<<

Trust dHealthNetwork.io Ivan Jasenovic - Founder - CEO of Sicoor.com Paradigms and tools change Leveraging the power of Blockchain

Decentralised

Secure - immutable - verifiable bioinformatic and financial information Quotes

“As revolutionary as it sounds, Blockchain truly is a mechanism to bring everyone to the highest degree of accountability. No more missed transactions, human or machine errors, or even an exchange that was not done with the consent of the parties involved. Above anything else, the most critical area where Blockchain helps is to guarantee the validity of a transaction by recording it not only on a main register but a connected distributed system of registers, all of which are connected through a secure validation mechanism.” Ian Khan, TEDx Speaker | Author | Technology Futurist Quotes

“Blockchain solves the problem of manipulation. When I speak about it in the West, people say they trust Google, Facebook, or their banks. But the rest of the world doesn’t trust organizations and corporations that much — I mean Africa, India, the Eastern Europe, or Russia. It’s not about the places where people are really rich. Blockchain’s opportunities are the highest in the countries that haven’t reached that level yet.” Vitalik Buterin, inventor of Ethereum dHealthNetwork.io Ivan Jasenovic - Founder - CEO of Sicoor.com Avionics Engineer - Entrepreneur

Steve Asetre

Steve is a serial entrepreneur, investor, business owner and engineer. He has sourced start-up financing for companies such as Cyberdefender, International Silver and Playsino. He is co-founder of Sicoor.

He is also co-founder and Managing Member of Dilato Point Capital, Founder and President of SEBA Ventures and Ancillatech. As a business owner, he is a partner at Kona Beri Frozen Yogurt.

As an Electrical/Mechanical Engineer, Steve consults for companies in the aerospace/defense industry, such as Lockheed-Martin, Rocketdyne, Raytheon and Northrop-Grumman. Trusted Friends History Trusted Friends History Trust Me Yet? Stennis Space Center Director

Dr. Richard J. Gilbrech

Richard J. Gilbrech serves as director of NASA’s John C. Stennis Space Center near Bay St. Louis, MS, since his appointment to the position in 2012. As director, he provides executive leadership, overall direction and management of the center.

He is responsible for implementing NASA's mission in the area of rocket propulsion testing, developing and maintaining NASA's world-class rocket propulsion test facilities. He serves as a federal manager hosting an integrated multi-agency federal laboratory.

Stennis is a unique federal city that is home to more than 40 federal, state, academic and private organizations and numerous technology-based companies. Professor, , PhD

Gregory Chamitoff

Gregory Errol Chamitoff born 6 August 1962 in , Quebec, Canada is an engineer and NASA astronaut. He was assigned to and flew to the International Space Station on STS-124, launching 31 May 2008.

He was in space 198 days, joining after Expedition 17 left the station, and returned to Earth 30 November 2008 on STS-126. Chamitoff served as a mission specialist on the STS-134 mission, which was the last flight of and delivered the Alpha Magnetic Spectrometer.

Now with over 200 days in space, Professor Chamitoff spends half the year in Australia and the other half in Texas teaching Aeronautical and engineering students.

What does the blockchain do?

Functionally, blockchains are.. Central Trust Using a ● A database (Ledger) Third-Party

○ Record of transactions

● A compute platform Distributed Trust ○ “Smart Contracts” Using a Blockchain

● Distributed, and no central owner Network Blockchain

Proof of Work - dHt -Identity Proof of Stake - Storage Keys Side Chain - Voting Tokens Proof of Stake - Research Data Membership - Ledger A Network of Nodes

A network of so-called computing “nodes” make up the blockchain.

Node (computer connected to the blockchain network using a client that performs the task of validating and relaying transactions) gets a copy of the blockchain, which gets downloaded automatically upon joining the blockchain network. A GLOBAL CONCERN

OUR HEALTH AND THE HEALTH OF OUR FAMILIES Who will use the Blockchain

Membership Services

Investment Research Blockchain & Conventional Medicine Health Record Keeping - EMR EMR - Bioinformatics - History Flat Earth Payment

The Payment Problem:

All the players in the healthcare universe communicating and getting paid Global Health Jurisdiction

Consumers

Medical Service Providers

Researchers

Investors Action Projects Action Projects Action Projects = Taxi Hires dHealthNetwork app Proof of Stake

Proof of Stake (PoS) happens by a miner putting up a stake, or locking up an amount of their coins, to verify a block of transactions. The cryptographic calculations in PoS are much simpler for computers to solve: you only need to prove you own a certain percentage of all coins available in a given currency. For example, if you somehow owned 2% of all Ether (ETH), you’d be able to mine 2% of all transactions across Ethereum. Proof of Work

Proof of Work happens through miners trying to solve exceptionally difficult math problems. Finding a is basically a guessing game, but checking if a solution is correct is easy. Miners aren’t able to cheat the system because it takes real-world resources to work out these . Hyperledger

Hyperledger Fabric is a platform for distributed ledger solutions, underpinned by a modular architecture delivering high degrees of confidentiality, resiliency, flexibility and scalability. It is designed to support pluggable implementations of different components, and accommodate the complexity and intricacies that exist across the economic ecosystem. Token Release Key Considerations

1. What are the pain points in the system?

2. What do you want to achieve?

3. Who are the key stakeholders?

4. What are the key relationships?

5. Are there other “smart” initiatives?

6. What are the logic paths?

7. How can the blockchain architecture be built into the existing transaction framework? CIA Information Security Properties

● Confidentiality

○ Only Disclosed to authorised parties (Control Reading)

● Integrity

○ Only updated by authorised parties: accurate, well-formed (Control writing)

● Availability

○ Can access when required

● Etc (Anonymity, Privacy, Non-repudiation, ...) Many Kinds of “Healthcare” Systems

● Overall national system of hospitals, government, professionals, supply/suppliers, insurers, etc

● Hospital management systems

● Practice management systems

● Pharmaceutical supply chain systems

● Adverse event reporting and management systems

● Medical insurance and payment systems

● Complex medical devices Security for Health Information?

