SlideShare a Scribd company logo
1 of 43
Blockchain technology
in (life) sciences
November 2017
Slides on slideshare.net (bdcvanschaik)
Blockchain
●
Technology
– How does it work?
– Strong points and weaknesses
●
Applications
– Current applications
– Applications in (life) sciences
– Avoiding the pointless blockchain project
Technology
What is a blockchain?
●
Technology behind Bitcoin
●
Distributed ledger (peer-to-peer)
●
No central authority (trustless system)
●
Transactions are transparent and traceable
Transactions
Public key
Private key
Balance_R = 10
Public key
Private key
Balance_B = 2
Public key
Private key
Balance_G = 0
https://en.wikipedia.org/wiki/Public-key_cryptography
Transactions
Public key
Private key
Balance_R = 10
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
Public key
Private key
Balance_B = 2
Public key
Private key
Balance_G = 0
https://en.wikipedia.org/wiki/Public-key_cryptography
Transactions
Public key
Private key
Balance_R = 8
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
Public key
Private key
Balance_B = 4
Public key
Private key
Balance_G = 0
Transactions
Public key
Private key
Balance_R = 8
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
Public key
Private key
Balance_B = 4
Public key
Private key
Balance_G = 0
Transaction:
Send 3 to green public key
Sign with blue private key
Balance_B = Balance_B – 3
Balance_G = Balance_G + 3
Transactions
Public key
Private key
Balance_R = 8
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
Public key
Private key
Balance_B = 1
Public key
Private key
Balance_G = 3
Transaction:
Send 3 to green public key
Sign with blue private key
Balance_B = Balance_B – 3
Balance_G = Balance_G + 3
Transactions
Public key
Private key
Balance_R = 8
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
21 November 2017
Public key
Private key
Balance_B = 1
Public key
Private key
Balance_G = 3
Transaction:
Send 3 to green public key
Sign with blue private key
Balance_B = Balance_B – 3
Balance_G = Balance_G + 3
24 November 2017
Check if balance is enough
Verify if sender is allowed to send
Transactions are timestamped
Everyone gets a copy of all transactions
If keys are not linked to persons it is
anonymous
Transaction
Satoshi Nakamoto (2008) Bitcoin: a peer-to-peer electronic cash system
Owner digitally signs hash of previous transaction and public key of next owner
Timestamp server
Block
Previous hash
Hash
21 Nov 2017
Tx1
Tx2
Tx3
.
.
Txn
Block
Previous hash
Hash
22 Nov 2017
Tx1
Tx2
Tx3
.
.
Txn
Block
$Previous_hash
Hash
$Date
$Transactions
Publicly announce hash of block to be timestamped
Publicly announce new transactions
Proof-of-work (mining)
Scan for a value (nonce), when hashed (e.g. SHA-256) it begins with a number
of zero bits
A.k.a. Keep computers busy for a while. More CPUs = more chance to win the
competition
Computationally hard to repeat, but easy to verify
Add new block to the chain (link to previous hash) and announce
Others verify if block is correct and add block too (majority vote)
Incentive: winner gets a reward (e.g. a bitcoin + transaction fees)
https://en.wikipedia.org/wiki/SHA-2
Network
1. Broadcast new transactions to all nodes
2. Each node collects transactions in a block
3. Each node works on proof-of-work for this block
4. Proof-of-work found → broadcast block to all nodes
5. Nodes accept block when transactions are valid and not already
spent
6. Acceptance by working on creating a new block based to the
previous block
7. Longest chain is the correct one
8. 51% rule: majority decides what is correct
Other points in bitcoin paper
●
Reclaim disk space
– Data compression with Merkle tree
●
Simplified payment verification
– You don't need the entire blockchain for verification
●
Splitting values
– Return the change and add transaction fees
●
Privacy
– No link between person and keys
●
Probability of building in malicious blocks
