{"id":"https://openalex.org/W7128057404","doi":"https://doi.org/10.1186/s13677-026-00842-4","title":"Enhancing health data integrity using Distributed Ledger Technology","display_name":"Enhancing health data integrity using Distributed Ledger Technology","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7128057404","doi":"https://doi.org/10.1186/s13677-026-00842-4"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-026-00842-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00842-4","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-026-00842-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030848543","display_name":"Jo\u00e3o Gi\u00e3o","orcid":"https://orcid.org/0000-0003-4525-4832"},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Joao Giao","raw_affiliation_strings":["NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal"],"affiliations":[{"raw_affiliation_string":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal","institution_ids":["https://openalex.org/I83558840"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125251449","display_name":"Fernando Luis-Ferreira","orcid":null},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Fernando Luis-Ferreira","raw_affiliation_strings":["NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal"],"affiliations":[{"raw_affiliation_string":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal","institution_ids":["https://openalex.org/I83558840"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123682385","display_name":"Joao Sarraipa","orcid":null},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Joao Sarraipa","raw_affiliation_strings":["NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal"],"affiliations":[{"raw_affiliation_string":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal","institution_ids":["https://openalex.org/I83558840"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ricardo Jardim-Gon\u00e7alves","orcid":null},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Ricardo Jardim-Gon\u00e7alves","raw_affiliation_strings":["NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal"],"affiliations":[{"raw_affiliation_string":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), NOVA University Lisbon, Street, Caparica, Lisbon, 2829-516, Portugal","institution_ids":["https://openalex.org/I83558840"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030848543"],"corresponding_institution_ids":["https://openalex.org/I83558840"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37255532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.3743000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.3743000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.12540000677108765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.08640000224113464,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.7633000016212463},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.6176999807357788},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5432999730110168},{"id":"https://openalex.org/keywords/ehealth","display_name":"eHealth","score":0.5217000246047974},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.42989999055862427},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.3898000121116638},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3815999925136566},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.37779998779296875},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.37119999527931213}],"concepts":[{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.7633000016212463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6421999931335449},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.6176999807357788},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5559999942779541},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5432999730110168},{"id":"https://openalex.org/C202645933","wikidata":"https://www.wikidata.org/wiki/Q4930","display_name":"eHealth","level":3,"score":0.5217000246047974},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4867999851703644},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.42989999055862427},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3898000121116638},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3815999925136566},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.3610000014305115},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.35010001063346863},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3221000134944916},{"id":"https://openalex.org/C3017977704","wikidata":"https://www.wikidata.org/wiki/Q18745135","display_name":"Health data","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3125},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30720001459121704},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C2993209047","wikidata":"https://www.wikidata.org/wiki/Q91248609","display_name":"Scientific integrity","level":2,"score":0.29670000076293945},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2946999967098236},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C2989086416","wikidata":"https://www.wikidata.org/wiki/Q15067276","display_name":"Healthcare industry","level":3,"score":0.2694999873638153},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.2671999931335449},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-026-00842-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00842-4","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:16f80597c23f460682c17f2b796314c4","is_oa":true,"landing_page_url":"https://doaj.org/article/16f80597c23f460682c17f2b796314c4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-026-00842-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00842-4","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5661508440971375,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1541456620","https://openalex.org/W1990509304","https://openalex.org/W2079484041","https://openalex.org/W2136922540","https://openalex.org/W2272954987","https://openalex.org/W2795085730","https://openalex.org/W2899880612","https://openalex.org/W2904417349","https://openalex.org/W2926529920","https://openalex.org/W2989256138","https://openalex.org/W3001576933","https://openalex.org/W3002652184","https://openalex.org/W3005929894","https://openalex.org/W3008169821","https://openalex.org/W3025603969","https://openalex.org/W3047027698","https://openalex.org/W3120264963","https://openalex.org/W3138387695","https://openalex.org/W3156332541","https://openalex.org/W3161499634","https://openalex.org/W4206243574","https://openalex.org/W4238399766","https://openalex.org/W4280585680","https://openalex.org/W4289533854","https://openalex.org/W4323519279","https://openalex.org/W4377966843","https://openalex.org/W4380225094","https://openalex.org/W4381329190","https://openalex.org/W4385637690","https://openalex.org/W4387707139","https://openalex.org/W4391386385","https://openalex.org/W4404181428"],"related_works":[],"abstract_inverted_index":{"Nowadays,":[0],"with":[1,140,159],"the":[2,15,27,47,50,61,74,80,85,89,122,151],"increased":[3],"integration":[4],"of":[5,31,79],"cloud-computing,":[6],"data":[7,32,102,136,144],"integrity":[8,137],"continues":[9],"to":[10,25,45,55,76,95,133],"be":[11,154],"a":[12,130],"problem":[13],"in":[14,60,110,117,138],"current":[16],"eHealth":[17],"sector.":[18],"This":[19,127],"security":[20],"principle":[21],"is":[22,114],"considered":[23],"fundamental":[24],"ensure":[26],"accuracy":[28],"and":[29,38,58,68,100,163],"reliability":[30],"by":[33],"ensuring":[34,142],"protection":[35],"from":[36],"unauthorized":[37],"illicit":[39],"tampering.":[40],"The":[41,71],"present":[42],"work":[43],"aims":[44],"demonstrate":[46],"ability":[48],"for":[49,64,84,92,146],"Distributed":[51],"Ledger":[52],"Technology":[53],"(DLT)":[54],"provide":[56],"trust":[57],"confidence":[59],"healthcare":[62,66,90,135],"infrastructure":[63],"patients,":[65],"professionals":[67],"policy":[69],"makers.":[70],"DLT":[72],"has":[73],"potential":[75,94],"become":[77],"one":[78],"most":[81],"reliable":[82],"solutions":[83],"many":[86],"challenges":[87],"facing":[88],"industry":[91],"its":[93],"enable":[96],"more":[97],"secure,":[98],"transparent,":[99],"equitable":[101],"management.":[103],"Although":[104],"much":[105],"documentation":[106],"exists":[107],"about":[108],"applications":[109],"this":[111],"domain,":[112],"it":[113],"mostly":[115],"presented":[116],"high-level":[118],"conceptualization,":[119],"without":[120],"detailing":[121],"actual":[123],"development":[124],"or":[125],"implementation.":[126],"document":[128],"proposes":[129],"metadata-based":[131],"approach":[132],"protect":[134],"compliance":[139],"GDPR,":[141],"trustworthy":[143],"access":[145],"end-users,":[147],"while":[148],"demonstrating":[149],"that":[150],"solution":[152],"can":[153],"deployed":[155],"on":[156],"low-resource":[157],"hardware":[158],"minimal":[160],"adaptation":[161],"effort":[162],"time":[164],"constraints.":[165]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-02-07T00:00:00"}
