for Decentralized Apps Muneeb Ali The New Internet Problems with the traditional internet End-to-end design principle for the Internet. *1981 Saltzer, Reed, and Clark paper End-to-end

More information

HELIX a Framework For The Future of Healthcare EKG Example. Frank Luijckx 4th-IR

HELIX a Framework For The Future of Healthcare EKG Example. Frank Luijckx 4th-IR HELIX a Framework For The Future of Healthcare EKG Example Frank Luijckx 4th-IR The Symbiotic Application of Machine Intelligence and Blockchain 8/27/18 2 base Architecture RawPatient Record EKG, MRI,

More information

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting 25.2.2016 Helsinki Dr. Kari Korpela, Information Logistics Integration School of Business and Management Lappeenranta University

More information

Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues

Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues Nathan Aw Ming Kun For The Decentralized Internet Infrastructure Research Group (DINRG) at the IETF 103, Bangkok on

More information

Modern key distribution with ClaimChains

Modern key distribution with ClaimChains Modern key distribution with ClaimChains A decentralized Public Key Infrastructure that supports privacy-friendly social verification NEXTLEAP Bogdan Kulynych Marios Isaakidis Carmela Troncoso George Danezis

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

Comments submitted at: ange+framework

Comments submitted at:   ange+framework The Honorable Donald Rucker, MD, National Coordinator for Health Information Technology, US Department of Health and Human Services 200 Independence Ave. SW Washington, DC, 20201 Comments submitted at:

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Synapse: Decentralized Intelligence

Synapse: Decentralized Intelligence Synapse: Decentralized Intelligence A Decentralized Data and Machine Learning Network Dan P. Gailey Version 1.0 Abstract Discusses the architecture and protocol specifications for building the infrastructure

More information

Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee 0 Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee Co-Chairs: Walter G. Suarez, MD, Institute for HIPAA/HIT Education

More information

Connected Medical Devices

Connected Medical Devices Connected Medical Devices How to Reduce Risks Inherent in an Internet of Things that Can Help or Harm Laura Clark Fey, Esq., Principal, Fey LLC Agenda Overview of the Internet of Things for Healthcare

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

SMARTDATA: Leveraging Blockchain to Securely Capture & Verify Scientific Provenance Data

SMARTDATA: Leveraging Blockchain to Securely Capture & Verify Scientific Provenance Data UT DALLAS Erik Jonsson School of Engineering & Computer Science SMARTDATA: Leveraging Blockchain to Securely Capture & Verify Scientific Provenance Data Dr.Murat Kantarcioglu Joint work with Aravind Ramachandran

More information

Radix - Tempo. Dan Hughes Abstract

Radix - Tempo. Dan Hughes   Abstract Radix - Tempo Monday 25 t h September, 2017 Dan Hughes www.radix.global Abstract In this paper we present a novel method for implementing a Distributed Ledger that preserves total order of events allowing

More information

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Authors: Stefan Tai, Jacob Eberhardt and Markus Klems Presentation by: Georgiou Zacharias and Paschalides Demetris 1 Overview

More information

Blockchain as a Foundation for Sharing Healthcare Data

Blockchain as a Foundation for Sharing Healthcare Data Blockchain as a Foundation for Sharing Healthcare Data Marek A Cyran 1 Author: 1 Booz Allen Hamilton, Inc., 8283 Greensboro Dr., McLean, VA 22102, United States Corresponding Author: Marek A Cyran at Cyran_Marek2@bah.com

More information

Radix - Tempo. Dan Hughes

Radix - Tempo. Dan Hughes Radix - Tempo Dan Hughes 25 th September 2017 Abstract In this paper we present a novel method for implementing a Distributed Ledger that preserves total order of events allowing for the trustless transfer

More information

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105

More information

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches

More information

The Technology behind Smart Contracts

The Technology behind Smart Contracts The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail

More information

Concurrency and Privacy with Payment Channel Networks

Concurrency and Privacy with Payment Channel Networks Concurrency and Privacy with Payment Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei*, and Srivatsan Ravi Friedrich-Alexander-University Purdue University *TU Vienna

More information

TC307 SG3 - SECURITY & PRIVACY

TC307 SG3 - SECURITY & PRIVACY TC307 SG3 - SECURITY & PRIVACY 6 layers of security 1. Cryptography 2. Blockchain protocol 3. Application 4. Privacy mechanisms 5. Implementation 6. Operation Security issues Cryptography Lots of understanding

More information

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Presented by HIPAA Pros 5th Annual HIPAA Summit Baltimore, Maryland October 31. 2002 Living

More information

Building on to the Digital Preservation Foundation at Harvard Library. Andrea Goethals ABCD-Library Meeting June 27, 2016

