<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMI</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id>
      <journal-title>JMIR Medical Informatics</journal-title>
      <issn pub-type="epub">2291-9694</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i11e27816</article-id>
      <article-id pub-id-type="pmid">34730538</article-id>
      <article-id pub-id-type="doi">10.2196/27816</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Blockchain-Based Dynamic Consent Architecture to Support Clinical Genomic Data Sharing (ConsentChain): Proof-of-Concept Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Lovis</surname>
            <given-names>Christian</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Platt</surname>
            <given-names>Moritz</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Doerr</surname>
            <given-names>Megan</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Albalwy</surname>
            <given-names>Faisal</given-names>
          </name>
          <degrees>BSc, MS</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Computer Science</institution>
            <institution>University of Manchester</institution>
            <addr-line>Oxford Road</addr-line>
            <addr-line>Manchester, M13 9PL</addr-line>
            <country>United Kingdom</country>
            <phone>44 161 306 6000</phone>
            <email>faisal.albalwy@manchester.ac.uk</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2342-2156</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Brass</surname>
            <given-names>Andrew</given-names>
          </name>
          <degrees>BSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0389-7058</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Davies</surname>
            <given-names>Angela</given-names>
          </name>
          <degrees>BSc, PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3365-7231</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Computer Science</institution>
        <institution>University of Manchester</institution>
        <addr-line>Manchester</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Computer Science</institution>
        <institution>College of Computer Science and Engineering</institution>
        <institution>Taibah University</institution>
        <addr-line>Madinah</addr-line>
        <country>Saudi Arabia</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Division of Informatics, Imaging and Data Sciences</institution>
        <institution>University of Manchester</institution>
        <addr-line>Manchester</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Faisal Albalwy <email>faisal.albalwy@manchester.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>3</day>
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <volume>9</volume>
      <issue>11</issue>
      <elocation-id>e27816</elocation-id>
      <history>
        <date date-type="received">
          <day>8</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>21</day>
          <month>3</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>15</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>25</day>
          <month>7</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Faisal Albalwy, Andrew Brass, Angela Davies. Originally published in JMIR Medical Informatics (https://medinform.jmir.org), 03.11.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on https://medinform.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://medinform.jmir.org/2021/11/e27816" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>In clinical genomics, sharing of rare genetic disease information between genetic databases and laboratories is essential to determine the pathogenic significance of variants to enable the diagnosis of rare genetic diseases. Significant concerns regarding data governance and security have reduced this sharing in practice. Blockchain could provide a secure method for sharing genomic data between involved parties and thus help overcome some of these issues.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to contribute to the growing knowledge of the potential role of blockchain technology in supporting the sharing of clinical genomic data by describing blockchain-based dynamic consent architecture to support clinical genomic data sharing and provide a proof-of-concept implementation, called ConsentChain, for the architecture to explore its performance.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The ConsentChain requirements were captured from a patient forum to identify security and consent concerns. The ConsentChain was developed on the Ethereum platform, in which smart contracts were used to model the actions of patients, who may provide or withdraw consent to share their data; the data creator, who collects and stores patient data; and the data requester, who needs to query and access the patient data. A detailed analysis was undertaken of the ConsentChain performance as a function of the number of transactions processed by the system.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We describe ConsentChain, a blockchain-based system that provides a web portal interface to support clinical genomic sharing. ConsentChain allows patients to grant or withdraw data requester access and allows data requesters to query and submit access to data stored in a secure off-chain database. We also developed an ontology model to represent patient consent elements into machine-readable codes to automate the consent and data access processes.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Blockchains and smart contracts can provide an efficient and scalable mechanism to support dynamic consent functionality and address some of the barriers that inhibit genomic data sharing. However, they are not a complete answer, and a number of issues still need to be addressed before such systems can be deployed in practice, particularly in relation to verifying user credentials.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>blockchain</kwd>
        <kwd>smart contracts</kwd>
        <kwd>dynamic consent</kwd>
        <kwd>clinical genomics</kwd>
        <kwd>data sharing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Overview</title>
        <p>With the advent of fast and effective next-generation sequencing technologies, unlinked and dispersed genomic data have emerged as a major challenge in diagnosing rare diseases. The molecular diagnosis of a rare disease involves comparing a patient’s genetic variant data with the variants of others with similar diseases in a large population. Therefore, sharing of data between genetic databases and laboratories is essential to identify overlapping results and for determining the pathogenic significance of variants to enable the diagnosis of rare genetic diseases.</p>
        <p>One of the most common challenges to be overcome is that genomic data are often kept in centralized restricted-access repositories because of privacy and security concerns [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]; therefore, the data are difficult to locate or unavailable outside of the laboratories that own them. An in-depth qualitative study has revealed that current approaches to genomic data access and sharing through restricted-access repositories are time consuming and difficult and emphasized that the availability, discoverability, and accessibility of genomic data are bottlenecks to facilitating genomic data sharing [<xref ref-type="bibr" rid="ref8">8</xref>]. There are also further challenges that hinder the large-scale sharing of genomic data, including a lack of time and the resources required to obtain consent to share [<xref ref-type="bibr" rid="ref9">9</xref>], insufficient resources and infrastructure to track and recontact patients [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>], lack of interoperability [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>], and ethical issues [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref13">13</xref>-<xref ref-type="bibr" rid="ref15">15</xref>].</p>
        <p>Some of the above-mentioned challenges are the result of adopting centralized architectures for storing, sharing, and accessing genomic data. In such architectures, the data are stored in centralized databases and accessed through controlled access mechanisms. Although this approach to the gathering and management of genomic data has proven successful in the past, studies have revealed that such centralized architectures fail to properly address the growing demand for accessing genomic data [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. This is concerning because the discoverability, availability, and accessibility of genomic data are essential for enabling the diagnosis of rare genetic diseases [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref18">18</xref>].</p>
        <p>Various solutions to the challenges associated with the centralized storage of genomic data have been proposed. For example, federated data storage systems have been proposed to support genomic data sharing. The GA4GH Beacon Project [<xref ref-type="bibr" rid="ref19">19</xref>] and i2b2 Data Sharing Network [<xref ref-type="bibr" rid="ref20">20</xref>] are examples of such systems. Both use a federated network to connect institutions’ genomic databases, which enables them to process queries concerning the presence of genetic variants and traits. This also reduces the cost of genomic data transfers and allows institutions to maintain data control [<xref ref-type="bibr" rid="ref21">21</xref>]. However, such systems have some drawbacks, including their failure to support complex queries, limitations to research institutions and hospitals, nonallowance of patient engagement in contributing or controlling their genomic data, and lack of decentralized governance [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Decentralized and distributed technologies have been suggested as a potential solution to promote genomic data sharing [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. One emerging example of such a technology is blockchain technology. As decentralized and distributed technology, blockchain technology has many appealing properties, such as data integrity and accountability, that could be used to improve the integrity, discoverability, and accessibility of genomic data, thereby moving toward a new trusted infrastructure to support the promotion of genomic data sharing. This paper proposes blockchain-based dynamic consent architecture to support genomic data sharing. We present some design considerations and describe a proof-of-concept implementation for the proposed architecture called ConsentChain. The source code is available on Mendeley data [<xref ref-type="bibr" rid="ref25">25</xref>] under the MIT license.</p>
      </sec>
      <sec>
        <title>Background</title>
        <sec>
          <title>Blockchain</title>
          <sec>
            <title>Overview</title>
            <p>A blockchain is a protocol that enables a network of computers, known as nodes, to maintain a shared database called a ledger, without the need for complete trust between the network’s nodes [<xref ref-type="bibr" rid="ref26">26</xref>]. It was originally developed as the underlying infrastructure for the peer-to-peer electronic cash system Bitcoin in 2009 [<xref ref-type="bibr" rid="ref27">27</xref>]. Other blockchain platforms, including Ethereum [<xref ref-type="bibr" rid="ref28">28</xref>] and Hyperledger Fabric [<xref ref-type="bibr" rid="ref29">29</xref>], have emerged as the next generation of blockchain technology and implemented the concept of smart contracts, which was first introduced by Nick Szabo in the 1990s to build a digital relationship between 2 parties over computer networks [<xref ref-type="bibr" rid="ref30">30</xref>]. In blockchain, a smart contract is a computer program that is stored, executed, and verified in the blockchain according to predefined conditions without the need for any trusted-third party [<xref ref-type="bibr" rid="ref31">31</xref>]. The result of smart contract execution is a transaction recorded on a blockchain [<xref ref-type="bibr" rid="ref28">28</xref>]. Ethereum smart contracts are written using high-level programming languages, such as Solidity and Vyper; therefore, they are vulnerable to coding bugs and malicious flaws [<xref ref-type="bibr" rid="ref32">32</xref>].</p>
          </sec>
          <sec>
            <title>Blockchain Architecture</title>
            <p>A blockchain consists of 2 main components: a peer-to-peer network and a distributed ledger.</p>
            <list list-type="bullet">
              <list-item>
                <p>Peer-to-peer network: understanding peer-to-peer networks is essential for understanding blockchains because, at its core, a blockchain is a peer-to-peer network. As stated, a peer-to-peer network consists of numerous connected computers called nodes. Each node in the network has a direct or indirect connection with the other network nodes. Each node makes a portion of its computational resources (ie, processing power or storage capacity) available directly to other nodes, without the need for central coordination by servers [<xref ref-type="bibr" rid="ref33">33</xref>]. Unlike centralized networks, peer-to-peer networks have no central control, and each network node is equal to all others. Furthermore, all nodes function as both servers and clients. <xref rid="figure1" ref-type="fig">Figure 1</xref> illustrates the architecture of the centralized and peer-to-peer networks.</p>
              </list-item>
            </list>
            <fig id="figure1" position="float">
              <label>Figure 1</label>
              <caption>
                <p>The architectures of centralized and peer-to-peer networks.</p>
              </caption>
              <graphic xlink:href="medinform_v9i11e27816_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
            <list list-type="bullet">
              <list-item>
                <p>Distributed ledger: all transactions in the network are stored in a shared ledger. This consists of a chain of blocks, with each block containing a set of transactions. Each block is timestamped and linked to the blocks immediately preceding it. Each node maintains an identical copy of the shared ledger. To add a new transaction, the network nodes use a consensus protocol to evaluate and verify the new transaction. This protocol guarantees that a transaction is appended to the shared ledger only if most nodes validate the transaction. Once the transaction is appended to the shared ledger, it cannot be changed or reverted, and because all nodes have an identical copy of the shared ledger, no node has the power to change the data. This ensures the integrity of the shared ledger. However, recent research has proven that altering the shared ledger is feasible with 51% attacks where an adversary can control more than half of the total nodes in the blockchain network to alter the shared ledger [<xref ref-type="bibr" rid="ref34">34</xref>]. <xref rid="figure2" ref-type="fig">Figure 2</xref> illustrates a simplified blockchain concept.</p>
              </list-item>
            </list>
            <fig id="figure2" position="float">
              <label>Figure 2</label>
              <caption>
                <p>Simplified blockchain concept.</p>
              </caption>
              <graphic xlink:href="medinform_v9i11e27816_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
          <sec>
            <title>Types of Blockchains</title>
            <p>In terms of access to data and the role of nodes participating in the network, blockchain is classified into 4 types [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
            <list list-type="order">
              <list-item>
                <p>Public permissionless. Anyone can participate in the network and read or write data from the blockchain. Bitcoin and Ethereum are examples of a public permissionless blockchain.</p>
              </list-item>
              <list-item>
                <p>Public permissioned. Anyone can participate in the network and read data from the blockchain, but a limited set of participants can write data in the blockchain. Ripple [<xref ref-type="bibr" rid="ref36">36</xref>] and EOSIO blockchain [<xref ref-type="bibr" rid="ref37">37</xref>] are examples of public permissioned blockchains.</p>
              </list-item>
              <list-item>
                <p>Private permissionless. A limited set of participants can participate in a network in which all participate can read or write data from or in the blockchain. Holochain [<xref ref-type="bibr" rid="ref38">38</xref>] is an example of a private permissionless blockchain.</p>
              </list-item>
              <list-item>
                <p>Private permissioned. A limited set of participants can participate in the network and read data from the blockchain, but a subset of them can write data in the blockchain. Hyperledger Fabric [<xref ref-type="bibr" rid="ref39">39</xref>] and Hyperledger Besu [<xref ref-type="bibr" rid="ref40">40</xref>] are examples of privately permissioned blockchains.</p>
              </list-item>
            </list>
          </sec>
        </sec>
        <sec>
          <title>Dynamic Consent and Blockchain</title>
          <p>Dynamic consent is a two-way communication method that enables individuals to specify what data they are willing to share with various health care providers by setting and modifying their consent preferences. It enables individuals to control their data by granting and revoking access to their data, tracking their data, and updating their consent preferences. Despite these benefits, the implementation of dynamic consent in clinical genetics is limited because of ethical, legal, and data security concerns. The lack of patient trust [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>], confidentiality data and misuse [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>], and the lack of traceability and transparency mechanisms [<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref47">47</xref>] are among the greatest concerns. Blockchain technology has many appealing properties, such as immutability, transparency, and accountability, that can address some of the barriers that inhibit the implementation of dynamic consent. Blockchain can support dynamic consent, as follows: data transparency and accountability through an immutable ledger, data security and privacy using cryptography mechanisms, and an efficient management system through smart contracts.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Blockchain Potential in Genomic Data Sharing</title>
