<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v5i7e111</article-id>
    <article-id pub-id-type="pmid">28747296</article-id>
    <article-id pub-id-type="doi">10.2196/mhealth.7938</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Tamper-Resistant Mobile Health Using Blockchain Technology</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Nakao</surname>
          <given-names>Mitsuyuki</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Apolinário-Hagen</surname>
          <given-names>Jennifer</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" equal-contrib="yes">
        <name name-style="western">
          <surname>Ichikawa</surname>
          <given-names>Daisuke</given-names>
        </name>
        <degrees>MD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1467-5119</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib2" equal-contrib="yes">
        <name name-style="western">
          <surname>Kashiyama</surname>
          <given-names>Makiko</given-names>
        </name>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-8795-6392</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3" corresp="yes">
      <name name-style="western">
        <surname>Ueno</surname>
        <given-names>Taro</given-names>
      </name>
      <degrees>MD, PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Sustainable Medicine, Inc.</institution>
        <addr-line>Nihonbashi Life Science Bldg 2, 3-11-5, Honcho</addr-line>
        <addr-line>Nihonbashi, Chuo-ku</addr-line>
        <addr-line>Tokyo, 103-0023</addr-line>
        <country>Japan</country>
        <phone>81 3 3527 3593</phone>
        <email>t-ueno@umin.ac.jp</email>
      </address>  
      <xref rid="aff2" ref-type="aff">2</xref>
      <xref rid="aff3" ref-type="aff">3</xref>
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3697-4301</ext-link></contrib>
    </contrib-group>
    <aff id="aff1">
      <sup>1</sup>
      <institution>Sustainable Medicine, Inc.</institution>
      <addr-line>Tokyo</addr-line>
      <country>Japan</country>
    </aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>Institute of Neuropsychiatry</institution>
    <institution>Seiwa Hospital</institution>  
    <addr-line>Tokyo</addr-line>
    <country>Japan</country></aff>
    <aff id="aff3">
    <sup>3</sup>
    <institution>Graduate School of Science</institution>
    <institution>Department of Biomolecular</institution>  
    <institution>Science Toho University</institution>  
    <addr-line>Chiba</addr-line>
    <country>Japan</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Taro Ueno 
      <email>t-ueno@umin.ac.jp</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>07</month><year>2017</year></pub-date>
    <pub-date pub-type="epub">
      <day>26</day>
      <month>07</month>
      <year>2017</year>
    </pub-date>
    <volume>5</volume>
    <issue>7</issue>
    <elocation-id>e111</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>28</day>
        <month>4</month>
        <year>2017</year>
      </date>
      <date date-type="rev-request">
        <day>18</day>
        <month>5</month>
        <year>2017</year>
      </date>
      <date date-type="rev-recd">
        <day>4</day>
        <month>6</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>20</day>
        <month>6</month>
        <year>2017</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Daisuke Ichikawa, Makiko Kashiyama, Taro Ueno. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 26.07.2017.</copyright-statement>
    <copyright-year>2017</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://mhealth.jmir.org/2017/7/e111/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and connecting people to their health care providers. Mobile apps help empower patients and health care providers to proactively address medical conditions through near real-time monitoring and treatment, regardless of the location of the patient or the health care provider. Additionally, mHealth data are stored in servers, and consequently, data management that prevents all forms of manipulation is crucial for both medical practice and clinical trials.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>The aim of this study was to develop and evaluate a tamper-resistant mHealth system using blockchain technology, which enables trusted and auditable computing using a decentralized network.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>We developed an mHealth system for cognitive behavioral therapy for insomnia using a smartphone app. The volunteer data collected with the app were stored in JavaScript Object Notation format and sent to the blockchain network. Thereafter, we evaluated the tamper resistance of the data against the inconsistencies caused by artificial faults.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>Electronic medical records collected using smartphones were successfully sent to a private Hyperledger Fabric blockchain network. We verified the data update process under conditions where all the validating peers were running normally. The mHealth data were successfully updated under network faults. We further ensured that any electronic health record registered to the blockchain network was resistant to tampering and revision. The mHealth data update was compatible with tamper resistance in the blockchain network.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>Blockchain serves as a tamperproof system for mHealth. Combining mHealth with blockchain technology may provide a novel solution that enables both accessibility and data transparency without a third party such as a contract research organization.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>telemedicine</kwd>
      <kwd>electronic health records</kwd>
      <kwd>sleep</kwd>
      <kwd>cognitive therapy</kwd>
      <kwd>computer security</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Digital health, including the utilization of mobile health (mHealth) apps and devices, has become popular in the everyday practice of medicine [<xref ref-type="bibr" rid="ref1">1</xref>]. It has the potential to promote improved patient health outcomes, support care coordination, and improve communication. Whereas digital health has the potential for better patient care, there’s a need to consider the security issues [<xref ref-type="bibr" rid="ref2">2</xref>]. Data tampering is one of the most crucial security risks [<xref ref-type="bibr" rid="ref3">3</xref>]. If data tampering occurs during an attack on the system, it leads to a loss of data reliability. As data reliability is essential, especially for clinical trials, a tamperproof system is needed. Also, decision making in medical practice should be based on precise information from the patients.</p>
      <p>Blockchain technology has attracted attention because of its efficacy in the prevention of data tampering. It serves as a distributed tamperproof database. To ensure tamper resistance, it maintains a continuously growing list of transactional records organized into blocks, using consensus algorithms that allow untrusted parties to agree on a common state. Valid transactions stored in a blockchain are digitally signed and timestamped by their sender, providing cryptographically irrefutable evidence of both the provenance and the existence of a record at a given time [<xref ref-type="bibr" rid="ref4">4</xref>]. Bitcoin was the first implementation of blockchain as a digital asset in widespread use [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. It is an electronic payment system based on cryptographic proof instead of trust. Although Bitcoin may be an appropriate technology for preventing data tampering in medical fields, it is currently not suitable for the following three reasons: (1) it is an open network that anyone can join; (2) it deals with currency, which is only one-dimensional data; and (3) it needs massive computing power to guarantee tamper resistance. However, a blockchain system that requires permission to join has been developed in a private network; this system could deal with multidimensional data, and it also does not need massive computing power for effective tamper resistance [<xref ref-type="bibr" rid="ref7">7</xref>]. Beyond digital currency, researchers have started to focus on using blockchain methodology for building cryptographic proof of medical systems [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. They have applied blockchain technology in the maintenance of protocols in clinical trials and for the management of electronic health records (EHRs) [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. However, there has been no study to evaluate the use of blockchain technology in an mHealth system.</p>