– Unlikely that a malicious node keeps up with longest chain
Satoshi Nakamoto (2008) Bitcoin: a peer-to-peer electronic cash system
Screenshot
Screenshot
Screenshot
Data can be added
to a transaction
Blockchain variants
●
Several variants similar to bitcoin
●
Some focus on anonymity, others on efficiency
●
Other data structures: block-graph i.s.o. block-chain
●
Generalization of transactions
Ethereum: programming platform
on blockchain a.k.a. smart contracts
Transaction:
Send 2 to blue public key
Sign with red private key
Balance_R = Balance_R - 2
Balance_B = Balance_B + 2
A transaction can be about anything
Function can be more complex than “add” and “subtract”
Multi-signature possibilities
Examples:
● Two (or more) people need to sign before transfer
takes place
● Transfer of money, a house, energy, karma points,
votes, supplies, etc
● Temporary transfer of a room, a car, a bike, etc
https://github.com/ethereum/wiki/wiki/White-Paper (2015)
Things that make people nervous
Forks●
Softforks are forward
compatible
– Old nodes accept new
blocks created with later
version of software
– Miners need to upgrade
●
Hardforks are not forward-
compatible
– Everyone needs to
upgrade (miners, users,
merchants)
Examples of hardforks
Ethereum: bug in smart contract
Funds were stolen and community
decided to fix that and return funds
Some did not agree: new coin
Ethereum classic went on separately
with original rules
Bitcoin: upgrades suggested to
improve transaction speed
Some wanted to increase blocksize
faster: new coin Bitcoin cash
https://bitcoin.stackexchange.com/questions/30817/what-is-a-soft-fork
Software A
Software B
Hacks, scams and bugs
Private keys were
stolen and/or
server was hacked
PCs were hackedRansom via bitcoin
Software bug insmart contract
Pyramid scheme
List of weaknesses and how likely they are:
https://en.bitcoin.it/wiki/Weaknesses
Strong points and weaknesses
●
Traceability
●
Transparency
●
Data redundancy
●
Strong crypto
●
Can be anonymous (not
always the case)
●
Data storage not efficient
●
Mining expensive (lots of
energy wasted)
●
No single authority
(refunds)
●
Miners have more power
than users
●
Don't loose or give away
your private keys
Applications
Supply chain @ port of Rotterdam
https://www.ad.nl/rotterdam/rotterdamse-haven-experimenteert-met-blockchain-technologie~a2bda56a/(2017)
Image: IBM
Solar energy @ Amsterdam
https://spectral.energy/about/news/jouliette-at-deceuvel/ (2017)
Current applications
Applications in (life) sciences
●
Where is current research on blockchain technology?
●
Education
●
Open science
●
Biomedical/health care
●
BioCommons
Blockchain research
Yli-Huumo et al. (2016) Where is current research on blockchain technology? - A systematic review. PloS one
41 papers included in study
80.5% about bitcoin challenges
and limitations
19.5% about other topics
Education
●
Digital record of achievements
– Certificates issued by university to students
●
Proof of intellectual work
– Public records of ideas
– Can not be modified, new revision can be submitted
●
Intellectual currency
– Micro-payment for contribution
– Reputation points (e.g. nr of citations, reviews)
Sharples and Domingue (2016) The blockchain and kudos: a distributed system for educational record, reputation and reward.
European conference on technology enhanced learning
Image:Ibrandify-Freepik.com
Blockchain-enabled open science framework
●
Store protocols, metadata, publications and reviews on blockchain
– Minimum publishing standards
– Data sharing/discovery
– Publish everything
– Provenance / track progress
●
Reputation award system (credits, funding)
●
Software development needed
https://www.oreilly.com/ideas/blockchain-enabled-open-science-framework (2016)
Furlanello et al. (2017) Towards a scientific blockchain framework for reproducible data analysis. https://arxiv.org/abs/1707.06552
Biomedical/health care applications
Blockchain versus distributed
database management systems