        <p>Determining whether blockchain is applicable to a particular scenario is not an easy task. Although no general formula or rule exists for the applicability of blockchain, several decision schemes have been proposed to determine whether a blockchain should be used depending on situational requirements [<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref50">50</xref>]. Wüst and Gervais [<xref ref-type="bibr" rid="ref48">48</xref>] proposed a decision tree to identify the scenario-based applicability of blockchain, as shown in <xref rid="figure3" ref-type="fig">Figure 3</xref>. This decision tree consists of 6 questions. Next, we answer these questions by considering our genomic data-sharing scenario.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Decision tree to determine the use of blockchain [<xref ref-type="bibr" rid="ref48">48</xref>].</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <list list-type="order">
          <list-item>
            <p>Do you need to store state? The answer to this question is yes. Diagnosing a patient with a rare genetic disease is a complex and time-consuming task, as it involves gathering data from multiple sources [<xref ref-type="bibr" rid="ref51">51</xref>]. For instance, to answer a simple question of whether a mutation in a patient associated with a particular disease has been previously reported with the same or similar disorders in another individual requires accessing preexisting genetic and phenotypic data from multiple databases relevant to the clinical case [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. Therefore, uniform access to preexisting genotype and phenotypic data using blockchain could improve the discovery and diagnosis of rare diseases. Moreover, accessing such databases involves legal and ethical obligations, including patient consent. For example, patients must control their own data and keep track of who has access to their data at any given time. Therefore, the storage and collection of patient consent as well as the administration of consent and data traceability will be guaranteed by using blockchain.</p>
          </list-item>
          <list-item>
            <p>Are there multiple writers of data? In clinical genomics, multiple parties are involved in the patient treatment pathway, such as clinicians, scientists, and clinical laboratory technicians [<xref ref-type="bibr" rid="ref51">51</xref>]. Therefore, a single source of truth is required for the patient data. Owing to the immutability of blockchain, the existence of patient data as well as the ownership and integrity of the data can be guaranteed. Therefore, considering that multiple parties would produce and deliver patient data, this question can be answered with yes.</p>
          </list-item>
          <list-item>
            <p>Can you use an always web-based trusted third party? Trust and consent are important factors in the successful advancement of genome medicine and research. Patients should feel confident that their data are handled safely and are only used with their consent. A recent Genome UK report [<xref ref-type="bibr" rid="ref53">53</xref>] showed that patients and the public are optimistic about the potential of genome medicine, but they have concerns related to the security and use of their data. It is reasonable to mention that patients trust health care providers more than any third party with their data. However, because of the high profile of patient data breaches [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>] by health care providers, this trust has been broken. Blockchain can eliminate the need for a trusted party by establishing trust between system actors through its robust technical infrastructure and cryptography mechanisms. Therefore, the answer to this question is probably no.</p>
          </list-item>
          <list-item>
            <p>Are all writers known? To produce, manage, and store patient data, health care providers must identify themselves. Moreover, patients need to identify themselves to connect with health care providers. Therefore, a clear answer to this question is yes.</p>
          </list-item>
          <list-item>
            <p>Are all writers trusted? Although a minimum level of trust is required between patients and health care providers, health care providers might use patient data for research purposes without obtaining explicit consent from patients [<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref58">58</xref>]. Blockchain enables accountability and transparency in the system by providing an audit trail and traceability of the stored data, which in turn reinforces patients’ trust in health care providers. Therefore, the answer to this question is probably no.</p>
          </list-item>
          <list-item>
            <p>Is public verifiability required? Even though patient data are not stored in the blockchain directly (off-chain storage), access to the system should be private and permissioned. Thus, the answer to this question is no.</p>
          </list-item>
        </list>
        <p>On the basis of the answers to these 6 questions, it is clear that the use of blockchain for the proposed genomic data sharing scenario is justifiable.</p>
      </sec>
      <sec>
        <title>Design Requirements</title>
        <sec>
          <title>Overview</title>
          <p>To identify the design requirements for ConsentChain, we analyzed a recent deliberative focus group study with National Health Service (NHS) Genomic Medicine Service patients regarding public opinion on sharing genomic data (National Research Ethics Committees ethical approval reference 18/NW/0510) [<xref ref-type="bibr" rid="ref59">59</xref>]. We used the user stories method [<xref ref-type="bibr" rid="ref60">60</xref>] to capture the main system design requirements. We used card sorting to collect data from the manuscript. We used our interpretation to represent the statements made by the study participants in simple user stories. We then discussed these user stories with a focus group study team to refine them. We emphasize that the findings from the focus group study are partially applicable to the scenario of our blockchain use case. Finally, 6 design requirements were identified.</p>
        </sec>
        <sec>
          <title>Requirement 1: Data Discovery</title>
          <sec>
            <title>User Stories</title>
            <disp-quote>
              <p>As a patient, I want my data to be available for sharing to facilitate my diagnosis and treatment.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want my unidentifiable data to be available for wider sharing to help others’ treatment and facilitate extensive research.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want my data to be available for different healthcare providers, so I won’t have to repeat myself every time I visit a new healthcare provider.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Context</title>
            <p>The study participants allowed the sharing of their genomic data to support the diagnosis and treatment of their conditions across multiple health care providers. They also agreed to use their genomic data to benefit other patients with similar genetic conditions and for future research.</p>
          </sec>
          <sec>
            <title>Implications for System Design</title>
            <p>The system should allow information about a genomic data set of interest stored in an individual genetic laboratory to be discoverable and accessible by health care professionals and researchers.</p>
          </sec>
        </sec>
        <sec>
          <title>Requirement 2: Data Security</title>
          <sec>
            <title>User Stories</title>
            <disp-quote>
              <p>As a patient, I want best practices in data security to be implemented to protect my data so that it can be safeguarded against hacking and loss.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want to have different levels of purpose to access my data, so they can be used for authorised purposes.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Context</title>
            <p>There was consensus among the participants that genomic data should be stored and shared securely without unauthorized alteration while making them available for authorized purposes.</p>
          </sec>
          <sec>
            <title>Implications for System Design</title>
            <p>Security techniques, such as data encryption and access control, should be used to protect sensitive data. Owing to the open and transparent nature of blockchains, sensitive data (either encrypted or not) should not be stored in the chain.</p>
          </sec>
        </sec>
        <sec>
          <title>Requirement 3: Data Privacy</title>
          <sec>
            <title>User Stories</title>
            <disp-quote>
              <p>As a patient, I want my genetic data to be shared without my identifiable information (eg, my name), so my identity will not be compromised.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Context</title>
            <p>The participants emphasized that sharing genomic data outside of the patient’s direct care should be anonymized to protect their identity.</p>
          </sec>
          <sec>
            <title>Implications for System Design</title>
            <p>The system should allow the flow of patient data among involved parties while minimizing the risk of patient identity disclosure.</p>
          </sec>
        </sec>
        <sec>
          <title>Requirement 4: Patient Control Over Data and Requirement 5: Traceability</title>
          <sec>
            <title>User Stories</title>
            <disp-quote>
              <p>As a patient, I want to give my consent to share my data for certain purposes that are clearly outlined so that no further consent is required for these purposes.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want to be told whether the purpose of sharing my data is changed so I’ll have the option of giving explicit permission for the new changes.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want to have the option to update/withdraw my consent in a straightforward and easy way so I can change my mind later.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want to be able to track my shared data so that I know when and with whom my data are being shared.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Context</title>
            <p>The participants thought that they should be asked for permission to share their data and be informed about how their data would be used and for what purpose. Moreover, some believed that they would exercise their right to opt out.</p>
          </sec>
          <sec>
            <title>Implications for System Design</title>
            <p>The system should enable patients to update their permissions dynamically and track data that are being shared with different parties.</p>
          </sec>
        </sec>
        <sec>
          <title>Requirement 6: Minimum Data Disclosure</title>
          <sec>
            <title>User Stories</title>
            <disp-quote>
              <p>As a patient, I want to have different levels of role requesters designated to access my data so only authorised parties can gain access.</p>
            </disp-quote>
            <disp-quote>
              <p>As a patient, I want to have a time limit for my shared data, so they cannot be used for other purposes in the future.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Context</title>
            <p>Some participants were concerned about unauthorized disclosure of their data to third parties, including family members, employers, and law enforcement agencies, whereas others were concerned with restricting access to their data by commercial entities.</p>
          </sec>
          <sec>
            <title>Implications for System Design</title>
            <p>The system should be designed in a way that allows the sharing of patient data for a given time frame and specific purpose.</p>
          </sec>
        </sec>
      </sec>
      <sec>
        <title>Consent Elements</title>
        <p>Inspired by the Global Alliance for Genomics and Health (GA4GH) data use ontology effort to model genomic data use restrictions and data access requests [<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref62">62</xref>], we developed an ontology model to represent patient consent elements into machine-readable codes. The model includes consent elements describing the data type, purpose, and role of the data requester (DR). <xref ref-type="table" rid="table1">Tables 1</xref>-<xref ref-type="table" rid="table3">3</xref> show an abstract view of the consent elements and their codes. We also introduced an access policy tree representing a Boolean formula that defines a combination of consent elements. Any data access request that satisfies the tree can obtain access to patient data. <xref rid="figure4" ref-type="fig">Figure 4</xref> shows an example of an access policy tree that allows patient genotype data to be accessed by a clinician for treatment.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Code representing the data type in consent element.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="620"/>
            <col width="380"/>
            <thead>
              <tr valign="top">
                <td>Data type</td>
                <td>Code</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Genotype</td>
                <td>GNE</td>
              </tr>
              <tr valign="top">
                <td>Phenotype</td>
                <td>PHE</td>
              </tr>
              <tr valign="top">
                <td>Metadata</td>
                <td>MEA</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Code representing the role in consent element.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="620"/>
            <col width="380"/>
            <thead>
              <tr valign="top">
                <td>Purpose</td>
                <td>Code</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Treatment</td>
                <td>TRT</td>
              </tr>
              <tr valign="top">
                <td>Research</td>
                <td>REH</td>
              </tr>
              <tr valign="top">
                <td>Clinical</td>
                <td>CLL</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Code representing the purpose in consent element.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="620"/>
            <col width="380"/>
            <thead>
              <tr valign="top">
                <td>Role</td>
                <td>Code</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Clinician</td>
                <td>CLN</td>
              </tr>
              <tr valign="top">
                <td>Researcher</td>
                <td>REE</td>
              </tr>
              <tr valign="top">
                <td>Bioinformatician</td>
                <td>BIN</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Example of an access policy tree where patient genotype data to be accessed by a clinician for treatment. CLN: clinician; GNE: patient genotype data; TRT: treatment.</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Related Work</title>
        <p>We used PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines to conduct a systematic review to analyze the existing literature on blockchain-based consent data used in health care management systems. The PRISMA flowchart for this systematic review is shown in <xref rid="figure5" ref-type="fig">Figure 5</xref>. For the purposes of this review, a reputable database (PubMed) was searched using the search query shown in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>. The resulting research papers (N=54) were imported into Covidence, a web-based app tool used to manage systematic reviews. In the next step, research papers were screened against titles and abstracts, and research papers unrelated to consent management systems were excluded (n=20). Then, the remaining research papers (n=34) were assessed for full-text eligibility, with the following exclusion criteria:</p>
        <list list-type="bullet">
          <list-item>
            <p>No consent management explained (n=13)</p>
          </list-item>
          <list-item>
            <p>No implementation provided (n=2)</p>
          </list-item>
          <list-item>
            <p>No access to the full text (n=2)</p>
          </list-item>
          <list-item>
            <p>Reviews and ideas (n=6)</p>
          </list-item>
        </list>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow for this review.</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <boxed-text id="box1" position="float">
          <title>Research query.</title>
          <p>((blockchain[Title/Abstract]) OR (Smart contracts [Title/Abstract]) OR (blockchain-based[Title/Abstract]) OR (Smart contracts-based[Title/Abstract])) AND ((Consent*[Title/Abstract]) OR (permission*[Title/Abstract]) OR (access control[Title/Abstract])) AND ((healthcare[Title/Abstract]) OR (EMR[Title/Abstract]) OR (genomic[Title/Abstract]) OR (Genetic [Title/Abstract]) OR (electronic health records[Title/Abstract]) OR (EHR[Title/Abstract]) OR (electronic Medical Records [Title/Abstract]) OR (Medical[Title/Abstract]) OR (Clinical Trial[Title/Abstract]) OR (Patient*[Title/Abstract]))</p>
        </boxed-text>
        <p>Additional relevant research papers were identified through citations (n=3). The remaining research papers and the identified relevant research papers (n=10) were analyzed thoroughly. The final findings are summarized in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref63">63</xref>-<xref ref-type="bibr" rid="ref72">72</xref>].</p>
        <p>Chenthara et al [<xref ref-type="bibr" rid="ref63">63</xref>] proposed a blockchain-based privacy-preserving framework called Healthchain to support electronic health record (EHR) access control and management. The framework was implemented using the Hyperldger Fabric InterPlanetary File System (IPFS). To achieve the immutability of EHRs, they were stored off-chain in an IPFS, with only the hash values of the EHRs being stored in the blockchain. Smart contracts were used to model the logic of EHR transactions in the system, including data exchange, access management, and EHR management. Azaria et al [<xref ref-type="bibr" rid="ref64">64</xref>] proposed a decentralized management system called MedRec, which was built using Ethereum smart contracts to facilitate the management of EHRs between health care providers. MedRec enables patients to have full control over their data by granting or revoking access to their data. To keep patients anonymous, their identification strings are mapped to their blockchain addresses. Smart contracts are used to define how data are managed and accessed. MedRec provides an immutable access history summary that improves accountability and transparency in the system. It can be integrated with current providers’ existing databases, and other medical stakeholders can participate.</p>