      <p>To address this issue, we have applied blockchain technology to an mHealth app that enables cognitive behavioral therapy for insomnia (CBTi) using a smartphone. Insomnia is a prevalent public health problem with a huge economic burden. Approximately 20% of the population meets the criteria for chronic insomnia as a disorder [<xref ref-type="bibr" rid="ref15">15</xref>]. Insomnia is highly comorbid with various disorders such as hypertension [<xref ref-type="bibr" rid="ref16">16</xref>], diabetes mellitus [<xref ref-type="bibr" rid="ref17">17</xref>], and depression [<xref ref-type="bibr" rid="ref18">18</xref>]. The combined direct and indirect economic burden associated with insufficient sleep is US $138 billion in Japan alone [<xref ref-type="bibr" rid="ref19">19</xref>]. Given the high prevalence and detrimental effect of insomnia, effective and accessible treatment is crucial. CBTi is a first-line treatment with sufficient empirical support to be recommended for treating chronic insomnia [<xref ref-type="bibr" rid="ref20">20</xref>]. It is a behavioral intervention that focuses on treating patients’ chronic insomnia through problem-solving techniques and supportive therapies to address some of the triggering factors [<xref ref-type="bibr" rid="ref21">21</xref>]. Although there is plenty of evidence supporting the effectiveness of CBTi, the method is labor-intensive, expensive, and based at medical institutions. The lack of trained clinicians and high expenses limit access to CBTi and its dissemination. To overcome this obstacle, technological innovation has enabled delivery of CBTi using the Internet. Recent studies have shown that those who received Web-based CBTi had improved sleep outcomes [<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]. In an mHealth system for CBTi, mobile devices and the host server are connected by a secured Internet network [<xref ref-type="bibr" rid="ref25">25</xref>]. In the network, patients transfer their own EHRs from mobile devices, and data are stored in the server. Feedback advice based on the data is transferred to the patients’ mobile devices.</p>
      <p>In this study, we developed an mHealth system for CBTi using a smartphone app together with blockchain storage platform and evaluated the tamper resistance of the data collected using smartphones.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>The Structure of the mHealth System for CBTi</title>
        <p>Our mHealth system was composed of the CBTi client and the CBTi servers (<xref ref-type="fig" rid="figure1">Figure 1</xref>). In this system, patients received sessions through a chat program every day. The program comprised a fully automated smartphone app. Patients had to input their mHealth data twice a day, in the morning and in the evening. The CBTi sessions were conducted based on the collected data. The CBTi content covered not only behavioral and cognitive strategies but also relaxation strategies. The strategies were based on the current literature [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. This system is used in our ongoing clinical trials (UMIN000023999).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>(a) The structure of the mobile health system for cognitive behavioral therapy for insomnia (b) The data update using a blockchain system (c) The structure of the blockchain (d) The virtual computing environment in the study.</p>
          </caption>
          <graphic xlink:href="mhealth_v5i7e111_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>mHealth Records</title>
        <p>The mHealth records collected from patients were divided into two types: subjective and objective data. The subjective data, which include clinical indicators, sleep status, and a review of daytime activities, were collected in the form of a self-administered questionnaire. The objective data, which include the results of a psychomotor vigilance test [<xref ref-type="bibr" rid="ref28">28</xref>], were evaluated by measuring the touch response using the touch function of the smartphone. For the clinical indicators, the Athens Insomnia Scale [<xref ref-type="bibr" rid="ref29">29</xref>], the Epworth Sleepiness Scale [<xref ref-type="bibr" rid="ref30">30</xref>], and the Quick Inventory of Depressive Symptomatology were used [<xref ref-type="bibr" rid="ref31">31</xref>]. For the sleep status, the time of going to bed, time of falling asleep, time of waking up, and time of getting up were recorded. All data were stored in the JavaScript Object Notation (JSON) format in the database. We utilized the mHealth data of a volunteer. Informed consent was obtained from the volunteer for publication of this study. The study has received ethical approval from the Institute of Neuropsychiatry Ethics Committee. All the methods were performed in accordance with the relevant guidelines and regulations.</p>
      </sec>
      <sec>
        <title>mHealth Data Registration to the Blockchain Network　</title>
        <p>We show the data update process using the blockchain network (<xref ref-type="fig" rid="figure1">Figure 1</xref>). In the system, the patients send their own daily data via smartphones and get feedback information for the data. The system was constructed using smartphones and the cluster of servers on the network. We utilized Hyperledger Fabric version 0.5 to operate the system because Hyperledger is an open-source blockchain platform and has become widely used [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. In this study, the system comprised 4 validating peers (VP) and a membership service (MS). A VP was in charge of the main function of the blockchain, and an MS was in charge of authentication for the client (smartphone) and the VPs. The MS issued enrollment and transaction certificates to the client, and the client used the certificates for the authentication. Every VP had a replica of the common database that was called the “state.”</p>
        <p>One of the VPs became a leader of the network and accepted requests from the CBTi client. The request that was accepted by the leader was delivered to each VP. The CBTi client sent the first transaction to the leader VP, and then the leader VP let each VP install chaincode and perform the initialization. After that, the CBTi client sent the request for data processing, and the leader VP sent the request from the client to each VP. The VPs executed an installed chaincode and returned hash values generated from the execution result. At that time, each VP followed the consensus algorithm, which was called the Practical Byzantine Fault Tolerance (PBFT) algorithm [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. When the VPs reached a consensus, it was settled among all VPs. Thereafter, each VP stored the same result into their state. After that, the information based on the hashed result of the transaction was generated. This was called the “block.” That block contained the previous block information as a hash value and the current block hash value (<xref ref-type="fig" rid="figure1">Figure 1</xref>). <xref ref-type="fig" rid="figure1">Figure 1</xref> illustrates the structure of the blockchain. The field “height” was the length of the blockchain (N: positive integer). At the start of each process, height was 1, and it increased incrementally with the generation of the blocks. Each block, except the initial block, includes 3 fields: “currentBlockHash,” “previousBlockHash,” and “statehash.” The field “currentBlockHash” was the current hash information of the block and matched “previousBlockHash” of the next block. The block also preserved the hashed information of the current state. The new block generated in this way was connected to the list, which is called the “blockchain.”</p>