1) Decentralized management
2) Immutable audit trail
3) Data provenance
4) Robustness/availability
5) Security/privacy
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
Use cases
1) Medical record management
2) Insurance claim process
3) Clinical/biomedical research:
data sharing
4) Biomedical/health care data
ledger
For each case examples and
potential benefits are described
Medical record management
1)Decentralized management
2)Immutable audit trail
3)Data provenance
4)Robustness/availability
5)Security/privacy
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
1) Patient-managed health care
records
2) Unalterable patient records
3) Records are signed
4) Decentralized: reduced risk of
data leaks (e.g. institute hacks)
5) Data is encrypted. Only patient
can decryptWhat if...
You need to migrate to stronger keys?
The patient loses the private key?
Clinical/biomedical research:
data sharing
1)Decentralized management
2)Immutable audit trail
3)Data provenance
4)Robustness/availability
5)Security/privacy
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
1) Improved care data sharing and
analysis without ceding control
(peer-to-peer between institutes)
2) Trackable and timestamped
patient-generated data
3) Provenance for medical research
data
4) Availability and access to real-time
data
5) Secured and privacy-preserving
health care data sharing
Challenges and proposed solutions
●
Blockchain provides pseudo-anonymity
– Encrypt the information
– Store sensitive data off-chain and a link on-chain
●
Speed and scalability
– Blockchain as index of health data, not data itself
– Alternative blockchain solutions
●
Threat of a 51% attack
– Implement as private or consortium blockchain
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
Ideas at BioCommons workshop
●
Reputation
●
Voting
●
Personal authentication
●
Secure anonymity
●
Crowdfunding campaigns
●
Contracts between project partners
●
Decentralized storage (e.g. MaidSafe)
●
Encryption of sensitive data (e.g. DNA.bits)
https://pdfs.semanticscholar.org/6f24/8a10c94b74e8eecf478363b3be999a899958.pdf (2014)
BLOCKCHAIN
ALL THE THINGS!
Avoiding the pointless blockchain project
https://www.multichain.com/blog/2015/11/avoiding-pointless-blockchain-project/
Checklist:
✔ Blockchain is for shared databases
✔ There are multiple writers
✔ Absence of trust: writers need to be verified
✔ Desire to cut out trusted third party (reduce costs, remove single point of failure)
✔ Transactions depend on each other
Also important:
✔ Set the rules: put constraints on transactions
✔ Pick your validators: public, private and consortium blockchains
✔ Back your assets: what does the digital unit represent in the real world?
Alternatives that might be better suited
• Regular file storage
• A centralized database
• Master-slave databases
• Multiple databases to which users can subscribe
Slides on slideshare.net (bdcvanschaik)
Insurance claim process
1)Decentralized management
2)Immutable audit trail
3)Data provenance
4)Robustness/availability
5)Security/privacy
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
1) Real-time claim processing
2) Improved claim auditing and
fraud detection
3) Verifiable records for claim
qualification
4) Enhanced accessibility of
patient data (iso data silos)
5) Increased security of medical
insurance information
Biomedical/health care data ledger
1)Decentralized management
2)Immutable audit trail
3)Data provenance
4)Robustness/availability
5)Security/privacy
Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
1) Decentralized health data backbone
2) Unchangeable log of clinical research
protocols
3) Ensure original manufacturer and
ownership transferring in
pharmaceutical supply chain
4) Improved robustness for counterfeit
drug prevention/detection systems in
pharmaceutical supply chain
5) Patients are able to add consent
statements at any point in their care
journey
Title