        <p>Cryan [<xref ref-type="bibr" rid="ref65">65</xref>] proposed a blockchain-based architecture capable of enabling patient data sharing across hospital systems. The proposed architecture was implemented using Ethereum smart contracts and IPFS to protect sensitive patient data and enable patients to own and share their data with designated clinicians and revoke that permission later. Choudbhury et al [<xref ref-type="bibr" rid="ref66">66</xref>] developed a decentralized system using Hyperledger Fabric for informed consent management and secondary data sharing. The system enhances compliance in human subject regulations for institutional review board regulations by leveraging smart contracts to enable a quick and efficient recording of consent and enforce the guidelines of a clinical trial protocol. Mamo et al [<xref ref-type="bibr" rid="ref67">67</xref>] presented a well-designed system called Dwarna that harnesses blockchain technology to enable dynamic consent in biobanking. This system aims to increase transparency by storing the research participants’ consent changes on the blockchain and presents a solution to overcome the blockchain incompatibility with Article 17 of the European Union’s General Data Protection Regulation (GDPR), known as the right to erasure, by using a different representation of research participants in both off-chain databases and blockchain. The proposed system was implemented using a Hyperledger Fabric blockchain.</p>
        <p>Tith et al [<xref ref-type="bibr" rid="ref68">68</xref>] proposed a blockchain-based consent management model to support the sharing of EHRs. The model was implemented using Hyperledger Fabric and where smart contracts were used to manage patient consent. Patient consent preferences, metadata of patient records, and data access logs are stored immutably on the blockchain, enabling transparency and traceability of patient data and consent. Dubovitskaya et al [<xref ref-type="bibr" rid="ref69">69</xref>] proposed a secure blockchain-based record management system that facilitates the secure sharing and aggregation of EHR data. The system is patient-centric and allows patients to manage their own EHRs across multiple hospitals. It uses proxy re-encryption algorithms and a fine-grained access control mechanism to ensure patient privacy and confidentiality. Dubovitskaya et al [<xref ref-type="bibr" rid="ref70">70</xref>] proposed a framework on a permissioned blockchain for sharing EHRs for care of patients with cancer. The proposed framework is implemented with the Hyperledger Fabric blockchain and uses a membership service to authenticate registered users using username or password credentials. To create patient identity, personally identifying information, such as name, social security number, and date of birth, are hashed and encrypted for security. Medical data were stored off-chain in secure cloud storage, where access management is managed by smart contract logic.</p>
        <p>Rajput et al [<xref ref-type="bibr" rid="ref71">71</xref>] presented a blockchain-based access control framework that maintains patient data privacy under emergency conditions. The framework was implemented on the permissioned blockchain Hyperledger Fabric, and smart contracts were used to enable patients to manage the access rules for their data. The system keeps the history-of-transactions logs while patients are in an emergency, enabling auditing at any time point. Zhuang et al [<xref ref-type="bibr" rid="ref72">72</xref>] presented a generalized blockchain-based architecture that provides generic functions and methods for a wide spectrum of health care apps. These functions and methods include requesting patient data, data access permission granting or revoking, and data tracking. The presented architecture was implemented on the Ethereum blockchain in 2 relevant health app domains: health information exchange and subject recruitment for clinical trials.</p>
        <p>Compared with existing relevant literature, the proposed system is dynamic and supports minimum data disclosure. To the best of our knowledge, no relevant literature has reported on the 6 design requirements and provides a detailed analysis of the system performance. <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref63">63</xref>-<xref ref-type="bibr" rid="ref72">72</xref>] summarizes the literature for blockchain-based consent management systems.</p>
      </sec>
      <sec>
        <title>System Architecture</title>
        <p>In this section, we describe the proposed blockchain-based dynamic consent architecture for supporting clinical genomic data sharing. This generic architecture can be customized and used in different use cases where dynamic consent is required. As illustrated in <xref rid="figure6" ref-type="fig">Figure 6</xref>, the components of the proposed architecture are as follows: </p>
        <list list-type="order">
          <list-item>
            <p>Users</p>
            <list list-type="bullet">
              <list-item>
                <p>A data creator (DC): an organizational entity, such as a genetic testing laboratory, where patient data are collected and stored in secure databases.</p>
              </list-item>
              <list-item>
                <p>Patient: an individual whose data are stored off-chain in a secure database managed by the DC; a patient can provide consent to the system using the</p>
                <p>consent elements</p>
                <p>code.</p>
              </list-item>
              <list-item>
                <p>DR: a domain expert or organizational entity that wishes to discover and request access to patient data for a specific purpose, including research and health care.</p>
              </list-item>
            </list>
          </list-item>
          <list-item>
            <p>Smart contracts, which are used to provide system functionalities, such as registering new users, managing patient consent, and processing access requests to patient data. In addition, smart contracts create transaction logs and events that enable the tracing and auditing of all system data and actions.</p>
          </list-item>
          <list-item>
            <p>On-chain resources</p>
            <list list-type="bullet">
              <list-item>
                <p>Logs and events: smart contracts create logs and events for all system transactions. These logs and events are stored on-chain, and they are an important resource for tracing and auditing all system actions, thus making all system users accountable for their actions.</p>
              </list-item>
              <list-item>
                <p>Data profile (DP): This is a description of preexisting genomic data for a specific patient that is stored off-chain in a genetic laboratory database. A patient DP contains information including the location of the patient data, patient condition, and gene name, and it does not reveal any sensitive and identifiable information. Storing patient DPs on-chain helps the DR to discover and identify a genomic data set of interest stored in several genetic laboratory databases.</p>
              </list-item>
              <list-item>
                <p>Consent management: This is used to handle patient consent operations, such as adding, updating, and deleting consent. </p>
              </list-item>
              <list-item>
                <p>Access data management: This is used to handle access to patient data procedures, including validating access requests and providing secure access to off-chain data.</p>
              </list-item>
            </list>
          </list-item>
          <list-item>
            <p>Off-chain resources</p>
            <list list-type="bullet">
              <list-item>
                <p>Secure database: a private database managed by a DC in which all information related to the required DP is stored.</p>
              </list-item>
              <list-item>
                <p>Oracle service: by design, blockchain and smart contracts cannot access and read off-chain data; therefore, oracle services are used. An oracle service is a trusted data feed service that provides off-chain data to the blockchain. In the proposed system, an oracle service is used to enable smart contracts to communicate with a secure database. </p>
              </list-item>
              <list-item>
                <p>IPFS: This is a decentralized file storage system that stores and shares various types of files permanently. Each stored file is given a unique hash value based on its content. This hash value is then used to retrieve the file from the system. In the context of this study, we leverage IPFS as a key management service to store users’ public key (PU). We believe that IPFS is the best candidate for users’ PU because of its high availability and low cost.</p>
              </list-item>
            </list>
          </list-item>
        </list>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>The components of the proposed architecture. IPFS: InterPlanetary File System.</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Implementation</title>
        <sec>
          <title>Overview</title>
          <p>We implemented our proof-of-concept on a privately permissioned blockchain to demonstrate the feasibility of our blockchain-based architecture. At the infrastructure level, Hyperledger Besu [<xref ref-type="bibr" rid="ref40">40</xref>], an open-source Ethereum client that provides permissioned private blockchain networks, was used to build a private blockchain. The Solidity programming language was used to write the system smart contracts and truffle framework, a development tool for developing and testing Ethereum smart contracts, to test, compile, and deploy system smart contracts. <xref rid="figure7" ref-type="fig">Figure 7</xref> shows a portion of the patient’s smart contract code. Finally, we used Provable [<xref ref-type="bibr" rid="ref73">73</xref>] as an oracle service and MongoDB to create an off-chain database.</p>
          <p>Six smart contracts are written to manage on-chain transactions: registration smart contract (RSC), patient smart contract (PSC), data profile smart contract (DPSC), data creator smart contract (DCSC), data requester smart contract (DRSC), and oracle service smart contract (OSSC). These smart contracts provide 8 main system functions: <italic>createNewDataRequestorContract</italic>, <italic>createNewPatientContract</italic>, Cr<italic>eateNewDataCreatorContract</italic>, <italic>setConsent</italic>, <italic>cancelConsent</italic>, <italic>checkConsent</italic>, <italic>setupDataProfile</italic>, <italic>requestAccessTicket</italic>, and <italic>requestAccessToken</italic>. We used smart contract modifiers to restrict the calling of these functions to authorized users. Any unauthorized function call results in stopping the execution of the function and reverting all changes to the original state. The remainder of this section explains the implementation of the main system functionalities using smart contract functions.</p>
          <fig id="figure7" position="float">
            <label>Figure 7</label>
            <caption>
              <p>An illustrative example of patient smart contract code.</p>
            </caption>
            <graphic xlink:href="medinform_v9i11e27816_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Registration</title>
          <p>Each system participant interacts with the system via his or her smart contract, which includes all the required information to interact with the system. Therefore, the participant should be registered in a system in which a smart contract is created. All users’ identities and professional registrations should be verified by a system admin, who is responsible for setting up the system and inviting the authorities to join the system, such as the NHS, before proceeding with the process of system registration. <xref ref-type="boxed-text" rid="box2">Textboxes 2</xref>-<xref ref-type="boxed-text" rid="box4">4</xref> describe the user registration process for the patient, DC, and DR, respectively. The system admin executes a specific smart contract function for each user, which creates a new smart contract and assigns the user as the owner of the contract. This is done by using modifiers to restrict the calling of the user smart contract functions to the user’s Ethereum address.</p>
          <boxed-text id="box2" position="float">
            <title>Pseudocode of registering new patient.</title>
            <p>Algorithm 1:createNewPatientContracter</p>
            <p>Input:caller, patientWalletAddress</p>
            <p>Output: smartContractAddress</p>
            <p>If caller=admin∧patientWalletAddress≠null then</p>
            <p>Create newPatientSmartContract</p>
            <p>Set newPatientSmartContract owner to patientWalletAddress</p>
            <p>Output newPatientSmartContract address</p>
            <p>Else</p>
            <p>Revert smart contract state and show an error message</p>
          </boxed-text>
          <boxed-text id="box3" position="float">
            <title>Pseudocode of registering new data creator.</title>
            <p>Algorithm 2:createNewDataCreatorContract</p>
            <p>Input: caller, dataCreatorWalletAddress</p>
            <p>Output: smartContractAddress</p>
            <p>If caller = admin∧dataCreatorWalletAddress ≠ null then</p>
            <p>Create new DataCreatorSmartContract</p>
            <p>set newDataCreatorSmartContract owner to</p>
            <p>dataCreatorWalletAddress</p>
            <p>Output newDataCreatorSmartContract address</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
          <boxed-text id="box4" position="float">
            <title>Pseudocode of registering new data requester.</title>
            <p>Algorithm 3: createNewDataRequestorContract</p>
            <p>Input: caller, dataRequesterWalletAddress, dataRequesterPUK</p>
            <p>Output: smartContractAddress</p>
            <p>If caller=admin∧dataCreatorWalletAddress≠null∧</p>
            <p>dataRequesterPUK≠null then</p>
            <p>Create newDataRequesterSmartContract</p>
            <p>Set newDataRequesterSmartContract owner to</p>
            <p>dataRequesterWalletAddress</p>
            <p>set newDataRequesterSmartContract’s public key to dataRequesterPUK</p>
            <p>output newDataRequesterSmartContract address</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
        </sec>
        <sec>
          <title>Consent Management</title>
          <p><xref ref-type="boxed-text" rid="box5">Textbox 5</xref> describes the process of creating and storing patient consent by submitting the elements of the access policy tree, which represents the patient’s consent, to the patient’s smart contract". The tree elements are then hashed to create a consent signature, which is then stored in the patient’s smart contract. A mapping data structure, a data structure type that consists of key types and corresponding value type pairs, is used to store the consent signature, which is used as a key associated with a Boolean value to indicate its status (eg, the value is true for valid consent and false for invalid consent). Hashing and storing the consent tree in a mapping data structure would enable efficient consent status retrieval and validation. As shown in <xref ref-type="boxed-text" rid="box6">Textbox 6</xref>, if the patient wants to cancel his or her consent, the associated value with the consent signature would be set to false. <xref ref-type="boxed-text" rid="box7">Textbox 7</xref> describes the process of checking a patient’s consent status by returning the associated value with the consent signature.</p>
          <boxed-text id="box5" position="float">
            <title>Pseudocode of storing patient consent</title>
            <p>Algorithm 4: setConsent</p>
            <p>Input: caller, dataType, role, purpose</p>
            <p>Output: status</p>
            <p>CONSENT←mapping</p>
            <p>If caller=contractOwner∧dataType ≠ null ∧ role ≠ null ∧ purpose ≠ null, then</p>
            <p>h←hash(dataType, role, purpose)</p>
            <p>if CONSENT.contain(h,true) then</p>
            <p>revert smart contract state and show an error message</p>
            <p>else</p>
            <p>CONSENT.insert(h,true)</p>
            <p>Output true</p>
            <p>Else</p>
            <p>Revert smart contract state and show an error message</p>
          </boxed-text>
          <boxed-text id="box6" position="float">
            <title>Pseudocode of cancelling patient consent.</title>
            <p>Algorithm 5: cancelConsent</p>
            <p>Input: caller, dataType, role, purpose</p>
            <p>Output:status</p>
            <p>CONSENT← mapping</p>
            <p>If caller=contractOwner ∧ dataType ≠ null ∧ role ≠ null ∧ purpose ≠ null, then</p>
            <p>h←hash(dataType, role, purpose)</p>
            <p>if CONSENT.contain(h,false) then</p>
            <p>revert smart contract state and show an error message</p>
            <p>Else</p>
            <p>CONSENT.insert(h,false)</p>
            <p>output true</p>
            <p>Else</p>
            <p>Revert smart contract state and show an error message</p>
          </boxed-text>
          <boxed-text id="box7" position="float">
            <title>Pseudocode of checking patient consent.</title>
            <p>Algorithm 6: checkConsent</p>
            <p>Input: dataType, role, purpose</p>
            <p>Output: status</p>
            <p>CONSENT←mapping</p>
            <p>If dataType ≠ null ∧ role ≠ null ∧ purpose ≠ null, then</p>
            <p>h←hash(dataType, role, purpose)</p>
            <p>r←CONSENT.return(h)</p>
            <p>output r</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
        </sec>
        <sec>
          <title>Patient Data</title>
          <p><xref ref-type="boxed-text" rid="box8">Textbox 8</xref> describes the process of submitting the patient data to the system. After collecting and storing patient data in a secure, off-chain database (eg, a genomic laboratory database), the DC submits the patient metadata, a description of the patient data that does not reveal sensitive and identifiable information, such as the hash of the stored data, conditions, data type, and gene name, to the system. The patient metadata are then stored in a data structure, where the hash of the stored data is used as a key and the remaining patient data are the value. </p>
          <boxed-text id="box8" position="float">
            <title>Pseudocode of creating patient data profile.</title>
            <p>Algorithm 7: setupDataProfile</p>
            <p>Input: caller, patientSmartContract, dataHash, condition, dataType,gene</p>
            <p>Output: id</p>
            <p>DATAPROFILE←mapping</p>
            <p>i←counter</p>
            <p>if caller = dataCreatorSmartContract ∧ patientSmartContract ≠ null ∧ datatHash ≠ null ∧ condition ≠ null ∧ dataType ≠ null ∧ gene ≠ null</p>
            <p>then</p>
            <p>i++</p>
            <p>DATAPROFILE.insert(i,[patientSmartContract, dataHash, condition, dataType, gene, dataCreatorSmartContract])</p>
            <p>output i</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
        </sec>
        <sec>
          <title>Access Management</title>