      </sec>
      <sec>
        <title>Test Scenario</title>
        <p>We evaluated the network robustness of the CBTi system with regard to data integrity according to the Recommendation of the Council Concerning Guidelines for the Security of Information Systems and Networks [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
        <p>To test network robustness during a network fault, we ensured the correctness of mHealth data updates from a smartphone using the procedure described below. First, we verified the process of normal data update. Next, we tested the data updates when one of the VP servers was down.</p>
        <p>For the test, we utilized the mHealth data of a volunteer over the course of 5 days. The client data format was JSON and, in the experiments, the data were input manually to the CBTi servers instead of via the smartphone app. Each server was constructed in the virtual environment, which ran in the same local personal computer with Intel Core i5-5200U CPU 2.2GHz and 8GB memory running Windows 10. For the construction of the virtual environment, we utilized Docker version 1.10.2 [<xref ref-type="bibr" rid="ref36">36</xref>], Oracle VirtualBox version 5.1.12, and Vagrant version 1.9.1. We used docker-compose version 1.5.2 to manage Docker. The virtual computing environment in the study comprised 4 VPs and an MS (<xref ref-type="fig" rid="figure1">Figure 1</xref>). Each VP server comprised a Docker container and a ledger. A chaincode was registered in the docker container. The ledger comprised state and blocks. The state was the key-value store database and recorded the result of the transactions.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Normal Data Update</title>
        <p>We verified the data update process under conditions where all the VPs were running normally. The test procedure was divided into 2 steps: Deploy and Invoke.</p>
        <sec>
          <title>The Deploy Step Execution</title>
          <p>We started the CBTi servers composed of 4 VPs and an MS. We initialized the state with the user data for 2 days and deployed the chaincode on each of the VPs. This is the Deploy step. In detail, the steps were as follows: First, we logged into the CBTi system with a user ID and password. We then initialized the state using the user data of a nonpatient volunteer for 2 days. Next, we deployed a chaincode to each of the 4 VPs. The chaincode describes the procedure for the addition of JSON formed data to the database. When the Deploy step was executed successfully, the block based on the transaction information was produced, and user data were added to the state.</p>
          <p>We ensured that the block was generated successfully and that the height (the length of the blockchain) incremented from the one at the start of the normal data update (<xref ref-type="fig" rid="figure2">Figure 2</xref>). At the start of the normal data update, the height was 1 and incremented with the production of the blocks. The “currentBlockHash” field matched the “previousBlockHash” field of the next block. At the start of the normal data update, the “previousBlockHash” field had no data. The queried user data from the state showed the user data for 2 days (<xref ref-type="fig" rid="figure3">Figure 3</xref>). The user data for 2 days were registered to the state as the initial data. Thus, the user data were registered to the state successfully.</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>The blockchain (excerpt) in the normal mobile health data update.</p>
            </caption>
            <graphic xlink:href="mhealth_v5i7e111_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>The user data (excerpt) queried from the state in the normal mobile health data update. (a) The initial user data after the Deploy step. (b) The updated user data after the Invoke step (newly added data were highlighted).</p>
            </caption>
            <graphic xlink:href="mhealth_v5i7e111_fig3.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>The Invoke Step Execution</title>
          <p>We executed the transaction to update the database with user data for a day using the chaincode on each VP. This is called the Invoke step. We ran the deployed chaincode on each VP, and each chaincode produced a temporary result. When the VPs in the network reached a consensus based on hash information of the temporary results, the transaction was confirmed. When the transaction was confirmed successfully, the user data were updated to the state, after which the block was produced. We ensured the production of the block and the increment of the height from one of the Deploy step (<xref ref-type="fig" rid="figure2">Figure 2</xref>). At the start of the normal data update, the height was 1 and incremented with the production of the blocks. The “currentBlockHash” field matched the “previousBlockHash” field of the next block. At the start of the normal data update, the “previousBlockHash” field had no data.</p>
          <p>We further confirmed the success of the data update by querying it. We could see that user data for a day had been added. The excerpt of user data registered to the database is shown in <xref ref-type="fig" rid="figure3">Figure 3</xref>. The user data for each day were added to the state. The full information from the produced blockchain and user data in the normal data update is shown in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>. Taken together, we could register and update the EHRs that were recorded from the smartphone into the blockchain network.</p>
        </sec>
      </sec>
      <sec>
        <title>Validation of Tamper Resistance</title>
        <p>To investigate the tamper resistance of our system, we produced an artificial fault in the system that caused ledgers in the VPs to contain inconsistencies. We produced a network fault by taking one of the VPs down and then updated data during the network fault. This gave an indication of the robustness of the blockchain network. After rebooting the VP that had stopped, we confirmed that the data in the rebooted VP were one step behind. We also checked that the inconsistency was corrected by ledger synchronization. In detail, the process was as follows: First, there were 4 VPs running in the initial state. We tested sequentially after normal data updates. Thus, the user data for 3 days was recorded (<xref ref-type="fig" rid="figure3">Figure 3</xref>). Second, we stopped one of the VPs (VP1); therefore, the total remaining number of running VPs was 3 (VP0, VP2, VP3). We then executed the Invoke step. Using PBFT as a consensus protocol, a blockchain network of N nodes can withstand a number of failed nodes, f, where f=(N−1)/3. Our network contains N=4 nodes, so applying the formula for the maximum number of tolerated failed nodes results in f=(4−1)/3=1. In other words, PBFT ensures that a minimum of 2×f + 1 (that is 3) nodes reach consensus on the order of transactions before appending them to the shared ledger. The block was produced (<xref ref-type="fig" rid="figure4">Figure 4</xref>: Node down &#38; Invoke), and the state was updated successfully because of the PBFT consensus protocol (<xref ref-type="fig" rid="figure5">Figure 5</xref>). At the start of all of the processes in the data update test, the height was 3 and increased incrementally with the production of the blocks. This suggests that the mHealth system with the blockchain network is robust against network faults.</p>
        <p>Next, we rebooted the stopped VP (VP1). We confirmed that the block of VP1 was one step behind because VP1 had been down (<xref ref-type="fig" rid="figure4">Figure 4</xref>: Node restart). As of this point, the total number of running VPs was 4. We executed the Invoke step again. The block was produced successfully (<xref ref-type="fig" rid="figure4">Figure 4</xref>: Invoke), and the state was updated (<xref ref-type="fig" rid="figure5">Figure 5</xref>).</p>
