ChaptersCircleEventsBlog

Download Publication

The Use of Blockchain in Healthcare
The Use of Blockchain in Healthcare
Who it's for:
Health information management professionals and anyone interested in the applications of blockchain technology.

The Use of Blockchain in Healthcare

Release Date: 07/15/2021

Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information and can levy fines for data breaches. The value of healthcare data, paired with these regulations and other international laws that govern the storage of data in the cloud, has motivated healthcare organizations to look at using blockchain in order to secure data. By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.

This research paper by the Health Information Management Working Group investigates current blockchain use cases in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the security of telehealth systems. After the presentation of several case studies, this document concludes with a discussion on the ways blockchain technology could be used in healthcare in the future.

Key Takeaways:
  • What distributed ledger technologies, blockchain, and smart contracts are
  • How blockchain helps with medical research projects
  • How blockchain increases the traceability of the medical supply chain
  • How blockchain can transform billing processing, medical coding, facility and energy management, and telehealth
  • How blockchain can provide increased control and access for the individual patient
  • What the security issues of blockchain are, and how to address them
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
PCI DSS Future-Dated Controls: 7 Critical Changes that Will Shape Your Security Strategy
PCI DSS Future-Dated Controls: 7 Critical Changes that Will Shape Y...
Published: 04/04/2025
Why Security Questionnaires Are a Familiar—but Ineffective—Norm for Assessing Risk
Why Security Questionnaires Are a Familiar—but Ineffective—Norm for...
Published: 04/02/2025
Don’t Buy A Network Pen Test Until You Ask These Questions
Don’t Buy A Network Pen Test Until You Ask These Questions
Published: 03/28/2025
How To Transform Your GRC with Continuous Controls Monitoring
How To Transform Your GRC with Continuous Controls Monitoring
Published: 03/26/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

Ken Huang
Ken Huang
Chief AI Officer at DistributedApps.ai

Ken Huang

Chief AI Officer at DistributedApps.ai

Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.

In addition, Huang contributed extensively to key initiatives in the space. He is a core contributor t...

Read more

Alexandre Caramelo Pinto Headshot Missing
Alexandre Caramelo Pinto

Alexandre Caramelo Pinto

Rea Achalkar Headshot Missing
Rea Achalkar

Rea Achalkar

Danielle Cadoret Headshot Missing
Danielle Cadoret

Danielle Cadoret

Ciju John Headshot Missing
Ciju John

Ciju John

Gurpreet Singh Maini Headshot Missing
Gurpreet Singh Maini

Gurpreet Singh Maini

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training