          <p>To access patient data, the DR needs to obtain an access ticket (ATi) and access token (ATo). The ATi is used to control access to patient data, whereas the ATo is used to minimize access to the requested data to the lowest level. <xref ref-type="boxed-text" rid="box9">Textbox 9</xref> describes the process of requesting an ATi for the patient data. After identifying a potential patient’s data, the DR must submit an ATi request to the system to provide the hash of the requested data, his role, and the purpose of accessing the data. Then, the request is verified by the patient’s smart contract in which the patient’s consent is stored. If there is valid consent that matches a DR request, an ATi is created automatically for the DR. </p>
          <boxed-text id="box9" position="float">
            <title>Pseudocode for requesting access tickets to access off-chain patient data.</title>
            <p>Algorithm 8: requestAccessTicket</p>
            <p>Input: caller, dataProfileId, role, purpose</p>
            <p>Output:ticketId</p>
            <p>DATAPROFILE←mapping</p>
            <p>If caller=contractOwner ∧ dataProfileId ≠ null ∧ role≠ null ∧ purpose ≠ null, then</p>
            <p>d←DATAPROFILE.return(dataProfileId)</p>
            <p>patient←d.patientSmartContract</p>
            <p>dataType←d.dataType</p>
            <p>h←hash(dataType, role, purpose)</p>
            <p>if patient.CONSENT.return(h)=true then</p>
            <p>ticket←patient.CreateAccessTicket(caller, dataProfileId)</p>
            <p>ticket.status=true</p>
            <p>output ticket.id</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
          <p>To obtain an ATo, the DR must submit a valid ATi to the system. <xref ref-type="boxed-text" rid="box10">Textbox 10</xref> describes the process of requesting an ATo. If the ATi is still valid and patient consent has not been updated or cancelled, an ATo is generated automatically by the DC for the DR. The ATo includes a secure one-time URL that can be used to gain access to the patient data stored off-chain.</p>
          <boxed-text id="box10" position="float">
            <title>Requesting an access token to retrieve off-chain patient data.</title>
            <p>Algorithm 9: requestAccessToken</p>
            <p>Input:caller, dataProfileId, ticketId</p>
            <p>Output: tokenId</p>
            <p>DATAPROFILE←mapping</p>
            <p>If caller=contractOwner ∧ dataProfileId ≠ null ∧ ticketId ≠ null, then</p>
            <p>d←DATAPROFILE.return(dataProfileId)</p>
            <p>dataCreator←d.dataCreatorSmartContract</p>
            <p>patient←d.patientSmartContract</p>
            <p>if patient.ticket[ticketId].status=true then</p>
            <p>token</p>
            <p>←dataCreator.createAccessToken(caller, dataProfileId)</p>
            <p>Token.status=true</p>
            <p>Output token.id</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
            <p>Else</p>
            <p>revert smart contract state and show an error message</p>
          </boxed-text>
        </sec>
      </sec>
      <sec>
        <title>A Proof-of-Concept (ConsentChain)</title>
        <p>This section presents ConsentChain, a proof-of-concept implementation of the proposed architecture, to explore the efficacy of applying blockchain technology to support clinical genomic data sharing. The ConsentChain provides a web portal for patients, DCs, and DRs to interact with the system. It enables patients to provide or withdraw their consent regarding the sharing of their data and DCs to collect and store patient data and DRs to query and access patient data. <xref rid="figure8" ref-type="fig">Figure 8</xref> shows the patient interface provided by the ConsentChain. The high-level structure and workflow of ConsentChain is shown in <xref rid="figure9" ref-type="fig">Figure 9</xref>, and the corresponding description of each step is as follows:</p>
        <list list-type="order">
          <list-item>
            <p>During registration, DR generates a pair of keys: a PU and a private key (PR). DR then uploads PU to the IPFS and records its location returned by the IPFS.</p>
          </list-item>
          <list-item>
            <p>DR sends a blockchain transaction to store the PU’s location returned by the IPFS in the RSC.</p>
          </list-item>
          <list-item>
            <p>Patient sends a blockchain transaction to store their consent elements (data type, role, and purpose) in PSC.</p>
          </list-item>
          <list-item>
            <p>DC collects patient’s data and stores it in a secure, off-chain database. The DC also records patient’s data reference (DRef) returned by the database.</p>
          </list-item>
          <list-item>
            <p>DC creates a DP that includes DRef, a PSC address, and other information related to patient’s data that do not reveal any sensitive and identifiable information. Then, the DC sends a blockchain transaction to store the DP in the DPSC.</p>
          </list-item>
          <list-item>
            <p>DR queries DPSC to discover a specific DP of interest and reads transaction information related to that DP.</p>
          </list-item>
          <list-item>
            <p>DR obtains the PSC address from the DP and sends a blockchain transaction to the PSC to request an ATi to access patient’s data stored in the off-chain database. The request is accepted or rejected automatically, based on patient consent stored in the PSC. On acceptance, ATi is generated and stored in PSC, and DR receives the transaction ID related to ATi.</p>
          </list-item>
          <list-item>
            <p>DR sends a blockchain transaction including ATi to DCSC to request an ATo to retrieve patient’s data stored in the off-chain database. The request is accepted or rejected automatically based on ATi validation. On acceptance of the request, the ATo is stored in the DCSC, and DR receives the transaction ID related to the ATo.</p>
          </list-item>
          <list-item>
            <p>DR sends a blockchain transaction including ATo to the oracle service smart contract to retrieve patient’s data stored in the off-chain database. The request is accepted or rejected automatically based on the ATo validation.</p>
          </list-item>
          <list-item>
            <p>On acceptance of the request, the request is forwarded to the Oracle Service Server (OSS).</p>
          </list-item>
          <list-item>
            <p>OSS retrieves the DR’s PU location on the IPFS from the RSC.</p>
          </list-item>
          <list-item>
            <p>OSS downloads the PU of the DR from the IPFS.</p>
          </list-item>
          <list-item>
            <p>OSS fetches patient’s data from the database and creates a temporary JSON file that contains patient’s data. This JSON file can be accessed via HTTPS requests and is available for one-time access.</p>
          </list-item>
          <list-item>
            <p>The OSS encrypts the URL for a JSON file using the PU of the DR. Then, the OSS sends a blockchain transaction to store the encrypted URL in the DRSC.</p>
          </list-item>
          <list-item>
            <p>DR retrieves encrypted URL from DRSC and decrypts it using the corresponding PR to access the JSON file.</p>
          </list-item>
        </list>
        <fig id="figure8" position="float">
          <label>Figure 8</label>
          <caption>
            <p>Patient interface.</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure9" position="float">
          <label>Figure 9</label>
          <caption>
            <p>The high-level structure and workflow of ConsentChain. Ati: access ticket; DR: data requester; IPFS: InterPlanetary File System; OSS: Oracle Service Server; OSSC: oracle service smart contract; P: patient; PSC: patient smart contract; RSC: registration smart contract.</p>
          </caption>
          <graphic xlink:href="medinform_v9i11e27816_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In this section, we discuss how our proof-of-concept, ConsentChain, meets the requirements captured from the patient forum, and we provide a detailed analysis of its performance.</p>
      </sec>
      <sec>
        <title>Addressing Requirement</title>
        <sec>
          <title>Requirement 1: Data Security</title>
          <p>In ConsentChain, we used a hybrid data storage model that included on-chain or off-chain storage. Sensitive patient data are stored securely off-chain, whereas metadata for patient data are stored on-chain along with a reference pointer to the data source. This reference pointer is constrained by a short time frame and is encrypted. Only an authorized DR can decrypt it within the given time frame to access patient data. Moreover, implementing ConsentChain on a private or consortium blockchain adds a security layer in which all users are verified before joining the network.</p>
        </sec>
        <sec>
          <title>Requirement 2: User Control Over Data</title>
          <p>Smart contracts act as autonomous actors whose behavior is predictable [<xref ref-type="bibr" rid="ref74">74</xref>]. However, because of blockchain immutability, once a smart contract is deployed, it cannot be modified; hence, bugs and security vulnerabilities found in the deployed smart contract are difficult to resolve. Therefore, smart contract security audits and testing are essential for developing smart contracts to minimize the risk of mismatches between a smart contract intended behavior and the actual behavior [<xref ref-type="bibr" rid="ref75">75</xref>]. Using a smart contract to manage consent would enable patients to dynamically grant and revoke access to their data. In ConsentChain, patients record consent preferences in their smart contract, and they can amend or delete these preferences at any time. These changes were reflected in the system in real time.</p>
        </sec>
        <sec>
          <title>Requirement 3: Data Privacy</title>
          <p>By leveraging blockchain authenticity and verifiability features, ConsentChain maintains privacy by using permissioned blockchain and anonymized accounts. Only authorized users can access the blockchain via their anonymized accounts, enabling patients to provide their consent without revealing their real identities.</p>
        </sec>
        <sec>
          <title>Requirements 4 and 5: Data Discovery and Minimum Data Disclosure</title>
          <p>In the health care context, balancing the maximization of data discovery while minimizing data disclosure risk is a challenging task [<xref ref-type="bibr" rid="ref76">76</xref>-<xref ref-type="bibr" rid="ref78">78</xref>]. Inspired by the one-time password scheme, we proposed a one-time-access-token mechanism to minimize the data disclosure risk in ConsentChain. In this mechanism, an ATo is automatically generated for an authorized access request. The token is valid for one-time use, and it contains an encrypted reference pointer to the data source along with a digital signature on the shared data to ensure data integrity against tampering. Only an authorized DR can decrypt the reference pointer to access the data within a given time frame. If the DR needs to access data in the future, the generation of a new ATo is required. Through the implementation of a one-time access-based token and public-key cryptography, a compromised reference pointer to patient data will not lead to data leakage. This is because of the limited access and time restrictions given to access patient data, further increasing the security of ConsentChain and decreasing the likelihood of data leakage.</p>
          <p>To maximize data discovery, we leveraged the blockchain features. One of these is the replication of data stored on-chain across the network; a consensus mechanism ensures that each node obtains a local identical copy of the data. Using their local copy of the on-chain data, a DR can identify potential patient data instead of individually querying each off-chain storage. Therefore, storing patients’ metadata on the chain would provide DRs with a broader vision of similar patient data, which are stored off-chain across different laboratories.</p>
        </sec>
        <sec>
          <title>Requirement 6: Traceability</title>
          <p>By leveraging the blockchain’s immutability, our system maintains an immutable log of all system transactions. As the process of sharing patient data is managed by smart contracts, all involved transactions are recorded permanently on the blockchain. This would enable patients to inspect the blockchain for all information and transactions related to their data, including where data are stored off-chain and who have access to them and for what purpose. This feature is a significant upgrade toward patient-centric approaches to advance data sharing. It would also enable regulators to investigate claims in the event of disputes among involved parties, thereby increasing confidence in ConsentChain.</p>
        </sec>
      </sec>
      <sec>
        <title>Security Analysis</title>
        <p>This section provides a security analysis of ConsentChain in terms of patient privacy preservation, data storage, data sharing, and tamper-proofing.</p>
        <sec>
          <title>Patient Privacy Preservation</title>
          <p>Genomic data are highly sensitive and should not be disclosed without proper permission. In ConsentChain, genomic data are stored in an off-chain private secure storage with an access control mechanism, thereby reducing the risk of patient data leakage. Moreover, to ensure participant anonymity, a randomly generated unique account was generated for the participants who were associated with a PU. This account is used to send transactions to the blockchain; these transactions are anonymous and cannot be linked to the real identity of participants. In addition, multiple accounts can be created for one participant; hence, transactions sent to the blockchain by the same participant cannot be inferred by an adversary.</p>
        </sec>
        <sec>
          <title>Data Storage</title>
          <p>In ConsentChain, genomic data are stored in an off-chain private secure storage system. The security of this storage is beyond the scope of this paper, and we assume that it is secured by its owner (the DC). Only the metadata, hash, and reference of the off-chain stored data are shared on the blockchain. The off-chain DRef stored in the blockchain is tamper-proof.</p>
        </sec>
        <sec>
          <title>Data Sharing</title>
          <p>Only authorized users can request access to off-chain data through permissions that are preset in smart contracts. After receiving a valid request, the DC creates a JSON file that contains the requested data and stores it in the temporary access off-chain storage from where it can be accessed via HTTPS. Access to the JSON file is restricted by a one-time visit and a short time frame. The DC then retrieves the PU of the user who requested the data from the IPFS and encrypts the URL that allows access to the JSON file and then stores it in the blockchain. The user requesting the data can then obtain the URL from the blockchain and decrypt it using their PR and access the JSON file. Once the JSON file is accessed, it is removed from the temporary access off-chain storage, making the URL stored in the blockchain useless; therefore, if the adversary compromises the PR of the user requesting the data to decrypt the URL, the URL would lead to nothing. Further, if the JSON file is not accessed within the specified time frame, it is removed from the temporary access off-chain storage, reducing the risk of unauthorized access to the data.</p>
        </sec>
        <sec>
          <title>Tamper-Proofing</title>
          <p>In ConsentChain, data access activities are recorded in the blockchain and can be audited and tracked. In addition, the data stored in the blockchain are immutable and cannot be arbitrarily modified owing to the consensus mechanisms used in the blockchain, which guarantees that the added blocks cannot be modified unless an adversary can launch a 51% attack. It is worth noting that the mechanism of launching a 51% attack differs depending on the type of consensus mechanism used in the blockchain. For instance, public blockchains such as Ethereum and Bitcoin use the proof-of-work consensus mechanism, which requires high computational power to generate new blocks, whereas in a private permissioned blockchain, the proof-of-authority consensus mechanism can be used to generate new blocks [<xref ref-type="bibr" rid="ref79">79</xref>-<xref ref-type="bibr" rid="ref82">82</xref>]. To launch a 51% attack on a blockchain that uses the proof-of-work consensus mechanism, an adversary needs to obtain 51% of the network’s computational power. In contrast, when the proof-of-authority consensus mechanism is used, a 51% attack can only be launched by controlling over 51% of the network nodes, which is much more difficult than obtaining 51% of the network computational power [<xref ref-type="bibr" rid="ref80">80</xref>]. Therefore, in ConsentChain, the proof-of-authority consensus mechanism is used to reduce the risk of a 51% attack.</p>
        </sec>
      </sec>
      <sec>
        <title>Performance Evaluation</title>
        <p>To test and validate ConsentChain, we built a real production environment for the deployment and hosting of ConsentChain. A detailed performance analysis of ConsentChain is provided in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. In summary, the analysis of the performance of the <italic>Transaction</italic> and <italic>Read</italic> operations of ConsentChain indicated an average <italic>Transaction Throughput</italic> of 13.59 tps and an average <italic>Read Throughput</italic> of 135.78 tps. The <italic>Transaction Latency</italic> was 2.76 seconds, whereas the average <italic>Read Latency</italic> was 0.288 seconds. In addition, the system performance analysis shows that a large number of read operations (reading a state from blockchain), that is, 10,000 transactions, could be handled by the system at very low latency, whereas transaction operations are processed with higher latency owing to the complexity involved (reading or writing a state from or to blockchain).</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Genomic data are useful when shared within the clinical genomics community and compared with other patient data, indicating that clinicians might need to share data to efficiently treat patients. However, many challenges hinder large-scale genomic data sharing, such as the availability, discoverability, and accessibility of genomic data [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>], preventing clinicians and researchers from generating an integrated view of rare genetic diseases. In this study, we proposed a blockchain-based dynamic consent architecture to support genomic data sharing and implemented a proof-of-concept for the architecture. We also developed an ontology model to represent patient consent elements into machine-readable codes to automate the consent and data access processes. The proof-of-concept has been implemented on a private Ethereum blockchain, and it shows that the proposed architecture can achieve a large-scale sharing of genomic data among the parties involved. The evaluation showed that patients achieved greater control over their data using this system. Performance analysis showed that the system was efficient and scalable.</p>