        <p>The full user data queried from the state are shown in <xref ref-type="app" rid="app2">Multimedia Appendix 2</xref>. Because only a minimum of 2×f + 1 nodes must reach consensus before proceeding to the next block of transactions, the ledger on any additional nodes (beyond 2×f + 1) will temporarily lag behind. The node that was restarted tries to synchronize with the latest ledger after several transactions (<xref ref-type="fig" rid="figure4">Figure 4</xref>).</p>
        <p>We further tested whether the rebooted VP (VP1) could rejoin the PBFT consensus if another VP (VP2) was temporarily down. After VP2 was offline, VP1 completely caught up with VP0 and VP3 because 2×f + 1 nodes must reach consensus before proceeding to the next block of transactions (<xref ref-type="fig" rid="figure4">Figure 4</xref>).</p>
        <p>The full information for the blockchain from these experiments is shown in <xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>. These results indicate that the EHR registered to the blockchain network is resistant to tampering and revision. The update of mHealth data was also compatible with tamper resistance in the blockchain network.</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>The blockchain in the mobile health data update test when one of validating peers (VPs) was down. The blockchain height of each VP is shown. (a) Robustness of the blockchain network against network failure. (b) Correction of the inconsistency by ledger synchronization. (c) Rejoining the Practical Byzantine Fault Tolerance consensus after another network failure.</p>
          </caption>
          <graphic xlink:href="mhealth_v5i7e111_fig4.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>The user mobile health data (excerpt) queried from the state in the data update test when one of the validating peers (VPs) was down. (a) The successfully added user data after the Invoke step when VP1 was down (newly added data were highlighted). (b) The user data after the Invoke step when VP1 was rebooted (newly added data were highlighted).</p>
          </caption>
          <graphic xlink:href="mhealth_v5i7e111_fig5.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In this study, we have developed and evaluated a tamper-resistant mHealth system using the blockchain technique. The mHealth data collected using a smartphone were sent to a private Hyperledger Fabric blockchain network. The mHealth database in the blockchain network was robust against network faults such as “node down.” The node of the distributed database in the blockchain network that was down could catch up with other normal nodes because of the consensus algorithm, which is not implemented in ordinary distributed database systems. Therefore, the distributed database in the blockchain network was resistant to tampering and revision, and the mHealth data update was compatible with tamper resistance in the blockchain network.</p>
        <p>Thus, mHealth technologies such as CBTi using a mobile device enable delivery of treatments that have previously been labor-intensive. The mHealth system needs to be tamper-resistant because the system automatically provides treatment to patients based on the stored data. Recently, attacks to hospital networks using ransomware have been reported where hospitals had to pay ransom to the attackers [<xref ref-type="bibr" rid="ref37">37</xref>]. If an mHealth system is attacked and the data is tampered with, the feedback based on the tampered information may be harmful to the patients.</p>
        <p>In previous studies, various secure EHR systems have been proposed [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. It has been pointed out that such systems are inadequate for practical use as they have security risks because of their reliance on a single trusted authority [<xref ref-type="bibr" rid="ref40">40</xref>]. This study avoided this risk by using a distributed blockchain network. Moreover, the system we constructed in this study utilized open-source software that could be applied to other mHealth systems.</p>
        <p>There are two reasons that blockchain technology is favorable to mHealth data. First, as shown in this study, the mHealth data update was not frequent because the patients’ data were transferred to the server only twice a day in our system. So, although blockchain is not ideal for data with high temporal resolution, it could easily deal with mHealth data. Second, mHealth data are valuable, which is why a high level of security is essential. From the point of the view of security, blockchain is expected to accomplish high tamper resistance.</p>
        <p>The system guarantees the accuracy of mHealth data without confirmation by a third party, so it has the potential for use in clinical trials in the following two ways: (1) the system would reduce the cost in clinical trials by decreasing the amount currently spent on confirmation by a third party such as a contract research organization [<xref ref-type="bibr" rid="ref41">41</xref>]; and (2) it could reduce the possibility of human error because the system could minimize human involvement with the data. Furthermore, one of the ethical problems in clinical trials is that patient data and personal information can be accessed by people who are not directly involved in that patient’s care. Thus, the use of blockchain technology in clinical trials may enhance the development of drugs and medical devices.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>This study has two limitations. First, there is vulnerability around the blockchain system. Although blockchain technology is tamper-resistant, the implementation around it can be attacked. Poorly maintained and outdated codes allowed vulnerability in an incident involving a decentralized autonomous organization [<xref ref-type="bibr" rid="ref42">42</xref>]. Second, the theoretical limitation of the consensus algorithm used in the blockchain also has vulnerability. Although we utilized the PBFT algorithm for the consensus, the blockchain can be disabled if more than (N-1)/3 of the VPs are attacked at the same time. Such incidents could happen, especially in small networks [<xref ref-type="bibr" rid="ref43">43</xref>]. To solve this problem, it is important to increase the number of servers, and at the same time, increase the number of stakeholders holding the servers to prevent malicious users from occupying the system. At the moment, private blockchain can scale to a few hundred nodes, and an advanced system has been developed [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>In this study, we developed and evaluated a tamper-resistant mobile health care system using blockchain technology.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>The user data queried from the state in the normal data update.</p>
        <media xlink:href="mhealth_v5i7e111_app1.pdf" xlink:title="PDF File (Adobe PDF File), 987KB"/>
      </app>
      <app id="app2">
        <title>Multimedia Appendix 2</title>
        <p>The user data queried from the state in the data update test when one of VPs was down.</p>
        <media xlink:href="mhealth_v5i7e111_app2.pdf" xlink:title="PDF File (Adobe PDF File), 1MB"/>
      </app>
      <app id="app3">
        <title>Multimedia Appendix 3</title>
        <p>The blockchain information in the validation test of tamper resistance.</p>
        <media xlink:href="mhealth_v5i7e111_app3.pdf" xlink:title="PDF File (Adobe PDF File), 55KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CBTi</term>
          <def>
            <p>cognitive behavioral therapy for insomnia</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EHRs</term>
          <def>
            <p>electronic health records</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">JSON</term>
          <def>