More Related Content

What's hot

2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economyHeung-No Lee
 
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703Nevruz Mesut Sahin
 
The 3rd generation blockchain
The 3rd generation blockchainThe 3rd generation blockchain
The 3rd generation blockchain承翰 蔡
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyNavin Kumar
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Bernhard Haslhofer
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyUnbiased Technolab
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain FundamentalsBruno Lowagie
 
Blockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial ServicesBlockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial ServicesRatnakar Pandey
 
MIT Blockchain Class - Intro and Overview
MIT Blockchain Class - Intro and OverviewMIT Blockchain Class - Intro and Overview
MIT Blockchain Class - Intro and OverviewMarian Cook
 
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeDeploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeHorea Porutiu
 
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...Paperchain
 
Blockchain and Services – Exploring the Links
Blockchain and Services – Exploring the LinksBlockchain and Services – Exploring the Links
Blockchain and Services – Exploring the LinksIngo Weber
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat ModelPeteLind
 
Blockchain technology-report-final
Blockchain technology-report-finalBlockchain technology-report-final
Blockchain technology-report-finalRishabhMalik32
 
Blockchain Technology Report 2018
Blockchain Technology Report 2018Blockchain Technology Report 2018
Blockchain Technology Report 2018Ranvijay Singh
 
Analysing Data from Blockchains - Keynote @ SOCCA 2020
Analysing Data from Blockchains - Keynote @ SOCCA 2020Analysing Data from Blockchains - Keynote @ SOCCA 2020
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101Karthikeyan VK
 

What's hot (20)

2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economy
 
Blockchain
BlockchainBlockchain
Blockchain
 
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703
Deployablockchainwebappwithhyperledgerfabricpresentation 190820170703
 
The 3rd generation blockchain
The 3rd generation blockchainThe 3rd generation blockchain
The 3rd generation blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
 
Blockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial ServicesBlockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial Services
 
MIT Blockchain Class - Intro and Overview
MIT Blockchain Class - Intro and OverviewMIT Blockchain Class - Intro and Overview
MIT Blockchain Class - Intro and Overview
 
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeDeploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
 
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
 
Blockchain and Services – Exploring the Links
Blockchain and Services – Exploring the LinksBlockchain and Services – Exploring the Links
Blockchain and Services – Exploring the Links
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Javantura v6 - Case Study: Marketplace App with Java and Hyperledger Fabric -...
Javantura v6 - Case Study: Marketplace App with Java and Hyperledger Fabric -...Javantura v6 - Case Study: Marketplace App with Java and Hyperledger Fabric -...
Javantura v6 - Case Study: Marketplace App with Java and Hyperledger Fabric -...
 
Blockchain technology-report-final
Blockchain technology-report-finalBlockchain technology-report-final
Blockchain technology-report-final
 
Blockchain Technology Report 2018
Blockchain Technology Report 2018Blockchain Technology Report 2018
Blockchain Technology Report 2018
 
Analysing Data from Blockchains - Keynote @ SOCCA 2020
Analysing Data from Blockchains - Keynote @ SOCCA 2020Analysing Data from Blockchains - Keynote @ SOCCA 2020
Analysing Data from Blockchains - Keynote @ SOCCA 2020
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 

Similar to Blockchain technology in (life) sciences

Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_linikinew1
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking SystemGaurav Singh
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityRagaviRaghavan
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET Journal
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyIRJET Journal
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of TrustMarco Segato
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
Blockchain: The Game-changer To Radically Transform Your Business
Blockchain: The Game-changer To Radically Transform Your Business Blockchain: The Game-changer To Radically Transform Your Business
Blockchain: The Game-changer To Radically Transform Your Business Emma Jhonson
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET Journal
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamentalCodium Club
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
Blockchain on Azure and Use Cases
Blockchain on Azure and Use CasesBlockchain on Azure and Use Cases
Blockchain on Azure and Use CasesNuri Cankaya
 

Similar to Blockchain technology in (life) sciences (20)

Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_li
 
An Introduction to Blockchains
An Introduction to BlockchainsAn Introduction to Blockchains
An Introduction to Blockchains
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Blockchain: The Game-changer To Radically Transform Your Business
Blockchain: The Game-changer To Radically Transform Your Business Blockchain: The Game-changer To Radically Transform Your Business
Blockchain: The Game-changer To Radically Transform Your Business
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
CIKMTutorial.pdf
CIKMTutorial.pdfCIKMTutorial.pdf
CIKMTutorial.pdf
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamental
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
Blockchain on Azure and Use Cases
Blockchain on Azure and Use CasesBlockchain on Azure and Use Cases
Blockchain on Azure and Use Cases
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Blockchain technology in (life) sciences