        <p>Nonetheless, several limitations of this study need to be addressed. Owing to the openness and distributed nature of blockchain technology, verifying user identity is challenging. Our system operates under the assumption that the system is implemented on a private blockchain, and all users are invited to join the system. User identity verification is performed before one can join the system, and each user is given a pseudonymous identifier to represent them on the system. A more reliable and practical solution to overcome this issue might be linking patient identity with an external trusted source of information, such as GOV.UK Verify and NHS Identity. In addition, DR and DC identity verification could be achieved by linking to their professional registration.</p>
        <p>Another issue is blockchain’s GDPR compliance, which needs to be considered [<xref ref-type="bibr" rid="ref83">83</xref>-<xref ref-type="bibr" rid="ref85">85</xref>]. Although blockchains can help dynamic consent systems comply with some GDPR objectives, including the rights to be informed and to withdraw, blockchains’ immutability seems to conflict with the GDPR, which encourages data minimization and gives data owners the right to erasure. A study conducted by the European Parliamentary Research Service concluded that although private and permissioned blockchains could easily comply with GDPR requirements, it is difficult to determine whether blockchains are, as a whole, either completely compliant or incompliant with GDPR [<xref ref-type="bibr" rid="ref86">86</xref>]. However, since the GDPR came into effect, several studies have taken initial steps toward designing and building GDPR-compliant blockchain-based use cases [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref87">87</xref>-<xref ref-type="bibr" rid="ref91">91</xref>]. Therefore, GDPR compliance should be considered during the design of blockchain-based systems [<xref ref-type="bibr" rid="ref92">92</xref>,<xref ref-type="bibr" rid="ref93">93</xref>].</p>
        <p>The objective of this work was not to design a system that could be used in practice in health care environments, but to show that blockchain technology has the potential to address several genomic data sharing challenges. We found that facilitating genomic data sharing through blockchain technology and smart contracts is promising. However, they are not the complete answer, and a number of issues still need to be addressed before such systems can be deployed in practice, particularly in relation to verifying user credentials.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>System design requirements in existing blockchain solutions in health care.</p>
        <media xlink:href="medinform_v9i11e27816_app1.docx" xlink:title="DOCX File , 19 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Detailed performance analysis of the proposed model.</p>
        <media xlink:href="medinform_v9i11e27816_app2.docx" xlink:title="DOCX File , 268 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ATi</term>
          <def>
            <p>access ticket</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ATo</term>
          <def>
            <p>access token</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DC</term>
          <def>
            <p>data creator</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DCSC</term>
          <def>
            <p>data creator smart contract</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">DP</term>
          <def>
            <p>data profile</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">DPSC</term>
          <def>
            <p>data profile smart contract</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">DR</term>
          <def>
            <p>data requester</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">DRef</term>
          <def>
            <p>data reference</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">DRSC</term>
          <def>
            <p>data requester smart contract</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">IPFS</term>
          <def>
            <p>InterPlanetary File System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">NHS</term>
          <def>
            <p>National Health Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">OSS</term>
          <def>
            <p>Oracle Service Server</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">PR</term>
          <def>
            <p>private key</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">PSC</term>
          <def>
            <p>patient smart contract</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb17">PU</term>
          <def>
            <p>public key</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Borry</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bentzen</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Budin-Ljøsne</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Cornel</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Howard</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Feeney</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mascalzoni</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mendes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Peterlin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Riso</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Skirton</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sterckx</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vears</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wjst</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Felzmann</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The challenges of the expanded availability of genomic information: an agenda-setting paper</article-title>
          <source>J Community Genet</source>
          <year>2018</year>
          <month>04</month>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>103</fpage>
          <lpage>16</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28952070"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12687-017-0331-7</pub-id>
          <pub-id pub-id-type="medline">28952070</pub-id>
          <pub-id pub-id-type="pii">10.1007/s12687-017-0331-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC5849701</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agarwala</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Khozin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Singal</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>O'Connell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kuk</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gossai</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Abernethy</surname>
              <given-names>AP</given-names>
            </name>
          </person-group>
          <article-title>Real-world evidence in support of precision medicine: clinico-genomic cancer data as a case study</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2018</year>
          <month>05</month>
          <volume>37</volume>
          <issue>5</issue>
          <fpage>765</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.2017.1579</pub-id>
          <pub-id pub-id-type="medline">29733723</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Borry</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Challenges of web-based personal genomic data sharing</article-title>
          <source>Life Sci Soc Policy</source>
          <year>2015</year>
          <volume>11</volume>
          <fpage>3</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26085313"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s40504-014-0022-7</pub-id>
          <pub-id pub-id-type="medline">26085313</pub-id>
          <pub-id pub-id-type="pmcid">PMC4480345</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rehm</surname>
              <given-names>HL</given-names>
            </name>
          </person-group>
          <article-title>Evolving health care through personal genomics</article-title>
          <source>Nat Rev Genet</source>
          <year>2017</year>
          <month>04</month>
          <volume>18</volume>
          <issue>4</issue>
          <fpage>259</fpage>
          <lpage>67</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28138143"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/nrg.2016.162</pub-id>
          <pub-id pub-id-type="medline">28138143</pub-id>
          <pub-id pub-id-type="pii">nrg.2016.162</pub-id>
          <pub-id pub-id-type="pmcid">PMC6517837</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Marmor</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bonomi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dow</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States</article-title>
          <source>Ann N Y Acad Sci</source>
          <year>2017</year>
          <month>01</month>
          <volume>1387</volume>
          <issue>1</issue>
          <fpage>73</fpage>
          <lpage>83</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27681358"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/nyas.13259</pub-id>
          <pub-id pub-id-type="medline">27681358</pub-id>
          <pub-id pub-id-type="pmcid">PMC5266631</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tabor</surname>
              <given-names>HK</given-names>
            </name>
            <name name-style="western">
              <surname>Berkman</surname>
              <given-names>BE</given-names>
            </name>
            <name name-style="western">
              <surname>Hull</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Bamshad</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Genomics really gets personal: how exome and whole genome sequencing challenge the ethical framework of human genetics research</article-title>
          <source>Am J Med Genet A</source>
          <year>2011</year>
          <month>12</month>
          <volume>155A</volume>
          <issue>12</issue>
          <fpage>2916</fpage>
          <lpage>24</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22038764"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/ajmg.a.34357</pub-id>
          <pub-id pub-id-type="medline">22038764</pub-id>
          <pub-id pub-id-type="pmcid">PMC4819320</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaye</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The tension between data sharing and the protection of privacy in genomics research</article-title>
          <source>Annu Rev Genomics Hum Genet</source>
          <year>2012</year>
          <volume>13</volume>
          <fpage>415</fpage>
          <lpage>31</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22404490"/>
          </comment>
          <pub-id pub-id-type="doi">10.1146/annurev-genom-082410-101454</pub-id>
          <pub-id pub-id-type="medline">22404490</pub-id>
          <pub-id pub-id-type="pmcid">PMC4337968</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Schaik</surname>
              <given-names>TA</given-names>
            </name>
            <name name-style="western">
              <surname>Kovalevskaya</surname>
              <given-names>NV</given-names>
            </name>
            <name name-style="western">
              <surname>Protopapas</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wahid</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Nielsen</surname>
              <given-names>FG</given-names>
            </name>
          </person-group>
          <article-title>The need to redefine genomic data sharing: a focus on data accessibility</article-title>
          <source>Appl Transl Genom</source>
          <year>2014</year>
          <month>9</month>
          <day>28</day>
          <volume>3</volume>
          <issue>4</issue>
          <fpage>100</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2212-0661(14)00038-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.atg.2014.09.013</pub-id>
          <pub-id pub-id-type="medline">27294022</pub-id>
          <pub-id pub-id-type="pii">S2212-0661(14)00038-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC4888834</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Riggs</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Azzariti</surname>
              <given-names>DR</given-names>
            </name>
            <name name-style="western">
              <surname>Niehaus</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Goehringer</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Ramos</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Rehm</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>CL</given-names>
            </name>
            <collab>Clinical Genome Resource Education Working Group</collab>
          </person-group>
          <article-title>Development of a consent resource for genomic data sharing in the clinical setting</article-title>
          <source>Genet Med</source>
          <year>2019</year>
          <month>01</month>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>81</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29899502"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41436-018-0017-5</pub-id>
          <pub-id pub-id-type="medline">29899502</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41436-018-0017-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC6292744</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dheensa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Carrieri</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doheny</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Turnpenny</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lucassen</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A 'joint venture' model of recontacting in clinical genomics: challenges for responsible implementation</article-title>
          <source>Eur J Med Genet</source>
          <year>2017</year>
          <month>07</month>
          <volume>60</volume>
          <issue>7</issue>
          <fpage>403</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1769-7212(17)30142-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ejmg.2017.05.001</pub-id>
          <pub-id pub-id-type="medline">28501562</pub-id>
          <pub-id pub-id-type="pii">S1769-7212(17)30142-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carrieri</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dheensa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Doheny</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Turnpenny</surname>
              <given-names>PD</given-names>
            </name>
            <name name-style="western">
              <surname>Lucassen</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>Recontacting in clinical practice: an investigation of the views of healthcare professionals and clinical scientists in the United Kingdom</article-title>
          <source>Eur J Hum Genet</source>
          <year>2017</year>
          <month>02</month>
          <volume>25</volume>
          <issue>3</issue>
          <fpage>275</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28051074"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/ejhg.2016.188</pub-id>
          <pub-id pub-id-type="medline">28051074</pub-id>
          <pub-id pub-id-type="pii">ejhg2016188</pub-id>
          <pub-id pub-id-type="pmcid">PMC5315519</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lawler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Siu</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Rehm</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Chanock</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Alterovitz</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Burn</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Calvo</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lacombe</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Teh</surname>
              <given-names>BT</given-names>
            </name>
            <name name-style="western">
              <surname>North</surname>
              <given-names>KN</given-names>
            </name>
            <name name-style="western">
              <surname>Sawyers</surname>
              <given-names>CL</given-names>
            </name>
            <collab>Clinical Working Group of the Global Alliance for GenomicsHealth (GA4GH)</collab>
          </person-group>
          <article-title>All the world's a stage: facilitating discovery science and improved cancer care through the global alliance for genomics and health</article-title>
          <source>Cancer Discov</source>
          <year>2015</year>
          <month>11</month>
          <volume>5</volume>
          <issue>11</issue>
          <fpage>1133</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://cancerdiscovery.aacrjournals.org/cgi/pmidlookup?view=long&#38;pmid=26526696"/>
          </comment>
          <pub-id pub-id-type="doi">10.1158/2159-8290.CD-15-0821</pub-id>
          <pub-id pub-id-type="medline">26526696</pub-id>
          <pub-id pub-id-type="pii">5/11/1133</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Siu</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Lawler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Haussler</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Vis</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Liao</surname>
              <given-names>RG</given-names>
            </name>
            <name name-style="western">
              <surname>Andre</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Banks</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Barrett</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Caldas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Camargo</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzgerald</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Mao</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mattison</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Pao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Sellers</surname>
              <given-names>WR</given-names>
            </name>
            <name name-style="western">
              <surname>Sullivan</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Teh</surname>
              <given-names>BT</given-names>
            </name>
            <name name-style="western">
              <surname>Ward</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>ZenKlusen</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Sawyers</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Voest</surname>
              <given-names>EE</given-names>
            </name>
          </person-group>
          <article-title>Facilitating a culture of responsible and effective sharing of cancer genome data</article-title>
          <source>Nat Med</source>
          <year>2016</year>
          <month>05</month>
          <day>05</day>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>464</fpage>