            <p>JavaScript Object Notation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">MS</term>
          <def>
            <p>membership service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PBFT</term>
          <def>
            <p>Practical Byzantine Fault Tolerance</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">VP</term>
          <def>
            <p>validating peer</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported, in part, by the New Energy and Industrial Technology Development Organization of Japan.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>TU designed the research; MK performed the research; DI, MK, and TU analyzed the data; and DI, MK, and TU wrote the paper.</p>
      </fn>
      <fn fn-type="conflict">
        <p>The authors are members of Sustainable Medicine, Inc.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Peter</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Ama-assn</source>  
        <year>2016</year>  
        <access-date>2017-07-19</access-date>
        <comment>Integration of mobile health applications and devices into practice 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.ama-assn.org/sites/default/files/media-browser/public/about-ama/councils/Council%20Reports/council-on-medical-service/interim-2016-council-on-medical-service-report-6.pdf">https://www.ama-assn.org/sites/default/files/media-browser/public/about-ama/councils/Council%20Reports/council-on-medical-service/interim-2016-council-on-medical-service-report-6.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6s4Fz8Rtm"/></comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Security models and requirements for healthcare application clouds</article-title>
        <year>2010</year>  
        <conf-name>IEEE 3rd International Conference on Cloud Computing</conf-name>
        <conf-date>2010</conf-date>
        <conf-loc>Miami, FL</conf-loc>
        <pub-id pub-id-type="doi">10.1109/cloud.2010.62</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rodrigues</surname>
            <given-names>JJ</given-names>
          </name>
          <name name-style="western">
            <surname>de la Torre</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Fernández</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>López-Coronado</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Analysis of the security and privacy requirements of cloud-based electronic health records systems</article-title>
        <source>J Med Internet Res</source>  
        <year>2013</year>  
        <month>08</month>  
        <day>21</day>  
        <volume>15</volume>  
        <issue>8</issue>  
        <fpage>e186</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://paperpile.com/b/RUDrOC/yFzwy"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.2494</pub-id>
        <pub-id pub-id-type="medline">23965254</pub-id>
        <pub-id pub-id-type="pii">v15i8e186</pub-id>
        <pub-id pub-id-type="pmcid">PMC3757992</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nugent</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Upton</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Cimpoesu</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Improving data transparency in clinical trials using blockchain smart contracts</article-title>
        <source>F1000Res</source>  
        <year>2016</year>  
        <volume>5</volume>  
        <fpage>2541</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://f1000research.com/articles/10.12688/f1000research.9756.1/doi"/>
        </comment>  
        <pub-id pub-id-type="doi">10.12688/f1000research.9756.1</pub-id>
        <pub-id pub-id-type="medline">28357041</pub-id>
        <pub-id pub-id-type="pmcid">PMC5357027</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Crosby</surname>
            <given-names>M</given-names>
          </name>
          <collab>Nachiappan</collab>
          <name name-style="western">
            <surname>Pattanayak</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Verma</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Kalyanaraman</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <source>Berkeley</source>  
        <access-date>2017-05-27</access-date>
        <comment>BlockChain technology: beyond Bitcoin 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf">http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6qlaKudww"/></comment> </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nakamoto</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Bitcoin</source>  
        <year>2008</year>  
        <access-date>2017-07-20</access-date>
        <comment>Bitcoin: a peer-to-peer electronic cash system 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6s5l7sXzg"/></comment> </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cachin</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>IBM</source>  
        <year>2016</year>  
        <access-date>2017-07-20</access-date>
        <comment>Architecture of the hyperledger blockchain fabric 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf">https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6s5lCBRAZ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sutherland</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Barnard</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Broad</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Clout</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Connor</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Côté</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <article-title>A 2017 horizon scan of emerging issues for global conservation and biological diversity</article-title>
        <source>Trends Ecol Evol</source>  
        <year>2017</year>  
        <volume>32</volume>  
        <fpage>40</fpage> </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
        <source>CCC Innovation Center</source>  
        <year>2016</year>  
        <access-date>2017-05-27</access-date>
        <comment>Blockchain challenge 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cccinnovationcenter.com/challenges/block-chain-challenge">http://www.cccinnovationcenter.com/challenges/block-chain-challenge</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6qlaWzPL0"/></comment> </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Azaria</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Ekblaw</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Vieira</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Lippman</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>MedRec: Using blockchain for medical data access and permission management</article-title>
        <year>2016</year>  
        <conf-name>2nd International Conference on Open and Big Data</conf-name>
        <conf-date>2016</conf-date>
        <conf-loc>Vienna, Austria</conf-loc>
        <fpage>25</fpage>  
        <lpage>30</lpage> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Irving</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Holden</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>How blockchain-timestamped protocols could improve the trustworthiness of medical science</article-title>
        <source>F1000Res</source>  
        <year>2016</year>  
        <volume>5</volume>  
        <fpage>222</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://f1000research.com/articles/10.12688/f1000research.8114.3/doi"/>
        </comment>  
        <pub-id pub-id-type="doi">10.12688/f1000research.8114.3</pub-id>
        <pub-id pub-id-type="medline">27239273</pub-id>
        <pub-id pub-id-type="pmcid">PMC4866630.3</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yue</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Jin</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>W</given-names>
          </name>
        </person-group>
        <article-title>Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control</article-title>
        <source>J Med Syst</source>  
        <year>2016</year>  
        <month>10</month>  
        <volume>40</volume>  
        <issue>10</issue>  
