{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:57:32Z","timestamp":1742990252668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031439490"},{"type":"electronic","value":"9783031439506"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":264,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The role of medical test results in the diagnosis and treatment of a patient\u2019s disease cannot be denied. Doctors and medical staff rely on these results to develop a treatment plan that meets the requirements of the patient\u2019s health status (i.e., physical condition) and disease type. In developing countries (i.e., Vietnam), we note that test results are recorded in paper versions and stored by patients. Thus, several solutions have been introduced for electronic medical records to compensate for medical test results management. However, in Vietnam, these approaches face many obstacles such as centralized processing (e.g., storage, analysis); non-transparency issues; scalability; availability; and so on. In this paper, we exploit the benefits of blockchain, smart contracts, and NFT technologies to solve the above disadvantages. Therefore, our work contributes to five aspects. (a) Collecting procedures for handling and storing test results of patients at hospitals in Ho Chi Minh City and Mekong Delta (i.e., Can Tho city) (b) Proposing a mechanism for sharing test results based on blockchain technology, smart contract, and NFT applied; (c) Presenting an NFT tool-based certification generation model; (d) implementing the proposed model based on smart contracts (i.e., proof-of-concept); and (e) deploying proof-of-concept on four EVM- and NFT-supported platforms to find the most suitable one.<\/jats:p>","DOI":"10.1007\/978-3-031-43950-6_7","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T03:25:20Z","timestamp":1695266720000},"page":"79-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a\u00a0Medical Test Results Management System Based on\u00a0Blockchain, Smart Contracts, and\u00a0NFT: A Case Study in\u00a0Vietnam"],"prefix":"10.1007","author":[{"given":"N. T.","family":"Anh","sequence":"first","affiliation":[]},{"given":"V. H.","family":"Khanh","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Phuc","sequence":"additional","affiliation":[]},{"given":"T. D.","family":"Khoa","sequence":"additional","affiliation":[]},{"given":"H. G.","family":"Khiem","sequence":"additional","affiliation":[]},{"given":"N. D. P.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"V. C. P.","family":"Loc","sequence":"additional","affiliation":[]},{"given":"N. T. Q.","family":"Duy","sequence":"additional","affiliation":[]},{"given":"T. Q.","family":"Bao","sequence":"additional","affiliation":[]},{"given":"D. M.","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"H. T.","family":"Nghia","sequence":"additional","affiliation":[]},{"given":"N. T. K.","family":"Ngan","sequence":"additional","affiliation":[]},{"given":"L. H.","family":"Huong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"issue":"2\u20133","key":"7_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/IJSN.2011.043666","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Secure. Network. 6(2\u20133), 67\u201376 (2011)","journal-title":"Int. J. Secure. Network."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Chen, L., Hoang, D.B.: Novel data protection model in healthcare cloud. In: 2011 IEEE International Conference on High Performance Computing and Communications, pp. 550\u2013555. IEEE (2011)","DOI":"10.1109\/HPCC.2011.148"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.future.2021.05.023","volume":"124","author":"Z Chen","year":"2021","unstructured":"Chen, Z., et al.: A blockchain-based preserving and sharing system for medical data privacy. Futur. Gener. Comput. Syst. 124, 338\u2013350 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TNSM.2021.3120912","volume":"19","author":"MS Chishti","year":"2021","unstructured":"Chishti, M.S., Sufyan, F., Banerjee, A.: Decentralized on-chain data access via smart contracts in Ethereum blockchain. IEEE Trans. Netw. Serv. Manage. 19(1), 174\u2013187 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31\u201335 (2020)","DOI":"10.1145\/3377644.3377668"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. pp. 105\u2013109. ICCSP 2020 (2020)","DOI":"10.1145\/3377644.3377667"},{"key":"7_CR7","unstructured":"Egorov, M., Wilkison, M., Nu\u00f1ez, D.: NuCypher KMS: decentralized key management system. arXiv preprint: arXiv:1707.06140 (2017)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.comcom.2020.02.058","volume":"154","author":"A Farouk","year":"2020","unstructured":"Farouk, A., et al.: Blockchain platform for industrial healthcare: vision and future opportunities. Comput. Commun. 154, 223\u2013235 (2020)","journal-title":"Comput. Commun."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116\u2013120 (2019)","DOI":"10.1145\/3309074.3309097"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kalogriopoulos, N.A., et al.: Electronic medical record systems for developing countries. In: 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 1730\u20131733. IEEE (2009)","DOI":"10.1109\/IEMBS.2009.5333561"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kassab, M., DeFranco, J., Malas, T., Destefanis, G., Neto, V.V.G.: Investigating quality requirements for blockchain-based healthcare systems. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 52\u201355. IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00014"},{"key":"7_CR12","first-page":"e950","volume":"8","author":"NTT Lam","year":"2022","unstructured":"Lam, N.T.T., et al.: BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages). PeerJ 8, e950 (2022)","journal-title":"PeerJ"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"193102","DOI":"10.1109\/ACCESS.2020.3032553","volume":"8","author":"MM Madine","year":"2020","unstructured":"Madine, M.M., et al.: Blockchain for giving patients control over their medical records. IEEE Access 8, 193102\u2013193115 (2020)","journal-title":"IEEE Access"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-030-44999-5_2","volume-title":"Responsible Design, Implementation and Use of Information and Communication Technology","author":"T Makubalo","year":"2020","unstructured":"Makubalo, T., Scholtz, B., Tokosi, T.O.: Blockchain technology for empowering patient-centred healthcare: a pilot study. In: Hattingh, M., Matthee, M., Smuts, H., Pappas, I., Dwivedi, Y.K., M\u00e4ntym\u00e4ki, M. (eds.) I3E 2020. LNCS, vol. 12066, pp. 15\u201326. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44999-5_2"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Misbhauddin, M., AlAbdulatheam, A., Aloufi, M., Al-Hajji, H., AlGhuwainem, A.: MedAccess: a scalable architecture for blockchain-based health record management. In: 2020 2nd International Conference on Computer and Information Sciences (ICCIS), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/ICCIS49240.2020.9257720"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"102535","DOI":"10.1016\/j.ipm.2021.102535","volume":"58","author":"K Miyachi","year":"2021","unstructured":"Miyachi, K., Mackey, T.K.: hOCBS: a privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Inf. Proc. Manag. 58(3), 102535 (2021)","journal-title":"Inf. Proc. Manag."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, L., et al.: IoHT-MBA: An internet of healthcare things (IoHT) platform based on microservice and brokerless architecture. Int. J. Adv. Comput. Sci. Appl. 12(7) (2021)","DOI":"10.14569\/IJACSA.2021.0120768"},{"issue":"12","key":"7_CR18","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.3390\/ijerph16122199","volume":"16","author":"FC Olaniyi","year":"2019","unstructured":"Olaniyi, F.C., Ogola, J.S., Tshitangano, T.G.: Efficiency of health care risk waste management in rural healthcare facilities of South Africa: an assessment of selected facilities in Vhembe District, Limpopo Province. Int. J. Environ. Res. Public Health 16(12), 2199 (2019)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sharma, B., Halder, R., Singh, J.: Blockchain-based interoperable healthcare using zero-knowledge proofs and proxy re-encryption. In: 2020 International Conference on Communication Systems & NETworkS (COMSNETS), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/COMSNETS48256.2020.9027413"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-72389-1_40","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"HX Son","year":"2017","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501\u2013515. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_40"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76\u201380 (2019)","DOI":"10.1145\/3309074.3309091"},{"key":"7_CR22","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-20005-3_8","volume-title":"International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)","author":"HX Son","year":"2020","unstructured":"Son, H.X., Nguyen, M.H., Vo, H.K., Nguyen, T.P.: Toward an privacy protection based on access control model in hybrid cloud for healthcare systems. In: Mart\u00ednez \u00c1lvarez, F., Troncoso Lora, A., S\u00e1ez Mu\u00f1oz, J.A., Quinti\u00e1n, H., Corchado, E. (eds.) CISIS\/ICEUTE -2019. AISC, vol. 951, pp. 77\u201386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-20005-3_8"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34444-2_10","volume-title":"Web Engineering","author":"HX Son","year":"2023","unstructured":"Son, H.X., et al.: In2P-Med: toward the individual privacy preferences identity in the medical web apps. In: Garrigos, I., Murillo Rodriguez, J.M., Wimmer, M. (eds.) ICWE 2023. Lecture Notes in Computer Science, vol. 13893. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-34444-2_10"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: SIP-MBA: a secure IoT platform with Brokerless and micro-service architecture (2021)","DOI":"10.14569\/IJACSA.2021.0120767"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-030-86653-2_47","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"LNT Thanh","year":"2021","unstructured":"Thanh, L.N.T., et al.: Toward a security IoT platform with high rate transmission and low energy consumption. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12949, pp. 647\u2013662. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86653-2_47"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-84340-3_22","volume-title":"Computer Information Systems and Industrial Management","author":"TTL Nguyen","year":"2021","unstructured":"Nguyen, T.T.L., et al.: Toward a unique IoT network via single sign-on protocol and message queue. In: Saeed, K., Dvorsk\u00fd, J. (eds.) CISIM 2021. LNCS, vol. 12883, pp. 270\u2013284. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84340-3_22"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: UIP2SOP: a unique IoT network applying single sign-on and message queue protocol. IJACSA 12(6) (2021)","DOI":"10.14569\/IJACSA.2021.0120603"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-319-72389-1_44","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"QNT Thi","year":"2017","unstructured":"Thi, Q.N.T., Dang, T.K., Van, H.L., Son, H.X.: Using JSON to specify privacy preserving-enabled attribute-based access control policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 561\u2013570. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_44"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Xuan, S.H., et al.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25\u201331. IEEE (2016)","DOI":"10.1109\/ACOMP.2016.014"},{"issue":"10","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue, X., et al.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 1\u20138 (2016)","journal-title":"J. Med. Syst."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: Metrics for assessing blockchain-based healthcare decentralized apps. In: 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/HealthCom.2017.8210842"},{"issue":"1","key":"7_CR32","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., et al.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88\u201395 (2015)","journal-title":"IEEE Syst. J."},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Zyskind, G., et al.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180\u2013184. IEEE (2015)","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Lecture Notes in Computer Science","Digital Health Transformation, Smart Ageing, and Managing Disability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43950-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T03:25:48Z","timestamp":1695266748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43950-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031439490","9783031439506"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43950-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICOST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Homes and Health Telematics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wonju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icost2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icost-society.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}