          <lpage>71</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27149219"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/nm.4089</pub-id>
          <pub-id pub-id-type="medline">27149219</pub-id>
          <pub-id pub-id-type="pii">nm.4089</pub-id>
          <pub-id pub-id-type="pmcid">PMC4995884</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vis</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Liao</surname>
              <given-names>RG</given-names>
            </name>
            <name name-style="western">
              <surname>Mao</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Andre</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ward</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Calvo</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Teh</surname>
              <given-names>BT</given-names>
            </name>
            <name name-style="western">
              <surname>Camargo</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Sawyers</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Wessels</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Lawler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Siu</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Voest</surname>
              <given-names>E</given-names>
            </name>
            <collab>Clinical Working Group of the Global Alliance for GenomicsHealth</collab>
          </person-group>
          <article-title>Towards a global cancer knowledge network: dissecting the current international cancer genomic sequencing landscape</article-title>
          <source>Ann Oncol</source>
          <year>2017</year>
          <month>05</month>
          <day>01</day>
          <volume>28</volume>
          <issue>5</issue>
          <fpage>1145</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0923-7534(19)32014-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/annonc/mdx037</pub-id>
          <pub-id pub-id-type="medline">28453708</pub-id>
          <pub-id pub-id-type="pii">S0923-7534(19)32014-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC5406763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Mardis</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Ota</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Watson</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Pfeifer</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Comprehensive genomic studies: emerging regulatory, strategic, and quality assurance challenges for biorepositories</article-title>
          <source>Am J Clin Pathol</source>
          <year>2012</year>
          <month>07</month>
          <volume>138</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>41</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22706855"/>
          </comment>
          <pub-id pub-id-type="doi">10.1309/AJCPXBA69LNSCVMH</pub-id>
          <pub-id pub-id-type="medline">22706855</pub-id>
          <pub-id pub-id-type="pii">138/1/31</pub-id>
          <pub-id pub-id-type="pmcid">PMC3509484</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chaterji</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Grama</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bagchi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Federation in genomics pipelines: techniques and challenges</article-title>
          <source>Brief Bioinform</source>
          <year>2019</year>
          <month>01</month>
          <day>18</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>235</fpage>
          <lpage>44</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28968781"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/bib/bbx102</pub-id>
          <pub-id pub-id-type="medline">28968781</pub-id>
          <pub-id pub-id-type="pii">4096810</pub-id>
          <pub-id pub-id-type="pmcid">PMC6357554</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thorisson</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Muilu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Genotype-phenotype databases: challenges and solutions for the post-genomic era</article-title>
          <source>Nat Rev Genet</source>
          <year>2009</year>
          <month>01</month>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>9</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1038/nrg2483</pub-id>
          <pub-id pub-id-type="medline">19065136</pub-id>
          <pub-id pub-id-type="pii">nrg2483</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Acmg Board Of Directors</collab>
          </person-group>
          <article-title>Laboratory and clinical genomic data sharing is crucial to improving genetic health care: a position statement of the American College of Medical Genetics and Genomics</article-title>
          <source>Genet Med</source>
          <year>2017</year>
          <month>07</month>
          <volume>19</volume>
          <issue>7</issue>
          <fpage>721</fpage>
          <lpage>2</lpage>
          <pub-id pub-id-type="doi">10.1038/gim.2016.196</pub-id>
          <pub-id pub-id-type="medline">28055021</pub-id>
          <pub-id pub-id-type="pii">gim2016196</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Global Alliance for GenomicsHealth</collab>
          </person-group>
          <article-title>GENOMICS. A federated ecosystem for sharing genomic, clinical data</article-title>
          <source>Science</source>
          <year>2016</year>
          <month>06</month>
          <day>10</day>
          <volume>352</volume>
          <issue>6291</issue>
          <fpage>1278</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1126/science.aaf6162</pub-id>
          <pub-id pub-id-type="medline">27284183</pub-id>
          <pub-id pub-id-type="pii">352/6291/1278</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weber</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McMurry</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Macfadden</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nigrin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Churchill</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kohane</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The Shared Health Research Information Network (SHRINE): a prototype federated query tool for clinical data repositories</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2009</year>
          <volume>16</volume>
          <issue>5</issue>
          <fpage>624</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/19567788"/>
          </comment>
          <pub-id pub-id-type="doi">10.1197/jamia.M3191</pub-id>
          <pub-id pub-id-type="medline">19567788</pub-id>
          <pub-id pub-id-type="pii">M3191</pub-id>
          <pub-id pub-id-type="pmcid">PMC2744712</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grishin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Obbad</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Estep</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Quinn</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zaranek</surname>
              <given-names>SW</given-names>
            </name>
            <name name-style="western">
              <surname>Zaranek</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Vandewege</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Clegg</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>César</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Cifric</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Church</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Accelerating genomic data generation and facilitating genomic data access using decentralization, privacy-preserving technologies and equitable compensation</article-title>
          <source>Blockchain Healthc Today</source>
          <year>2018</year>
          <month>12</month>
          <day>19</day>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.30953/bhty.v1.34</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dyke</surname>
              <given-names>SO</given-names>
            </name>
            <name name-style="western">
              <surname>Philippakis</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Rambla De Argila</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Paltoo</surname>
              <given-names>DN</given-names>
            </name>
            <name name-style="western">
              <surname>Luetkemeier</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Spalding</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Roos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Boycott</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Brudno</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hurles</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rehm</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Matern</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fiume</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sherry</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>Consent codes: upholding standard data use conditions</article-title>
          <source>PLoS Genet</source>
          <year>2016</year>
          <month>01</month>
          <day>21</day>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>e1005772</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pgen.1005772"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pgen.1005772</pub-id>
          <pub-id pub-id-type="medline">26796797</pub-id>
          <pub-id pub-id-type="pii">PGENETICS-D-15-02164</pub-id>
          <pub-id pub-id-type="pmcid">PMC4721915</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based platforms for genomic data sharing: a de-centralized approach in response to the governance problems?</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>01</month>
          <day>01</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>76</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30496430"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocy149</pub-id>
          <pub-id pub-id-type="medline">30496430</pub-id>
          <pub-id pub-id-type="pii">5211361</pub-id>
          <pub-id pub-id-type="pmcid">PMC7647160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ozercan</surname>
              <given-names>HI</given-names>
            </name>
            <name name-style="western">
              <surname>Ileri</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Ayday</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alkan</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Realizing the potential of blockchain technologies in genomics</article-title>
          <source>Genome Res</source>
          <year>2018</year>
          <month>09</month>
          <volume>28</volume>
          <issue>9</issue>
          <fpage>1255</fpage>
          <lpage>63</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://genome.cshlp.org:4040/lookup/pmidlookup?view=long&#38;pmid=30076130"/>
          </comment>
          <pub-id pub-id-type="doi">10.1101/gr.207464.116</pub-id>
          <pub-id pub-id-type="medline">30076130</pub-id>
          <pub-id pub-id-type="pii">gr.207464.116</pub-id>
          <pub-id pub-id-type="pmcid">PMC6120626</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <article-title>Consent-chain-project</article-title>
          <source>Mendeley Data</source>
          <year>2021</year>
          <access-date>2021-09-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://data.mendeley.com/datasets/vwy3hj5h8n/1">https://data.mendeley.com/datasets/vwy3hj5h8n/1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bashir</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <source>Mastering Blockchain</source>
          <year>2017</year>
          <publisher-loc>Birmingham</publisher-loc>
          <publisher-name>Packt Publishing</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <article-title>Bitcoin: a peer-to-peer electronic cash system</article-title>
          <source>bitcoin.org</source>
          <access-date>2021-01-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bitcoin.org/bitcoin.pdf?">https://bitcoin.org/bitcoin.pdf?</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buterin</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Ethereum white paper</article-title>
          <source>etherium.org</source>
          <access-date>2021-01-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf">https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Androulaki</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Barger</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bortnikov</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Muralidharan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cachin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Christidis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>De</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Enyeart</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Murthy</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ferris</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Laventman</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Manevich</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sethi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sorniotti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stathakopoulou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vukolić</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cocco</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yellick</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Hyperledger fabric: a distributed operating system for permissioned blockchains</article-title>
          <source>Proceedings of the Thirteenth EuroSys Conference</source>
          <year>2018</year>
          <conf-name>Proceedings of the Thirteenth EuroSys Conference</conf-name>
          <conf-date>Apr 23-26, 2018</conf-date>
          <conf-loc>Porto Portugal</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3190508.3190538</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Szabo</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Formalizing and securing relationships on public networks</article-title>
          <source>First Monday</source>
          <year>1997</year>
          <month>9</month>
          <day>1</day>
          <volume>2</volume>
          <issue>9</issue>
          <fpage>-</fpage>
          <pub-id pub-id-type="doi">10.5210/fm.v2i9.548</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cannarsa</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Interpretation of contracts and smart contracts: smart interpretation or interpretation of smart contracts?</article-title>
          <source>Eur Rev Priv Law</source>
          <year>2018</year>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>773</fpage>
          <lpage>85</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Delmolino</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Arnett</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kosba</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab</article-title>
          <source>IACR</source>
          <year>2015</year>
          <access-date>2021-04-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eprint.iacr.org/2015/460.pdf">https://eprint.iacr.org/2015/460.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schollmeier</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications</article-title>
          <source>Proceedings First International Conference on Peer-to-Peer Computing</source>
          <year>2001</year>
          <conf-name>First International Conference on Peer-to-Peer Computing</conf-name>
          <conf-date>Aug 27-29, 2001</conf-date>
          <conf-loc>Sweden</conf-loc>
          <pub-id pub-id-type="doi">10.1109/p2p.2001.990434</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sayeed</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Marco-Gisbert</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Assessing blockchain consensus and security mechanisms against the 51% attack</article-title>
          <source>Appl Sci</source>
          <year>2019</year>
          <month>04</month>
          <day>29</day>
          <volume>9</volume>
          <issue>9</issue>
          <fpage>1788</fpage>
          <pub-id pub-id-type="doi">10.3390/app9091788</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Carrara</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandes</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Albuquerque</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Carrano</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Medeiros</surname>
              <given-names>DV</given-names>
            </name>
          </person-group>
          <article-title>Towards a performance evaluation of private blockchain frameworks using a realistic workload</article-title>
          <source>Proceedings of the 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</source>
          <year>2019</year>
          <conf-name>2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</conf-name>
          <conf-date>Feb 19-21, 2019</conf-date>
          <conf-loc>Paris, France</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icin.2019.8685888</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Youngs</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Britto</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The Ripple protocol consensus algorithm</article-title>
          <source>Ripple Consensus</source>
          <year>2018</year>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.naation.com/ripple-consensus-whitepaper.pdf">http://www.naation.com/ripple-consensus-whitepaper.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <article-title>EOS.IO technical white paper</article-title>
          <source>steemit</source>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://steemit.com/eos/@eosio/eos-io-technical-white-paper">https://steemit.com/eos/@eosio/eos-io-technical-white-paper</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brock</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Braden</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Day</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Holochain—a framework for distributed applications</article-title>
          <source>Google Patents</source>
          <year>2021</year>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://patents.google.com/patent/US20200389521A1/en">https://patents.google.com/patent/US20200389521A1/en</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <article-title>Hyperledger Fabric</article-title>
          <source>Hyperledger</source>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hyperledger.org/projects/fabric">https://www.hyperledger.org/projects/fabric</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dawson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Baxter</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Announcing Hyperledger Besu</article-title>
          <source>Hyperledger</source>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hyperledger.org/blog/2019/08/29/announcing-hyperledger-besu">https://www.hyperledger.org/blog/2019/08/29/announcing-hyperledger-besu</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dankar</surname>