        <fpage>218</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://paperpile.com/b/RUDrOC/D5Tsi"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s10916-016-0574-6</pub-id>
        <pub-id pub-id-type="medline">27565509</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10916-016-0574-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yli-Huumo</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Ko</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Park</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Smolander</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Where is current research on blockchain technology?-a systematic review</article-title>
        <source>PLoS One</source>  
        <year>2016</year>  
        <volume>11</volume>  
        <issue>10</issue>  
        <fpage>e0163477</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0163477"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0163477</pub-id>
        <pub-id pub-id-type="medline">27695049</pub-id>
        <pub-id pub-id-type="pii">PONE-D-16-17351</pub-id>
        <pub-id pub-id-type="pmcid">PMC5047482</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Xhafa</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Zhao</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Wong</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Designing cloud-based electronic health record system with attribute-based encryption</article-title>
        <source>Multimed Tools Appl</source>  
        <year>2014</year>  
        <volume>74</volume>  
        <fpage>3441</fpage>  
        <lpage>58</lpage>  
        <pub-id pub-id-type="doi">10.1007/s11042-013-1829-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaneita</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Ohida</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Osaki</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Tanihata</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Minowa</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Suzuki</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Wada</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Kanda</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Hayashi</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Insomnia among Japanese adolescents: a nationwide representative survey</article-title>
        <source>Sleep</source>  
        <year>2006</year>  
        <month>12</month>  
        <volume>29</volume>  
        <issue>12</issue>  
        <fpage>1543</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="medline">17252885</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Suka</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Yoshida</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Sugimori</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Persistent insomnia is a predictor of hypertension in Japanese male workers</article-title>
        <source>J Occup Health</source>  
        <year>2003</year>  
        <month>11</month>  
        <volume>45</volume>  
        <issue>6</issue>  
        <fpage>344</fpage>  
        <lpage>50</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://joi.jlc.jst.go.jp/JST.JSTAGE/joh/45.344?from=PubMed"/>
        </comment>  
        <pub-id pub-id-type="medline">14676413</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mallon</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Broman</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Hetta</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>High incidence of diabetes in men with sleep complaints or short sleep duration: a 12-year follow-up study of a middle-aged population</article-title>
        <source>Diabetes Care</source>  
        <year>2005</year>  
        <month>11</month>  
        <volume>28</volume>  
        <issue>11</issue>  
        <fpage>2762</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="medline">16249553</pub-id>
        <pub-id pub-id-type="pii">28/11/2762</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Salo</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Sivertsen</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Oksanen</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Sjösten</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Pentti</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Virtanen</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Kivimäki</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Vahtera</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Insomnia symptoms as a predictor of incident treatment for depression: prospective cohort study of 40,791 men and women</article-title>
        <source>Sleep Med</source>  
        <year>2012</year>  
        <month>03</month>  
        <volume>13</volume>  
        <issue>3</issue>  
        <fpage>278</fpage>  
        <lpage>84</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.sleep.2011.06.022</pub-id>
        <pub-id pub-id-type="medline">22177343</pub-id>
        <pub-id pub-id-type="pii">S1389-9457(11)00381-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hafner</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Stepanek</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Taylor</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Troxel</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Stolk</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>Why sleep matters -- the economic costs of insufficient sleep</source>  
        <year>2016</year>  
        <publisher-loc>Europe</publisher-loc>
        <publisher-name>RAND Corporation</publisher-name></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jacobs</surname>
            <given-names>GD</given-names>
          </name>
          <name name-style="western">
            <surname>Pace-Schott</surname>
            <given-names>EF</given-names>
          </name>
          <name name-style="western">
            <surname>Stickgold</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Otto</surname>
            <given-names>MW</given-names>
          </name>
        </person-group>
        <article-title>Cognitive behavior therapy and pharmacotherapy for insomnia: a randomized controlled trial and direct comparison</article-title>
        <source>Arch Intern Med</source>  
        <year>2004</year>  
        <month>09</month>  
        <day>27</day>  
        <volume>164</volume>  
        <issue>17</issue>  
        <fpage>1888</fpage>  
        <lpage>96</lpage>  
        <pub-id pub-id-type="doi">10.1001/archinte.164.17.1888</pub-id>
        <pub-id pub-id-type="medline">15451764</pub-id>
        <pub-id pub-id-type="pii">164/17/1888</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morin</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Hauri</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Espie</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Spielman</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Buysse</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Bootzin</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Nonpharmacologic treatment of chronic insomnia. An American academy of sleep medicine review</article-title>
        <source>Sleep</source>  
        <year>1999</year>  
        <month>12</month>  
        <day>15</day>  
        <volume>22</volume>  
        <issue>8</issue>  
        <fpage>1134</fpage>  
        <lpage>56</lpage>  
        <pub-id pub-id-type="medline">10617176</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Luxton</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>McCann</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Bush</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Mishkind</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Reger</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>mHealth for mental health: integrating smartphone technology in behavioral healthcare</article-title>
        <source>Prof Psychol Res Pr</source>  
        <year>2011</year>  
        <volume>42</volume>  
        <issue>6</issue>  