Building on to the Digital Preservation Foundation at Harvard Library. Andrea Goethals ABCD-Library Meeting June 27, 2016 Building on to the Digital Preservation Foundation at Harvard Library Andrea Goethals ABCD-Library Meeting June 27, 2016 What do we already have? What do we still need? Where I ll focus DIGITAL PRESERVATION

More information

Clinical Information Security Pre-Purchase Security Assessment Vendor Packet Instructions

Clinical Information Security Pre-Purchase Security Assessment Vendor Packet Instructions Clinical Information Security Pre-Purchase Security Assessment Vendor Packet Instructions Executive Summary Mayo Clinic s primary value is The needs of the patient come first. It is built into our daily

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Blockchain Beyond Bitcoin. Mark O Connell

Blockchain Beyond Bitcoin. Mark O Connell Mark O Connell mark@mkoconnell.com SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material

More information

A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District

A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District Project Overview and Plan Sujansky & Associates, LLC 1. Project Objectives Figure 1. High-level

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

Presenter Info: Bob Calco

Presenter Info: Bob Calco Session Abstract In this talk, Mr. Calco will discuss the use of HL7 FHIR as a data exchange format to (i) facilitate federated data domain reconciliation, (ii) support usable, discreet interfaces at the

More information

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA ljohnson@ffalaw.com INTRODUCTION Cyber attacks increasing Liability/actions resulting

More information

Adapting Blockchain Technology for Scientific Computing. Wei Li

Adapting Blockchain Technology for Scientific Computing. Wei Li Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).

More information

Adapting Blockchain Technology for Scientific Computing. Wei Li

Adapting Blockchain Technology for Scientific Computing. Wei Li Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).

More information

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data Michael F. Huerta, Ph.D. Associate Director, National Library of Medicine Director, Office of Health Information Programs Development

More information

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium

More information

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Li Chen, Kai Chen SING Lab Computer Science and Engineering Hong Kong University of Science and Technology Trust in the Cloud

More information

Connected Health Principles

Connected Health Principles Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6

More information

neblio Next Generation Enterprise Blockchain Solutions v

neblio Next Generation Enterprise Blockchain Solutions v neblio Next Generation Enterprise Blockchain Solutions v20170726 contents Neblio Blockchain 3 4 6 7 14 16 18 19 Abstract Blockchain What is the Neblio Blockchain? Enterprise Adoption & Next Generation

More information

DisLedger - Distributed Concurrence Ledgers 12 August, 2017

DisLedger - Distributed Concurrence Ledgers  12 August, 2017 DisLedger - Distributed Concurrence Ledgers www.disledger.com info@disledger.com 12 August, 2017 This whitepaper describes DisLedger - Distributed Concurrence Ledgers (patent pending) an architecture for

More information

Blockchain Computing Systems in Healthcare

Blockchain Computing Systems in Healthcare s in Healthcare 1 2 3 4 By Conrad Barski, M.D., Stephen Claypool, M.D., and Tony Little, N.D. Introduction Academic computer science first started to notice the technology underlying Bitcoin in early 2013.

More information

Core Technology Development Team Meeting

Core Technology Development Team Meeting Core Technology Development Team Meeting To hear the meeting, you must call in Toll-free phone number: 1-866-740-1260 Access Code: 2201876 For international call in numbers, please visit: https://www.readytalk.com/account-administration/international-numbers

More information

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing & Reimbursement Revenue Cycle Management 8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing and Reimbursement for Physician Offices, Ambulatory Surgery Centers and Hospitals Billings & Reimbursements

More information

Unity and Interoperability Among Decentralized Systems. Chris Gebhardt. The InfoCentral Project

Unity and Interoperability Among Decentralized Systems. Chris Gebhardt. The InfoCentral Project Unity and Interoperability Among Decentralized Systems Chris Gebhardt The InfoCentral Project https://infocentral.org Users, Devices, I/O Software Layer (dynamic, largely declarative) software components

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned

More information

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer Security Rule for IT Staffs J. T. Ash University of Hawaii System HIPAA Compliance Officer jtash@hawaii.edu hipaa@hawaii.edu Disclaimer HIPAA is a TEAM SPORT and everyone has a role in protecting protected

More information

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01 An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01 OPSEC - IETF 101 - London March 2018 Jordi Paillissé, Albert

More information

UC San Diego UC San Diego Electronic Theses and Dissertations

UC San Diego UC San Diego Electronic Theses and Dissertations UC San Diego UC San Diego Electronic Theses and Dissertations Title Information Retrieval in Biomedical Research: From Articles to Datasets Permalink https://escholarship.org/uc/item/660390nr Author Wei,

More information

Secure Enterprise Access to Support Collaboration on Clinical Research

Secure Enterprise Access to Support Collaboration on Clinical Research Secure Enterprise Access to Support Collaboration on Clinical Research Oracle9iR2 Database Security Oracle World, Sept. 9, 2003 Nitin Sawhney, Ph.D. Cal Collins and Tom Hickerson Akaza Research, Cambridge,