              <given-names>FK</given-names>
            </name>
            <name name-style="western">
              <surname>Gergely</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Badji</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Dankar</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Shuaib</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Dynamic-informed consent: a potential solution for ethical dilemmas in population sequencing initiatives</article-title>
          <source>Comput Struct Biotechnol J</source>
          <year>2020</year>
          <month>4</month>
          <day>2</day>
          <volume>18</volume>
          <fpage>913</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2001-0370(19)30496-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.csbj.2020.03.027</pub-id>
          <pub-id pub-id-type="medline">32346464</pub-id>
          <pub-id pub-id-type="pii">S2001-0370(19)30496-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7182686</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karlson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Boutin</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffnagle</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Allen</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Building the partners healthcare biobank at partners personalized medicine: informed consent, return of research results, recruitment lessons and operational considerations</article-title>
          <source>J Pers Med</source>
          <year>2016</year>
          <month>01</month>
          <day>14</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>2</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=jpm6010002"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/jpm6010002</pub-id>
          <pub-id pub-id-type="medline">26784234</pub-id>
          <pub-id pub-id-type="pii">jpm6010002</pub-id>
          <pub-id pub-id-type="pmcid">PMC4810381</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Pain</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Delgado</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Cole</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Campion</surname>
              <given-names>TR</given-names>
            </name>
          </person-group>
          <article-title>Replacing paper informed consent with electronic informed consent for research in academic medical centers: a scoping review</article-title>
          <source>AMIA Jt Summits Transl Sci Proc</source>
          <year>2020</year>
          <month>5</month>
          <day>30</day>
          <volume>2020</volume>
          <fpage>80</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32477626"/>
          </comment>
          <pub-id pub-id-type="medline">32477626</pub-id>
          <pub-id pub-id-type="pmcid">PMC7233043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mamo</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Desira</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ellul</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ebejer</surname>
              <given-names>J-P</given-names>
            </name>
          </person-group>
          <article-title>Dwarna: a blockchain solution for dynamic consent in biobanking</article-title>
          <source>Eur J Hum Genet</source>
          <year>2020</year>
          <month>05</month>
          <volume>28</volume>
          <issue>5</issue>
          <fpage>609</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31844175"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41431-019-0560-9</pub-id>
          <pub-id pub-id-type="medline">31844175</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41431-019-0560-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7170942</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaye</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Whitley</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Lund</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Teare</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Melham</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Dynamic consent: a patient interface for twenty-first century research networks</article-title>
          <source>Eur J Hum Genet</source>
          <year>2015</year>
          <month>02</month>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>141</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24801761"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/ejhg.2014.71</pub-id>
          <pub-id pub-id-type="medline">24801761</pub-id>
          <pub-id pub-id-type="pii">ejhg201471</pub-id>
          <pub-id pub-id-type="pmcid">PMC4130658</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Andrews</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Raspa</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Edwards</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Moultrie</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Turner-Brown</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Alvarez Rivas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Frisch</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Wheeler</surname>
              <given-names>AC</given-names>
            </name>
          </person-group>
          <article-title>"Just tell me what's going on": the views of parents of children with genetic conditions regarding the research use of their child's electronic health record</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>03</month>
          <day>01</day>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>429</fpage>
          <lpage>36</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31913479"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz208</pub-id>
          <pub-id pub-id-type="medline">31913479</pub-id>
          <pub-id pub-id-type="pii">5698289</pub-id>
          <pub-id pub-id-type="pmcid">PMC7025353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Samuel</surname>
              <given-names>GN</given-names>
            </name>
            <name name-style="western">
              <surname>Dheensa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Farsides</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Fenwick</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lucassen</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Healthcare professionals' and patients' perspectives on consent to clinical genetic testing: moving towards a more relational approach</article-title>
          <source>BMC Med Ethics</source>
          <year>2017</year>
          <month>08</month>
          <day>08</day>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>47</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-017-0207-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-017-0207-8</pub-id>
          <pub-id pub-id-type="medline">28789658</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-017-0207-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC5549302</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wust</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gervais</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Do you need a Blockchain?</article-title>
          <source>Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT)</source>
          <year>2018</year>
          <conf-name>2018 Crypto Valley Conference on Blockchain Technology (CVCBT)</conf-name>
          <conf-date>Jun 20-22, 2018</conf-date>
          <conf-loc>Zug, Switzerland</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cvcbt.2018.00011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koens</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Poll</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>What blockchain alternative do you need?</article-title>
          <source>Data Privacy Management, Cryptocurrencies and Blockchain Technology</source>
          <year>2018</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yaga</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mell</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Roby</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Scarfone</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology overview</article-title>
          <source>National institute of Standards and Technology</source>
          <year>2018</year>
          <access-date>2021-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8202.pdf">https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8202.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <article-title>Data sharing to support UK clinical genetics and genomics services</article-title>
          <source>PHG Foundation</source>
          <year>2015</year>
          <access-date>2021-05-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.phgfoundation.org/media/79/download/Data%20sharing%20to%20support%20UK%20clinical%20genetics%20and%20genomics%20services.pdf?v=1&#38;inline=1">https://www.phgfoundation.org/media/79/download/Data%20sharing%20to%20support%20UK%20clinical%20genetics%20 and%20genomics%20services.pdf?v=1&#38;inline=1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>MacArthur</surname>
              <given-names>DG</given-names>
            </name>
          </person-group>
          <article-title>Challenges in clinical genomics</article-title>
          <source>Genome Med</source>
          <year>2012</year>
          <month>5</month>
          <day>12</day>
          <volume>4</volume>
          <fpage>43</fpage>
          <pub-id pub-id-type="doi">10.1186/gm342</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="web">
          <article-title>Genome UK: the future of healthcare</article-title>
          <source>gov.uk</source>
          <year>2020</year>
          <access-date>2021-05-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.gov.uk/government/publications/genome-uk-the-future-of-healthcare">https://www.gov.uk/government/publications/genome-uk-the-future-of-healthcare</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alice</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Briggs</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>NHS patient data breached 1395 times in the last two years</article-title>
          <source>The Ferret</source>
          <year>2021</year>
          <access-date>2021-05-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://theferret.scot/nhs-patient-data-breached-1395-times-in-two-years/">https://theferret.scot/nhs-patient-data-breached-1395-times-in-two-years/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ghafur</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kinross</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hankin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Darzi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>WannaCry-a year on</article-title>
          <source>BMJ</source>
          <year>2018</year>
          <month>06</month>
          <day>04</day>
          <volume>361</volume>
          <fpage>k2381</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj.k2381</pub-id>
          <pub-id pub-id-type="medline">29866711</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Using human tissue: when do we need consent?</article-title>
          <source>J Med Ethics</source>
          <year>2011</year>
          <month>12</month>
          <volume>37</volume>
          <issue>12</issue>
          <fpage>759</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1136/medethics-2011-100043</pub-id>
          <pub-id pub-id-type="medline">21873308</pub-id>
          <pub-id pub-id-type="pii">medethics-2011-100043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cardinal</surname>
              <given-names>RN</given-names>
            </name>
          </person-group>
          <article-title>Clinical records anonymisation and text extraction (CRATE): an open-source software system</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2017</year>
          <month>04</month>
          <day>26</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>50</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-017-0437-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-017-0437-1</pub-id>
          <pub-id pub-id-type="medline">28441940</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-017-0437-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC5405523</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Korff</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Using NHS patient data for research without consent</article-title>
          <source>Law Innov Technol</source>
          <year>2015</year>
          <month>05</month>
          <day>07</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>219</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.5235/175799610794046186</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dalton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hammond</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tully</surname>
              <given-names>MP</given-names>
            </name>
          </person-group>
          <article-title>A deliberative study of public attitudes towards sharing genomic data within NHS genomic medicine services in England</article-title>
          <source>Public Underst Sci</source>
          <year>2020</year>
          <month>10</month>
          <volume>29</volume>
          <issue>7</issue>
          <fpage>702</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/0963662520942132?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0963662520942132</pub-id>
          <pub-id pub-id-type="medline">32664786</pub-id>
          <pub-id pub-id-type="pmcid">PMC7539600</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hebig</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bendraou</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>On the need to study the impact of model driven engineering on software processes</article-title>
          <source>Proceedings of the 2014 International Conference on Software and System Process</source>
          <year>2014</year>
          <conf-name>2014 International Conference on Software and System Process</conf-name>
          <conf-date>May 26-28, 2014</conf-date>
          <conf-loc>Nanjing China</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2600821.2600846</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Woolley</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Kirby</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Leslie</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jeanson</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cabili</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Rushton</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hazard</surname>
              <given-names>JG</given-names>
            </name>
            <name name-style="western">
              <surname>Ladas</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Veal</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Gibson</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Tassé</surname>
              <given-names>A-M</given-names>
            </name>
            <name name-style="western">
              <surname>Dyke</surname>
              <given-names>SO</given-names>
            </name>
            <name name-style="western">
              <surname>Gaff</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Thorogood</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Wilbanks</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>AJ</given-names>
            </name>
          </person-group>
          <article-title>Responsible sharing of biomedical data and biospecimens via the "Automatable Discovery and Access Matrix" (ADA-M)</article-title>
          <source>NPJ Genom Med</source>
          <year>2018</year>
          <month>7</month>
          <day>23</day>
          <volume>3</volume>
          <fpage>17</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41525-018-0057-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41525-018-0057-4</pub-id>
          <pub-id pub-id-type="medline">30062047</pub-id>
          <pub-id pub-id-type="pii">57</pub-id>
          <pub-id pub-id-type="pmcid">PMC6056554</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dyke</surname>
              <given-names>SOM</given-names>
            </name>
            <name name-style="western">
              <surname>Philippakis</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Rambla De Argila</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Paltoo</surname>
              <given-names>DN</given-names>
            </name>
            <name name-style="western">
              <surname>Luetkemeier</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Spalding</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Roos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Boycott</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Brudno</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hurles</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rehm</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Matern</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fiume</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sherry</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>Consent Codes: Upholding Standard Data Use Conditions</article-title>
          <source>PLoS Genet</source>
          <year>2016</year>
          <month>1</month>
          <day>21</day>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>e1005772</fpage>
          <pub-id pub-id-type="doi">10.1371/journal.pgen.1005772</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chenthara</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Whittaker</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Healthchain: a novel framework on privacy preservation of electronic health records using blockchain technology</article-title>
          <source>PLoS One</source>
          <year>2020</year>
          <month>12</month>
          <day>9</day>
          <volume>15</volume>
          <issue>12</issue>
          <fpage>e0243043</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0243043"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0243043</pub-id>
          <pub-id pub-id-type="medline">33296379</pub-id>
          <pub-id pub-id-type="pii">PONE-D-20-27393</pub-id>
          <pub-id pub-id-type="pmcid">PMC7725426</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Azaria</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ekblaw</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Vieira</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lippman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>MedRec: Using blockchain for medical data access and permission management</article-title>
          <source>Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD)</source>
          <year>2016</year>
          <conf-name>2016 2nd International Conference on Open and Big Data (OBD)</conf-name>