        <fpage>505</fpage>  
        <lpage>12</lpage>  
        <pub-id pub-id-type="doi">10.1037/a0024485</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Espie</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Luik</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Cape</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Drake</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Siriwardena</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Ong</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Bostock</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Hames</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Nisbet</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Sheaves</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Freeman</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Costa-Font</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Emsley</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Kyle</surname>
            <given-names>SD</given-names>
          </name>
        </person-group>
        <article-title>Digital cognitive behavioural therapy for insomnia versus sleep hygiene education: the impact of improved sleep on functional health, quality of life and psychological well-being. study protocol for a randomised controlled trial</article-title>
        <source>Trials</source>  
        <year>2016</year>  
        <month>05</month>  
        <day>23</day>  
        <volume>17</volume>  
        <issue>1</issue>  
        <fpage>257</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-016-1364-7"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s13063-016-1364-7</pub-id>
        <pub-id pub-id-type="medline">27216112</pub-id>
        <pub-id pub-id-type="pii">10.1186/s13063-016-1364-7</pub-id>
        <pub-id pub-id-type="pmcid">PMC4877942</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Espie</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Kyle</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Ong</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Douglas</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Hames</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Brown</surname>
            <given-names>JS</given-names>
          </name>
        </person-group>
        <article-title>A randomized, placebo-controlled trial of online cognitive behavioral therapy for chronic insomnia disorder delivered via an automated media-rich web application</article-title>
        <source>Sleep</source>  
        <year>2012</year>  
        <month>06</month>  
        <day>01</day>  
        <volume>35</volume>  
        <issue>6</issue>  
        <fpage>769</fpage>  
        <lpage>81</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22654196"/>
        </comment>  
        <pub-id pub-id-type="doi">10.5665/sleep.1872</pub-id>
        <pub-id pub-id-type="medline">22654196</pub-id>
        <pub-id pub-id-type="pmcid">PMC3353040</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Weiss</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Taylor</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Hoffman</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Ramsey</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Manber</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Gehrman</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Crowley</surname>
            <given-names>JJ</given-names>
          </name>
          <name name-style="western">
            <surname>Ruzek</surname>
            <given-names>JI</given-names>
          </name>
          <name name-style="western">
            <surname>Trockel</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>CBT-I coach: a description and clinician perceptions of a mobile app for cognitive behavioral therapy for insomnia</article-title>
        <source>J Clin Sleep Med</source>  
        <year>2016</year>  
        <month>04</month>  
        <day>15</day>  
        <volume>12</volume>  
        <issue>4</issue>  
        <fpage>597</fpage>  
        <lpage>606</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://dx.doi.org/10.5664/jcsm.5700"/>
        </comment>  
        <pub-id pub-id-type="doi">10.5664/jcsm.5700</pub-id>
        <pub-id pub-id-type="medline">26888586</pub-id>
        <pub-id pub-id-type="pii">jc-00087-15</pub-id>
        <pub-id pub-id-type="pmcid">PMC4795288</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ritterband</surname>
            <given-names>LM</given-names>
          </name>
          <name name-style="western">
            <surname>Thorndike</surname>
            <given-names>FP</given-names>
          </name>
          <name name-style="western">
            <surname>Ingersoll</surname>
            <given-names>KS</given-names>
          </name>
          <name name-style="western">
            <surname>Lord</surname>
            <given-names>HR</given-names>
          </name>
          <name name-style="western">
            <surname>Gonder-Frederick</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Frederick</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Quigg</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Cohn</surname>
            <given-names>WF</given-names>
          </name>
          <name name-style="western">
            <surname>Morin</surname>
            <given-names>CM</given-names>
          </name>
        </person-group>
        <article-title>Effect of a web-based cognitive behavior therapy for insomnia intervention with 1-year follow-up: a randomized clinical trial</article-title>
        <source>JAMA Psychiatry</source>  
        <year>2017</year>  
        <month>01</month>  
        <day>01</day>  
        <volume>74</volume>  
        <issue>1</issue>  
        <fpage>68</fpage>  
        <lpage>75</lpage>  
        <pub-id pub-id-type="doi">10.1001/jamapsychiatry.2016.3249</pub-id>
        <pub-id pub-id-type="medline">27902836</pub-id>
        <pub-id pub-id-type="pii">2589161</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morin</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Bootzin</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Buysse</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Edinger</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Espie</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Lichstein</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Psychological and behavioral treatment of insomnia:update of the recent evidence (1998-2004)</article-title>
        <source>Sleep</source>  
        <year>2006</year>  
        <month>11</month>  
        <volume>29</volume>  
        <issue>11</issue>  
        <fpage>1398</fpage>  
        <lpage>414</lpage>  
        <pub-id pub-id-type="medline">17162986</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Basner</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Dinges</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Maximizing sensitivity of the psychomotor vigilance test (PVT) to sleep loss</article-title>
        <source>Sleep</source>  
        <year>2011</year>  
        <month>05</month>  
        <day>01</day>  
        <volume>34</volume>  
        <issue>5</issue>  
        <fpage>581</fpage>  
        <lpage>91</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21532951"/>
        </comment>  
        <pub-id pub-id-type="medline">21532951</pub-id>
        <pub-id pub-id-type="pmcid">PMC3079937</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Soldatos</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Dikeos</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Paparrigopoulos</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Athens insomnia scale: validation of an instrument based on ICD-10 criteria</article-title>
        <source>J Psychosom Res</source>  
        <year>2000</year>  
        <month>06</month>  
        <volume>48</volume>  
        <issue>6</issue>  
        <fpage>555</fpage>  
        <lpage>60</lpage>  
        <pub-id pub-id-type="medline">11033374</pub-id>