● Threat model

■ “The main threat the medical privacy is abuse of authorised access by insiders, and the most common threat vector is social engineering.” (Anderson, 2008)

○ Centralised data increases both value and number of people with access

○ Reidentification attacks won’t stop just because they are illegal

● What Security Properties are Key for Clinical Information Systems

○ Privacy? Consent?

● What is a good Security Policy Model? Generic Privacy Policies Are Not Enough?

● Lots of the people think they have the right to access your medical data

○ Public health benefit from the access to data by medical researchers

○ Public economic benefit from access to date by government, admin, (insurers?)

○ BUT there are public health harms if patients lose trust in privacy of data

● Healthcare is complex, and is held to higher ethical standards

○ “The Collection, linking and use of data in biomedical research and health care: ethical issues” (Nuffield Council on Bioethics,2015)

○ “Donation” of data may be limited to purposes

○ Consent is complicated by shared genetics/family history Blockchain Non-Functional Trade-Offs

● Compared to conventional database & script engines, blockchains have:

○ (+) Integrity, Non-repudiation

○ (-) Confidentiality, Privacy

○ (-) Modifiability

○ (-) Throughput/ Scalability/ Big Data

○ (+/ -) Availability/ Latency Potential Blockchain Use Cases

● Financial Services ● Government Services ● Enterprise and Industry ○ Digital Currency ○ Registry & Identity ○ Supply chain ○ (International) ○ Grants & Social Payment security ○ IoT

○ Reconciliation ○ Quota management ○ Metered access

○ Settlement ○ Taxation ○ Digital rights and IP

○ Markets ○ Data management

○ Trade finance ○ Attesation

○ Inter-divisional accounting When to Use a Blockchain?

● You’ll use a blockchain as part of a broader solution, for data storage, compute, and/or communication

● Benefit from blockchain’s advantages

○ Logically-centralised, but administratively and physically distributed

● Deal with blockchain’s limitations

○ Work around limitations with other mechanisms

○ Choose a use case where limitations don’t matter Building a blockchain in the Health Industry

● Design Issues ● Governance issues

○ How is the blockchain being used? ○ How is the blockchain run?

○ Is this use efficient? ○ Is the operation fair

● Tech issues ● Legal issues

○ What blockchain is being used? ○ Is the blockchain’s operation supported by law ○ Is this type of blockchain safe? ● Systemic issues ● Data issues ○ Will the blockchain affect others? ○ How does the blockchain use data? ○ Will it affect system stability? ○ Is it using data properly? ● Design Issues ● Governance issues Efficient ○ How is the blockchain ○ How is the being used? blockchain run? Stable Safe

○ Is this use efficient? ○ Is the operation fair

● Tech issues Blockchain ● Legal issues

○ What blockchain is Lawful Proper ○ Is the blockchain’s being used? operation supported by law ○ Is this type of blockchain safe? Fair ● Systemic issues

● Data issues King & Wood○ Will Mallesons the blockchain/ www.kwm.com The code is not law. Really.

Legal Legal Issues Legal Framework Landscape

● Contract ● Public Law

● Property ● Private Law

● Privacy ● International Law

● Regulation King & Wood Mallesons / www.kwm.com Standards of care

● Identifying Public, Private & Identification the actions International Law which need to work with laws.

● Recognizing CPSS- those actions BCBS ISDA Recognition IOSCO under local laws.

● Harmonizing those local laws Harmonisation so that actions can be taken UNIDROIT UNCITRAL FSB ICMA AFMA across borders.

King & Wood Mallesons / www.kwm.com The Blockchain & Enhanced security

By storing data across its network, the blockchain eliminates the risks that come with data being held centrally.

Its network lacks centralized points of vulnerability that computer hackers can exploit. Today’s internet has security problems that are familiar to everyone. We all rely on the “username/password” system to protect our identity and assets online. Blockchain security methods use encryption technology.

The basis for this are the so-called public and private “keys”. A “public key” (a long, randomly-generated string of numbers) is a users’ address on the blockchain. Bitcoins sent across the network gets recorded as belonging to that address. The “private key” is like a password that gives its owner access to their Bitcoin or other digital assets. Store your data on the blockchain and it is incorruptible. This is true, although protecting your digital assets will also require safeguarding of your private key by printing it out, creating what’s referred to as a paper wallet. Centralized Decentralized Distributed Ledgers

The New Networks

Distributed ledgers can be public or private and vary in their ● Users are anonymous ● Users are not anonymous structure and size ● Each user has a copy ● Permission is required for Public blockchains of the ledger and users to have a copy of the participates in ledger and participate in Require computer processing power to confirm transactions confirming confirming transactions (“Mining”) transactions independently tokenrelease.dhealthnetwork.io/pledge