          <conf-date>Aug 22-24, 2016</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <pub-id pub-id-type="doi">10.1109/obd.2016.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cyran</surname>
              <given-names>Ma</given-names>
            </name>
          </person-group>
          <article-title>Blockchain as a foundation for sharing healthcare data</article-title>
          <source>Blockchain Healthc Today</source>
          <year>2018</year>
          <month>03</month>
          <day>23</day>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blockchainhealthcaretoday.com/index.php/journal/article/view/13"/>
          </comment>
          <pub-id pub-id-type="doi">10.30953/bhty.v1.13</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Sarker</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Rudolph</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Foreman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fay</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Dhuliawala</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sylla</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fairoza</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Das</surname>
              <given-names>AK</given-names>
            </name>
          </person-group>
          <article-title>Enforcing human subject regulations using blockchain and smart contracts</article-title>
          <source>Blockchain Healthc Today</source>
          <year>2018</year>
          <month>03</month>
          <day>23</day>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blockchainhealthcaretoday.com/index.php/journal/article/view/10"/>
          </comment>
          <pub-id pub-id-type="doi">10.30953/bhty.v1.10</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mamo</surname>
              <given-names>Nicholas</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>Gillian M</given-names>
            </name>
            <name name-style="western">
              <surname>Desira</surname>
              <given-names>Maria</given-names>
            </name>
            <name name-style="western">
              <surname>Ellul</surname>
              <given-names>Bridget</given-names>
            </name>
            <name name-style="western">
              <surname>Ebejer</surname>
              <given-names>Jean-Paul</given-names>
            </name>
          </person-group>
          <article-title>Dwarna: a blockchain solution for dynamic consent in biobanking</article-title>
          <source>Eur J Hum Genet</source>
          <year>2020</year>
          <month>05</month>
          <volume>28</volume>
          <issue>5</issue>
          <fpage>609</fpage>
          <lpage>626</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31844175"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41431-019-0560-9</pub-id>
          <pub-id pub-id-type="medline">31844175</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41431-019-0560-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7170942</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tith</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Suzuki</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wijesundara</surname>
              <given-names>WM</given-names>
            </name>
            <name name-style="western">
              <surname>Taira</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Obi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ohyama</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Patient consent management by a purpose-based consent model for electronic health record based on blockchain technology</article-title>
          <source>Healthc Inform Res</source>
          <year>2020</year>
          <month>10</month>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>265</fpage>
          <lpage>73</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.e-hir.org/DOIx.php?id=10.4258/hir.2020.26.4.265"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2020.26.4.265</pub-id>
          <pub-id pub-id-type="medline">33190460</pub-id>
          <pub-id pub-id-type="pii">hir.2020.26.4.265</pub-id>
          <pub-id pub-id-type="pmcid">PMC7674812</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubovitskaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Baig</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Shukla</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zambani</surname>
              <given-names>PS</given-names>
            </name>
            <name name-style="western">
              <surname>Swaminathan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jahangir</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Chowdhry</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lachhani</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Idnani</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Aberer</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Stoller</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>ACTION-EHR: patient-centric blockchain-based electronic health record data management for cancer care</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>08</month>
          <day>21</day>
          <volume>22</volume>
          <issue>8</issue>
          <fpage>e13598</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/8/e13598/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13598</pub-id>
          <pub-id pub-id-type="medline">32821064</pub-id>
          <pub-id pub-id-type="pii">v22i8e13598</pub-id>
          <pub-id pub-id-type="pmcid">PMC7474412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubovitskaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Secure and trustable electronic medical records sharing using blockchain</article-title>
          <source>arXiv.org</source>
          <year>2017</year>
          <access-date>2021-05-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/1709.06528">http://arxiv.org/abs/1709.06528</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rajput</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Ahvanooey</surname>
              <given-names>MT</given-names>
            </name>
          </person-group>
          <article-title>A blockchain-based secret-data sharing framework for personal health records in emergency condition</article-title>
          <source>Healthcare (Basel)</source>
          <year>2021</year>
          <month>02</month>
          <day>14</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>206</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=healthcare9020206"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/healthcare9020206</pub-id>
          <pub-id pub-id-type="medline">33672991</pub-id>
          <pub-id pub-id-type="pii">healthcare9020206</pub-id>
          <pub-id pub-id-type="pmcid">PMC7917907</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Shae</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Shyu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Generalizable layered blockchain architecture for health care applications: development, case studies, and evaluation</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>07</month>
          <day>27</day>
          <volume>22</volume>
          <issue>7</issue>
          <fpage>e19029</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/7/e19029/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/19029</pub-id>
          <pub-id pub-id-type="medline">32716300</pub-id>
          <pub-id pub-id-type="pii">v22i7e19029</pub-id>
          <pub-id pub-id-type="pmcid">PMC7418010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="web">
          <article-title>The ProvableTM blockchain oracle for modern DApps</article-title>
          <source>Provable</source>
          <access-date>2021-01-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://provable.xyz/">https://provable.xyz/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christidis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Devetsikiotis</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Blockchains and smart contracts for the internet of things</article-title>
          <source>IEEE Access</source>
          <year>2016</year>
          <month>5</month>
          <day>10</day>
          <volume>4</volume>
          <fpage>2292</fpage>
          <lpage>303</lpage>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2016.2566339</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atzei</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Bartoletti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cimoli</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>A survey of attacks on Ethereum Smart Contracts (SoK)</article-title>
          <source>Principles of Security and Trust</source>
          <year>2017</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oliver</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Slashinski</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Hilsenbeck</surname>
              <given-names>SG</given-names>
            </name>
            <name name-style="western">
              <surname>McGuire</surname>
              <given-names>AL</given-names>
            </name>
          </person-group>
          <article-title>Balancing the risks and benefits of genomic data sharing: genome research participants' perspectives</article-title>
          <source>Public Health Genomics</source>
          <year>2012</year>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>106</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.karger.com?DOI=10.1159/000334718"/>
          </comment>
          <pub-id pub-id-type="doi">10.1159/000334718</pub-id>
          <pub-id pub-id-type="medline">22213783</pub-id>
          <pub-id pub-id-type="pii">000334718</pub-id>
          <pub-id pub-id-type="pmcid">PMC3318928</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Slavkovic</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>O privacy, where art thou?: genomics and privacy</article-title>
          <source>CHANCE</source>
          <year>2015</year>
          <month>04</month>
          <day>27</day>
          <volume>28</volume>
          <issue>2</issue>
          <fpage>37</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1080/09332480.2015.1042736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bacchus</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Towards secure and privacy preserving e-health data exchanges through consent based access control internet</article-title>
          <source>ProQuest</source>
          <year>2017</year>
          <access-date>2021-05-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/openview/4c24433193f4293fca2bcdfccda1cef5/1?pq-origsite=gscholar&#38;cbl=18750">https://www.proquest.com/openview/4c24433193f4293fca2bcdfccda1cef5/1?pq-origsite=gscholar&#38;cbl=18750</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cash</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bassiouni</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Two-tier permission-ed and permission-less blockchain for secure data sharing</article-title>
          <source>Proceedings of the 2018 IEEE International Conference on Smart Cloud (SmartCloud)</source>
          <year>2018</year>
          <conf-name>2018 IEEE International Conference on Smart Cloud (SmartCloud)</conf-name>
          <conf-date>Sep 21-23, 2018</conf-date>
          <conf-loc>New York, NY, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/smartcloud.2018.00031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="web">
          <article-title>Proof-of-Authority consensus</article-title>
          <source>GitHub</source>
          <access-date>2021-06-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://apla.readthedocs.io/en/latest/concepts/consensus.html#attack">https://apla.readthedocs.io/en/latest/concepts/consensus.html#attack</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Angelis</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Aniello</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Baldoni</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lombardi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Margheri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sassone</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain</article-title>
          <source>Proceedings of the  Italian Conference on Cybersecurity</source>
          <year>2017</year>
          <conf-name>Italian Conference on Cybersecurity</conf-name>
          <conf-date>Feb 6, 2018</conf-date>
          <conf-loc>Milan, Italy</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="web">
          <article-title>Proof of authority</article-title>
          <source>GitHub</source>
          <access-date>2021-06-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/openethereum/parity-ethereum">https://github.com/openethereum/parity-ethereum</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Humbeeck</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The blockchain-GDPR paradox</article-title>
          <source>J Data Prot Priv</source>
          <year>2019</year>
          <volume>2</volume>
          <issue>3</issue>
          <fpage>208</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hstalks.com/article/4997/the-blockchain-gdpr-paradox/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berberich</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Steiner</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Practitioner's corner ∙ blockchain technology and the GDPR – how to reconcile privacy and distributed ledgers?</article-title>
          <source>Eur Data Prot Law Rev</source>
          <year>2016</year>
          <volume>2</volume>
          <issue>3</issue>
          <fpage>422</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.21552/edpl/2016/3/21</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="web">
          <article-title>Blockchain and GDPR: how blockchain could address five areas associated with GDPR compliance</article-title>
          <source>IBM Security</source>
          <year>2018</year>
          <access-date>2021-05-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iapp.org/media/pdf/resource_center/blockchain_and_gdpr.pdf">https://iapp.org/media/pdf/resource_center/blockchain_and_gdpr.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Finck</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Blockchains and the General Data Protection Regulation</source>
          <year>2019</year>
          <publisher-loc>Brussels</publisher-loc>
          <publisher-name>European Union</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Mukkamala</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Vatrapu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ordieres-Mere</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based personal health data sharing system using cloud storage</article-title>
          <source>Proceedings of the 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)</source>
          <year>2018</year>
          <conf-name>2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)</conf-name>
          <conf-date>Sep 17-20, 2018</conf-date>
          <conf-loc>Ostrava, Czech Republic</conf-loc>
          <pub-id pub-id-type="doi">10.1109/healthcom.2018.8531125</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rantos</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Drosatos</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kritsas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ilioudis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Papanikolaou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Filippidis</surname>
              <given-names>AP</given-names>
            </name>
          </person-group>
          <article-title>A blockchain-based platform for consent management of personal data processing in the IoT ecosystem</article-title>
          <source>Sec Commun Netw</source>
          <year>2019</year>
          <volume>2019</volume>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1155/2019/1431578</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wirth</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kolain</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy by BlockChain design: a blockchain-enabled GDPR-compliant approach for handling personal data</article-title>
          <source>Proceedings of 1st ERCIM Blockchain Workshop 2018</source>
          <year>2018</year>
          <conf-name>Proceedings of 1st ERCIM Blockchain Workshop 2018</conf-name>
          <conf-date>May 8-9, 2018</conf-date>
          <conf-loc>Amsterdam, Netherlands</conf-loc>
          <pub-id pub-id-type="doi">10.18420/blockchain2018_03</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Camilo</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based consent manager for GDPR compliance</article-title>
          <source>Open Identity Summit</source>
          <year>2019</year>
          <access-date>2021-05-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.gi.de/bitstream/handle/20.500.12116/20985/proceedings-14.pdf?isAllowed=y&#38;sequence=1">https://dl.gi.de/bitstream/handle/20.500.12116/20985/proceedings-14.pdf?isAllowed=y&#38;sequence=1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farshid</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Reitz</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Roßbach</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Design of a forgetting blockchain: a possible way to accomplish GDPR compatibility</article-title>
          <source>Proceedings of the 52nd Hawaii International Conference on System Sciences</source>
          <year>2019</year>
          <conf-name>52nd Hawaii International Conference on System Sciences</conf-name>
          <conf-date>Jan 8-11, 2019</conf-date>
          <conf-loc>Maui, Hawaii, USA</conf-loc>
          <pub-id pub-id-type="doi">10.24251/hicss.2019.850</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eichler</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Jongerius</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McMullen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Naegele</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Steininger</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Blockchain, data protection, and the GDPR</article-title>
          <source>Blockchain Bundesverband</source>
          <year>2021</year>
          <access-date>2021-05-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.crowdfundinsider.com/wp-content/uploads/2018/06/GDPR_Position_Paper_v1.0.pdf">https://www.crowdfundinsider.com/wp-content/uploads/2018/06/GDPR_Position_Paper_v1.0.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rose</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>GDPR challenges for blockchain technology</article-title>
          <source>Interact Enterain Law Rev</source>
          <year>2019</year>
          <month>6</month>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>35</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.4337/ielr.2019.01.03</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