        <pub-id pub-id-type="pii">S0022399900000957</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>A new method for measuring daytime sleepiness: the Epworth sleepiness scale</article-title>
        <source>Sleep</source>  
        <year>1991</year>  
        <month>12</month>  
        <volume>14</volume>  
        <issue>6</issue>  
        <fpage>540</fpage>  
        <lpage>5</lpage>  
        <pub-id pub-id-type="medline">1798888</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rush</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Carmody</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Reimitz</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>The inventory of depressive symptomatology (IDS): clinician (IDS-C) and self-report (IDS-SR) ratings of depressive symptoms</article-title>
        <source>Int J Method Psychiat Res</source>  
        <year>2006</year>  
        <month>06</month>  
        <volume>9</volume>  
        <issue>2</issue>  
        <fpage>45</fpage>  
        <lpage>59</lpage>  
        <pub-id pub-id-type="doi">10.1002/mpr.79</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kakavand</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Kost De Sevres</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Chilton</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <source>SSRN</source>  
        <year>2017</year>  
        <access-date>2017-05-27</access-date>
        <comment>The blockchain revolution: an analysis of regulation and technology related to distributed ledger technologies 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract%7B_%7Did=2849251">https://papers.ssrn.com/sol3/papers.cfm?abstract%7B_%7Did=2849251</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6qlH3aIRZ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Castro</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Liskov</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Practical byzantine fault tolerance and proactive recovery</article-title>
        <source>ACM Trans Comput Syst</source>  
        <year>2002</year>  
        <volume>20</volume>  
        <issue>4</issue>  
        <fpage>398</fpage>  
        <lpage>461</lpage>  
        <pub-id pub-id-type="doi">10.1145/571637.571640</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Castro</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Liskov</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Practical byzantine fault tolerance</article-title>
        <year>1999</year>  
        <conf-name>Proceedings of the Third Symposium on Operating Systems Design Implementation</conf-name>
        <conf-date>1999</conf-date>
        <conf-loc>Berkeley, CA</conf-loc>
        <publisher-loc>USA</publisher-loc>
        <publisher-name>USENIX Association</publisher-name>
        <fpage>173</fpage>  
        <lpage>86</lpage> </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>OECD</collab>
        </person-group>
        <source>OECD</source>  
        <year>2002</year>  
        <access-date>2017-07-20</access-date>
        <comment>OECD guidelines for the security of information systems and networks 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.oecd.org/sti/ieconomy/15582260.pdf">https://www.oecd.org/sti/ieconomy/15582260.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6s5mwo8Kt"/></comment> </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Merkel</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Docker: lightweight linux containers for consistent development deployment</article-title>
        <source>Linux J</source>  
        <year>2014</year>  
        <volume>2014</volume>  
        <issue>239</issue>  
        <fpage>2</fpage> </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pope</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Ransomware: minimizing the risks</article-title>
        <source>Innov Clin Neurosci</source>  
        <year>2016</year>  
        <volume>13</volume>  
        <issue>11-12</issue>  
        <fpage>37</fpage>  
        <lpage>40</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28210525"/>
        </comment>  
        <pub-id pub-id-type="medline">28210525</pub-id>
        <pub-id pub-id-type="pmcid">PMC5300711</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Alshehri</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Radziszowski</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Raj</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption</article-title>
        <year>2012</year>  
        <conf-name>IEEE 28th International Conference on Data Engineering Workshops</conf-name>
        <conf-date>2012</conf-date>
        <conf-loc>Washington, DC</conf-loc>
        <publisher-name>IEEE</publisher-name>
        <fpage>143</fpage>  
        <lpage>6</lpage> </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Jia</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Ren</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Xie</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>DAC-MACS: effective data access control for multiauthority cloud storage systems</article-title>
        <source>IEEE Trans Inform Forensic Secur</source>  
        <year>2013</year>  
        <month>11</month>  
        <volume>8</volume>  
        <issue>11</issue>  
        <fpage>1790</fpage>  
        <lpage>801</lpage>  
        <pub-id pub-id-type="doi">10.1109/TIFS.2013.2279531</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rezaeibagha</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Mu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Susilo</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Win</surname>
            <given-names>KT</given-names>
          </name>
        </person-group>
        <article-title>Multi-authority security framework for scalable EHR systems</article-title>
        <source>IJMEI</source>  
        <year>2016</year>  
        <volume>8</volume>  
        <issue>4</issue>  
        <fpage>390</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://paperpile.com/b/zkAzox/8Xau"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1504/IJMEI.2016.079368</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shuchman</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Commercializing clinical trials--risks and benefits of the CRO boom</article-title>
        <source>N Engl J Med</source>  
        <year>2007</year>  
        <month>10</month>  
        <day>04</day>  
        <volume>357</volume>  
        <issue>14</issue>  
        <fpage>1365</fpage>  
        <lpage>8</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp078176</pub-id>
        <pub-id pub-id-type="medline">17914036</pub-id>
        <pub-id pub-id-type="pii">357/14/1365</pub-id></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Xu</surname>
            <given-names>JJ</given-names>
          </name>
        </person-group>
        <article-title>Are blockchains immune to all malicious attacks? financial Innovation</article-title>
        <source>Financial Innovation</source>  
        <year>2016</year>  
        <volume>2</volume>  
        <fpage>25</fpage> </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Swan</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>Blockchain: Blueprint for a New Economy</source>  
        <year>2015</year>  
        <publisher-loc>Boston</publisher-loc>
        <publisher-name>O'Reilly Media</publisher-name></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Li</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Sforzin</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Fedorov</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Karame</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Towards scalable private industrial blockchains</article-title>
        <year>2017</year>  
        <conf-name>Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts</conf-name>
        <conf-date>April 02, 2017</conf-date>
        <conf-loc>Abu Dhabi, United Arab Emirates</conf-loc>
        <pub-id pub-id-type="doi">10.1145/3055518.3055531</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