More information

WORLDMETER.IO AS INTERNET OF THINGS CONCEPT FOR ENERGY DATA INTEROPERABILITY

WORLDMETER.IO AS INTERNET OF THINGS CONCEPT FOR ENERGY DATA INTEROPERABILITY WORLDMETER.IO AS INTERNET OF THINGS CONCEPT FOR ENERGY DATA INTEROPERABILITY Ewald Hesse Grid Singularity GmbH 14. Symposium Energieinnovation 2016 Graz Energy Market Development Trends Centralized Conventional

More information

Evolving IoT with Smart Objects

Evolving IoT with Smart Objects Evolving IoT with Smart Objects John Soldatos (jsol@ait.gr) Associate Professor Athens Information Technology isprint Workshop, Brussels, September 19th, 2017 Monolithic IoT applications (2005-2010) IoT

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open

More information

The simplified guide to. HIPAA compliance

The simplified guide to. HIPAA compliance The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers! Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized

More information

Distributed Concurrence Ledgers 16 May, 2016

Distributed Concurrence Ledgers  16 May, 2016 Distributed Concurrence Ledgers www.disledger.com info@disledger.com 16 May, 2016 This whitepaper describes DisLedger - Distributed Concurrence Ledgers (patent pending) an architecture for distributed

More information

ETHERNITY DECENTRALIZED CLOUD COMPUTING

ETHERNITY DECENTRALIZED CLOUD COMPUTING ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY

More information

Securing, standardizing, and simplifying electronic health

Securing, standardizing, and simplifying electronic health Securing, standardizing, and simplifying electronic health record audit logs through permissioned blockchain technology Jessie Anderson Senior Honors Thesis Department of Computer Science, Dartmouth College

More information

Securing cross-border exchange of ehealth data in the EU

Securing cross-border exchange of ehealth data in the EU Securing cross-border exchange of ehealth data in the EU Ioannis Komnios KONFIDO Project Coordinator EXUS Software Ltd, NCSR "Demokritos", Athens, Greece KONFIDO means Trust in Esperanto 2 KONFIDO Consortium

More information

Distributed Ledger With Secure Data Deletion

Distributed Ledger With Secure Data Deletion Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the

More information

Reproducible Workflows Biomedical Research. P Berlin, Germany

Reproducible Workflows Biomedical Research. P Berlin, Germany Reproducible Workflows Biomedical Research P11 2018 Berlin, Germany Contributors Leslie McIntosh Research Data Alliance, U.S., Executive Director Oya Beyan Aachen University, Germany Anthony Juehne RDA,

More information

Protecting PHI in the Cloud. Session #47, February 20, 2017 Kurt J. Long, Founder & CEO, FairWarning, Inc.

Protecting PHI in the Cloud. Session #47, February 20, 2017 Kurt J. Long, Founder & CEO, FairWarning, Inc. Protecting PHI in the Cloud Session #47, February 20, 2017 Kurt J. Long, Founder & CEO, FairWarning, Inc. 1 Speaker Introduction Kurt J. Long Founder & CEO FairWarning, Inc. 2 Conflict of Interest Kurt

More information

Richard Marciano Alexandra Chassanoff David Pcolar Bing Zhu Chien-Yi Hu. March 24, 2010

Richard Marciano Alexandra Chassanoff David Pcolar Bing Zhu Chien-Yi Hu. March 24, 2010 Richard Marciano Alexandra Chassanoff David Pcolar Bing Zhu Chien-Yi Hu March 24, 2010 What is the feasibility of repository interoperability at the policy level? Can a preservation environment be assembled

More information

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Update History October 19, 2016: The document was revised to reflect the most recent update to the template.

More information

The ABCs of HIPAA Security

The ABCs of HIPAA Security The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Requirements for DIDs (Decentralized Identifiers)

Requirements for DIDs (Decentralized Identifiers) Requirements for DIDs (Decentralized Identifiers) A Requirement from Rebooting the Web of Trust II: ID2020 Design Workshop by Drummond Reed and Les Chasen, Respect Network 1. INTRODUCTION Respect Network

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data

FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data Peng Zhang a, Jules White a, Douglas C. Schmidt a, Gunther Lenz b, S. Trent Rosenbloom c a Department of Electrical Engineering

More information

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 HIPAA in 2017: Hot Topics You Can t Ignore Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 Breach Notification State Law Privacy Rule Authorizations Polices and Procedures The Truth Is Have created

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

HIPAA Security Rule s Technical Safeguards - Compliance

HIPAA Security Rule s Technical Safeguards - Compliance www.getfilecloud.com HIP Security Rule s Technical Safeguards - Compliance Note: This white paper is intended to provide an overview and is not intended to provide legal advice. For more comprehensive

More information

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,

More information

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information