Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

The Use of Blockchain in Healthcare
The Use of Blockchain in Healthcare
Who it's for:
Health information management professionals and anyone interested in the applications of blockchain technology.

The Use of Blockchain in Healthcare

Release Date: 07/15/2021

Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information and can levy fines for data breaches. The value of healthcare data, paired with these regulations and other international laws that govern the storage of data in the cloud, has motivated healthcare organizations to look at using blockchain in order to secure data. By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.

This research paper by the Health Information Management Working Group investigates current blockchain use cases in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the security of telehealth systems. After the presentation of several case studies, this document concludes with a discussion on the ways blockchain technology could be used in healthcare in the future.

Key Takeaways:
  • What distributed ledger technologies, blockchain, and smart contracts are
  • How blockchain helps with medical research projects
  • How blockchain increases the traceability of the medical supply chain
  • How blockchain can transform billing processing, medical coding, facility and energy management, and telehealth
  • How blockchain can provide increased control and access for the individual patient
  • What the security issues of blockchain are, and how to address them
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
How AI Changes End-User Experience Optimization and Can Reinvent IT
How AI Changes End-User Experience Optimization and Can Reinvent IT
Published: 11/15/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

Ken Huang
Ken Huang
Chief AI Officer at DistributedApps.ai

Ken Huang

Chief AI Officer at DistributedApps.ai

Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.

In addition, Huang contributed extensively to key initiatives in the space. He is a core contributor t...

Read more

Alexandre Caramelo Pinto Headshot Missing
Alexandre Caramelo Pinto

Alexandre Caramelo Pinto

Rea Achalkar Headshot Missing
Rea Achalkar

Rea Achalkar

Danielle Cadoret Headshot Missing
Danielle Cadoret

Danielle Cadoret

Ciju John Headshot Missing
Ciju John

Ciju John

Gurpreet Singh Maini Headshot Missing
Gurpreet Singh Maini

Gurpreet Singh Maini

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training