  • 1. Blockchain technology in (life) sciences November 2017 Slides on slideshare.net (bdcvanschaik)
  • 2. Blockchain ● Technology – How does it work? – Strong points and weaknesses ● Applications – Current applications – Applications in (life) sciences – Avoiding the pointless blockchain project
  • 4. What is a blockchain? ● Technology behind Bitcoin ● Distributed ledger (peer-to-peer) ● No central authority (trustless system) ● Transactions are transparent and traceable
  • 5. Transactions Public key Private key Balance_R = 10 Public key Private key Balance_B = 2 Public key Private key Balance_G = 0 https://en.wikipedia.org/wiki/Public-key_cryptography
  • 6. Transactions Public key Private key Balance_R = 10 Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 Public key Private key Balance_B = 2 Public key Private key Balance_G = 0 https://en.wikipedia.org/wiki/Public-key_cryptography
  • 7. Transactions Public key Private key Balance_R = 8 Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 Public key Private key Balance_B = 4 Public key Private key Balance_G = 0
  • 8. Transactions Public key Private key Balance_R = 8 Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 Public key Private key Balance_B = 4 Public key Private key Balance_G = 0 Transaction: Send 3 to green public key Sign with blue private key Balance_B = Balance_B – 3 Balance_G = Balance_G + 3
  • 9. Transactions Public key Private key Balance_R = 8 Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 Public key Private key Balance_B = 1 Public key Private key Balance_G = 3 Transaction: Send 3 to green public key Sign with blue private key Balance_B = Balance_B – 3 Balance_G = Balance_G + 3
  • 10. Transactions Public key Private key Balance_R = 8 Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 21 November 2017 Public key Private key Balance_B = 1 Public key Private key Balance_G = 3 Transaction: Send 3 to green public key Sign with blue private key Balance_B = Balance_B – 3 Balance_G = Balance_G + 3 24 November 2017 Check if balance is enough Verify if sender is allowed to send Transactions are timestamped Everyone gets a copy of all transactions If keys are not linked to persons it is anonymous
  • 11. Transaction Satoshi Nakamoto (2008) Bitcoin: a peer-to-peer electronic cash system Owner digitally signs hash of previous transaction and public key of next owner
  • 12. Timestamp server Block Previous hash Hash 21 Nov 2017 Tx1 Tx2 Tx3 . . Txn Block Previous hash Hash 22 Nov 2017 Tx1 Tx2 Tx3 . . Txn Block $Previous_hash Hash $Date $Transactions Publicly announce hash of block to be timestamped Publicly announce new transactions
  • 13. Proof-of-work (mining) Scan for a value (nonce), when hashed (e.g. SHA-256) it begins with a number of zero bits A.k.a. Keep computers busy for a while. More CPUs = more chance to win the competition Computationally hard to repeat, but easy to verify Add new block to the chain (link to previous hash) and announce Others verify if block is correct and add block too (majority vote) Incentive: winner gets a reward (e.g. a bitcoin + transaction fees) https://en.wikipedia.org/wiki/SHA-2
  • 14. Network 1. Broadcast new transactions to all nodes 2. Each node collects transactions in a block 3. Each node works on proof-of-work for this block 4. Proof-of-work found → broadcast block to all nodes 5. Nodes accept block when transactions are valid and not already spent 6. Acceptance by working on creating a new block based to the previous block 7. Longest chain is the correct one 8. 51% rule: majority decides what is correct
  • 15. Other points in bitcoin paper ● Reclaim disk space – Data compression with Merkle tree ● Simplified payment verification – You don't need the entire blockchain for verification ● Splitting values – Return the change and add transaction fees ● Privacy – No link between person and keys ● Probability of building in malicious blocks – Unlikely that a malicious node keeps up with longest chain Satoshi Nakamoto (2008) Bitcoin: a peer-to-peer electronic cash system
  • 18. Screenshot Data can be added to a transaction
  • 19. Blockchain variants ● Several variants similar to bitcoin ● Some focus on anonymity, others on efficiency ● Other data structures: block-graph i.s.o. block-chain ● Generalization of transactions
  • 20. Ethereum: programming platform on blockchain a.k.a. smart contracts Transaction: Send 2 to blue public key Sign with red private key Balance_R = Balance_R - 2 Balance_B = Balance_B + 2 A transaction can be about anything Function can be more complex than “add” and “subtract” Multi-signature possibilities Examples: ● Two (or more) people need to sign before transfer takes place ● Transfer of money, a house, energy, karma points, votes, supplies, etc ● Temporary transfer of a room, a car, a bike, etc https://github.com/ethereum/wiki/wiki/White-Paper (2015)
  • 21. Things that make people nervous
  • 22. Forks● Softforks are forward compatible – Old nodes accept new blocks created with later version of software – Miners need to upgrade ● Hardforks are not forward- compatible – Everyone needs to upgrade (miners, users, merchants) Examples of hardforks Ethereum: bug in smart contract Funds were stolen and community decided to fix that and return funds Some did not agree: new coin Ethereum classic went on separately with original rules Bitcoin: upgrades suggested to improve transaction speed Some wanted to increase blocksize faster: new coin Bitcoin cash https://bitcoin.stackexchange.com/questions/30817/what-is-a-soft-fork Software A Software B
  • 23. Hacks, scams and bugs Private keys were stolen and/or server was hacked PCs were hackedRansom via bitcoin Software bug insmart contract Pyramid scheme List of weaknesses and how likely they are: https://en.bitcoin.it/wiki/Weaknesses
  • 24. Strong points and weaknesses ● Traceability ● Transparency ● Data redundancy ● Strong crypto ● Can be anonymous (not always the case) ● Data storage not efficient ● Mining expensive (lots of energy wasted) ● No single authority (refunds) ● Miners have more power than users ● Don't loose or give away your private keys
  • 26. Supply chain @ port of Rotterdam https://www.ad.nl/rotterdam/rotterdamse-haven-experimenteert-met-blockchain-technologie~a2bda56a/(2017) Image: IBM
  • 27. Solar energy @ Amsterdam https://spectral.energy/about/news/jouliette-at-deceuvel/ (2017)
  • 29. Applications in (life) sciences ● Where is current research on blockchain technology? ● Education ● Open science ● Biomedical/health care ● BioCommons
  • 30. Blockchain research Yli-Huumo et al. (2016) Where is current research on blockchain technology? - A systematic review. PloS one 41 papers included in study 80.5% about bitcoin challenges and limitations 19.5% about other topics
  • 31. Education ● Digital record of achievements – Certificates issued by university to students ● Proof of intellectual work – Public records of ideas – Can not be modified, new revision can be submitted ● Intellectual currency – Micro-payment for contribution – Reputation points (e.g. nr of citations, reviews) Sharples and Domingue (2016) The blockchain and kudos: a distributed system for educational record, reputation and reward. European conference on technology enhanced learning Image:Ibrandify-Freepik.com
  • 32. Blockchain-enabled open science framework ● Store protocols, metadata, publications and reviews on blockchain – Minimum publishing standards – Data sharing/discovery – Publish everything – Provenance / track progress ● Reputation award system (credits, funding) ● Software development needed https://www.oreilly.com/ideas/blockchain-enabled-open-science-framework (2016) Furlanello et al. (2017) Towards a scientific blockchain framework for reproducible data analysis. https://arxiv.org/abs/1707.06552
  • 33. Biomedical/health care applications Blockchain versus distributed database management systems 1) Decentralized management 2) Immutable audit trail 3) Data provenance 4) Robustness/availability 5) Security/privacy Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA Use cases 1) Medical record management 2) Insurance claim process 3) Clinical/biomedical research: data sharing 4) Biomedical/health care data ledger For each case examples and potential benefits are described
  • 34. Medical record management 1)Decentralized management 2)Immutable audit trail 3)Data provenance 4)Robustness/availability 5)Security/privacy Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA 1) Patient-managed health care records 2) Unalterable patient records 3) Records are signed 4) Decentralized: reduced risk of data leaks (e.g. institute hacks) 5) Data is encrypted. Only patient can decryptWhat if... You need to migrate to stronger keys? The patient loses the private key?
  • 35. Clinical/biomedical research: data sharing 1)Decentralized management 2)Immutable audit trail 3)Data provenance 4)Robustness/availability 5)Security/privacy Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA 1) Improved care data sharing and analysis without ceding control (peer-to-peer between institutes) 2) Trackable and timestamped patient-generated data 3) Provenance for medical research data 4) Availability and access to real-time data 5) Secured and privacy-preserving health care data sharing
  • 36. Challenges and proposed solutions ● Blockchain provides pseudo-anonymity – Encrypt the information – Store sensitive data off-chain and a link on-chain ● Speed and scalability – Blockchain as index of health data, not data itself – Alternative blockchain solutions ● Threat of a 51% attack – Implement as private or consortium blockchain Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA
  • 37. Ideas at BioCommons workshop ● Reputation ● Voting ● Personal authentication ● Secure anonymity ● Crowdfunding campaigns ● Contracts between project partners ● Decentralized storage (e.g. MaidSafe) ● Encryption of sensitive data (e.g. DNA.bits) https://pdfs.semanticscholar.org/6f24/8a10c94b74e8eecf478363b3be999a899958.pdf (2014)
  • 39. Avoiding the pointless blockchain project https://www.multichain.com/blog/2015/11/avoiding-pointless-blockchain-project/ Checklist: ✔ Blockchain is for shared databases ✔ There are multiple writers ✔ Absence of trust: writers need to be verified ✔ Desire to cut out trusted third party (reduce costs, remove single point of failure) ✔ Transactions depend on each other Also important: ✔ Set the rules: put constraints on transactions ✔ Pick your validators: public, private and consortium blockchains ✔ Back your assets: what does the digital unit represent in the real world? Alternatives that might be better suited • Regular file storage • A centralized database • Master-slave databases • Multiple databases to which users can subscribe
  • 40. Slides on slideshare.net (bdcvanschaik)
  • 41. Insurance claim process 1)Decentralized management 2)Immutable audit trail 3)Data provenance 4)Robustness/availability 5)Security/privacy Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA 1) Real-time claim processing 2) Improved claim auditing and fraud detection 3) Verifiable records for claim qualification 4) Enhanced accessibility of patient data (iso data silos) 5) Increased security of medical insurance information
  • 42. Biomedical/health care data ledger 1)Decentralized management 2)Immutable audit trail 3)Data provenance 4)Robustness/availability 5)Security/privacy Kuo et al. (2017) Blockchain distributed ledger technologies for biomedical and health care applications. JAMIA 1) Decentralized health data backbone 2) Unchangeable log of clinical research protocols 3) Ensure original manufacturer and ownership transferring in pharmaceutical supply chain 4) Improved robustness for counterfeit drug prevention/detection systems in pharmaceutical supply chain 5) Patients are able to add consent statements at any point in their care journey
  • 43. Title

Editor's Notes

  1. <number>
  2. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  3. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  4. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  5. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  6. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  7. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  8. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  9. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  10. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  11. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  12. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  13. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  14. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  15. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  16. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  17. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  18. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  19. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  20. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  21. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  22. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  23. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  24. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  25. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  26. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  27. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  28. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  29. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  30. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  31. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  32. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  33. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  34. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  35. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  36. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  37. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  38. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  39. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>
  40. Not only the sequences are in a different format, the quality scores are different too. I will explain in the next slides what the scoring scheme is of the different machines. <number>